An M2M-based interface management framework for vehicles with multiple network interfaces

Hong Jong Jeong, Sungwon Lee, Dongkyun Kim, Yong Geun Hong

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The Intelligent Transportation System (ITS) can be considered the most representative example of Machine-to-Machine (M2M) applications in a standardization and commercial market. To support the applications, utilizing multiple network interfaces and providing appropriate network connectivity to them are the key issues in order to meet different network requirements of M2M applications on ITS devices. Moreover, different from applications which are controlled by a human operator, the ITS device with M2M application is required to decide the appropriate air interface and network for each application by itself according to the predefined policy and network status. In this paper, we therefore propose a novel multiple network interface management framework for ITS devices with M2M applications having their different requirements and constraints based on the CALM architecture. This can provide the M2M applications with extensible and flexible system environments based on the CALM architecture.

Original languageEnglish
Title of host publicationIT Convergence and Security 2012
Pages409-416
Number of pages8
DOIs
StatePublished - 2013
EventInternational Conference on IT Convergence and Security, ICITCS 2012 - Pyeong Chang, Korea, Republic of
Duration: 5 Dec 20127 Dec 2012

Publication series

NameLecture Notes in Electrical Engineering
Volume215 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

ConferenceInternational Conference on IT Convergence and Security, ICITCS 2012
Country/TerritoryKorea, Republic of
CityPyeong Chang
Period5/12/127/12/12

Keywords

  • CALM
  • Communication
  • ITS
  • M2M
  • Machine-to-machine
  • Multiple interfaces

Fingerprint

Dive into the research topics of 'An M2M-based interface management framework for vehicles with multiple network interfaces'. Together they form a unique fingerprint.

Cite this