Skip to main content
Top

2020 | OriginalPaper | Chapter

9. Internet of Things (IoT) and Machine to Machine (M2M) Communication

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Kevin Ashton, form Auto-ID center at MIT first coined the term Internet of things in 1999. IoT is nothing but the convergence of wired technologies, wireless communications, micro-electromechanical devices, micro-services software systems building small single function modules, and Internet connectivity. IoT is basically a network of connected physical objects and they communicate with each other through Internet.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Atzori L, Iera A, Morabito G (2010) The Internet of Things: a survey. Elsevier, Amsterdam Atzori L, Iera A, Morabito G (2010) The Internet of Things: a survey. Elsevier, Amsterdam
go back to reference Barki A, Bouabdallah A, Gharout S, Traoré J (2016) M2M security: challenges and solutions. IEEE Commun Surveys Tutor 18(2)CrossRef Barki A, Bouabdallah A, Gharout S, Traoré J (2016) M2M security: challenges and solutions. IEEE Commun Surveys Tutor 18(2)CrossRef
go back to reference Belenko V, Chernenko V, Kalinin M, Krundyshev V (2018) Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems. In: International Russian automation conference (RusAutoCon) Belenko V, Chernenko V, Kalinin M, Krundyshev V (2018) Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems. In: International Russian automation conference (RusAutoCon)
go back to reference Du J, Chao SW (2010) A study of information security for M2M of lOT. In: 3rd international conference on advanced computer theory and engineering Du J, Chao SW (2010) A study of information security for M2M of lOT. In: 3rd international conference on advanced computer theory and engineering
go back to reference ENISA (2017) Baseline security recommendations for IoT in the context of critical information infrastructures, Nov 2017 ENISA (2017) Baseline security recommendations for IoT in the context of critical information infrastructures, Nov 2017
go back to reference ETSI TR 102 857 (2013) V1.1.1, use cases of M2M applications for connected consumer, Aug 2013 ETSI TR 102 857 (2013) V1.1.1, use cases of M2M applications for connected consumer, Aug 2013
go back to reference Fleisch E (2010) What is the Internet of Things?—an economic perspective. Auto-ID Labs White Paper WP-BIZAPP-053, Jan 2010 Fleisch E (2010) What is the Internet of Things?—an economic perspective. Auto-ID Labs White Paper WP-BIZAPP-053, Jan 2010
go back to reference Gazis V, Sasloglou K, Frangiadakis N, Kikiras P (2012) Wireless sensor networking, automation technologies and machine to machine developments on the path to the Internet of Things. In: 16th Panhellenic conference on informatics Gazis V, Sasloglou K, Frangiadakis N, Kikiras P (2012) Wireless sensor networking, automation technologies and machine to machine developments on the path to the Internet of Things. In: 16th Panhellenic conference on informatics
go back to reference Ghidini G, Emmons SP, Kamangar FA, Smith JO (2014) Advancing M2M communications management: a cloud-based system for cellular traffic analysis. 15th international IEEE symposium on a world of wireless, mobile and multimedia networks (WoWMoM) Ghidini G, Emmons SP, Kamangar FA, Smith JO (2014) Advancing M2M communications management: a cloud-based system for cellular traffic analysis. 15th international IEEE symposium on a world of wireless, mobile and multimedia networks (WoWMoM)
go back to reference Hussain F, Ferdouse L, Anpalagan A, Karim L, Woungang I (2016) Security threats in M2M networks: a survey with case study. Int J Comput Syst Sci Eng Hussain F, Ferdouse L, Anpalagan A, Karim L, Woungang I (2016) Security threats in M2M networks: a survey with case study. Int J Comput Syst Sci Eng
go back to reference GSMA Intelligence (2014) Analysis from concept to delivery: the M2M market today, Feb 2014 GSMA Intelligence (2014) Analysis from concept to delivery: the M2M market today, Feb 2014
go back to reference ITU-T Focus Group (2014) M2M service layer: Requirements and architectural framework. ITU-T Focus Group Technical Report on M2M Service Layer, Deliverable D2.1 “M2M service layer: Requirements and architectural framework” ITU-T Focus Group (2014) M2M service layer: Requirements and architectural framework. ITU-T Focus Group Technical Report on M2M Service Layer, Deliverable D2.1 “M2M service layer: Requirements and architectural framework”
go back to reference Nagesh S (2013) Roll of data mining in cyber security. J Exclusive Manag Sci 2(5):2277–5684 Nagesh S (2013) Roll of data mining in cyber security. J Exclusive Manag Sci 2(5):2277–5684
go back to reference Olavsrud T, CIO Blog on (2015) Internet of Things connections to quadruple by 2020, 20 Mar 2015 Olavsrud T, CIO Blog on (2015) Internet of Things connections to quadruple by 2020, 20 Mar 2015
go back to reference Pal A, Rath HK, Shailendra S, Bhattacharyya A (2018) IoT standardization: the road ahead. In: Sen J (ed) Internet of Things. IntechOpen Publishing Pal A, Rath HK, Shailendra S, Bhattacharyya A (2018) IoT standardization: the road ahead. In: Sen J (ed) Internet of Things. IntechOpen Publishing
go back to reference Renuka KM, Kumari S, Zhao D, Li L (2019) Design of a secure password-based authentication scheme for M2M networks in IoT enabled cyber-physical systems. In: IEEE access of special section on security and privacy for cloud and IoT Renuka KM, Kumari S, Zhao D, Li L (2019) Design of a secure password-based authentication scheme for M2M networks in IoT enabled cyber-physical systems. In: IEEE access of special section on security and privacy for cloud and IoT
go back to reference Stojmenovic I (2013) Large scale cyber-physical systems: distributed actuation, in-network processing and machine-to-machine communications. In: Mediterranean conference on embedded computing Stojmenovic I (2013) Large scale cyber-physical systems: distributed actuation, in-network processing and machine-to-machine communications. In: Mediterranean conference on embedded computing
go back to reference Whitter-Jones J (2018) Security review on the Internet of Things. In: Third international conference on fog and mobile edge computing (FMEC) Whitter-Jones J (2018) Security review on the Internet of Things. In: Third international conference on fog and mobile edge computing (FMEC)
Metadata
Title
Internet of Things (IoT) and Machine to Machine (M2M) Communication
Authors
Ramjee Prasad
Vandana Rohokale
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-31703-4_9

Premium Partner