ABSTRACT

Contents 15.1 Introduction ............................................................................................402 15.2 Security of M2M Communication .........................................................405