Security Challenges: M2M Communication in IoT

نویسندگان

چکیده

In recent times, smart devices, homes, manufacturing, and even cities, all of which are connected to the Internet Things (IoT) have become quite common. IoT technology heavily relies on Machine-to-Machine (M2M) communication in order make technologies behave a way. Any type connection between two devices that does not require human intervention is referred as "machine-to-machine" technology. The system with unique identifiers can transmit information over network. There no interaction humans or machines IoT. now widely used variety sectors, including banking (connected branches), industries where secrecy privacy data important components. allows multiple design network, whereas M2M makes it possible for communicate one another. Therefore, this paper gives brief review work security challenges faced significance both technologies.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IoT Privacy and Security Challenges for Smart Home Environments

Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources avai...

متن کامل

Adaptive and composite privacy and security mechanism for IoT communication

With billions of connected devices expected in near future, the number and nature of IoT networks and their various interactions is certain to grow rapidly. As a result, the need for security and privacy of IoT networks during such interactions is a subject of major interest. Security & privacy related aspects need to take into consideration the context and purpose of such diverse types of inte...

متن کامل

Traffic Monitoring Using M2M Communication

This paper presents an intelligent traffic monitoring system using wireless vision sensor network that captures and processes the real-time video image to obtain the traffic flow rate and vehicle speeds along different urban roadways. This system will display the traffic states on the front roadways that can guide the drivers to select the right way and avoid potential traffic congestions. On t...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

IoT Security: A Survey

The Internet of Things (IoT) is still at the top of the Gartner Hype Cycle as the most hyped technology, which means that it is the hottest topic that has gained the most attraction of the researchers currently. In recent years, there have been huge amount of research that have investigated different aspects and concerns of this field. Meanwhile, supplying privacy and security is an inseparable...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Electrical Engineering and Automation

سال: 2022

ISSN: ['2582-3051']

DOI: https://doi.org/10.36548/jeea.2022.3.006