Advertisement

Communication and Security in Machine-to-Machine Systems

  • Iva BojicEmail author
  • Jorge Granjal
  • Edmundo Monteiro
  • Damjan Katusic
  • Pavle Skocir
  • Mario Kusek
  • Gordan Jezic
Chapter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8611)

Abstract

Machine-to-Machine (M2M) systems and technologies currently constitute a hot topic in the field of Information and Communication Technology (ICT), and reflect an increasing need for technologies enabling applications in diverse areas, as well as interactions between continuously increasing numbers of connected devices. Important participants in making M2M systems widely used and applicable in numerous real-life scenarios are standardization organizations. They try to develop technical specifications that address the need for a common M2M service layer, which can be realized through various hardware and software implementations. This chapter presents current standards and architecture of M2M systems with the focus on communication and security issues, while also discussing current and future research efforts addressing important open issues. One of the main problems in the area is correlated with heterogeneous devices, which are using different technologies for communication. Because of communication technology diversity, research challenges are to uniquely identify devices, and to enable them to communicate securely. To tackle the former, previously proposed, a unique identifying scheme that enables device identification regardless of used technology is explained. Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects not covered by current standards and in relation to research proposals which may integrate with M2M systems in future versions of the standards.

Keywords

M2M Communication identifiers M2M security 6LoWPAN security 

Notes

Acknowledgments

This work was supported by two projects: “Machine-to-Machine Communication challenges” funded by Ericsson Nikola Tesla, Croatia, and iCIS project (CENTRO-07-ST24-FEDER-002003), which is co-financed by QREN, in the scope of the Mais Centro Program and European Union’s FEDER.

