Skip to main content

2020 | OriginalPaper | Buchkapitel

9. Internet of Things (IoT) and Machine to Machine (M2M) Communication

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Kevin Ashton, form Auto-ID center at MIT first coined the term Internet of things in 1999. IoT is nothing but the convergence of wired technologies, wireless communications, micro-electromechanical devices, micro-services software systems building small single function modules, and Internet connectivity. IoT is basically a network of connected physical objects and they communicate with each other through Internet.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Atzori L, Iera A, Morabito G (2010) The Internet of Things: a survey. Elsevier, Amsterdam Atzori L, Iera A, Morabito G (2010) The Internet of Things: a survey. Elsevier, Amsterdam
Zurück zum Zitat Barki A, Bouabdallah A, Gharout S, Traoré J (2016) M2M security: challenges and solutions. IEEE Commun Surveys Tutor 18(2)CrossRef Barki A, Bouabdallah A, Gharout S, Traoré J (2016) M2M security: challenges and solutions. IEEE Commun Surveys Tutor 18(2)CrossRef
Zurück zum Zitat Belenko V, Chernenko V, Kalinin M, Krundyshev V (2018) Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems. In: International Russian automation conference (RusAutoCon) Belenko V, Chernenko V, Kalinin M, Krundyshev V (2018) Evaluation of GAN applicability for intrusion detection in self-organizing networks of cyber physical systems. In: International Russian automation conference (RusAutoCon)
Zurück zum Zitat Du J, Chao SW (2010) A study of information security for M2M of lOT. In: 3rd international conference on advanced computer theory and engineering Du J, Chao SW (2010) A study of information security for M2M of lOT. In: 3rd international conference on advanced computer theory and engineering
Zurück zum Zitat ENISA (2017) Baseline security recommendations for IoT in the context of critical information infrastructures, Nov 2017 ENISA (2017) Baseline security recommendations for IoT in the context of critical information infrastructures, Nov 2017
Zurück zum Zitat ETSI TR 102 857 (2013) V1.1.1, use cases of M2M applications for connected consumer, Aug 2013 ETSI TR 102 857 (2013) V1.1.1, use cases of M2M applications for connected consumer, Aug 2013
Zurück zum Zitat Fleisch E (2010) What is the Internet of Things?—an economic perspective. Auto-ID Labs White Paper WP-BIZAPP-053, Jan 2010 Fleisch E (2010) What is the Internet of Things?—an economic perspective. Auto-ID Labs White Paper WP-BIZAPP-053, Jan 2010
Zurück zum Zitat Gazis V, Sasloglou K, Frangiadakis N, Kikiras P (2012) Wireless sensor networking, automation technologies and machine to machine developments on the path to the Internet of Things. In: 16th Panhellenic conference on informatics Gazis V, Sasloglou K, Frangiadakis N, Kikiras P (2012) Wireless sensor networking, automation technologies and machine to machine developments on the path to the Internet of Things. In: 16th Panhellenic conference on informatics
Zurück zum Zitat Ghidini G, Emmons SP, Kamangar FA, Smith JO (2014) Advancing M2M communications management: a cloud-based system for cellular traffic analysis. 15th international IEEE symposium on a world of wireless, mobile and multimedia networks (WoWMoM) Ghidini G, Emmons SP, Kamangar FA, Smith JO (2014) Advancing M2M communications management: a cloud-based system for cellular traffic analysis. 15th international IEEE symposium on a world of wireless, mobile and multimedia networks (WoWMoM)
Zurück zum Zitat Hussain F, Ferdouse L, Anpalagan A, Karim L, Woungang I (2016) Security threats in M2M networks: a survey with case study. Int J Comput Syst Sci Eng Hussain F, Ferdouse L, Anpalagan A, Karim L, Woungang I (2016) Security threats in M2M networks: a survey with case study. Int J Comput Syst Sci Eng
Zurück zum Zitat GSMA Intelligence (2014) Analysis from concept to delivery: the M2M market today, Feb 2014 GSMA Intelligence (2014) Analysis from concept to delivery: the M2M market today, Feb 2014
Zurück zum Zitat ITU-T Focus Group (2014) M2M service layer: Requirements and architectural framework. ITU-T Focus Group Technical Report on M2M Service Layer, Deliverable D2.1 “M2M service layer: Requirements and architectural framework” ITU-T Focus Group (2014) M2M service layer: Requirements and architectural framework. ITU-T Focus Group Technical Report on M2M Service Layer, Deliverable D2.1 “M2M service layer: Requirements and architectural framework”
Zurück zum Zitat Nagesh S (2013) Roll of data mining in cyber security. J Exclusive Manag Sci 2(5):2277–5684 Nagesh S (2013) Roll of data mining in cyber security. J Exclusive Manag Sci 2(5):2277–5684
Zurück zum Zitat Olavsrud T, CIO Blog on (2015) Internet of Things connections to quadruple by 2020, 20 Mar 2015 Olavsrud T, CIO Blog on (2015) Internet of Things connections to quadruple by 2020, 20 Mar 2015
Zurück zum Zitat Pal A, Rath HK, Shailendra S, Bhattacharyya A (2018) IoT standardization: the road ahead. In: Sen J (ed) Internet of Things. IntechOpen Publishing Pal A, Rath HK, Shailendra S, Bhattacharyya A (2018) IoT standardization: the road ahead. In: Sen J (ed) Internet of Things. IntechOpen Publishing
Zurück zum Zitat Renuka KM, Kumari S, Zhao D, Li L (2019) Design of a secure password-based authentication scheme for M2M networks in IoT enabled cyber-physical systems. In: IEEE access of special section on security and privacy for cloud and IoT Renuka KM, Kumari S, Zhao D, Li L (2019) Design of a secure password-based authentication scheme for M2M networks in IoT enabled cyber-physical systems. In: IEEE access of special section on security and privacy for cloud and IoT
Zurück zum Zitat Stojmenovic I (2013) Large scale cyber-physical systems: distributed actuation, in-network processing and machine-to-machine communications. In: Mediterranean conference on embedded computing Stojmenovic I (2013) Large scale cyber-physical systems: distributed actuation, in-network processing and machine-to-machine communications. In: Mediterranean conference on embedded computing
Zurück zum Zitat Whitter-Jones J (2018) Security review on the Internet of Things. In: Third international conference on fog and mobile edge computing (FMEC) Whitter-Jones J (2018) Security review on the Internet of Things. In: Third international conference on fog and mobile edge computing (FMEC)
Metadaten
Titel
Internet of Things (IoT) and Machine to Machine (M2M) Communication
verfasst von
Ramjee Prasad
Vandana Rohokale
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-31703-4_9

Premium Partner