Communication and Security in Machine-to-Machine Systems

نویسندگان

  • Iva Bojic
  • Jorge Granjal
  • Edmundo Monteiro
  • Damjan Katusic
  • Pavle Skocir
  • Mario Kusek
  • Gordan Jezic
چکیده

Machine-to-Machine (M2M) systems and technologies currently constitute a hot topic in the field of Information and Communication Technology (ICT), and reflect an increasing need for technologies enabling applications in diverse areas, as well as interactions between continuously increasing numbers of connected devices. Important participants in making M2M systems widely used and applicable in numerous real-life scenarios are standardization organizations. They try to develop technical specifications that address the need for a common M2M service layer, which can be realized through various hardware and software implementations. This chapter presents current standards and architecture of M2M systems with the focus on communication and security issues, while also discussing current and future research efforts addressing important open issues. One of the main problems in the area is correlated with heterogeneous devices, which are using different technologies for communication. Because of communication technology diversity, research challenges are to uniquely identify devices, and to enable them to communicate securely. To tackle the former, previously proposed, a unique identifying scheme that enables device identification regardless of used technology is explained. Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects not covered by current standards and in relation to research proposals which may integrate with M2M systems in future versions of the standards.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication

Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...

متن کامل

Design of Multi-Stage Fuzzy PID Bundled Artificial Bee Colony for Multi-machine PSS

This paper presents a new strategy based on Multi-stage Fuzzy (MSF) PID controller based on Artificial Bee Colony (ABC) for damping Power System Stabilizer (PSS) in multi-machine environment. The recent studies in artificial intelligence demonstrated that the ABC optimization is strong intelligent method in complicated stability problems. Also, finding the parameters of PID controller in power ...

متن کامل

Design of Multi-Stage Fuzzy PID Bundled Artificial Bee Colony for Multi-machine PSS

This paper presents a new strategy based on Multi-stage Fuzzy (MSF) PID controller based on Artificial Bee Colony (ABC) for damping Power System Stabilizer (PSS) in multi-machine environment. The recent studies in artificial intelligence demonstrated that the ABC optimization is strong intelligent method in complicated stability problems. Also, finding the parameters of PID controller in power ...

متن کامل

An Effective Attack-Resilient Kalman Filter-Based Approach for Dynamic State Estimation of Synchronous Machine

Kalman filtering has been widely considered for dynamic state estimation in smart grids. Despite its unique merits, the Kalman Filter (KF)-based dynamic state estimation can be undesirably influenced by cyber adversarial attacks that can potentially be launched against the communication links in the Cyber-Physical System (CPS). To enhance the security of KF-based state estimation, in this paper...

متن کامل

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

متن کامل

Robust Control of Power System Stabilizer Using World Cup Optimization Algorithm

In this paper, we propose a new optimized PID controller to stabilize the synchronous machine connected to an infinite bus. The model for the synchronous machine is 4-ordered linear Philips-Heffron synchronous machine. In this research, the parameters of the PID controller are optimally achieved by minimizing a definite fitness function to removes the unstable Eigen-value to the left side of im...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014