Skip to main content

Communication and Security in Machine-to-Machine Systems

  • Chapter
  • First Online:
Wireless Networking for Moving Objects

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 8611))

Abstract

Machine-to-Machine (M2M) systems and technologies currently constitute a hot topic in the field of Information and Communication Technology (ICT), and reflect an increasing need for technologies enabling applications in diverse areas, as well as interactions between continuously increasing numbers of connected devices. Important participants in making M2M systems widely used and applicable in numerous real-life scenarios are standardization organizations. They try to develop technical specifications that address the need for a common M2M service layer, which can be realized through various hardware and software implementations. This chapter presents current standards and architecture of M2M systems with the focus on communication and security issues, while also discussing current and future research efforts addressing important open issues. One of the main problems in the area is correlated with heterogeneous devices, which are using different technologies for communication. Because of communication technology diversity, research challenges are to uniquely identify devices, and to enable them to communicate securely. To tackle the former, previously proposed, a unique identifying scheme that enables device identification regardless of used technology is explained. Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects not covered by current standards and in relation to research proposals which may integrate with M2M systems in future versions of the standards.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    If M2M device uses connectivity protocols such as ZigBee, Z-Wave, or Bluetooth that do not natively support IP.

  2. 2.

    The authors said that the order of other bits should be standardized by standardization organizations active in the field of M2M systems.

References

  1. Galetic, V., Bojic, I., Kusek, M., Jezic, G., Desic, S., Huljenic, D.: Basic principles of Machine-to-Machine communication and its impact on telecommunications industry. In: Proceedings of the 34th International Convention MIPRO, 2011, pp. 89–94 (2011)

    Google Scholar 

  2. SingTel M2M. http://info.singtel.com/large-enterprise/about-m2m. Accessed 30 Mar 2014

  3. 3GPP, TR 22.868 Study on Facilitating Machine-to-Machine Communication in 3GPP Systems (2008)

    Google Scholar 

  4. Watson, D.S., Piette, M.A., Sezgen, O., Motegi, N.: Machine-to-Machine (M2M) technology in demand responsive commercial buildings. In: Proceedings of the ACEEE Summer Study on Energy Efficiency in Buildings, 2004, pp. 1–14 (2004)

    Google Scholar 

  5. Emmerson, B.: M2M: the internet of 50 billion devices. Win-Win, pp. 19–22 (2010)

    Google Scholar 

  6. Boswarthick, D., Hersent, O., Elloumi, O.: M2M Communications: A Systems Approach. Wiley-Blackwell, New York (2012)

    Book  Google Scholar 

  7. ETSI, TR 102 897 Use Cases of M2M Applications for City Automation (2012)

    Google Scholar 

  8. ETSI, TR 102 857 Use Cases of M2M Applications for Connected Consumer (2013)

    Google Scholar 

  9. ETSI, TR 102 691 Smart Metering Use Cases (2010)

    Google Scholar 

  10. ETSI, TR 102 732 Use Cases of M2M Applications for eHealth (2013)

    Google Scholar 

  11. ETSI, TR 102 898 Use Cases of Automotive Applications in M2M Capable Networks (2013)

    Google Scholar 

  12. M2M World of Connected Services - Beecham. www.m2m.com/docs/DOC-1221. Accessed 30 Mar 2014

  13. Atzoria, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  Google Scholar 

  14. Miorandi, D., Sicari, S., Pellegrini, F.D., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad-hoc Netw. 10(7), 1497–1516 (2012)

    Article  Google Scholar 

  15. Gantz, J.: The Embedded Internet: Methodology and Findings (2009)

    Google Scholar 

  16. Evans, D.: The Internet of Things: How the Next Evolution of the Internet Is Changing Everything (2011)

    Google Scholar 

  17. Hatton, M.: The Global M2M Market in 2013 (2013)

    Google Scholar 

  18. Zorzi, M., Gluhak, A., Lange, S., Bassi, A.: From today’s INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view. IEEE Wirel. Commun. 17(6), 44–51 (2010)

    Article  Google Scholar 

  19. Katusic, D., Weber, M., Bojic, I., Jezic, G., Kusek, M.: Market, standardization, and regulation development in Machine-to-Machine communications. In: Proceedings of the 20th International Conference on Software, Telecommunications and Computer Networks, 2012, pp. 1–7 (2012)

    Google Scholar 

  20. ETSI M2M. www.etsi.org/technologies-clusters/technologies/m2m. Accessed 30 Mar 2014

  21. oneM2M. www.onem2m.org. Accessed 30 Mar 2014

  22. Association of Radio Industries and Businesses. www.arib.or.jp/english. Accessed 30 Mar 2014

  23. Telecommunication Technology Committee. www.ttc.or.jp/e. Accessed 30 Mar 2014

  24. Alliance for Telecommunications Industry Solutions. www.atis.org. Accessed 30 Mar 2014

  25. Telecommunications Industry Association. www.tiaonline.org. Accessed 30 Mar 2014

  26. China Communications Standards Association. www.ccsa.org.cn/english. Accessed 30 Mar 2014

  27. Telecommunications Technology Association. www.tta.or.kr/English. Accessed 30 Mar 2014

  28. ETSI, TS 102 690 M2M Functional Architecture (2011)

    Google Scholar 

  29. Katusic, D., Skocir, P., Bojic, I., Kusek, M., Jezic, G., Desic, S., Huljenic, D.: Universal identification scheme in Machine-to-Machine systems. In: Proceedings of the 12th International Conference on Telecommunications, 2013, pp. 71–78 (2013)

    Google Scholar 

  30. Jiang, D., ShiWei, C.: A study of information security for M2M of IOT. In: Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering, 2010, pp. 576–579 (2010)

    Google Scholar 

  31. Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad-hoc networks and sensor networks. IEEE Commun. Surv. Tutorials 7(4), 2–28 (2005)

    Article  Google Scholar 

  32. Cho, J.-H., Swami, A., Chen, R.: A survey on trust management for mobile ad-hoc networks. IEEE Commun. Surv. Tutorials 13(4), 562–583 (2011)

    Article  Google Scholar 

  33. Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2), 2–23 (2006)

    Article  Google Scholar 

  34. Cha, I., Shah, Y., Schmidt, A.U., Leicher, A., Meyerstein, M.V.: Trust in M2M communication. IEEE Veh. Technol. Mag. 4(3), 69–75 (2009)

    Article  Google Scholar 

  35. ETSI, TS 102 689 M2M Service Requirements (2010)

    Google Scholar 

  36. ETSI, TS 102 921 mIa, dIa and mId Interfaces (2012)

    Google Scholar 

  37. 3rd Generation Partnership Project. www.3gpp.org. Accessed 30 Mar 2014

  38. 3rd Generation Partnership Project 2. www.3gpp2.org. Accessed 30 Mar 2014

  39. Open Mobile Alliance. www.openmobilealliance.org. Accessed 30 Mar 2014

  40. Broadband Forum. www.broadband-forum.org. Accessed 30 Mar 2014

  41. Open Mobile Alliance, OMA Device Management Protocol (2008)

    Google Scholar 

  42. Broadband Forum, TR-069: CPE WAN Management Protocol (2011)

    Google Scholar 

  43. 3GPP, TR 23.888 System Improvements for Machine-Type Communications (2012)

    Google Scholar 

  44. Bojic, I., Jezic, G., Katusic, D., Desic, S., Kusek, M., Huljenic, D.: Communication in Machine-to-Machine environments. In: Proceedings of the 5th Balkan Conference in Informatics, 2012, pp. 283–286 (2012)

    Google Scholar 

  45. Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (2004)

    Google Scholar 

  46. Haverinen, H., Salowey, J.: Extensible Authentication Protocol Method for Global System for Mobile Communications Subscriber Identity Modules (2006)

    Google Scholar 

  47. Arkko, J., Haverinen, H.: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (2006)

    Google Scholar 

  48. Cakulev, V., Sundaram, G., Broustis, I.: IBAKE: Identity-Based Authenticated Key Exchange (2012)

    Google Scholar 

  49. Dierks, T., Rescorla, E.: The Transport Layer Security Protocol Version 1.2 (2008)

    Google Scholar 

  50. Santesson, S., Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol (2013)

    Google Scholar 

  51. IPv6 over Low power WPAN. https://datatracker.ietf.org/wg/6lowpan. Accessed 30 Mar 2014

  52. Pandey, S., Choi, M.-J., Kim, M.-S., Hong, J.: Towards management of Machine-to-Machine networks. In: Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011, pp. 1–7 (2011)

