A Survey on M 2 M Service Networks

The number of industrial applications relying on the Machine to Machine (M2M) services exposed from physical world has been increasing in recent years. Such M2M services enable communication of devices with the core processes of companies. However, there is a big challenge related to complexity and to application-specific M2M systems called ―vertical silos‖. This paper focuses on reviewing the technologies of M2M service networks and discussing approaches from the perspectives of M2M information OPEN ACCESS Computers 2014, 3 131 and services, M2M communication and M2M security. Finally, a discussion on technologies and approaches potentially enabling future autonomic M2M service networks are provided. According to our conclusions, it is seen that clear definition of the architectural principles is needed to solve the ―vertical silo‖ problem and then, proceeding towards enabling autonomic capabilities for solving complexity problem appears feasible. Several areas of future research have been identified, e.g., autonomic information based services, optimization of communications with limited capability devices, real-time messaging, creation of trust and end to end security, adaptability, reliability, performance, interoperability, and maintenance.

[1]  Vincent H. Berk,et al.  Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems , 2005, Second International Conference on Autonomic Computing (ICAC'05).

[2]  Yi-Min Wang,et al.  Discovering correctness constraints for self-management of system configuration , 2004, International Conference on Autonomic Computing, 2004. Proceedings..

[3]  David Sinreich,et al.  An architectural blueprint for autonomic computing , 2006 .

[4]  Morris Sloman,et al.  Guest Editorial: Policy-Based Management of Networks and Services , 2004, Journal of Network and Systems Management.

[5]  Gail E. Kaiser,et al.  Retrofitting Autonomic Capabilities onto Legacy Systems , 2006, Cluster Computing.

[6]  Diomidis Spinellis,et al.  A survey of peer-to-peer content distribution technologies , 2004, CSUR.

[7]  Yacine Challal,et al.  A taxonomy of multicast data origin authentication: Issues and solutions , 2004, IEEE Communications Surveys & Tutorials.

[8]  Christoph Stasch,et al.  New Generation Sensor Web Enablement , 2011, Sensors.

[9]  Geng Wu,et al.  M2M: From mobile to embedded internet , 2011, IEEE Communications Magazine.

[10]  M. Costello,et al.  Briefs , 1984 .

[11]  M. Salehie,et al.  Autonomic computing , 2005, ACM SIGSOFT Softw. Eng. Notes.

[12]  Amir Zeid,et al.  Towards autonomic web services: achieving self-healing using web services , 2005, DEAS '05.

[13]  Steve R. White,et al.  Unity: experiences with a prototype autonomic computing system , 2004, International Conference on Autonomic Computing, 2004. Proceedings..

[14]  G. Ganger,et al.  File classification in self-* storage systems , 2004, International Conference on Autonomic Computing, 2004. Proceedings..

[15]  Janne Riihijärvi,et al.  A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks , 2008, Comput. Networks.

[16]  Scott Rose,et al.  An autonomic failure-detection algorithm , 2004, WOSP '04.

[17]  Mahdi Ben Alaya,et al.  Towards Horizontal Architecture for Autonomic M2M Service Networks , 2014, Future Internet.

[18]  John Davidson,et al.  Ogc® sensor web enablement:overview and high level achhitecture. , 2007, 2007 IEEE Autotestcon.

[19]  Malik Jahan Khan,et al.  Achieving Self-configuration Capability in Autonomic Systems Using Case-Based Reasoning with a New Similarity Measure , 2007, ICIC.

[20]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[21]  DiffServ Qos Satellite Earth Stations and Systems (SES); Broadband Satellite Multimedia (BSM); , 2007 .

[22]  Noel De Palma,et al.  Self-protection for Distributed Component-Based Applications , 2006, SSS.

[23]  Amit P. Sheth,et al.  The SSN ontology of the W3C semantic sensor network incubator group , 2012, J. Web Semant..

[24]  S. Sicard Using Components for Architecture-Based Management The Self-Repair case , 2007 .

[25]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[26]  Esko Dijk,et al.  DTLS-based Multicast Security for Low-Power and Lossy Networks (LLNs) , 2012 .

[27]  François Jammes,et al.  Service-Oriented Device Communications Using the Devices Profile for Web services , 2005, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[28]  Ahmed Karmouch Mobile Software Agents for Telecommunications , 1998, IEEE Communications Magazine.

[29]  Salim Hariri,et al.  The Autonomic Computing Paradigm , 2006, Cluster Computing.

[30]  George Candea,et al.  Microreboot - A Technique for Cheap Recovery , 2004, OSDI.

[31]  Cosimo Anglano,et al.  Achieving Self-Healing in Autonomic Software Systems: a Case-Based Reasoning Approach , 2005, SOAS.

[32]  Srinivasan Seshan,et al.  IrisNet: An Architecture for a Worldwide Sensor Web , 2003, IEEE Pervasive Comput..

[33]  Roy Want,et al.  Comparing autonomic and proactive computing , 2003, IBM Syst. J..

[34]  Juhani Latvakoski,et al.  Distributed service platform for adaptive mobile services , 2006, Int. J. Pervasive Comput. Commun..

[35]  Joseph L. Hellerstein,et al.  Managing the Performance of Lotus Notes: A Control Theoretic Approach , 2001, Int. CMG Conference.

[36]  Deborah L. McGuinness,et al.  Bringing Semantics to Web Services with OWL-S , 2007, World Wide Web.

[37]  Volker Markl,et al.  LEO: An autonomic query optimizer for DB2 , 2003, IBM Syst. J..

[38]  Kim Chang,et al.  Global Wireless Machine-to-Machine Standardization , 2011, IEEE Internet Computing.

