A survey on information security threats and solutions for Machine to Machine (M2M) communications
نویسندگان
چکیده
Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources ofmachines and devices in theM2Mnetworks bring several constraints including energy, bandwidth, storage, and computation. Such constraints pose several challenges in the design of M2M networks. Furthermore, some elements that contributed to the rise of M2M applications have caused several new security threats and risks, typically due to the advancements in technology, increasing computing power, declining hardware costs, and freely available software tools. Due to the restricted capabilities of M2M devices, most of the recent research efforts on M2M have focused on computing, resource management, sensing, congestion control and controlling technologies. However, there are few studies on security aspects and there is a need to introduce the threats existing in M2M systems and corresponding solutions. Accordingly, in this paper, after presenting an overview of potential M2M applications, we present a survey of security threats against M2M networks and solutions to prevent or reduce their impact. Then, we investigate security-related challenges and open research issues in M2M networks to provide an insight for future research opportunities. Moreover, we discuss the oneM2M standard, one of the prominent standard initiatives for more secure and smoother M2M networks and the Internet of Things. © 2017 Elsevier Inc. All rights reserved.
منابع مشابه
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملGLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications
Supporting a massive number of machine to machine (M2M) devices has been considered as an essential requirement in M2M communications. Meanwhile, cyber security is of paramount importance in M2M; if M2M devices cannot securely access the networks through efficient authentication, all applications involving M2M cannot be widely accepted. One of research challenges in M2M is group authentication ...
متن کاملSecurity and Privacy in Machine-to- Machine Communications – A Survey
Machine-to-Machine (M2M) Communication is one of the most attractive technology used in both industrial and education sectors and that is predicted to grow within the next few years. It provides a way of communication between connected devices. Very important obstacles which will cut down M2M Communication growth and even hold back the large roll-out of sure applications are security and privac...
متن کاملMachine-to-Machine Communication Architecture as an Enabling Paradigm of Embedded Internet Evolution
In addition to human-to-human (H2H) and machine-to-human (M2H) communications, an emerging technology enabling full mechanical automation that may change living styles is being developed. Communications among machine-type devices are known as machine-to-machine (M2M) communications. Current market penetration and recent predictions confirm that M2M system deployments are increasing exponentiall...
متن کاملA Survey on M2M Service Networks
The number of industrial applications relying on the Machine to Machine (M2M) services exposed from physical world has been increasing in recent years. Such M2M services enable communication of devices with the core processes of companies. However, there is a big challenge related to complexity and to application-specific M2M systems called ―vertical silos‖. This paper focuses on reviewing the ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Parallel Distrib. Comput.
دوره 109 شماره
صفحات -
تاریخ انتشار 2017