ABSTRACT

Contents 10.1 Introduction ................................................................................................................... 260 10.2 Security of M2M Communication ................................................................................. 262

10.2.1 Security Requirements ........................................................................................ 263 10.2.2 Security Threats .................................................................................................. 263

10.3 Review of Solutions ........................................................................................................ 264 10.3.1 Solutions for the M2M Device and Gateway Domain .........................................265