This document discusses machine-to-machine (M2M) communications in vehicular networks. It begins with an overview of M2M communications and architectures, highlighting areas where M2M is being applied such as smart grids, home networking, and healthcare. The document then explores how M2M principles can enhance vehicular networks by supporting large-scale deployment, cross-platform networking, autonomous monitoring and control, visualization, and security. Several challenges for applying M2M to vehicular networks are also identified, including standardization and data security management.
A decentralized paradigm for resource-aware computing in wireless Ad hoc netw...
A key factor limiting the democratisation of networked systems is the lack of trust, particularly in the wake of data-intensive applications that work on sensitive and private data, which requires providing strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms to compute on the network peripheries without moving data. In many security and privacy-critical domains such as Home Automation IoT networks, AUV networks etc., the existence of a centralized privileged node leads to a vulnerability for leakage of sensitive information. In this paper, we have proposed a decentralized networking architecture that adopts collaborative processing techniques and operates within the tradeoff between network security and performance. We have investigated the design and sustainability of autonomous decentralized systems and evaluated the efficiency of the proposed scheme with the help of extensive simulation tools.
This document proposes an optimized algorithm for securely integrating wireless sensor networks (WSNs) into enterprise information systems. It discusses the security requirements for WSNs, including data confidentiality, authenticity, integrity, availability, freshness, and robustness. It also analyzes threats to WSN security like spoofing, selective forwarding, sinkhole, Sybil, wormhole, and hello flood attacks. The document suggests using Internet of Things principles to authenticate sensor data senders independently of network location, improving security and efficiency.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
2014-Adaptive Interest Modeling Improves Content Services at the Network Edge...
This document describes an approach called Adaptive Interest Modeling (AIM) that models users' interests at the network layer in mobile ad hoc networks (MANETs). AIM monitors network events to build an interest model (IM) for each user that captures their explicit, correlated, and popular interests over time. This adaptive IM then enables features like content prefetching and IM sharing to improve response times, availability of content, and situational awareness in tactical scenarios. The authors implemented AIM and evaluated its prefetching and sharing features, finding they significantly reduced response times while increasing data availability and enhancing shared understanding between users.
Manet mobile ad hoc network – challenges, security and protocols-2
This document discusses mobile ad hoc networks (MANETs) and related security challenges. It provides an overview of MANETs, including their evolution, characteristics, and architecture. The document then examines key security issues for MANETs, such as vulnerabilities to different types of attacks, including active attacks like packet dropping, modification, and denial of service attacks. It emphasizes that MANETs require new security solutions due to their lack of infrastructure, dynamic topology, and other distinguishing features compared to traditional wired networks. Overall, the document serves to introduce MANETs and outline important security considerations for further research on this topic.
User Preference based Network Selection in Wireless Networks
This document summarizes a research paper on user preference-based network selection in wireless networks. It discusses how next generation wireless networks will integrate different technologies like GPRS, LTE, WiMAX and WLAN. The key challenge is deciding which network to handover to, called handoff decision. Many factors influence this decision, including available bandwidth, cost, security, and user preferences. The paper proposes a new network selection scheme that considers user preferences, network parameters and quality of service requirements to select the optimal network for handoff. It uses the IEEE 802.21 MIH framework to gather information about available networks and make the selection decision.
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and
analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input
(MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEW
This document reviews security issues in routing protocols for ad hoc networks. It begins by describing the key features of ad hoc networks and some of the main security challenges they present for routing. It then discusses three major types of security attacks on ad hoc network routing: route manipulation through wormhole attacks or modifying packet fields, identity theft, and denial of service attacks. The document reviews several secure routing protocols that aim to address these issues, including flooding, DSR, AODV, and others. It analyzes the security properties of these protocols and their ability to prevent different types of attacks in ad hoc network routing. Overall, the document provides an overview of common security problems in ad hoc network routing and different protocol approaches to enhancing routing security
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATION
This document describes a proposed circuit breaker monitoring system using mobile apps. Key points:
- The system would replace traditional circuit breakers with mobile app-controlled breakers for remote management of home appliances for safety and energy savings.
- It would include a home security system against intrusion using a mobile app-controlled door lock and gas leak detection.
- The proposed system architecture uses ESP 32 microcontrollers and Bluetooth modules in each "slave" unit installed at circuit breakers to collect data, and a "master" unit to store and process the collected data from all slaves.
Distributed Systems, Mobile Computing and Security
We investigate how to build secure yet easy-to-use and cost-effective systems. Our research focuses on areas like improving security usability with contextual data, ensuring privacy in cloud services, and designing secure software-defined networking. We evaluate and optimize mobile and distributed systems to save energy and improve user experience of mobile cloud services and applications like crowdsensing, multimedia streaming, and edge/cloud computing. We also research topics in areas like mobile cloud gaming, internet of things, big data analytics, and verification of distributed systems.
A survey on cost effective survivable network design in wireless access network
In today’s technology, the essential property for wireless communication network is to exhibit as a
dependable network. The dependability network incorporates the property like availability, reliability and
survivability. Although these factors are well taken care by protocol for wired network, still there exists
huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with
difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access
network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access
network is very important factor to be considered will performing wireless network designing. This paper
focuses on discussion of survivability in wireless access network. Capability of a wireless access network to
perform its dedicated accessibility services even in case of infrastructure failure is known as survivability.
Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to
minimize the overall connection cost for multiple requests. The various failure scenario of wireless access
network as existing in literature is been explored. The existing survivability models for access network like
shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail
here. Further comparison between various existing survivability solutions is also tabulated.
11.providing security to wireless packet networks by using optimized security...
This document discusses providing security to wireless packet networks using an optimized security method. It proposes encrypting data packets when they are scheduled using the Blowfish encryption algorithm. This would secure the packets at the initial level of scheduling, preventing attackers from modifying packets even if they are delayed. The document outlines the Blowfish algorithm and its use of variable-length keys and data encryption in rounds to encrypt packets. It also describes the system model used and assumptions made, including modeling the wireless channel as a switch and defining packet attributes like arrival time, processing time, security level and deadline. Encrypting packets at the scheduling level with Blowfish aims to securely transmit real-time data over wireless networks.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
A DNA-BASED PRIVACY-PRESERVING SCHEME IN SMART-GRIDijcisjournal
Smart grid utility provider collects consumers’ power consumption data for three main reasons: billing, analysis, and operation. Billing needs coarse-grained data where there are no, or minimal, privacy concerns. While analysis and operation needs fine-grained data which can highly explore consumers’ privacy. Hence, consumers might be reluctant to allow for operational metering to protect their privacy.This paper presents detail description of a reliable DNA-based privacy-preserving (DNAPP) scheme in smart grid. DNAPP assures robust authentication, confidentiality, message integrity, and nonrepudiation across the smart grid as well as assuring high consumers’ privacy. The scheme demonstrates many good security features, such as: high complexity of O(n!), light-weight, scalable, minimum overhead, no cryptography key exchange between the communicating parties as each of them can determine the key locally and independently. This scheme does not require any level of modifications to the existing smart grid infrastructure or smart meter. It only requires some software modifications.
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...IRJET Journal
This document discusses challenges at the MAC layer for machine-to-machine (M2M) communications. It first describes issues around efficient, scalable and fair channel access for large numbers of M2M devices. It then discusses application layer protocols used to connect devices and applications to the internet, including CoAP, MQTT, and WebSocket. Finally, it analyzes MAC layer issues for a smart home example using M2M for power management, security and assisted living for the elderly. Key challenges include supporting diverse quality of service needs, large numbers of devices sharing channels, energy efficiency needs, and low-cost hardware requirements.
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
1. The document proposes an efficient transport protocol called the Multimedia Grid Protocol (MMGP) for delivering multimedia content over wireless grids.
2. MMGP aims to provide faster, reliable access and high quality of service when streaming multimedia over wireless grid networks, which face challenges like intermittent connectivity, device heterogeneity, weak security, and device mobility.
3. The protocol incorporates a new video compression algorithm called dWave to make streaming more efficient over bandwidth-constrained wireless networks.
A decentralized paradigm for resource-aware computing in wireless Ad hoc netw...TELKOMNIKA JOURNAL
A key factor limiting the democratisation of networked systems is the lack of trust, particularly in the wake of data-intensive applications that work on sensitive and private data, which requires providing strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms to compute on the network peripheries without moving data. In many security and privacy-critical domains such as Home Automation IoT networks, AUV networks etc., the existence of a centralized privileged node leads to a vulnerability for leakage of sensitive information. In this paper, we have proposed a decentralized networking architecture that adopts collaborative processing techniques and operates within the tradeoff between network security and performance. We have investigated the design and sustainability of autonomous decentralized systems and evaluated the efficiency of the proposed scheme with the help of extensive simulation tools.
This document proposes an optimized algorithm for securely integrating wireless sensor networks (WSNs) into enterprise information systems. It discusses the security requirements for WSNs, including data confidentiality, authenticity, integrity, availability, freshness, and robustness. It also analyzes threats to WSN security like spoofing, selective forwarding, sinkhole, Sybil, wormhole, and hello flood attacks. The document suggests using Internet of Things principles to authenticate sensor data senders independently of network location, improving security and efficiency.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
2014-Adaptive Interest Modeling Improves Content Services at the Network Edge...Hua Li, PhD
This document describes an approach called Adaptive Interest Modeling (AIM) that models users' interests at the network layer in mobile ad hoc networks (MANETs). AIM monitors network events to build an interest model (IM) for each user that captures their explicit, correlated, and popular interests over time. This adaptive IM then enables features like content prefetching and IM sharing to improve response times, availability of content, and situational awareness in tactical scenarios. The authors implemented AIM and evaluated its prefetching and sharing features, finding they significantly reduced response times while increasing data availability and enhancing shared understanding between users.
Manet mobile ad hoc network – challenges, security and protocols-2prjpublications
This document discusses mobile ad hoc networks (MANETs) and related security challenges. It provides an overview of MANETs, including their evolution, characteristics, and architecture. The document then examines key security issues for MANETs, such as vulnerabilities to different types of attacks, including active attacks like packet dropping, modification, and denial of service attacks. It emphasizes that MANETs require new security solutions due to their lack of infrastructure, dynamic topology, and other distinguishing features compared to traditional wired networks. Overall, the document serves to introduce MANETs and outline important security considerations for further research on this topic.
User Preference based Network Selection in Wireless NetworksIRJET Journal
This document summarizes a research paper on user preference-based network selection in wireless networks. It discusses how next generation wireless networks will integrate different technologies like GPRS, LTE, WiMAX and WLAN. The key challenge is deciding which network to handover to, called handoff decision. Many factors influence this decision, including available bandwidth, cost, security, and user preferences. The paper proposes a new network selection scheme that considers user preferences, network parameters and quality of service requirements to select the optimal network for handoff. It uses the IEEE 802.21 MIH framework to gather information about available networks and make the selection decision.
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
Wireless network implementation is a viable option for building network infrastructure in rural communities. Rural people lack network infrastructures for information services and socio-economic development. The aim of this study was to develop a wireless network infrastructure architecture for network services to rural dwellers. A user-centered approach was applied in the study and a wireless network infrastructure was designed and deployed to cover five rural locations. Data was collected and
analyzed to assess the performance of the network facilities. The results shows that the system had been performing adequately without any downtime with an average of 200 users per month and the quality of service has remained high. The transmit/receive rate of 300Mbps was thrice as fast as the normal Ethernet transmit/receive specification with an average throughput of 1 Mbps. The multiple output/multiple input
(MIMO) point-to-multipoint network design increased the network throughput and the quality of service experienced by the users.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed
SECURITY IN ROUTING PROTOCOLS OF AD-HOC NETWORKS: A REVIEWijmnct
This document reviews security issues in routing protocols for ad hoc networks. It begins by describing the key features of ad hoc networks and some of the main security challenges they present for routing. It then discusses three major types of security attacks on ad hoc network routing: route manipulation through wormhole attacks or modifying packet fields, identity theft, and denial of service attacks. The document reviews several secure routing protocols that aim to address these issues, including flooding, DSR, AODV, and others. It analyzes the security properties of these protocols and their ability to prevent different types of attacks in ad hoc network routing. Overall, the document provides an overview of common security problems in ad hoc network routing and different protocol approaches to enhancing routing security
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATIONijcsit
This document describes a proposed circuit breaker monitoring system using mobile apps. Key points:
- The system would replace traditional circuit breakers with mobile app-controlled breakers for remote management of home appliances for safety and energy savings.
- It would include a home security system against intrusion using a mobile app-controlled door lock and gas leak detection.
- The proposed system architecture uses ESP 32 microcontrollers and Bluetooth modules in each "slave" unit installed at circuit breakers to collect data, and a "master" unit to store and process the collected data from all slaves.
We investigate how to build secure yet easy-to-use and cost-effective systems. Our research focuses on areas like improving security usability with contextual data, ensuring privacy in cloud services, and designing secure software-defined networking. We evaluate and optimize mobile and distributed systems to save energy and improve user experience of mobile cloud services and applications like crowdsensing, multimedia streaming, and edge/cloud computing. We also research topics in areas like mobile cloud gaming, internet of things, big data analytics, and verification of distributed systems.
A survey on cost effective survivable network design in wireless access networkijcses
In today’s technology, the essential property for wireless communication network is to exhibit as a
dependable network. The dependability network incorporates the property like availability, reliability and
survivability. Although these factors are well taken care by protocol for wired network, still there exists
huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with
difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access
network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access
network is very important factor to be considered will performing wireless network designing. This paper
focuses on discussion of survivability in wireless access network. Capability of a wireless access network to
perform its dedicated accessibility services even in case of infrastructure failure is known as survivability.
Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to
minimize the overall connection cost for multiple requests. The various failure scenario of wireless access
network as existing in literature is been explored. The existing survivability models for access network like
shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail
here. Further comparison between various existing survivability solutions is also tabulated.
11.providing security to wireless packet networks by using optimized security...Alexander Decker
This document discusses providing security to wireless packet networks using an optimized security method. It proposes encrypting data packets when they are scheduled using the Blowfish encryption algorithm. This would secure the packets at the initial level of scheduling, preventing attackers from modifying packets even if they are delayed. The document outlines the Blowfish algorithm and its use of variable-length keys and data encryption in rounds to encrypt packets. It also describes the system model used and assumptions made, including modeling the wireless channel as a switch and defining packet attributes like arrival time, processing time, security level and deadline. Encrypting packets at the scheduling level with Blowfish aims to securely transmit real-time data over wireless networks.
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
With the growing deployment of host-based and network-based intrusion detection systems in increasingly
large and complex communication networks, managing low-level alerts from these systems becomes
critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or
intrusion prevention systems (IPSs) are collected throughout a monitored network such that large series of
alerts (alert streams) need to be fused. An alert indicates an abnormal behavior, which could potentially be
a sign for an ongoing cyber attack. Unfortunately, in a real data communication network, administrators
cannot manage the large number of alerts occurring per second, in particular since most alerts are false
positives. Hence, an emerging track of security research has focused on alert correlation to better identify
true positive and false positive. To achieve this goal we introduce Mission Oriented Network Analysis
(MONA). This method builds on data correlation to derive network dependencies and manage security
events by linking incoming alerts to network dependencies.
Congestion and overload control techniques in massive M2M systems: a surveyapnegrao
Lilatul Ferdouse1, Alagan Anpalagan1* and Sudip Misra2
1 WINCORE Lab, Department of Electrical and Computer Engineering, Ryerson University, Toronto, Canada
2 School of Information Technology, Indian Institute of Technology, Kharagpur, India
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in Mobile ad hoc network is of searching and maintaining an effective route for transporting data information securely. Security and privacy are indispensable in various communications for successful acceptance and deployment of such a technology. Mobile Ad Hoc Network MANET is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses however, their main applications lie in military, tactical and other security sensitive operations. In these and other applications of mobile ad hoc networking, secure routing is an important issue. Thinking of this, I proposed an efficient secure ad hoc routing protocol for optimize the performance of MANET which will more efficient in terms of time delay, packet drop and packet delivery fraction in mobile ad hoc network. The proposed protocol can employ an integrated approach of digital signature and encryption techniques to achieve the security goals like message integrity, data confidentiality and end to end authentication at IP layer. Together with existing approaches for securing the physical and MAC layer within the network protocol stack, the proposed secure routing protocol can provide a foundation for the secure operation of an ad hoc network. Md. Torikur Rahman ""An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET)"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23727.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23727/an-efficient-secure-ad-hoc-routing-protocol-for-optimize-the-performance-of-mobile-ad-hoc-network-manet/md-torikur-rahman
This document summarizes a conference paper about an M2M communication framework called sMeter for smart metering applications. sMeter manages data aggregation and encryption mechanisms for wireless multi-hop communication between smart meters. It addresses challenges of simultaneously executing data aggregation and encryption while meeting requirements of multiple concurrent applications. The paper describes sMeter's architecture, an implementation using low-cost hardware in an indoor test, and evaluation of communication performance in terms of delay, reception ratio and signal strength.
This document provides an overview of the OpenMTC platform, which is a generic M2M communication platform that aims to enable machine-to-machine connectivity. The key points are:
1) OpenMTC is based on a client/server RESTful architecture and supports ETSI M2M specifications, including capabilities like communication, application enablement, and security.
2) It provides a standard compliant platform for smart city and M2M services across different vertical domains like transportation, utilities, and healthcare.
3) The platform consists of a gateway service capability layer and network service capability layer that allow interactions between applications and the network using standardized interfaces defined by ETSI.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices communicate directly with each other using the available wired or wireless channels. M2M is a new concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on providing solutions for M2M communication for the 5G networks. Challenges associated with M2M communication are the lack of standards, security, poor infrastructure, interoperability and diverse architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for 5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support like security algorithms for data transmission among devices and scheduling algorithm for seamless transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system level simulator, considering two different approaches for analyzing the parameters such as delay, throughput and bandwidth are presented.
NEW TECHNOLOGY FOR MACHINE TO MACHINE COMMUNICATION IN SOFTNET TOWARDS 5Gijwmn
Machine to Machine communication or M2M, refers to a model of communication where devices
communicate directly with each other using the available wired or wireless channels. M2M is a new
concept proposed under 3GPP(3rd Generation Partnership Project); several research are working on
providing solutions for M2M communication for the 5G networks. Challenges associated with M2M
communication are the lack of standards, security, poor infrastructure, interoperability and diverse
architecture. In this paper, we propose a new mechanism called TM2M5G (The Machine to Machine for
5G) based on SOFTNET platform which results in support of 5G heterogeneous network. In this paper, we
propose the architecture for M2M communication based on SOFTNET and provide new features support
like security algorithms for data transmission among devices and scheduling algorithm for seamless
transmission of data packets over the network. Finallysimulation results ofthis algorithm based on a system
level simulator, considering two different approaches for analyzing the parameters such as delay,
throughput and bandwidth are presented.
The fast emerging of internet of things (IoTs) has introduced fog computing as an intermediate layer between end-users and the cloud datacenters. Fog computing layer characterized by its closeness to end users for service provisioning than the cloud. However, security challenges are still a big concern in fog and cloud computing paradigms as well. In fog computing, one of the most destructive attacks is man-in-the-middle (MitM). Moreover, MitM attacks are hard to be detected since they performed passively on the network level. This paper proposes a MitM mitigation scheme in fog computing architecture. The proposal mapped the fog layer on software-defined network (SDN) architecture. The proposal integrated multi-path transmission control protocol (MPTCP), moving target defense (MTD) technique, and reinforcement learning agent (RL) in one framework that contributed significantly to improving the fog layer resources utilization and security. The proposed schema hardens the network reconnaissance and discovery, thus improved the network security against MitM attack. The evaluation framework was tested using a simulation environment on mininet, with the utilization of MPTCP kernel and Ryu SDN controller. The experimental results shows that the proposed schema maintained the network resiliency, improves resource utilization without adding significant overheads compared to the traditional transmission control protocol (TCP).
Smart Grid Systems Based Survey on Cyber Security IssuesjournalBEEI
The future power system will be an innovative administration of existing power grids, which is called smart grid. Above all, the application of advanced communication and computing tools is going to significantly improve the productivity and consistency of smart grid systems with renewable energy resources. Together with the topographies of the smart grid, cyber security appears as a serious concern since a huge number of automatic devices are linked through communication networks. Cyber attacks on those devices had a direct influence on the reliability of extensive infrastructure of the power system. In this survey, several published works related to smart grid system vulnerabilities, potential intentional attacks, and suggested countermeasures for these threats have been investigated.
This document discusses the history, challenges, and applications of mobile ad hoc networks (MANETs). It describes how MANETs evolved from early packet radio networks developed in the 1970s. Key challenges for MANETs include dynamic topology changes, asymmetric wireless links, and lack of a centralized administration. However, MANETs also enable applications for military communications, disaster recovery, device networking, internet sharing, and wireless sensor networks by allowing devices to self-configure into a network without any infrastructure. While progress has been made, many technical challenges remain in fully realizing the vision of seamlessly integrating MANETs with other networks.
Modeling and Simulation of the Communication Networks in.docxannandleola
Modeling and Simulation of the Communication
Networks in Smart grid
Yizhou Dong, Ziyuan Cai, Ming Yu, and Mischa Sturer
Dept. of Electrical & Computer Engineering
FAMU-FSU College of Engineering, FL 32310, USA.
[email protected], [email protected], [email protected], [email protected]
Abstract—A reliable and secure communication network plays
a significant role in Smart grid systems, which aims at
coordinating generation, transmission, distribution, and
consumption parts in power system. The scope of our work
ranges from utility level to end consumption level. The major
difficulties in this work can be summarized as follows: 1)
Performance requirements from the viewpoint of network have
not been clearly defined; 2) Model mapping from power system
to communication networks is not straightforward. 3) Network
performance has not been well-investigated. This paper
proposes a communication network model for a typical
program of smart gird. Moreover, application requirements,
link capacity and traffic settings have been investigated.
Simulation results validate the feasibility of this model and
provide useful network performances which can satisfy both
the non-real-time and real-time application requirements.
Keywords-Smart Grid; Communication Network; Simulation;
Performance; FREEDM; IFM
I. INTRODUCTION
Smart grid becomes to an attractive dominating topic
nowadays in both research universities and industrial
organization. The traditional power communication
infrastructure cannot meet the requirements for our future
power system which the energy will not only generated by
traditional generation facilities but also produced by
distributed facilities and new energy devices. The delivery of
both energy and information must also be end-to-end and
bidirectional. Communication network should interconnect
every device of power system from electricity generation to
end-user consumption, and even more. One view need to be
point out is that, in physical layer, geographic location for
power electricity device and communication network device
can be dissimilar.
NIST published the first definition of Smart Grid in 2009
which represent smart grid standardization in North
American. The networking parts proposed by NIST
emphasize the transformation from traditional power
communication networks to Information and Communication
Technology (ICT), which indicates that both energy and
information transmission must be bidirectional for all levels.
[1] In Europe, European Technology Platform also issued
standards to define smart grid as the target architecture which
enable all users’ connection, including generators,
transmission, and consumers. Other national organizations
and industrial companies also boost the development of
smart grid by provides the recommend standards and
proposals like The German Smart Grid Standardization
Roadmap concentrate their attentions ...
F2CDM: Internet of Things for Healthcare Network Based Fog-to-Cloud and Data-...Istabraq M. Al-Joboury
Internet of Things (IoT) evolves very rapidly over time, since everything such as sensors/actuators linked together from around the world with use of evolution of ubiquitous computing through the Internet. These devices have a unique IP address in order to communicate with each other and transmit data with features of wireless technologies. Fog computing or so called edge computing brings all Cloud features to embedded devices at edge network and adds more features to servers like pre-store data of Cloud, fast response, and generate overhasty users reporting. Fog mediates between Cloud and IoT devices and thus enables new types of computing and services. The future applications take the advantage of combing the two concepts Fog and Cloud in order to provide low delay Fog-based and high capacity of storage Cloud-based. This paper proposes an IoT architecture for healthcare network based on Fog to Cloud and Data in Motion (F2CDM). The proposed architecture is designed and implemented over three sites: Site 1 contains the embedded devices layer, Site 2 consists of the Fog network layer, while Site 3 consists of the Cloud network. The Fog layer is represented by a middleware server in Al-Nahrain University with temporary storage such that the data lives inside for 30 min. During this time, the selection of up-normality in behavior is send to the Cloud while the rest of the data is wiped out. On the other hand, the Cloud stores all the incoming data from Fog permanently. The F2CDM works using Message Queue Telemetry Transport (MQTT) for fast response. The results show that all data can be monitored from the Fog in real time while the critical data can be monitored from Cloud. In addition, the response time is evaluated using traffic generator called Tsung. It has been found that the proposed architecture reduces traffic on Cloud network and provides better data analysis.
The document describes a robust and trusted routing scheme (RTS) for IoT-based mobile wireless mesh networks. The RTS aims to improve network reliability and security. It consists of two main techniques: (1) a network infrastructure using multi-hop connectivity between mesh clients, routers and gateways; and (2) secure and trusted data routing between devices using RSA cryptography with public/private keys. The RTS allows for self-configuration, coverage expansion, and recovery from failures while preventing various security attacks.
This document discusses security issues related to data management in wireless communication and sensor networks over cloud environments. It begins by describing wireless sensor networks and cloud computing individually, noting key characteristics like location independence and on-demand access. It then discusses how wireless sensor networks and cloud computing can be integrated using technologies like PHP and MySQL. The main body of the document focuses on security challenges in cloud computing environments, including issues related to virtualization, networking, and browser-based attacks that can carry over risks from traditional systems. It concludes that secure data transmission to and from the cloud is an important issue that requires mitigation techniques like encryption algorithms.
A Grouped System Architecture for Smart Grids Based AMI Communications Over LTE ijwmn
- The document proposes a grouped hierarchical architecture and scheduling technique for smart meter communications over LTE networks. Smart meters are divided into groups, with each group connected to a data concentrator.
- The data concentrator collects smart meter readings and sends a total consumption message to the LTE network on a scheduled basis. It also sends individual smart meter readings.
- This grouped approach reduces the number of LTE modules needed and ensures real-time monitoring while avoiding overloading the LTE network, making LTE a promising solution for smart grid communications.
Machine-to-machine (M2M) communication allows devices to exchange information and take actions without human intervention. M2M happens through both wired and wireless connections and is used across various applications like security, tracking, payments, health monitoring, and facility management. The core components of an M2M system include M2M devices, area networks to connect devices, gateways that enable communication to networks, communication networks themselves, and applications that make use of the collected data.
This document proposes a new millimeter-wave non-orthogonal multiple access (mmWave-NOMA) transmission scheme for cellular machine-to-machine (M2M) communications to support massive connectivity and low latency for Internet of Things applications. It considers downlink transmission where multiple MTC devices share communication resources. Three MTC device pairing schemes are introduced based on the distance between devices and base station: 1) random near and far devices, 2) nearest near and far devices, 3) nearest near and farthest far devices. The performance of the schemes is analyzed by deriving expressions for outage probability and sum rate. Analysis and simulations show the proposed system improves outage probability over mmWave with orthogonal multiple access schemes.
M2M technology allows machines and devices to communicate with each other without human intervention. It uses sensors, wireless networks, and the internet to connect devices. There are four basic stages to most M2M applications: data collection, data transmission over a network, data assessment, and response to the available information. M2M has many applications including security, transportation, healthcare, manufacturing, and the automotive industry. In particular, vehicle-to-vehicle communication through technologies like DSRC can help avoid road accidents by warning drivers of dangerous conditions.
Ericsson Review: Capillary networks – a smart way to get things connectedEricsson
A capillary network is a local network that uses short-range radio-access technologies to provide local connectivity to things and devices. By leveraging the key capabilities of cellular networks – ubiquity, integrated security, network management and advanced backhaul connectivity – capillary networks will become a key enabler of the Networked Society.
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
Mobile ad hoc networks are growing in popularity due to the explosive growth of modern
devices with wireless capability such as laptop, mobile phones, PDA, etc., makes the application more
challenging. The mobile nodes are vulnerable to security attacks. To protect the ad hoc network it is
essential to evaluate the trust worthiness. The proposed TWCA is similar to WCA in terms of cluster
formation and cluster head election. However, in WCA security features are not included. The proposed
TWCA is a cluster based trust evaluation, in which the mobile nodes are grouped into clusters with one
cluster head. It establishes trust relationship for the cluster based on the previous transaction result. The
simulation result confirms the efficiency of our scheme than the WCA and SEMC.
Internet of things (IoT) will be the main part in upcoming generation devices that would not simply sense and report, also will have the controlling capability. It may be a connected vehicle, connected devices, robot, a building automation system, a door lock or a thermostat, these connected machines or devices will provide greater impact on our daily lives. Control data and the operating instructions could be protected to ensure control and autonomy for our safety and security, this could be a critical task. Privacy and security are important consideration in designing the system. With the intense growth of devices or devices with facilities such as computing and communication are carried out using a profound technology known as machine to machine (M2M) communication, which is specially designed for cross‐platform integration. In many industries, smart homes, smart cities, smart agriculture, government, connected devices, security, healthcare, education, public safety, and supply chain management. Internet of things (IoT) and machine to machine communication have to be implemented in near future. Also, this paper gives an in depth view about the different M2M techniques with interconnected IoT for truly connected, smart, and sustainable world.
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...YanKing2
Pre-trained Large Language Models (LLM) have achieved remarkable successes in several domains. However, code-oriented LLMs are often heavy in computational complexity, and quadratically with the length of the input code sequence. Toward simplifying the input program of an LLM, the state-of-the-art approach has the strategies to filter the input code tokens based on the attention scores given by the LLM. The decision to simplify the input program should not rely on the attention patterns of an LLM, as these patterns are influenced by both the model architecture and the pre-training dataset. Since the model and dataset are part of the solution domain, not the problem domain where the input program belongs, the outcome may differ when the model is trained on a different dataset. We propose SlimCode, a model-agnostic code simplification solution for LLMs that depends on the nature of input code tokens. As an empirical study on the LLMs including CodeBERT, CodeT5, and GPT-4 for two main tasks: code search and summarization. We reported that 1) the reduction ratio of code has a linear-like relation with the saving ratio on training time, 2) the impact of categorized tokens on code simplification can vary significantly, 3) the impact of categorized tokens on code simplification is task-specific but model-agnostic, and 4) the above findings hold for the paradigm–prompt engineering and interactive in-context learning and this study can save reduce the cost of invoking GPT-4 by 24%per API query. Importantly, SlimCode simplifies the input code with its greedy strategy and can obtain at most 133 times faster than the state-of-the-art technique with a significant improvement. This paper calls for a new direction on code-based, model-agnostic code simplification solutions to further empower LLMs.
Response & Safe AI at Summer School of AI at IIITHIIIT Hyderabad
Talk covering Guardrails , Jailbreak, What is an alignment problem? RLHF, EU AI Act, Machine & Graph unlearning, Bias, Inconsistency, Probing, Interpretability, Bias
How to Manage Internal Notes in Odoo 17 POSCeline George
In this slide, we'll explore how to leverage internal notes within Odoo 17 POS to enhance communication and streamline operations. Internal notes provide a platform for staff to exchange crucial information regarding orders, customers, or specific tasks, all while remaining invisible to the customer. This fosters improved collaboration and ensures everyone on the team is on the same page.
Exploring Deep Learning Models for Image Recognition: A Comparative Reviewsipij
Image recognition, which comes under Artificial Intelligence (AI) is a critical aspect of computer vision,
enabling computers or other computing devices to identify and categorize objects within images. Among
numerous fields of life, food processing is an important area, in which image processing plays a vital role,
both for producers and consumers. This study focuses on the binary classification of strawberries, where
images are sorted into one of two categories. We Utilized a dataset of strawberry images for this study; we
aim to determine the effectiveness of different models in identifying whether an image contains
strawberries. This research has practical applications in fields such as agriculture and quality control. We
compared various popular deep learning models, including MobileNetV2, Convolutional Neural Networks
(CNN), and DenseNet121, for binary classification of strawberry images. The accuracy achieved by
MobileNetV2 is 96.7%, CNN is 99.8%, and DenseNet121 is 93.6%. Through rigorous testing and analysis,
our results demonstrate that CNN outperforms the other models in this task. In the future, the deep
learning models can be evaluated on a richer and larger number of images (datasets) for better/improved
results.
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
Conservation of Taksar through Economic RegenerationPriyankaKarn3
This was our 9th Sem Design Studio Project, introduced as Conservation of Taksar Bazar, Bhojpur, an ancient city famous for Taksar- Making Coins. Taksar Bazaar has a civilization of Newars shifted from Patan, with huge socio-economic and cultural significance having a settlement of about 300 years. But in the present scenario, Taksar Bazar has lost its charm and importance, due to various reasons like, migration, unemployment, shift of economic activities to Bhojpur and many more. The scenario was so pityful that when we went to make inventories, take survey and study the site, the people and the context, we barely found any youth of our age! Many houses were vacant, the earthquake devasted and ruined heritages.
