A survey on information security threats and solutions for Machine to Machine (M2M) communications

dc.contributor.author Tuna, Gurkan
dc.contributor.author Kogias, Dimitrios G.
dc.contributor.author Gungor, V. Cagri
dc.contributor.author Gezer, Cengiz
dc.contributor.author Taskin, Erhan
dc.contributor.author Ayday, Erman
dc.contributor.department AGÜ, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü en_US
dc.contributor.institutionauthor
dc.date.accessioned 2020-02-14T08:46:53Z
dc.date.available 2020-02-14T08:46:53Z
dc.date.issued 2017 en_US
dc.description This work was supported by the Turkish Scientific and Technical Research Council (TUBITAK) under Grant no. 3140911. en_US
dc.description.abstract Although Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, storage, and computation. Such constraints pose several challenges in the design of M2M networks. Furthermore, some elements that contributed to the rise of M2M applications have caused several new security threats and risks, typically due to the advancements in technology, increasing computing power, declining hardware costs, and freely available software tools. Due to the restricted capabilities of M2M devices, most of the recent research efforts on M2M have focused on computing, resource management, sensing, congestion control and controlling technologies. However, there are few studies on security aspects and there is a need to introduce the threats existing in M2M systems and corresponding solutions. Accordingly, in this paper, after presenting an overview of potential M2M applications, we present a survey of security threats against M2M networks and solutions to prevent or reduce their impact. Then, we investigate security-related challenges and open research issues in M2M networks to provide an insight for future research opportunities. Moreover, we discuss the oneM2M standard, one of the prominent standard initiatives for more secure and smoother M2M networks and the Internet of Things. (C) 2017 Elsevier Inc. All rights reserved. en_US
dc.description.sponsorship Turkiye Bilimsel ve Teknolojik Arastirma Kurumu (TUBITAK) 3140911 en_US
dc.identifier.doi 10.1016/j.jpdc.2017.05.021
dc.identifier.issn 0743-7315
dc.identifier.other eISSN: 1096-0848
dc.identifier.other DOI: 10.1016/j.jpdc.2017.05.021
dc.identifier.uri https://hdl.handle.net/20.500.12573/156
dc.language.iso eng en_US
dc.publisher ACADEMIC PRESS INC ELSEVIER SCIENCE, 525 B ST, STE 1900, SAN DIEGO, CA 92101-4495 USA en_US
dc.relation.ispartofseries Volume: 109;
dc.relation.ispartofseries Pages: 142-154;
dc.relation.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.subject Machine to Machine (M2M) communications en_US
dc.subject Security threats en_US
dc.subject Countermeasures en_US
dc.subject OneM2M standard en_US
dc.title A survey on information security threats and solutions for Machine to Machine (M2M) communications en_US
dc.type article en_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
A survey on information security threats and solutions for Machine to Machine (M2M) communications.pdf
Size:
837.32 KB
Format:
Adobe Portable Document Format
Description:
Makale

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: