M2M, means “Machine to Machine”, including “Machine to Mobile”, “Man to Machine”, etc., is the most popular application form of Internet of Things (IOT) in current stage, whose data transmission is supported by cable, wireless, mobile and other technology, which may be significant security vulnerabilities and risks. In addition, in many use cases, it is likely that M2M will be deployed in very large quantities, and also be mobile, making it unrealistic or impossible for operators or subscribers to send personnel to manage or service it. These requirements introduce a number of unique security vulnerabilities for the M2M and the wireless communication networks. So, in this paper, I will represent the possible security threats and their corresponding analysis from M2M's structure, which consists of front-end sensors and equipment, networks, back-end IT systems.
[1]
Latanya Sweeney,et al.
k-Anonymity: A Model for Protecting Privacy
,
2002,
Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[2]
David Chaum,et al.
Security without identification: transaction systems to make big brother obsolete
,
1985,
CACM.
[3]
Andreas Leicher,et al.
Implementation of a Trusted Ticket System
,
2009,
SEC.
[4]
Ernest F. Brickell,et al.
Direct anonymous attestation
,
2004,
CCS '04.
[5]
Jan Camenisch,et al.
Better Privacy for Trusted Computing Platforms: (Extended Abstract)
,
2004,
ESORICS.
[6]
M. Weiser.
The Computer for the Twenty-First Century
,
1991
.