References

  1. 1.
    Galetic, V., Bojic, I., Kusek, M., Jezic, G., Desic, S., Huljenic, D.: Basic principles of Machine-to-Machine communication and its impact on telecommunications industry. In: Proceedings of the 34th International Convention MIPRO, 2011, pp. 89–94 (2011)Google Scholar
  2. 2.
    SingTel M2M. http://info.singtel.com/large-enterprise/about-m2m. Accessed 30 Mar 2014
  3. 3.
    3GPP, TR 22.868 Study on Facilitating Machine-to-Machine Communication in 3GPP Systems (2008)Google Scholar
  4. 4.
    Watson, D.S., Piette, M.A., Sezgen, O., Motegi, N.: Machine-to-Machine (M2M) technology in demand responsive commercial buildings. In: Proceedings of the ACEEE Summer Study on Energy Efficiency in Buildings, 2004, pp. 1–14 (2004)Google Scholar
  5. 5.
    Emmerson, B.: M2M: the internet of 50 billion devices. Win-Win, pp. 19–22 (2010)Google Scholar
  6. 6.
    Boswarthick, D., Hersent, O., Elloumi, O.: M2M Communications: A Systems Approach. Wiley-Blackwell, New York (2012)CrossRefGoogle Scholar
  7. 7.
    ETSI, TR 102 897 Use Cases of M2M Applications for City Automation (2012)Google Scholar
  8. 8.
    ETSI, TR 102 857 Use Cases of M2M Applications for Connected Consumer (2013)Google Scholar
  9. 9.
    ETSI, TR 102 691 Smart Metering Use Cases (2010)Google Scholar
  10. 10.
    ETSI, TR 102 732 Use Cases of M2M Applications for eHealth (2013)Google Scholar
  11. 11.
    ETSI, TR 102 898 Use Cases of Automotive Applications in M2M Capable Networks (2013)Google Scholar
  12. 12.
    M2M World of Connected Services - Beecham. www.m2m.com/docs/DOC-1221. Accessed 30 Mar 2014
  13. 13.
    Atzoria, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)CrossRefGoogle Scholar
  14. 14.
    Miorandi, D., Sicari, S., Pellegrini, F.D., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad-hoc Netw. 10(7), 1497–1516 (2012)CrossRefGoogle Scholar
  15. 15.
    Gantz, J.: The Embedded Internet: Methodology and Findings (2009)Google Scholar
  16. 16.
    Evans, D.: The Internet of Things: How the Next Evolution of the Internet Is Changing Everything (2011)Google Scholar
  17. 17.
    Hatton, M.: The Global M2M Market in 2013 (2013)Google Scholar
  18. 18.
    Zorzi, M., Gluhak, A., Lange, S., Bassi, A.: From today’s INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view. IEEE Wirel. Commun. 17(6), 44–51 (2010)CrossRefGoogle Scholar
  19. 19.
    Katusic, D., Weber, M., Bojic, I., Jezic, G., Kusek, M.: Market, standardization, and regulation development in Machine-to-Machine communications. In: Proceedings of the 20th International Conference on Software, Telecommunications and Computer Networks, 2012, pp. 1–7 (2012)Google Scholar
  20. 20.
  21. 21.
    oneM2M. www.onem2m.org. Accessed 30 Mar 2014
  22. 22.
    Association of Radio Industries and Businesses. www.arib.or.jp/english. Accessed 30 Mar 2014
  23. 23.
    Telecommunication Technology Committee. www.ttc.or.jp/e. Accessed 30 Mar 2014
  24. 24.
    Alliance for Telecommunications Industry Solutions. www.atis.org. Accessed 30 Mar 2014
  25. 25.
    Telecommunications Industry Association. www.tiaonline.org. Accessed 30 Mar 2014
  26. 26.
    China Communications Standards Association. www.ccsa.org.cn/english. Accessed 30 Mar 2014
  27. 27.
    Telecommunications Technology Association. www.tta.or.kr/English. Accessed 30 Mar 2014
  28. 28.
    ETSI, TS 102 690 M2M Functional Architecture (2011)Google Scholar
  29. 29.
    Katusic, D., Skocir, P., Bojic, I., Kusek, M., Jezic, G., Desic, S., Huljenic, D.: Universal identification scheme in Machine-to-Machine systems. In: Proceedings of the 12th International Conference on Telecommunications, 2013, pp. 71–78 (2013)Google Scholar
  30. 30.
    Jiang, D., ShiWei, C.: A study of information security for M2M of IOT. In: Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering, 2010, pp. 576–579 (2010)Google Scholar
  31. 31.
    Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad-hoc networks and sensor networks. IEEE Commun. Surv. Tutorials 7(4), 2–28 (2005)CrossRefGoogle Scholar
  32. 32.
    Cho, J.-H., Swami, A., Chen, R.: A survey on trust management for mobile ad-hoc networks. IEEE Commun. Surv. Tutorials 13(4), 562–583 (2011)CrossRefGoogle Scholar
  33. 33.
    Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2), 2–23 (2006)CrossRefGoogle Scholar
  34. 34.
    Cha, I., Shah, Y., Schmidt, A.U., Leicher, A., Meyerstein, M.V.: Trust in M2M communication. IEEE Veh. Technol. Mag. 4(3), 69–75 (2009)CrossRefGoogle Scholar
  35. 35.
    ETSI, TS 102 689 M2M Service Requirements (2010)Google Scholar
  36. 36.
    ETSI, TS 102 921 mIa, dIa and mId Interfaces (2012)Google Scholar
  37. 37.
    3rd Generation Partnership Project. www.3gpp.org. Accessed 30 Mar 2014
  38. 38.
    3rd Generation Partnership Project 2. www.3gpp2.org. Accessed 30 Mar 2014
  39. 39.
    Open Mobile Alliance. www.openmobilealliance.org. Accessed 30 Mar 2014
  40. 40.
    Broadband Forum. www.broadband-forum.org. Accessed 30 Mar 2014
  41. 41.
    Open Mobile Alliance, OMA Device Management Protocol (2008)Google Scholar
  42. 42.
    Broadband Forum, TR-069: CPE WAN Management Protocol (2011)Google Scholar
  43. 43.
    3GPP, TR 23.888 System Improvements for Machine-Type Communications (2012)Google Scholar
  44. 44.
