A survey on information security threats and solutions for Machine to Machine (M2M) communications
Embargo Lift Date: 2019-11-01
Journal of Parallel and Distributed Computing
Academic Press Inc.
142 - 154
Item Usage Stats
Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, storage, and computation. Such constraints pose several challenges in the design of M2M networks. Furthermore, some elements that contributed to the rise of M2M applications have caused several new security threats and risks, typically due to the advancements in technology, increasing computing power, declining hardware costs, and freely available software tools. Due to the restricted capabilities of M2M devices, most of the recent research efforts on M2M have focused on computing, resource management, sensing, congestion control and controlling technologies. However, there are few studies on security aspects and there is a need to introduce the threats existing in M2M systems and corresponding solutions. Accordingly, in this paper, after presenting an overview of potential M2M applications, we present a survey of security threats against M2M networks and solutions to prevent or reduce their impact. Then, we investigate security-related challenges and open research issues in M2M networks to provide an insight for future research opportunities. Moreover, we discuss the oneM2M standard, one of the prominent standard initiatives for more secure and smoother M2M networks and the Internet of Things. © 2017 Elsevier Inc.
Machine to machine (M2M) communications
One M2M standard
Security of data
Freely available software
Information security threats
Published Version (Please cite this version)http://dx.doi.org/10.1016/j.jpdc.2017.05.021
Showing items related by title, author, creator and subject.
Aktürk, M. S.; Avcı, S. (Springer-Verlag, 1996)In view of the high investment and tooling cost of a CNC machining centre, the cutting and idle times should be optimised by considering the tool consumption and the non-machining time cost components. In this paper, we ...
Oliaei, S.N.B.; Özdemir, C.; Karpat, Y. (Inderscience Enterprises Ltd., 2014)Micro electro discharge machining (μ -EDM) process can be used to fabricate micro-milling tools of different geometries from tungsten carbide (WC) and polycrystalline diamond (PCD). The non-contact nature of EDM process ...
Bilgin, P. (Sage Publications Ltd., 2004)Contesting those approaches that present the ‘Middle East’ as a region that ‘best fits the realist view of international politics’, this article submits that critical approaches are relevant to this part of the world as ...