Author:
Jyothi K. Krishna,Chaudhari Shilpa
Reference15 articles.
1. Steri G, Baldini G, Fovino IN, Neisse R, Goratti L (2016) A novel multi-hop secure LTE-D2D communication protocol for IoT scenarios. In: 2016 23rd international conference on telecommunications (ICT)
2. Taleb T, Kunz A (2012) Machine type communications in 3GPP networks: potential, challenges, and solutions. IEEE Commun Mag 50(3):178–184
3. Ghavimi Fayezeh, Chen Hsiao-Hwa (2015) M2M communications in 3GPP LTE/LTE-A networks: architectures, service requirements, challenges, and applications. IEEE Commun Surv Tutor 17(2):1–26
4. Chengzhe Lai,Hui Lix, Rongxing Lu, Xuemin “A Unified End-to-End Security Scheme for Machine-Type Communication in LTE Networks” 2nd IEEE/CIC International Conference on Communications in China (ICCC),pp. 698–703
5. Cha I, Shah Y, Schmidt AU, Leicher A, Meyerstein MV (2009) Trust in M2M communication. IEEE Veh Technol Mag 4(3):69–75
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献