Conservation of those heritages, ancient marvels,a nd history was in dire need, so we proposed the Conservation of Taksar through economic regeneration because the lack of economy was the main reason for the people to leave the settlement and the reason for the overall declination.
Conservation of Taksar through Economic Regeneration
Booysen machine 2012
1. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. X, NO. X, December201X 1
Copyright ⓒ 2011 KSII
Notes.
DOI: 10.3837/tiis.0000.00.000
Machine-to-Machine (M2M)
Communications in Vehicular Networks
M.J. Booysen1
, J.S. Gilmore1
, S. Zeadally2
, and G.-J.van Rooyen1
1
MIH Media Lab, Dept. of Electrical and Electronic Engineering,
Stellenbosch University, Stellenbosch, 7600, South Africa
[E-mail: {1, jgilmore,gvrooyen}@sun.ac.za]
2
Department of Computer Science and Information Technology,
University of the District of Columbia, Washington,
DC 2008, USA
[E-mail:szeadally@udc.edu]
Abstract
To address the need for autonomous control of remote and distributed mobile systems,
Machine-to-Machine (M2M) communications are rapidly gaining attention from both
academia and industry. M2M communications have recently been deployed in smart grid,
home networking, health care, and vehicular networking environments. This paper focuses on
M2M communications in the vehicular networking context and investigates areas where M2M
principles can improve vehicular networking. Since connected vehicles are essentially a
network of machines that are communicating, preferably autonomously, vehicular networks
can benefit a lot from M2M communications support. The M2M paradigm enhances vehicular
networking by supporting large-scale deployment of devices, cross-platform networking,
autonomous monitoring and control, visualization of the system and measurements, and
security. We also present some of the challenges that still need to be addressed to fully enable
M2M support in the vehicular networking environment. Of these, component standardization
and data security management are considered to be the most significant challenges.
Keywords: M2M, VANET, Protocol, Networking, Security
2. 2 M.J. Booysen et al.: Machine-to-Machine (M2M) Communications in Vehicular Networks
1. Introduction
When two electronic systems communicate autonomously, that is to say without human
intervention, the process is described as Machine-to-Machine (M2M) communications. The
main goal of M2M communications is to enable the sharing of information between electronic
systems autonomously [1] [2]. Due to the emergence and rapid adoption of wireless
technologies, the ubiquity of electronic control systems, and the increasing complexity of
software systems, wireless M2M has been attracting a lot of attention from industry and
academia [3] [4] [5].
M2M communications include wired communications, but recent interest has focused on
wireless M2M communications [4] [6]. Moreover, the number of wireless devices (not
including mobile phones) which operate without human interaction (e.g. weather stations,
electricity meters, point of sales devices), is expected to grow to 1.5 billion by 2014 [7].
Recent research efforts on M2M communications have investigated areas that include network
energy efficiency and green networking, the tradeoff between device power consumption and
device intelligence or processing power, standardization of communications, data aggregation
and bandwidth, privacy and security, and network scalability [3] [4] [6] [7] [8].
Although "M2M architecture" can technically refer to any number of machines
communicating (e.g. based on the fairly broad definition given by the European
Telecommunications Standards Institute, ETSI), it is generally accepted that M2M principles
apply particularly well to networks where a large number of machines is used, even up to the
1.5 billion wireless devices of the future. This means that when an M2M application is
discussed, it is generally presented on a national or global scale with a multitude of sensors
that are centrally coordinated. Consequently, when we evaluate a vehicular network as a type
of M2M architecture, this evaluation is done for a large-scale network that potentially has
many other devices connected to it, some of which may not be related to vehicular networks.
In this work we explore how vehicular networks can leverage the M2M paradigm to support
vehicular communications. We present a brief overview of some of the most recent application
areas of M2M, namely smart grid technology, home networking, health care, and vehicular
networking. The M2M network communication layers in a vehicular network are then
explored. We identify five fundamental M2M concepts that have been reported in the
literature to address vehicular communication challenges, such as the support for large-scale
deployment of devices, cross-platform networking, autonomous monitoring and control,
visualization of the system, and security.
The remainder of the paper is organized as follows. Section 2 presents a generic M2M
architecture and describes some application areas where M2M support is being used. Section 3
presents the communication layers for vehicular networks and describes how these layers map
to the generic architecture presented in section 2. In section 4, we discuss specific M2M design
issues that need to be taken into consideration for future M2M-based vehicular networks.
Section 5 presents some M2M challenges that still need to be addressed to enable vehicular
networks to reap the benefits of M2M support. We make some concluding remarks in section
6.
3. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 3
2. A Generic M2M Architecture and M2M Application Areas
Gateway
Gateway
Gateway
Gateway
Internet
Aggregators
Gateways
Backhaul
fully distributed
subnet
client-server subnet
cooperative
subnet
Gateway coverage area
Gateway
boundary
Gateway
boundary
Data collectors
Subnets
Figure 1.Generic M2M communication architecture.
A generic M2M communication architecture is shown in Figure 1. To support the high number
of M2M devices (billions to trillions) that are expected to be part of an M2M network,
hierarchical communication architectures have been proposed [4]. At the highest level, the
goal of M2M architectures is to aggregate information from data collectors, and to apply some
decision-making function to this information to produce decisions which are then executed.
Several data collectors (e.g. temperature sensors, location sensors or heart rate monitors) are
used to collect information from multiple locations. Data collectors gather data in areas that
are small compared to the total area covered by the M2M architecture. The data collectors are
usually separated in physical space and can collect information from various types of sources.
