M2M Security: Challenges and Solutions

被引:78
|
作者
Barki, Amira [1 ,2 ]
Bouabdallah, Abdelmadjid [1 ]
Gharout, Said [3 ]
Traore, Jacques [2 ]
机构
[1] Univ Paris 04, Univ Technol Compiegne, CNRS, UMR Heudiasyc 7253, F-60203 Compiegne, France
[2] Orange Labs, F-14000 Caen, France
[3] Orange Labs, F-92320 Chatillon, France
来源
关键词
Machine-to-machine ( M2M); applications; architecture; security; privacy; MACHINE COMMUNICATIONS; AUTHENTICATION SCHEME; KEY MANAGEMENT; PRIVACY; COMMUNICATION; NETWORKS; ATTACKS; ISSUES;
D O I
10.1109/COMST.2016.2515516
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine-to-machine (M2M) is one of the emergent technologies that has attracted a lot of attention in both industrial and academic sectors, and which is expected to grow in the next few years. Indeed, it opens the way to the Internet of Things (IoT), an internet where all devices are connected and communicate without any human intervention. Yet, an important hurdle that may slow down M2M growth and even hinder the massive roll-out of certain applications is security. Even though there has been a lot of research on M2M, nevertheless only few focus on the security aspects. As a fusion of heterogeneous networks, M2M poses a number of challenges, particularly to security design. In this paper, we provide a survey on M2M research and development works that mainly addresses security and more precisely the threats thatM2M communications have to face. We also tackle the challenges that arise when trying to secure M2M communications along with an investigation of the existing approaches aiming to do so. Finally, we give a general comparison of existing solutions regarding some selected parameters.
引用
收藏
页码:1241 / 1254
页数:14
相关论文
共 50 条
  • [21] The challenges of M2M massive access in wireless cellular networks
    Biral, Andrea
    Centenaro, Marco
    Zanella, Andrea
    Vangelista, Lorenzo
    Zorzi, Michele
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2015, 1 (01) : 1 - 19
  • [22] Verizon Wireless And QUALCOMM Will Provide Advanced M2M Solutions
    不详
    [J]. MICROWAVES & RF, 2009, 48 (09) : 22 - 22
  • [23] M2M(上篇)
    芮祥麟
    [J]. 软件和集成电路, 2014, (02) : 70 - 70
  • [24] M2M Communication
    Malleck, H.
    Mecklenbruker, C.
    [J]. ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2014, 131 (01): : 1 - 2
  • [25] M2M Communication
    Helmut Malleck
    Christoph Mecklenbräuker
    [J]. e & i Elektrotechnik und Informationstechnik, 2014, 131 (1) : 1 - 2
  • [26] Security Analysis Based on Trusted Environment (TRE) of M2M/IoT
    Urunov, Khamdamboy
    Namgung, Jung-Il
    Park, Soo-Hyun
    [J]. 2015 17TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM APNOMS, 2015, : 554 - 557
  • [27] On Cellular Network Planning and Operation with M2M Signalling and Security Considerations
    Jaber, Mona
    Kouzayha, Nour
    Dawy, Zaher
    Kayssi, Ayman
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 429 - 434
  • [28] The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment
    Hu, Liang
    Chi, Ling
    Li, Hong-tu
    Yuan, Wei
    Sun, Yuyu
    Chu, Jian-feng
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01): : 131 - 146
  • [29] Framework for Trustful Handover of M2M devices between Security Domains
    Corici, Andreea Ancuta
    Corici, Marius
    Troudt, Eric
    Riemer, Bjoern
    Magedanz, Thomas
    [J]. 2020 23RD CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN 2020), 2020, : 102 - 109
  • [30] A security gateway application for End-to-End M2M communications
    Chen, Hsing-Chung
    You, Ilsun
    Weng, Chien-Erh
    Cheng, Chia-Hsin
    Huang, Yung-Fa
    [J]. COMPUTER STANDARDS & INTERFACES, 2016, 44 : 85 - 93