A Survey on Information Security Threats and Solutions for Machine to Machine (M2M) Communications

dc.contributor.author Tuna, Gurkan
dc.contributor.author Kogias, Dimitrios G.
dc.contributor.author Gungor, V. Cagri
dc.contributor.author Gezer, Cengiz
dc.contributor.author Taskin, Erhan
dc.contributor.author Ayday, Erman
dc.date.accessioned 2025-09-25T10:39:41Z
dc.date.available 2025-09-25T10:39:41Z
dc.date.issued 2017
dc.description Kogias, Dimitrios/0000-0001-8985-6136; en_US
dc.description.abstract Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, storage, and computation. Such constraints pose several challenges in the design of M2M networks. Furthermore, some elements that contributed to the rise of M2M applications have caused several new security threats and risks, typically due to the advancements in technology, increasing computing power, declining hardware costs, and freely available software tools. Due to the restricted capabilities of M2M devices, most of the recent research efforts on M2M have focused on computing, resource management, sensing, congestion control and controlling technologies. However, there are few studies on security aspects and there is a need to introduce the threats existing in M2M systems and corresponding solutions. Accordingly, in this paper, after presenting an overview of potential M2M applications, we present a survey of security threats against M2M networks and solutions to prevent or reduce their impact. Then, we investigate security-related challenges and open research issues in M2M networks to provide an insight for future research opportunities. Moreover, we discuss the oneM2M standard, one of the prominent standard initiatives for more secure and smoother M2M networks and the Internet of Things. (C) 2017 Elsevier Inc. All rights reserved. en_US
dc.description.sponsorship Turkish Scientific and Technical Research Council (TUBITAK) [3140911] en_US
dc.description.sponsorship This work was supported by the Turkish Scientific and Technical Research Council (TUBITAK) under Grant no. 3140911. en_US
dc.identifier.doi 10.1016/j.jpdc.2017.05.021
dc.identifier.issn 0743-7315
dc.identifier.issn 1096-0848
dc.identifier.scopus 2-s2.0-85021447987
dc.identifier.uri https://doi.org/10.1016/j.jpdc.2017.05.021
dc.identifier.uri https://hdl.handle.net/20.500.12573/3165
dc.language.iso en en_US
dc.publisher Academic Press inc Elsevier Science en_US
dc.relation.ispartof Journal of Parallel and Distributed Computing en_US
dc.rights info:eu-repo/semantics/closedAccess en_US
dc.subject Machine to Machine (M2M) Communications en_US
dc.subject Security Threats en_US
dc.subject Countermeasures en_US
dc.subject Onem2M Standard en_US
dc.subject Machine to Machine (M2M) Communications
dc.title A Survey on Information Security Threats and Solutions for Machine to Machine (M2M) Communications en_US
dc.type Article en_US
dspace.entity.type Publication
gdc.author.id Kogias, Dimitrios/0000-0001-8985-6136
gdc.author.scopusid 48862103700
gdc.author.scopusid 56896083200
gdc.author.scopusid 10739803300
gdc.author.scopusid 57212210999
gdc.author.scopusid 56246993300
gdc.author.scopusid 20435500700
gdc.author.wosid Tuna, Gurkan/Aag-4412-2019
gdc.author.wosid Kogias, Dimitrios/Aap-7715-2021
gdc.bip.impulseclass C4
gdc.bip.influenceclass C4
gdc.bip.popularityclass C4
gdc.coar.access metadata only access
gdc.coar.type text::journal::journal article
gdc.collaboration.industrial false
gdc.description.department Abdullah Gül University en_US
gdc.description.departmenttemp [Tuna, Gurkan] Trakya Univ, Dept Comp Programming, Edirne, Turkey; [Kogias, Dimitrios G.] Piraeus Univ Appl Sci, Dept Elect Engn, TEI Piraeus, Piraeus, Greece; [Gungor, V. Cagri] Abdullah Gul Univ, Dept Comp Engn, Kayseri, Turkey; [Gezer, Cengiz; Taskin, Erhan] NETAS Telekomunikasyon AS, Istanbul, Turkey; [Ayday, Erman] Bilkent Univ, Dept Comp Engn, Ankara, Turkey en_US
gdc.description.endpage 154 en_US
gdc.description.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
gdc.description.scopusquality Q1
gdc.description.startpage 142 en_US
gdc.description.volume 109 en_US
gdc.description.woscitationindex Science Citation Index Expanded
gdc.description.wosquality Q1
gdc.identifier.openalex W2733304997
gdc.identifier.wos WOS:000408298400012
gdc.index.type WoS
gdc.index.type Scopus
gdc.oaire.accesstype BRONZE
gdc.oaire.diamondjournal false
gdc.oaire.downloads 206
gdc.oaire.impulse 21.0
gdc.oaire.influence 5.2660014E-9
gdc.oaire.isgreen true
gdc.oaire.keywords Standards
gdc.oaire.keywords Security Threats
gdc.oaire.keywords Security of data
gdc.oaire.keywords Surveys
gdc.oaire.keywords OneM2M standard
gdc.oaire.keywords Countermeasures
gdc.oaire.keywords Scheme
gdc.oaire.keywords Security systems
gdc.oaire.keywords Information security threats
gdc.oaire.keywords Freely available software
gdc.oaire.keywords Application programs
gdc.oaire.keywords Machine-to-machine communication
gdc.oaire.keywords Internet
gdc.oaire.keywords Authentication
gdc.oaire.keywords Resource management
gdc.oaire.keywords Security threats
gdc.oaire.keywords One M2M standard
gdc.oaire.keywords Machine to Machine (M2M) communications
gdc.oaire.keywords Machine to machine (M2M) communications
gdc.oaire.keywords Recent researches
gdc.oaire.keywords Research opportunities
gdc.oaire.keywords 303
gdc.oaire.keywords Network security
gdc.oaire.keywords Trust Management
gdc.oaire.keywords Radar countermeasures
gdc.oaire.keywords Corresponding solutions
gdc.oaire.keywords Onem2m Standard
gdc.oaire.keywords Privacy
gdc.oaire.keywords Machine To Machine (M2M) Communications
gdc.oaire.keywords Things
gdc.oaire.keywords Mechanism
gdc.oaire.keywords Machine-to-machine (M2M)
gdc.oaire.keywords Wireless Sensor Networks
gdc.oaire.popularity 1.8036873E-8
gdc.oaire.publicfunded false
gdc.oaire.sciencefields 02 engineering and technology
gdc.oaire.sciencefields 0202 electrical engineering, electronic engineering, information engineering
gdc.oaire.views 159
gdc.openalex.collaboration International
gdc.openalex.fwci 6.2237
gdc.openalex.normalizedpercentile 0.97
gdc.openalex.toppercent TOP 10%
gdc.opencitations.count 39
gdc.plumx.crossrefcites 40
gdc.plumx.mendeley 174
gdc.plumx.scopuscites 45
gdc.scopus.citedcount 46
gdc.wos.citedcount 30
relation.isOrgUnitOfPublication 665d3039-05f8-4a25-9a3c-b9550bffecef
relation.isOrgUnitOfPublication.latestForDiscovery 665d3039-05f8-4a25-9a3c-b9550bffecef

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
A survey on information security threats and solutions for Machine to Machine (M2M) communications.pdf
Size:
837.32 KB
Format:
Adobe Portable Document Format
Description:
Makale

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: