Skip to main content

Network-Centric Operations in Machine-to-Machine Networks

  • Conference paper
Agent and Multi-Agent Systems. Technologies and Applications (KES-AMSTA 2012)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 7327))

  • 2082 Accesses

Abstract

This paper explores the convergence of Machine-to-Machine (M2M) networks with Network-Centric Operations (NCO). An overview of the M2M communication paradigm and current standardization efforts regarding architecture are given. It includes an overview of the network-centric networking and analyses the idea of implementing NCO approach to achieve situational awareness and self-synchronization of autonomous and intelligent M2M devices in networked M2M environments. Case study involving M2M e-Health scenario is given and discussed as a proof of concept for the proposed convergence.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lawton, G.: Machine-to-Machine Technology Gears Up for Growth. IEEE Computer 37(9), 12–15 (2004)

    Article  Google Scholar 

  2. Smart Devices and Services Connected by CDMA 2000, Harbor Research, Inc. (2010)

    Google Scholar 

  3. M2M: Growth Opportunities for MNOs in developed Markets (Sample Pages), Mobile Market Development Ltd. (2010)

    Google Scholar 

  4. Alendal, M.: Operators need an ecosystem to support 50 billion connections. Ericsson Review (3) (2010)

    Google Scholar 

  5. Cox, A.: M2M: Connecting the devices. M2M & Embedded Strategies, Telematics, CE, mHealth, Metering & Smart Buildings 2011-2016, Juniper Research (2011)

    Google Scholar 

  6. ETSI M2M Technical Committee, http://www.etsi.org/Website/Technologies/M2M.aspx

  7. 3GPP Technical Specification 22.368, v11.3.0 (2011), http://www.3gpp.org/ftp/Specs/html-info/22368.htm

  8. Lien, S.-Y., Chen, K.-W., Lin, Y.: Towards Ubiquitous Massive Accesses in 3GPP Machine-to-Machine Communications. IEEE Communications Magazine 49(4), 66–74 (2011)

    Article  Google Scholar 

  9. Chang, K., Soong, A., Tseng, M., Xiang, Z.: Global Wireless Machine-to-Machine Standardization. IEEE Internet Computing 15(2), 64–69 (2011)

    Article  Google Scholar 

  10. ETSI, http://www.etsi.org/website/homepage.aspx

  11. 3GPP, http://www.3gpp.org/About-3GPP

  12. Dressler, F.: Network-centric Actuation Control in Sensor/Actuator Networks based on Bio-inspired Technologies. In: Mobile Adhoc and Sensor Systems (MASS), pp. 680–684 (2006)

    Google Scholar 

  13. Cebrowski, A.K., Garstka, J.J.: Network-centric warfare: Its origin and future. U.S. Naval Institute Proceedings Magazine, 28–35 (1998)

    Google Scholar 

  14. NIS23, Net-Centric Information & Integration Services for Security System (2009)

    Google Scholar 

  15. Alberts, D.S., Garstka, J.J., Stein, F.P.: Network centric warfare: Developing and leveraging information superiority, 2nd edn. CCRP (2001)

    Google Scholar 

  16. Networked Field Services, ClickSoftware (2010)

    Google Scholar 

  17. Network Centric Warfare, Department of Defense Report to Congress (2001)

    Google Scholar 

  18. Wang. N., Schmidt, D.C., van’t Hag, H., Corsaro, A.: Toward an adaptive Data Distribution Service for Dynamic Large-Scale Network-Centric Operation and Warfare. PrismTech Corporation (2008)

    Google Scholar 

  19. Wesensten, N.J., Belenky, G., Balkin, T.J.: Cognitive Readiness in Network-Centric Operations. Parameters 35(1), 94–105 (2005)

    Google Scholar 

  20. Bay, J.S.: Disruptive Effects of Net-Centricity on Command and Control. In: 13th ICCRTS “C2 for Complex Endeavors” (2008)

    Google Scholar 

  21. Groh, J.L.: Network-Centric Warfare: Leveraging the Power of Information. In: USAWC Guide to National Security Issues. Theory of War and Strategy, vol. 1, pp. 323–338 (2008)

    Google Scholar 

  22. von Lubitz, D., Wickramasinghe, N.: Healthcare Network Centric Operations: The Confluence of E-Health and E-Government. In: Global E-Government: Theory, Applications and Benchmarking, pp. 127–147 (2007)

    Google Scholar 

  23. ETSI Technical Report 102.742: Use cases of M2M applications for eHealth, v0.4.1 (2011), http://docbox.etsi.org/M2M/Open/Latest_Drafts/00005v041.pdf

  24. Schmidt, D.C., Corsaro, A., van’t Hag, H.: Addressing the Challenges of Tactical Information Management in Net-Centric Systems with DDS. PrismTech Corporation (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Katusic, D., Jezic, G. (2012). Network-Centric Operations in Machine-to-Machine Networks. In: Jezic, G., Kusek, M., Nguyen, NT., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems. Technologies and Applications. KES-AMSTA 2012. Lecture Notes in Computer Science(), vol 7327. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30947-2_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30947-2_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30946-5

  • Online ISBN: 978-3-642-30947-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics