Security Issues in Machine-to-Machine Communication

2014 ◽  
pp. 401-418
Author(s):  
Shuo Chen ◽  
Maode Ma
2017 ◽  
pp. 205-240
Author(s):  
Rami Haidar Ahmad ◽  
Al-Sakib Khan Pathan

The increase of the applications of numerous innovative technologies and associated devices has brought forward various new concepts like Cyber-Physical System (CPS), Internet of Things (IoT), Smart environment, Smart cities, and so on. While the boundary lines between these concepts and technologies are often kind of blur and perhaps, each one's development is helping the development of the other, M2M (Machine to Machine) communication would surely play a great role as a key enabler of all these emerging scenarios. When we see the same smart concept from different angles; for instance, from the participating device, or human being's angle, we get different definitions and concept-specific standards. In this chapter, our objective is to study M2M system and communication along with its security issues and intrusion detection systems. We have also proposed our framework in line with the standardization efforts for tackling security issues of M2M.


Author(s):  
Rami Haidar Ahmad ◽  
Al-Sakib Khan Pathan

The increase of the applications of numerous innovative technologies and associated devices has brought forward various new concepts like Cyber-Physical System (CPS), Internet of Things (IoT), Smart environment, Smart cities, and so on. While the boundary lines between these concepts and technologies are often kind of blur and perhaps, each one's development is helping the development of the other, M2M (Machine to Machine) communication would surely play a great role as a key enabler of all these emerging scenarios. When we see the same smart concept from different angles; for instance, from the participating device, or human being's angle, we get different definitions and concept-specific standards. In this chapter, our objective is to study M2M system and communication along with its security issues and intrusion detection systems. We have also proposed our framework in line with the standardization efforts for tackling security issues of M2M.


Author(s):  
O. S. Galinina ◽  
S. D. Andreev ◽  
A. M. Tyurlikov

Introduction: Machine-to-machine communication assumes data transmission from various wireless devices and attracts attention of cellular operators. In this regard, it is crucial to recognize and control overload situations when a large number of such devices access the network over a short time interval.Purpose:Analysis of the radio network overload at the initial network entry stage in a machine-to-machine communication system.Results: A system is considered that features multiple smart meters, which may report alarms and autonomously collect energy consumption information. An analytical approach is proposed to study the operation of a large number of devices in such a system as well as model the settings of the random-access protocol in a cellular network and overload control mechanisms with respect to the access success probability, network access latency, and device power consumption. A comparison between the obtained analytical results and simulation data is also offered. 


Sensors ◽  
2020 ◽  
Vol 20 (15) ◽  
pp. 4122
Author(s):  
Emma Fitzgerald ◽  
Michał Pióro ◽  
Artur Tomaszewski

We investigate the trade-off between energy usage and (packet) throughput in wireless mesh networks performing machine-to-machine communication. For this we provide a novel mixed-integer programming formulation to maximise the throughput while maintaining minimal energy usage, together with an effective price-and-branch solution algorithm based on column generation. The resulting optimisation model is the main original contribution of the presented paper. We conducted a numerical study using network examples from 10 to 40 nodes, in which periodic sensor measurements are aggregated and disseminated to actuators. In almost all cases, we were able to achieve maximum throughput and minimum energy usage simultaneously, and in those cases where this was not possible, the costs incurred in one objective in order to achieve the other were typically low. The solution times for all network sizes were of the order of seconds, showing that our optimisation model is feasible to use in practice.


Sign in / Sign up

Export Citation Format

Share Document