Communication and Security in Machine-to-Machine Systems

Machine-to-Machine (M2M) systems and technologies currently constitute a hot topic in the field of Information and Communication Technology (ICT), and reflect an increasing need for technologies enabling applications in diverse areas, as well as interactions between continuously increasing numbers of connected devices. Important participants in making M2M systems widely used and applicable in numerous real-life scenarios are standardization organizations. They try to develop technical specifications that address the need for a common M2M service layer, which can be realized through various hardware and software implementations. This chapter presents current standards and architecture of M2M systems with the focus on communication and security issues, while also discussing current and future research efforts addressing important open issues. One of the main problems in the area is correlated with heterogeneous devices, which are using different technologies for communication. Because of communication technology diversity, research challenges are to uniquely identify devices, and to enable them to communicate securely. To tackle the former, previously proposed, a unique identifying scheme that enables device identification regardless of used technology is explained. Regarding the latter, we analyze how current standards and architecture of M2M systems define basic processes for secure connection establishment, and also discuss open issues, both in respect to aspects not covered by current standards and in relation to research proposals which may integrate with M2M systems in future versions of the standards.

[1]  Samu Varjonen,et al.  Host Identity Protocol Certificates , 2011, RFC.

[2]  Ioannis Broustis,et al.  IBAKE: Identity-Based Authenticated Key Exchange , 2012, RFC.

[3]  Darko Huljenic,et al.  Communication in machine-to-machine environments , 2012, BCI '12.

[4]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[5]  Carlisle M. Adams,et al.  X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.

[6]  Alessandro Bassi,et al.  From today's INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view , 2010, IEEE Wireless Communications.

[7]  Fernando Boavida,et al.  Why is IPSec a viable option for wireless sensor networks , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[8]  Scott A. Rotondo Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.

[9]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[10]  Darko Huljenic,et al.  Basic principles of Machine-to-Machine communication and its impact on telecommunications industry , 2011, 2011 Proceedings of the 34th International Convention MIPRO.

[11]  Jari Arkko,et al.  Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA') , 2009, RFC.

[12]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[13]  Larry J. Blunk,et al.  PPP Extensible Authentication Protocol (EAP) , 1998, RFC.

[14]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[15]  Xiaohui Liang,et al.  GRS: The green, reliability, and security of emerging machine to machine communications , 2011, IEEE Communications Magazine.

[16]  J. F. Holmes,et al.  Supervisory Control and Data Acquisition (SCADA) and related systems for automated process control in the food industry: an introduction , 2013, ICRA 2013.

[17]  Jari Arkko,et al.  Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA) , 2006, RFC.

[18]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[19]  Jorge Sá Silva,et al.  On the feasibility of secure application-layer communications on the Web of Things , 2012, 37th Annual IEEE Conference on Local Computer Networks.

[20]  Doug Fisher,et al.  SCADA: Supervisory Control and Data Acquisition , 2015 .

[21]  José María Sierra,et al.  A light-weight authentication scheme for wireless sensor networks , 2011, Ad Hoc Networks.

[22]  Olivier Hersent,et al.  M2M Communications: A Systems Approach , 2012 .

[23]  Xiaotie Deng,et al.  TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.

[24]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[25]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[26]  Gilbert Moïsio,et al.  Internet Engineering Task Force , 2014 .

[27]  Jorge Sá Silva,et al.  End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication , 2013, 2013 IFIP Networking Conference.

[28]  Lossy Networks Stability Analysis of the Delays of the Routing Protocol over Low Power and , 2010 .

[29]  Henry Haverinen,et al.  Extensible Authentication Protocol Method for Global System for Mobile Communications (GSM) Subscriber Identity Modules (EAP-SIM) , 2006, RFC.

[30]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[31]  Wenqing Liu,et al.  Channel characterization and system verification for narrowband power line communication in smart grid applications , 2011, IEEE Communications Magazine.

[32]  Darko Huljenic,et al.  Universal identification scheme in machine-to-machine systems , 2013, Proceedings of the 12th International Conference on Telecommunications.

[33]  Jorge Sá Silva,et al.  Network‐layer security for the Internet of Things using TinyOS and BLIP , 2014, Int. J. Commun. Syst..

[34]  Jiang Du,et al.  A study of information security for M2M of IOT , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[35]  Basavaraj Patil,et al.  Transmission of IPv6 Packets over BLUETOOTH Low Energy , 2013 .

[36]  Mario Kusek,et al.  Rich Presence Information in Agent based Machine-to-Machine Communication , 2013, KES.

[37]  Mario Kusek,et al.  Market, standardization, and regulation development in Machine-to-Machine communications , 2012, SoftCOM 2012, 20th International Conference on Software, Telecommunications and Computer Networks.

[38]  Pekka Nikander,et al.  Host Identity Protocol , 2005 .

[39]  Mary Ann Piette,et al.  Machine to Machine (M2M) Technology in Demand Responsive Commercial Buildings , 2004 .

[40]  James Won-Ki Hong,et al.  Towards management of machine to machine networks , 2011, 2011 13th Asia-Pacific Network Operations and Management Symposium.

[41]  Inhyok Cha,et al.  Trust in M2M communication , 2009, IEEE Vehicular Technology Magazine.