Skip to main content

Machine-to-Machine Interfaces

  • Chapter
  • First Online:
Cognitive (Internet of) Things
  • 1702 Accesses

Abstract

How do Cognitive Things communicate with each other? What are the options and trade-offs?How would Cognitive Things develop trusted relationships? How would they recognize and protect themselves from fraudulent and malicious attacks?How is the information processed by Cognitive Things governed? Should they remember everything forever?Could the Cognitive Things negotiate with each other? Could they collaborate and develop long-lasting relationships?

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 37.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 37.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A. Bond and L. Gasser. Readings in Distributed Artificial Intelligence. Morgan Kaufman, San Mateo, CA, 1988, https://www.amazon.com/Readings-Distributed-Artificial-Intelligence-Alan/dp/093461363X

  2. 2.

    Jim Geier, “Wireless System Architecture: How Wireless Works”, chapter from the book “Wireless Networks First Step”, Cisco Press, August 2004, http://www.ciscopress.com/store/wireless-networks-first-step-9781587201110

  3. 3.

    Michael Miller, “The Internet of Things: How Smart TVs, Smart Cars, Smart Homes, and Smart Cities are Changing the World”, Que. Publishing, March 2015, ISBN: 0789754002, https://www.amazon.com/Internet-Things-Smart-Cities-Changing/dp/0789754002

  4. 4.

    John Bradley, “An Authentication Framework for the IoT”, Slideshare, March 10, 2015, http://www.slideshare.net/AllSeenAlliance/identity-foriot03

  5. 5.

    R.G. Smith, “The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver”, IEEE Transaction on Computers, Issue No.12—December (1980 vol. 29), http://www.computer.org/csdl/trans/tc/1980/12/01675516-abs.html

Author information

Authors and Affiliations

Authors

Copyright information

© 2016 The Author(s)

About this chapter

Cite this chapter

Sathi, A. (2016). Machine-to-Machine Interfaces. In: Cognitive (Internet of) Things. Palgrave Macmillan, New York. https://doi.org/10.1057/978-1-137-59466-2_9

Download citation

  • DOI: https://doi.org/10.1057/978-1-137-59466-2_9

  • Published:

  • Publisher Name: Palgrave Macmillan, New York

  • Print ISBN: 978-1-137-59465-5

  • Online ISBN: 978-1-137-59466-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics