M2M technologies: Enablers for a pervasive Internet of Things

We survey the state-of-the-art on the Internet-of-Things (IoT) from a wireless communications point of view, as a result of the European FP7 project BUTLER which has its focus on pervasiveness, context-awareness and security for IoT. In particular, we describe the efforts to develop so-called (wireless) enabling technologies, aimed at circumventing the many challenges involved in extending the current set of domains (“verticals”) of IoT applications towards a “horizontal” (i.e. integrated) vision of the IoT. We start by illustrating current research effort in machine-to-machine (M2M), which is mainly focused on vertical domains, and we discuss some of them in details, depicting then the necessary horizontal vision for the future intelligent daily routine (“Smart Life”). We then describe the technical features of the most relevant heterogeneous communications technologies on which the IoT relies, under the light of the on-going M2M service layer standardization. Finally we identify and present the key aspects, within three major cross-vertical categories, under which M2M technologies can function as enablers for the horizontal vision of the IoT.

[1]  G. Abreu,et al.  Reformulating the least-square source localization problem with contracted distances , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.

[2]  Henry A. Kautz,et al.  Location-Based Activity Recognition using Relational Markov Networks , 2005, IJCAI.

[3]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[4]  Stark C. Draper,et al.  Secret key generation through OFDM multipath channel , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[5]  Giuseppe Thadeu Freitas de Abreu,et al.  Super MDS with heterogeneous information , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[6]  Stephen W. Neville,et al.  Secret Key Extraction in Ultra Wideband Channels for Unsynchronized Radios , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).

[7]  James M. Ferryman,et al.  Supplementing Markov Chains with Additional Features for Behavioural Analysis , 2006, 2006 IEEE International Conference on Video and Signal Based Surveillance.

[8]  Kui Ren,et al.  Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.

[9]  Padhraic Smyth,et al.  From Data Mining to Knowledge Discovery in Databases , 1996, AI Mag..

[10]  Christophe F. Wakim,et al.  A Markovian model of pedestrian behavior , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[11]  Davide Dardari,et al.  Efficient and accurate localization in multihop networks , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.

[12]  Wayne E. Stark,et al.  Cryptographic Key Agreement for Mobile Radio , 1996, Digit. Signal Process..

[13]  B. R. Badrinath,et al.  Ad hoc positioning system (APS) using AOA , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[14]  Hao Ni,et al.  OFDM-Based Precise Ranging Technique in Space Applications , 2011, IEEE Transactions on Aerospace and Electronic Systems.

[15]  Qinye Yin,et al.  An efficient ranging method for wireless sensor networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[16]  B. R. Badrinath,et al.  DV Based Positioning in Ad Hoc Networks , 2003, Telecommun. Syst..

[17]  Wen Yao,et al.  Leveraging complex event processing for smart hospitals using RFID , 2011, J. Netw. Comput. Appl..

[18]  Giuseppe Thadeu Freitas de Abreu,et al.  Interval-scaling for multitarget localization , 2012, 2012 9th Workshop on Positioning, Navigation and Communication.

[19]  B. R. Badrinath,et al.  Ad hoc positioning system (APS) , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).

[20]  Tyler Moore,et al.  Measuring the Cost of Cybercrime , 2012, WEIS.

[21]  Jon W. Wallace Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits , 2009, 2009 IEEE International Conference on Communications.

[22]  Ramasamy Uthurusamy,et al.  Data mining and knowledge discovery in databases , 1996, CACM.

[23]  Jeffrey M. Stanton,et al.  Analysis of end user security behaviors , 2005, Comput. Secur..

[24]  Giuseppe Thadeu Freitas de Abreu,et al.  Super MDS: Source Location from Distance and Angle Information , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[25]  Giuseppe Thadeu Freitas de Abreu,et al.  Sensor localization with algebraic confidence , 2012, 2012 Conference Record of the Forty Sixth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[26]  Christoph P. Mayer Electronic Communications of the EASST Volume 17 ( 2009 ) Workshops der Wissenschaftlichen Konferenz Kommunikation in Verteilten Systemen 2009 ( WowKiVS 2009 ) Security and Privacy Challenges in the Internet of Things , 2008 .