A survey on information security threats and solutions for Machine to Machine (M2M) communications

dc.citation.epage154en_US
dc.citation.spage142en_US
dc.citation.volumeNumber109en_US
dc.contributor.authorTuna, G.en_US
dc.contributor.authorKogias, D. G.en_US
dc.contributor.authorGungor, V. C.en_US
dc.contributor.authorGezer, C.en_US
dc.contributor.authorTaşkın, E.en_US
dc.contributor.authorAyday, E.en_US
dc.date.accessioned2018-04-12T11:11:15Z
dc.date.available2018-04-12T11:11:15Z
dc.date.issued2017en_US
dc.departmentDepartment of Computer Engineeringen_US
dc.description.abstractAlthough Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, storage, and computation. Such constraints pose several challenges in the design of M2M networks. Furthermore, some elements that contributed to the rise of M2M applications have caused several new security threats and risks, typically due to the advancements in technology, increasing computing power, declining hardware costs, and freely available software tools. Due to the restricted capabilities of M2M devices, most of the recent research efforts on M2M have focused on computing, resource management, sensing, congestion control and controlling technologies. However, there are few studies on security aspects and there is a need to introduce the threats existing in M2M systems and corresponding solutions. Accordingly, in this paper, after presenting an overview of potential M2M applications, we present a survey of security threats against M2M networks and solutions to prevent or reduce their impact. Then, we investigate security-related challenges and open research issues in M2M networks to provide an insight for future research opportunities. Moreover, we discuss the oneM2M standard, one of the prominent standard initiatives for more secure and smoother M2M networks and the Internet of Things. © 2017 Elsevier Inc.en_US
dc.description.provenanceMade available in DSpace on 2018-04-12T11:11:15Z (GMT). No. of bitstreams: 1 bilkent-research-paper.pdf: 179475 bytes, checksum: ea0bedeb05ac9ccfb983c327e155f0c2 (MD5) Previous issue date: 2017en
dc.embargo.release2019-11-01en_US
dc.identifier.doi10.1016/j.jpdc.2017.05.021en_US
dc.identifier.issn0743-7315en_US
dc.identifier.urihttp://hdl.handle.net/11693/37358en_US
dc.language.isoEnglishen_US
dc.publisherAcademic Press Inc.en_US
dc.relation.isversionofhttp://dx.doi.org/10.1016/j.jpdc.2017.05.021en_US
dc.source.titleJournal of Parallel and Distributed Computingen_US
dc.subjectCountermeasuresen_US
dc.subjectMachine to machine (M2M) communicationsen_US
dc.subjectOne M2M standarden_US
dc.subjectSecurity threatsen_US
dc.subjectApplication programsen_US
dc.subjectMachine-to-machine communicationen_US
dc.subjectRadar countermeasuresen_US
dc.subjectSecurity of dataen_US
dc.subjectSecurity systemsen_US
dc.subjectSurveysen_US
dc.subjectCorresponding solutionsen_US
dc.subjectFreely available softwareen_US
dc.subjectInformation security threatsen_US
dc.subjectMachine-to-machine (M2M)en_US
dc.subjectRecent researchesen_US
dc.subjectResearch opportunitiesen_US
dc.subjectResource managementen_US
dc.subjectNetwork securityen_US
dc.titleA survey on information security threats and solutions for Machine to Machine (M2M) communicationsen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
A_survey_on_information_security_threats_and_solutions_for_Machine_to_Machine_(M2M)_communications.pdf
Size:
715.06 KB
Format:
Adobe Portable Document Format
Description:
Full printable version