A survey on M2M service networks

J Latvakoski, A Iivari, P Vitic, B Jubeh, M Ben Alaya… - Computers, 2014 - mdpi.com
The number of industrial applications relying on the Machine to Machine (M2M) services
exposed from physical world has been increasing in recent years. Such M2M services …

Authorization server and client apparatus, server cooperative system, and token management method

S Mogaki - US Patent 9,571,494, 2017 - Google Patents
There is a method of generating a token required to transfer an access authority to a
cooperating system to a cooperation asking system. In this method, a refresh token is issued …

Method and apparatus for dynamically establishing and joining an encrypted collaborative communication session

T Tahan, SL Cox, W Wang, M Woscek - US Patent 8,885,830, 2014 - Google Patents
A system for establishing an encrypted multicast communication session over a
communications network can include a client means (eg, a radio, laptop, workstation, phone …

A framework to add AAA functionalities in IP multicast

S Islam, JW Atwood - … and Int'l Conference on Internet and Web …, 2006 - ieeexplore.ieee.org
Multicasting, as an operational paradigm, has not been widely adopted until now, in spite of
the advantages of its lower resource utilization and bandwidth conservation. This is due to …

The internet group management protocol with access control (IGMP-AC)

S Islam, JW Atwood - … . 2006 31st IEEE Conference on Local …, 2006 - ieeexplore.ieee.org
IP multicast is best known for its bandwidth conservation and lower resource utilization. The
classical model of multicast makes it difficult to permit access only to authorized end users or …

Sensor and data privacy in industrial wireless sensor networks

N Oualha, A Olivereau - 2011 Conference on Network and …, 2011 - ieeexplore.ieee.org
Over the past years, the deployment of wireless sensor networks (WSNs) into industrial
environments attracted a lot of business domains (eg, defence, public security, energy …

Morphing distribution trees—on the evolution of multicast states under mobility and an adaptive routing scheme for mobile SSM sources

TC Schmidt, M Wählisch - Telecommunication Systems, 2006 - Springer
Abstract Source Specific Multicast (SSM) promises a wider dissemination of group
distribution services than Any Source Multicast, as it relies on simpler routing strategies with …

Transparent handover for mobile multicast sources

I Romdhani, H Bettahar… - … Conference on Systems …, 2006 - ieeexplore.ieee.org
The Internet research community has proposed many routing protocols to support efficient
multicast application. However, these protocols were developed for multicast parties whose …

Design and implementation of a central-controllable and secure multicast system based on universal identifier network

J Guan, X Liu, S Yao, Z Jiang - Sensors, 2018 - mdpi.com
With the rapid increase of network users and services, the breadth and depth of Internet
have greatly changed. The mismatch between current network requirements and original …

Multicast receiver access control by IGMP-AC

S Islam, JW Atwood - Computer Networks, 2009 - Elsevier
IP multicast is best-known for its bandwidth conservation and lower resource utilization. The
present service model of multicast makes it difficult to restrict access to authorized End Users …