M2M Security: Challenges and Solutions

被引:79
|
作者
Barki, Amira [1 ,2 ]
Bouabdallah, Abdelmadjid [1 ]
Gharout, Said [3 ]
Traore, Jacques [2 ]
机构
[1] Univ Paris 04, Univ Technol Compiegne, CNRS, UMR Heudiasyc 7253, F-60203 Compiegne, France
[2] Orange Labs, F-14000 Caen, France
[3] Orange Labs, F-92320 Chatillon, France
来源
关键词
Machine-to-machine ( M2M); applications; architecture; security; privacy; MACHINE COMMUNICATIONS; AUTHENTICATION SCHEME; KEY MANAGEMENT; PRIVACY; COMMUNICATION; NETWORKS; ATTACKS; ISSUES;
D O I
10.1109/COMST.2016.2515516
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of attention in both industrial and academic sectors, and which is expected to grow in the next few years. Indeed, it opens the way to the Internet of Things (IoT), an internet where all devices are connected and communicate without any human intervention. Yet, an important hurdle that may slow down M2M growth and even hinder the massive roll-out of certain applications is security. Even though there has been a lot of research on M2M, nevertheless only few focus on the security aspects. As a fusion of heterogeneous networks, M2M poses a number of challenges, particularly to security design. In this paper, we provide a survey on M2M research and development works that mainly addresses security and more precisely the threats thatM2M communications have to face. We also tackle the challenges that arise when trying to secure M2M communications along with an investigation of the existing approaches aiming to do so. Finally, we give a general comparison of existing solutions regarding some selected parameters.
引用
收藏
页码:1241 / 1254
页数:14
相关论文
共 50 条
  • [1] Security Challenges and Attacks in M2M Communications
    Imani, Amirhosein
    Keshavarz-Haddad, Alireza
    Eslami, Mohsen
    Haghighat, Javad
    [J]. 2018 9TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2018, : 264 - 269
  • [2] M2M Solutions - Design Challenges and Considerations
    Jalali, Sukriti
    [J]. 2013 IEEE RECENT ADVANCES IN INTELLIGENT COMPUTATIONAL SYSTEMS (RAICS), 2013, : 210 - 214
  • [3] Internet of Things - Security threats and challenges in M2M Devices
    Abdullah, Syed Muhammad
    Shah, Munam Ali
    [J]. 2018 24TH IEEE INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC' 18), 2018, : 541 - 547
  • [4] M2M performance metrics: challenges, solutions and research opportunities
    Belghith, Abdelfettah
    Aissa, Mohamed
    [J]. 2015 2ND WORLD SYMPOSIUM ON WEB APPLICATIONS AND NETWORKING (WSWAN), 2015,
  • [5] M2M: Challenges and Opportunities
    Ilderem, Vida
    [J]. 2013 INTERNATIONAL SYMPOSIUM ON VLSI DESIGN, AUTOMATION, AND TEST (VLSI-DAT), 2013,
  • [6] M2M: Challenges and Opportunities
    Ilderem, Vida
    [J]. 2013 INTERNATIONAL SYMPOSIUM ON VLSI TECHNOLOGY, SYSTEMS, AND APPLICATIONS (VLSI-TSA), 2013,
  • [7] M2M Security Threat and Security Mechanism Research
    Nie, Xiao
    Zhai, Xiaobing
    [J]. 2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 906 - 909
  • [8] A survey on information security threats and solutions for Machine to Machine (M2M) communications
    Tuna, Gurkan
    Kogias, Dimitrios G.
    Gungor, V. Cagri
    Gezer, Cengiz
    Taskin, Erhan
    Ayday, Erman
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2017, 109 : 142 - 154
  • [9] Cooperative Communications in Machine to Machine (M2M): Solutions, Challenges and Future Work
    Raymond, Juma W.
    Olwal, Thomas O.
    Kurien, Anish M.
    [J]. IEEE ACCESS, 2018, 6 : 9750 - 9766
  • [10] M2M Security Technology of CPS Based on Blockchains
    Yin, Shiyong
    Bao, Jinsong
    Zhang, Yiming
    Huang, Xiaodi
    [J]. SYMMETRY-BASEL, 2017, 9 (09):