Abstract
Machine-to-Machine (M2M) systems and technologies currently constitute a hot topic in the field of Information and Communication Technology (ICT), and reflect an increasing need for technologies enabling applications in diverse areas, as well as interactions between continuously increasing numbers of connected devices. Important participants in making M2M systems widely used and applicable in numerous real-life scenarios are standardization organizations. They try to develop technical specifications that address the need for a common M2M service layer, which can be realized through various hardware and software implementations. This chapter presents current standards and architecture of M2M systems with the focus on communication and security issues, while also discussing current and future research efforts addressing important open issues. One of the main problems in the area is correlated with heterogeneous devices, which are using different technologies for communication. Because of communication technology diversity, research challenges are to uniquely identify devices, and to enable them to communicate securely. To tackle the former, previously proposed, a unique identifying scheme that enables device identification regardless of used technology is explained. Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects not covered by current standards and in relation to research proposals which may integrate with M2M systems in future versions of the standards.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
If M2M device uses connectivity protocols such as ZigBee, Z-Wave, or Bluetooth that do not natively support IP.
- 2.
The authors said that the order of other bits should be standardized by standardization organizations active in the field of M2M systems.
References
Galetic, V., Bojic, I., Kusek, M., Jezic, G., Desic, S., Huljenic, D.: Basic principles of Machine-to-Machine communication and its impact on telecommunications industry. In: Proceedings of the 34th International Convention MIPRO, 2011, pp. 89–94 (2011)
SingTel M2M. http://info.singtel.com/large-enterprise/about-m2m. Accessed 30 Mar 2014
3GPP, TR 22.868 Study on Facilitating Machine-to-Machine Communication in 3GPP Systems (2008)
Watson, D.S., Piette, M.A., Sezgen, O., Motegi, N.: Machine-to-Machine (M2M) technology in demand responsive commercial buildings. In: Proceedings of the ACEEE Summer Study on Energy Efficiency in Buildings, 2004, pp. 1–14 (2004)
Emmerson, B.: M2M: the internet of 50 billion devices. Win-Win, pp. 19–22 (2010)
Boswarthick, D., Hersent, O., Elloumi, O.: M2M Communications: A Systems Approach. Wiley-Blackwell, New York (2012)
ETSI, TR 102 897 Use Cases of M2M Applications for City Automation (2012)
ETSI, TR 102 857 Use Cases of M2M Applications for Connected Consumer (2013)
ETSI, TR 102 691 Smart Metering Use Cases (2010)
ETSI, TR 102 732 Use Cases of M2M Applications for eHealth (2013)
ETSI, TR 102 898 Use Cases of Automotive Applications in M2M Capable Networks (2013)
M2M World of Connected Services - Beecham. www.m2m.com/docs/DOC-1221. Accessed 30 Mar 2014
Atzoria, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Miorandi, D., Sicari, S., Pellegrini, F.D., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad-hoc Netw. 10(7), 1497–1516 (2012)
Gantz, J.: The Embedded Internet: Methodology and Findings (2009)
Evans, D.: The Internet of Things: How the Next Evolution of the Internet Is Changing Everything (2011)
Hatton, M.: The Global M2M Market in 2013 (2013)
Zorzi, M., Gluhak, A., Lange, S., Bassi, A.: From today’s INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view. IEEE Wirel. Commun. 17(6), 44–51 (2010)
Katusic, D., Weber, M., Bojic, I., Jezic, G., Kusek, M.: Market, standardization, and regulation development in Machine-to-Machine communications. In: Proceedings of the 20th International Conference on Software, Telecommunications and Computer Networks, 2012, pp. 1–7 (2012)
ETSI M2M. www.etsi.org/technologies-clusters/technologies/m2m. Accessed 30 Mar 2014
oneM2M. www.onem2m.org. Accessed 30 Mar 2014
Association of Radio Industries and Businesses. www.arib.or.jp/english. Accessed 30 Mar 2014
Telecommunication Technology Committee. www.ttc.or.jp/e. Accessed 30 Mar 2014
Alliance for Telecommunications Industry Solutions. www.atis.org. Accessed 30 Mar 2014
Telecommunications Industry Association. www.tiaonline.org. Accessed 30 Mar 2014
China Communications Standards Association. www.ccsa.org.cn/english. Accessed 30 Mar 2014
Telecommunications Technology Association. www.tta.or.kr/English. Accessed 30 Mar 2014
ETSI, TS 102 690 M2M Functional Architecture (2011)
Katusic, D., Skocir, P., Bojic, I., Kusek, M., Jezic, G., Desic, S., Huljenic, D.: Universal identification scheme in Machine-to-Machine systems. In: Proceedings of the 12th International Conference on Telecommunications, 2013, pp. 71–78 (2013)
Jiang, D., ShiWei, C.: A study of information security for M2M of IOT. In: Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering, 2010, pp. 576–579 (2010)
Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad-hoc networks and sensor networks. IEEE Commun. Surv. Tutorials 7(4), 2–28 (2005)
Cho, J.-H., Swami, A., Chen, R.: A survey on trust management for mobile ad-hoc networks. IEEE Commun. Surv. Tutorials 13(4), 562–583 (2011)
Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutorials 8(2), 2–23 (2006)
Cha, I., Shah, Y., Schmidt, A.U., Leicher, A., Meyerstein, M.V.: Trust in M2M communication. IEEE Veh. Technol. Mag. 4(3), 69–75 (2009)
ETSI, TS 102 689 M2M Service Requirements (2010)
ETSI, TS 102 921 mIa, dIa and mId Interfaces (2012)
3rd Generation Partnership Project. www.3gpp.org. Accessed 30 Mar 2014
3rd Generation Partnership Project 2. www.3gpp2.org. Accessed 30 Mar 2014
Open Mobile Alliance. www.openmobilealliance.org. Accessed 30 Mar 2014
Broadband Forum. www.broadband-forum.org. Accessed 30 Mar 2014
Open Mobile Alliance, OMA Device Management Protocol (2008)
Broadband Forum, TR-069: CPE WAN Management Protocol (2011)
3GPP, TR 23.888 System Improvements for Machine-Type Communications (2012)
Bojic, I., Jezic, G., Katusic, D., Desic, S., Kusek, M., Huljenic, D.: Communication in Machine-to-Machine environments. In: Proceedings of the 5th Balkan Conference in Informatics, 2012, pp. 283–286 (2012)
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (2004)
Haverinen, H., Salowey, J.: Extensible Authentication Protocol Method for Global System for Mobile Communications Subscriber Identity Modules (2006)
Arkko, J., Haverinen, H.: Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (2006)
Cakulev, V., Sundaram, G., Broustis, I.: IBAKE: Identity-Based Authenticated Key Exchange (2012)
Dierks, T., Rescorla, E.: The Transport Layer Security Protocol Version 1.2 (2008)
Santesson, S., Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol (2013)
IPv6 over Low power WPAN. https://datatracker.ietf.org/wg/6lowpan. Accessed 30 Mar 2014
Pandey, S., Choi, M.-J., Kim, M.-S., Hong, J.: Towards management of Machine-to-Machine networks. In: Proceedings of the 13th Asia-Pacific Network Operations and Management Symposium, 2011, pp. 1–7 (2011)
Actility Cocoon. http://cocoon.actility.com. Accessed 30 Mar 2014
The OpenMTC Vision. www.open-mtc.org/index.html. Accessed 30 Mar 2014
Routing Over Low Power and Lossy Networks. http://datatracker.ietf.org/wg/roll/charter. Accessed 30 Mar 2014
Hui, J., Thubert, P.: Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks (2011)
ZigBee IP Specification Overview. www.zigbee.org/Specifications/ZigBeeIP/Overview.aspx. Accessed 30 Mar 2014
Nieminen, J., Savolainen, T., Isomaki, M., Patil, B., Shelby, Z., Gomez, C.: Transmission of IPv6 Packets over Bluetooth Low Energy (2013)
Shelby, Z., Hartke, K., Bormann, C.: Constrained Application Protocol (2013)
Kusek, M., Lovrek, I., Maracic, H.: Rich presence information in agent based Machine-to-Machine communication. In: Proceedings of the 17th International Conference in Knowledge Based and Intelligent Information and Engineering Systems, pp. 321–329 (2013)
Xiong, X., Wong, D.S., Deng, X.: TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Proceedings of the IEEE Wireless Communications and Networking Conference, 2010, pp. 1–6 (2010)
Delgado-Mohatar, O., Fúster-Sabater, A., Sierra, J.M.: A light-weight authentication scheme for wireless sensor networks. Ad-hoc Netw. 9(5), 727–735 (2011)
IEEE 802.1AR, Secure Device Identity. www.ieee802.org/1/pages/802.1ar.html. Accessed 30 Mar 2014
Moskowitz, R., Nikander, P., Jokela, P., Henderson, T.: Host Identity Protocol (2008)
Heer, T., Varjonen, S.: Host Identity Protocol Certificates (2011)
Trusted Computing Group. www.trustedcomputinggroup.org. Accessed 30 Mar 2014
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzz. Knowl.-Based Syst. 10(5), 557–570 (2002)
Lu, R., Li, X., Liang, X., Shen, X., Lin, X.: GRS: the green, reliability, and security of emerging Machine-to-Machine communications. IEEE Commun. Mag. 49(4), 28–35 (2011)
Boyer, S.A.: SCADA: Supervisory Control and Data Acquisition. International Society of Automation, Raleigh (2009)
Igure, V.M., Laughter, S.A., Williams, R.D.: Security issues in SCADA networks. Comput. Secur. 25(7), 498–506 (2006)
Internet Engineering Task Force. www.ietf.org. Accessed 30 Mar 2014
Granjal, J., Sa Silva, J., Monteiro, E., Sa Silva, R., Boavida, F.: Why is IPSec a viable option for wireless sensor networks. In: Proceedings of the IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008, pp. 802–807 (2008)
Constrained RESTful Environments. https://datatracker.ietf.org/wg/core. Accessed 30 Mar 2014
Granjal, J., Monteiro, E., Sa Silva, J.: Network-layer security for the internet of things using TinyOS and BLIP. Int. J. Commun. Syst. 1–14 (2012)
Granjal, J., Monteiro, E., Sa Silva, J.: End-to-end transport-layer security for internet-integrated sensing applications with mutual and delegated ECC public-key authentication. In: Proceedings of the IFIP Networking Conference, 2013, pp. 1–9 (2013)
Granjal, J., Monteiro, E., Sa Silva, J.: On the feasibility of secure application-layer communications on the web of things. In: Proceedings of the IEEE 37th Conference on Local Computer Networks, 2012, pp. 228–231 (2012)
Trust Chip Mobile Device Security. www.koolspan.com/trustchip. Accessed 30 Mar 2014
Acknowledgments
This work was supported by two projects: “Machine-to-Machine Communication challenges” funded by Ericsson Nikola Tesla, Croatia, and iCIS project (CENTRO-07-ST24-FEDER-002003), which is co-financed by QREN, in the scope of the Mais Centro Program and European Union’s FEDER.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Bojic, I. et al. (2014). Communication and Security in Machine-to-Machine Systems. In: Ganchev, I., Curado, M., Kassler, A. (eds) Wireless Networking for Moving Objects. Lecture Notes in Computer Science(), vol 8611. Springer, Cham. https://doi.org/10.1007/978-3-319-10834-6_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-10834-6_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10833-9
Online ISBN: 978-3-319-10834-6
eBook Packages: Computer ScienceComputer Science (R0)