    Bojic, I., Jezic, G., Katusic, D., Desic, S., Kusek, M., Huljenic, D.: Communication in Machine-to-Machine environments. In: Proceedings of the 5th Balkan Conference in Informatics, 2012, pp. 283–286 (2012)Google Scholar
  45. 45.
    Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (2004)Google Scholar
  46. 46.
    Haverinen, H., Salowey, J.: Extensible Authentication Protocol Method for Global System for Mobile Communications Subscriber Identity Modules (2006)Google Scholar
  47. 47.
    Arkko, J., Haverinen, H.: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (2006)Google Scholar
  48. 48.
    Cakulev, V., Sundaram, G., Broustis, I.: IBAKE: Identity-Based Authenticated Key Exchange (2012)Google Scholar
  49. 49.
    Dierks, T., Rescorla, E.: The Transport Layer Security Protocol Version 1.2 (2008)Google Scholar
  50. 50.
    Santesson, S., Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol (2013)Google Scholar
  51. 51.
    IPv6 over Low power WPAN. https://datatracker.ietf.org/wg/6lowpan. Accessed 30 Mar 2014
  52. 52.
    Pandey, S., Choi, M.-J., Kim, M.-S., Hong, J.: Towards management of Machine-to-Machine networks. In: Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011, pp. 1–7 (2011)Google Scholar
  53. 53.
    Actility Cocoon. http://cocoon.actility.com. Accessed 30 Mar 2014
  54. 54.
    The OpenMTC Vision. www.open-mtc.org/index.html. Accessed 30 Mar 2014
  55. 55.
    Routing Over Low Power and Lossy Networks. http://datatracker.ietf.org/wg/roll/charter. Accessed 30 Mar 2014
  56. 56.
    Hui, J., Thubert, P.: Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks (2011)Google Scholar
  57. 57.
    ZigBee IP Specification Overview. www.zigbee.org/Specifications/ZigBeeIP/Overview.aspx. Accessed 30 Mar 2014
  58. 58.
    Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., Shelby, Z., Gomez, C.: Transmission of IPv6 Packets over Bluetooth Low Energy (2013)Google Scholar
  59. 59.
    Shelby, Z., Hartke, K., Bormann, C.: Constrained Application Protocol (2013)Google Scholar
  60. 60.
    Kusek, M., Lovrek, I., Maracic, H.: Rich presence information in agent based Machine-to-Machine communication. In: Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, pp. 321–329 (2013)Google Scholar
  61. 61.
    Xiong, X., Wong, D.S., Deng, X.: TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Proceedings of the IEEE Wireless Communications and Networking Conference, 2010, pp. 1–6 (2010)Google Scholar
  62. 62.
    Delgado-Mohatar, O., Fúster-Sabater, A., Sierra, J.M.: A light-weight authentication scheme for wireless sensor networks. Ad-hoc Netw. 9(5), 727–735 (2011)CrossRefGoogle Scholar
  63. 63.
    IEEE 802.1AR, Secure Device Identity. www.ieee802.org/1/pages/802.1ar.html. Accessed 30 Mar 2014
  64. 64.
    Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: Host Identity Protocol (2008)Google Scholar
  65. 65.
    Heer, T., Varjonen, S.: Host Identity Protocol Certificates (2011)Google Scholar
  66. 66.
    Trusted Computing Group. www.trustedcomputinggroup.org. Accessed 30 Mar 2014
  67. 67.
    Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzz. Knowl.-Based Syst. 10(5), 557–570 (2002)CrossRefzbMATHMathSciNetGoogle Scholar
  68. 68.
    Lu, R., Li, X., Liang, X., Shen, X., Lin, X.: GRS: the green, reliability, and security of emerging Machine-to-Machine communications. IEEE Commun. Mag. 49(4), 28–35 (2011)CrossRefGoogle Scholar
  69. 69.
    Boyer, S.A.: SCADA: Supervisory Control and Data Acquisition. International Society of Automation, Raleigh (2009)Google Scholar
  70. 70.
    Igure, V.M., Laughter, S.A., Williams, R.D.: Security issues in SCADA networks. Comput. Secur. 25(7), 498–506 (2006)CrossRefGoogle Scholar
  71. 71.
    Internet Engineering Task Force. www.ietf.org. Accessed 30 Mar 2014
  72. 72.
    Granjal, J., Sa Silva, J., Monteiro, E., Sa Silva, R., Boavida, F.: Why is IPSec a viable option for wireless sensor networks. In: Proceedings of the IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008, pp. 802–807 (2008)Google Scholar
  73. 73.
    Constrained RESTful Environments. https://datatracker.ietf.org/wg/core. Accessed 30 Mar 2014
  74. 74.
    Granjal, J., Monteiro, E., Sa Silva, J.: Network-layer security for the internet of things using TinyOS and BLIP. Int. J. Commun. Syst. 1–14 (2012)Google Scholar
  75. 75.
    Granjal, J., Monteiro, E., Sa Silva, J.: End-to-end transport-layer security for internet-integrated sensing applications with mutual and delegated ECC public-key authentication. In: Proceedings of the IFIP Networking Conference, 2013, pp. 1–9 (2013)Google Scholar
  76. 76.
    Granjal, J., Monteiro, E., Sa Silva, J.: On the feasibility of secure application-layer communications on the web of things. In: Proceedings of the IEEE 37th Conference on Local Computer Networks, 2012, pp. 228–231 (2012)Google Scholar
  77. 77.
    Trust Chip Mobile Device Security. www.koolspan.com/trustchip. Accessed 30 Mar 2014

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Iva Bojic
    • 1
    Email author
  • Jorge Granjal
    • 2
  • Edmundo Monteiro
    • 2
  • Damjan Katusic
    • 1
  • Pavle Skocir
    • 1
  • Mario Kusek
    • 1
  • Gordan Jezic
    • 1
  1. 1.Faculty of Electrical Engineering and ComputingUniversity of ZagrebZagrebCroatia
  2. 2.Department of Informatics EngineeringUniversity of CoimbraCoimbraPortugal

Personalised recommendations