A Survey on Information Security Threats and Solutions for Machine to Machine (M2M) Communications

Loading...
Publication Logo

Date

2017

Journal Title

Journal ISSN

Volume Title

Publisher

Academic Press inc Elsevier Science

Open Access Color

BRONZE

Green Open Access

Yes

OpenAIRE Downloads

206

OpenAIRE Views

159

Publicly Funded

No
Impulse
Top 10%
Influence
Top 10%
Popularity
Top 10%

Research Projects

Journal Issue

Abstract

Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, storage, and computation. Such constraints pose several challenges in the design of M2M networks. Furthermore, some elements that contributed to the rise of M2M applications have caused several new security threats and risks, typically due to the advancements in technology, increasing computing power, declining hardware costs, and freely available software tools. Due to the restricted capabilities of M2M devices, most of the recent research efforts on M2M have focused on computing, resource management, sensing, congestion control and controlling technologies. However, there are few studies on security aspects and there is a need to introduce the threats existing in M2M systems and corresponding solutions. Accordingly, in this paper, after presenting an overview of potential M2M applications, we present a survey of security threats against M2M networks and solutions to prevent or reduce their impact. Then, we investigate security-related challenges and open research issues in M2M networks to provide an insight for future research opportunities. Moreover, we discuss the oneM2M standard, one of the prominent standard initiatives for more secure and smoother M2M networks and the Internet of Things. (C) 2017 Elsevier Inc. All rights reserved.

Description

Kogias, Dimitrios/0000-0001-8985-6136;

Keywords

Machine to Machine (M2M) Communications, Security Threats, Countermeasures, Onem2M Standard, Standards, Security Threats, Security of data, Surveys, OneM2M standard, Countermeasures, Scheme, Security systems, Information security threats, Freely available software, Application programs, Machine-to-machine communication, Internet, Authentication, Resource management, Security threats, One M2M standard, Machine to Machine (M2M) communications, Machine to machine (M2M) communications, Recent researches, Research opportunities, 303, Network security, Trust Management, Radar countermeasures, Corresponding solutions, Onem2m Standard, Privacy, Machine To Machine (M2M) Communications, Things, Mechanism, Machine-to-machine (M2M), Wireless Sensor Networks

Fields of Science

02 engineering and technology, 0202 electrical engineering, electronic engineering, information engineering

Citation

WoS Q

Q1

Scopus Q

Q1
OpenCitations Logo
OpenCitations Citation Count
39

Source

Journal of Parallel and Distributed Computing

Volume

109

Issue

Start Page

142

End Page

154
PlumX Metrics
Citations

CrossRef : 40

Scopus : 45

Captures

Mendeley Readers : 174

SCOPUS™ Citations

46

checked on Mar 06, 2026

Web of Science™ Citations

30

checked on Mar 06, 2026

Page Views

3

checked on Mar 06, 2026

Downloads

4

checked on Mar 06, 2026

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
6.2237

Sustainable Development Goals

SDG data is not available