[39]  Roy Fielding,et al.  Architectural Styles and the Design of Network-based Software Architectures"; Doctoral dissertation , 2000 .

[40]  Mohsen Sharifi,et al.  A Survey of Autonomic Computing Systems , 2006, Third International Conference on Autonomic and Autonomous Systems (ICAS'07).

[41]  Yuanyuan Zhou,et al.  Rx: treating bugs as allergies---a safe method to survive software failures , 2005, SOSP '05.

[42]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[43]  A. Chakravarti,et al.  The organic grid: self-organizing computation on a peer-to-peer network , 2004, International Conference on Autonomic Computing, 2004. Proceedings..

[44]  Sam Lightstone,et al.  SMART: Making DB2 (More) Autonomic , 2002, VLDB.

[45]  Dilma Da Silva,et al.  Enabling autonomic behavior in systems software with hot swapping , 2003, IBM Syst. J..

[46]  Jack Weast,et al.  UPnP Design by Example: A Software Developer's Guide to Universal Plug and Play , 2003 .

[47]  Jin Li,et al.  On peer-to-peer (P2P) content delivery , 2008, Peer-to-Peer Netw. Appl..

[48]  Benny Rochwerger,et al.  Oceano-SLA based management of a computing utility , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).

[49]  Joon S. Park,et al.  Static vs. dynamic recovery models for survivable distributed systems , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[50]  Roger Alexander,et al.  Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments , 2012 .

[51]  Pascal Thubert,et al.  Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks , 2011, RFC.

[52]  M. Parashar,et al.  Accord: a programming framework for autonomic applications , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[53]  Utz Roedig,et al.  Securing Internet of Things with Lightweight IPsec , 2010 .

[54]  Gail E. Kaiser,et al.  An Approach to Autonomizing Legacy Systems , 2002 .

[55]  Eric Rescorla,et al.  Datagram Transport Layer Security , 2006, RFC.

[56]  Roy H. Campbell,et al.  Autonomic pervasive computing based on planning , 2004, International Conference on Autonomic Computing, 2004. Proceedings..

[57]  Miguel Castro,et al.  Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.

[58]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[59]  Amin Vahdat,et al.  Pip: Detecting the Unexpected in Distributed Systems , 2006, NSDI.

[60]  K. Shadan,et al.  Available online: , 2012 .

[61]  Jeffrey S. Chase,et al.  Learning Application Models for Utility Resource Planning , 2006, 2006 IEEE International Conference on Autonomic Computing.

[62]  Nagarajan Kandasamy,et al.  Online control for self-management in computing systems , 2004, Proceedings. RTAS 2004. 10th IEEE Real-Time and Embedded Technology and Applications Symposium, 2004..

[63]  Jeffrey O. Kephart,et al.  The Vision of Autonomic Computing , 2003, Computer.

[64]  Martin Fowler,et al.  Analysis patterns - reusable object models , 1996, Addison-Wesley series in object-oriented software engineering.

[65]  Shu Yun Lim,et al.  Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network , 2011, J. Ubiquitous Syst. Pervasive Networks.

[66]  Abdelmadjid Bouabdallah,et al.  Multicast receiver and sender access control and its applicability to mobile IP environments: a survey , 2005, IEEE Communications Surveys & Tutorials.

[67]  Ingrid Moerman,et al.  An overview of mobile ad hoc networks: applications and challenges , 2004 .

[68]  Ming Zhang,et al.  Autonomia: an autonomic computing environment , 2003, Conference Proceedings of the 2003 IEEE International Performance, Computing, and Communications Conference, 2003..

[69]  Ben Y. Zhao,et al.  Maintenance-Free Global Data Storage , 2001, IEEE Internet Comput..

[70]  David L. Cohn,et al.  Autonomic Computing , 2003, ISADS.

[71]  Bradley R. Schmerl,et al.  Rainbow: architecture-based self-adaptation with reusable infrastructure , 2004, International Conference on Autonomic Computing, 2004. Proceedings..

[72]  Zheng He,et al.  Research and Analysis of the Optimization of the Unstructured P2P Overlay Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[73]  Sheng Ma,et al.  Real-time problem determination in distributed systems using active probing , 2004, 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507).

[74]  Salim Hariri,et al.  Autonomic Computing: An Overview , 2004, UPP.

[75]  Zach Shelby,et al.  CoAP Security Options , 2011 .

[76]  Adam Dunkels,et al.  A Low-Power CoAP for Contiki , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[77]  Zach Shelby,et al.  Constrained RESTful Environments (CoRE) Link Format , 2012, RFC.

[78]  Gail E. Kaiser,et al.  Kinesthetics eXtreme: an external infrastructure for monitoring distributed legacy systems , 2003, 2003 Autonomic Computing Workshop.

[79]  Juhani Latvakoski,et al.  A communication architecture for spontaneous systems , 2004, IEEE Wireless Communications.

[80]  Raouf Boutaba,et al.  Projecting advanced enterprise network and service management to active networks , 2002 .

[81]  Habib Youssef,et al.  An efficient source authentication scheme in wireless sensor networks , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.

[82]  T. Hannelius,et al.  Roadmap to adopting OPC UA , 2008, 2008 6th IEEE International Conference on Industrial Informatics.

[83]  Petr Jan Horn,et al.  Autonomic Computing: IBM's Perspective on the State of Information Technology , 2001 .

[84]  Z. Hocenski,et al.  A Self Manageable Rule Driven Enterprise Application , 2007, 2007 29th International Conference on Information Technology Interfaces.

[85]  Matt Welsh,et al.  Hourglass: An Infrastructure for Connecting Sensor Networks and Applications , 2004 .

[86]  Mostafa Ammar,et al.  Security issues and solutions in multicast content distribution: a survey , 2003 .