Publication detail

Security Monitoring of LwM2M communication

RYŠAVÝ, O.

Original Title

Security Monitoring of LwM2M communication

English Title

Security Monitoring of LwM2M communication

Type

report

Language

en

Original Abstract

LwM2M is a client-server application communication protocol that serves the purpose of a machine to machine communication respecting constrained resources of devices. The protocol promotes the use four basic interfaces between L2M2M server and client, namely bootstrap, client registration, device management and information reporting. The protocol itself employs CoAP as a transport protocol. This document in addition to the overview of LwM2M features also provides a proposal for a list of data extracted for monitoring purposes. 

English abstract

LwM2M is a client-server application communication protocol that serves the purpose of a machine to machine communication respecting constrained resources of devices. The protocol promotes the use four basic interfaces between L2M2M server and client, namely bootstrap, client registration, device management and information reporting. The protocol itself employs CoAP as a transport protocol. This document in addition to the overview of LwM2M features also provides a proposal for a list of data extracted for monitoring purposes. 

Released

31.12.2017

Publisher

Faculty of Information Technology BUT

Location

FIT-TR-2017-16, Brno

Pages count

19

URL

Documents

BibTex


@techreport{BUT168656,
  author="Ondřej {Ryšavý}",
  title="Security Monitoring of LwM2M communication",
  annote="LwM2M is a client-server application communication protocol that serves the
purpose of a machine to machine communication respecting constrained resources of
devices. The protocol promotes the use four basic interfaces between L2M2M server
and client, namely bootstrap, client registration, device management and
information reporting. The protocol itself employs CoAP as a transport protocol.
This document in addition to the overview of LwM2M features also provides a
proposal for a list of data extracted for monitoring purposes. ",
  address="Faculty of Information Technology BUT",
  chapter="168656",
  edition="NEUVEDEN",
  howpublished="online",
  institution="Faculty of Information Technology BUT",
  year="2017",
  month="december",
  pages="0--0",
  publisher="Faculty of Information Technology BUT",
  type="report"
}