    Google Scholar 

  53. Actility Cocoon. http://cocoon.actility.com. Accessed 30 Mar 2014

  54. The OpenMTC Vision. www.open-mtc.org/index.html. Accessed 30 Mar 2014

  55. Routing Over Low Power and Lossy Networks. http://datatracker.ietf.org/wg/roll/charter. Accessed 30 Mar 2014

  56. Hui, J., Thubert, P.: Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks (2011)

    Google Scholar 

  57. ZigBee IP Specification Overview. www.zigbee.org/Specifications/ZigBeeIP/Overview.aspx. Accessed 30 Mar 2014

  58. Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., Shelby, Z., Gomez, C.: Transmission of IPv6 Packets over Bluetooth Low Energy (2013)

    Google Scholar 

  59. Shelby, Z., Hartke, K., Bormann, C.: Constrained Application Protocol (2013)

    Google Scholar 

  60. Kusek, M., Lovrek, I., Maracic, H.: Rich presence information in agent based Machine-to-Machine communication. In: Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, pp. 321–329 (2013)

    Google Scholar 

  61. Xiong, X., Wong, D.S., Deng, X.: TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Proceedings of the IEEE Wireless Communications and Networking Conference, 2010, pp. 1–6 (2010)

    Google Scholar 

  62. Delgado-Mohatar, O., Fúster-Sabater, A., Sierra, J.M.: A light-weight authentication scheme for wireless sensor networks. Ad-hoc Netw. 9(5), 727–735 (2011)

    Article  Google Scholar 

  63. IEEE 802.1AR, Secure Device Identity. www.ieee802.org/1/pages/802.1ar.html. Accessed 30 Mar 2014

  64. Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: Host Identity Protocol (2008)

    Google Scholar 

  65. Heer, T., Varjonen, S.: Host Identity Protocol Certificates (2011)

    Google Scholar 

  66. Trusted Computing Group. www.trustedcomputinggroup.org. Accessed 30 Mar 2014

  67. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzz. Knowl.-Based Syst. 10(5), 557–570 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  68. Lu, R., Li, X., Liang, X., Shen, X., Lin, X.: GRS: the green, reliability, and security of emerging Machine-to-Machine communications. IEEE Commun. Mag. 49(4), 28–35 (2011)

    Article  Google Scholar 

  69. Boyer, S.A.: SCADA: Supervisory Control and Data Acquisition. International Society of Automation, Raleigh (2009)

    Google Scholar 

  70. Igure, V.M., Laughter, S.A., Williams, R.D.: Security issues in SCADA networks. Comput. Secur. 25(7), 498–506 (2006)

    Article  Google Scholar 

  71. Internet Engineering Task Force. www.ietf.org. Accessed 30 Mar 2014

  72. Granjal, J., Sa Silva, J., Monteiro, E., Sa Silva, R., Boavida, F.: Why is IPSec a viable option for wireless sensor networks. In: Proceedings of the IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008, pp. 802–807 (2008)

    Google Scholar 

  73. Constrained RESTful Environments. https://datatracker.ietf.org/wg/core. Accessed 30 Mar 2014

  74. Granjal, J., Monteiro, E., Sa Silva, J.: Network-layer security for the internet of things using TinyOS and BLIP. Int. J. Commun. Syst. 1–14 (2012)

    Google Scholar 

  75. Granjal, J., Monteiro, E., Sa Silva, J.: End-to-end transport-layer security for internet-integrated sensing applications with mutual and delegated ECC public-key authentication. In: Proceedings of the IFIP Networking Conference, 2013, pp. 1–9 (2013)

    Google Scholar 

  76. Granjal, J., Monteiro, E., Sa Silva, J.: On the feasibility of secure application-layer communications on the web of things. In: Proceedings of the IEEE 37th Conference on Local Computer Networks, 2012, pp. 228–231 (2012)

    Google Scholar 

  77. Trust Chip Mobile Device Security. www.koolspan.com/trustchip. Accessed 30 Mar 2014

Download references

Acknowledgments

This work was supported by two projects: “Machine-to-Machine Communication challenges” funded by Ericsson Nikola Tesla, Croatia, and iCIS project (CENTRO-07-ST24-FEDER-002003), which is co-financed by QREN, in the scope of the Mais Centro Program and European Union’s FEDER.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iva Bojic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Bojic, I. et al. (2014). Communication and Security in Machine-to-Machine Systems. In: Ganchev, I., Curado, M., Kassler, A. (eds) Wireless Networking for Moving Objects. Lecture Notes in Computer Science(), vol 8611. Springer, Cham. https://doi.org/10.1007/978-3-319-10834-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-10834-6_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-10833-9

  • Online ISBN: 978-3-319-10834-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics