A Survey on Information Security Threats and Solutions for Machine to Machine (M2M) Communications
Loading...
Date
2017
Journal Title
Journal ISSN
Volume Title
Publisher
Academic Press inc Elsevier Science
Open Access Color
BRONZE
Green Open Access
Yes
OpenAIRE Downloads
206
OpenAIRE Views
159
Publicly Funded
No
Abstract
Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, storage, and computation. Such constraints pose several challenges in the design of M2M networks. Furthermore, some elements that contributed to the rise of M2M applications have caused several new security threats and risks, typically due to the advancements in technology, increasing computing power, declining hardware costs, and freely available software tools. Due to the restricted capabilities of M2M devices, most of the recent research efforts on M2M have focused on computing, resource management, sensing, congestion control and controlling technologies. However, there are few studies on security aspects and there is a need to introduce the threats existing in M2M systems and corresponding solutions. Accordingly, in this paper, after presenting an overview of potential M2M applications, we present a survey of security threats against M2M networks and solutions to prevent or reduce their impact. Then, we investigate security-related challenges and open research issues in M2M networks to provide an insight for future research opportunities. Moreover, we discuss the oneM2M standard, one of the prominent standard initiatives for more secure and smoother M2M networks and the Internet of Things. (C) 2017 Elsevier Inc. All rights reserved.
Description
Kogias, Dimitrios/0000-0001-8985-6136;
ORCID
Keywords
Machine to Machine (M2M) Communications, Security Threats, Countermeasures, Onem2M Standard, Standards, Security Threats, Security of data, Surveys, OneM2M standard, Countermeasures, Scheme, Security systems, Information security threats, Freely available software, Application programs, Machine-to-machine communication, Internet, Authentication, Resource management, Security threats, One M2M standard, Machine to Machine (M2M) communications, Machine to machine (M2M) communications, Recent researches, Research opportunities, 303, Network security, Trust Management, Radar countermeasures, Corresponding solutions, Onem2m Standard, Privacy, Machine To Machine (M2M) Communications, Things, Mechanism, Machine-to-machine (M2M), Wireless Sensor Networks
Fields of Science
02 engineering and technology, 0202 electrical engineering, electronic engineering, information engineering
Citation
WoS Q
Q1
Scopus Q
Q1

OpenCitations Citation Count
39
Source
Journal of Parallel and Distributed Computing
Volume
109
Issue
Start Page
142
End Page
154
PlumX Metrics
Citations
CrossRef : 40
Scopus : 45
Captures
Mendeley Readers : 174
SCOPUS™ Citations
46
checked on Mar 06, 2026
Web of Science™ Citations
30
checked on Mar 06, 2026
Page Views
3
checked on Mar 06, 2026
Downloads
4
checked on Mar 06, 2026
Google Scholar™