For example, one data collector could record the ambient temperature in one location, and
another could record the current consumed by a television set in another distant physical
location.
In M2M architectures, data collectors of the same type are connected to small networks (e.g.
Body Area Networks (BANs), Zigbee, and Bluetooth), called subnets. Each subnet uses a
network technology appropriate for the type of information to be collected and distributed.
4. 4 M.J. Booysen et al.: Machine-to-Machine (M2M) Communications in Vehicular Networks
The network technology which is employed determines the subnet architecture. Three types of
subnets (fully distributed, client-server and cooperative) are shown in Figure 1. In a fully
distributed network, all nodes (e.g. various computers on a home Wi-Fi network) are
connected as peers and share data amongst themselves. One of the nodes (e.g. a router’s Wi-Fi
module) acts as a super-peer that has the ability to connect through some gateway (e.g. a
router’s ADSL connection) to the Internet. In a client-server network, all clients only
communicate with the server; an example would be portable media players connecting to a
media server. The server then relays appropriate information to other clients (e.g. wireless
speakers). The server also has the ability to connect to the Internet through some gateway (e.g.
a home router). A cooperative network is not, strictly speaking, a subnet. None of the nodes
(e.g. BAN sensors) communicate directly with each other as is the case on a subnet, but rather
via the gateway (e.g. a cellular phone).
The collected data is then aggregated at possibly multiple layers of aggregation points. The
number of aggregation layers depends on the expected number of M2M devices and how these
devices are logically grouped. At each aggregation layer, data from multiple data collectors
can be aggregated by applying some intelligence to the data. This means that the aggregation
function is not merely assembling the data, but it can also reduce the amount of data
retransmitted. This can be achieved, for example, through filtering data based on relevance, or
by extracting higher-level information from aggregated data. Data aggregation is used to allow
M2M devices to have low cost, consume little power and have a limited operating area. This is
required to enable a system of billions to trillions of these devices.
Multiple local subnets using different communication standards can communicate with each
other using some gateway which provides Internet connectivity or a similar backhaul network.
The gateway typically interfaces with at least one device on each subnet to which it is
connected, and is also connected to other gateways. An end-user can connect to a server to
access information collected from the M2M data collectors. This server may be connected to
the Internet or some other backhaul network. The function of the M2M server is to perform
final processing tasks on the collected data, to store the data, log the transactions that occurred
and to make the data available online to the various users of the M2M system.
M2M technology has been deployed in various application areas recently. These include smart
power grids, home networking, health care, and vehicular networking. Below, we briefly
describe how M2M principles are used to support the selected areas (as depicted in Figure 2
and Figure 3).
5. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 5
Figure 2 M2M networking applied in smart grid, home networking, and health care.
2.1. Smart Grid
The smart grid is defined as an electrical grid which is specifically designed to improve the
efficiency of power transmission, enhance the quality of service to utility users, and to reduce
the economic and environmental cost of power generation, distribution and consumption. The
smart grid is a combination of a power network and an information network. The distributed
nature of an electrical grid, the sensors required to aggregate usage information, and the
various tiers of decision making (from home energy management to power generation
scheduling) makes M2M principles particularly applicable to the smart grid. For this reason,
the smart grid is considered one of the strongest driving forces for M2M communications [1].
In the smart grid, all devices in every home monitor their power consumption, aggregate the
data and send it to the servers of the power utility. Multiple aggregators exist in the smart grid.
One aggregator is present in each home to aggregate home device data and to optimize local
electrical power consumption. Neighborhood aggregators can also exist to aggregate data
from multiple homes. After neighborhood aggregators send their collected data to the power
utility servers, the power utility company knows how much and when power is consumed by
each house and which devices are consuming the power. This allows the utility company to
preemptively increase power production to meet transient power requirements, turn off
devices that are putting too much strain on the network, monitor the health of all devices in the
power network and to improve billing for power usage [7].
6. 6 M.J. Booysen et al.: Machine-to-Machine (M2M) Communications in Vehicular Networks
2.2. Home Networking
The main purpose of home networking is media distribution, but home networking can also
include elements of the smart grid as described earlier. Media distribution systems include
media storage (media server), media transportation (Wi-Fi, Bluetooth, Ultra-WideBand
(UWB) and media consumption (High Definition TeleVision (HDTV), smart phones, tablet
computers, desktop computers). Home networking is currently receiving significant attention
as an M2M network [4]. A home network is composed of various smaller home device
sub-networks. Each sub-network can contain an aggregator that in turn connects to the Internet
gateway (router). Examples of such sub-networks are Zigbee sub-networks (electrical
appliances, air conditioner), Wi-Fi sub-networks (laptop, printer, and media server), UWB
sub-networks (HDTV, camcorder), smart grid sub-networks (smart meters, smart thermostat,
smart switch), body area sub-network (smart phone, monitoring instrument, body sensors) and
Bluetooth sub-network (music center, portable audio player) [9]. Possible aggregators include
a cellular phone for the BAN subnet and power meters for the smart grid subnet.
Devices exist in the home that can be connected to the Internet to provide extra services to
consumers. One example where the M2M paradigm might be employed is where a fridge in a
home forms part of an M2M network. The fridge is able to collect data about the number and
state of items that it contains, for example the number of eggs that remain and the amount of
milk a container has. Many fridges can then be connected, via the Internet and their respective
home routers, to report on stock numbers and states. The reporting can be done to a grocery
store chain, which can run a dispatch chain that will replenish food items in all the houses that
it oversees.
2.3. Health Care
Health care M2M networks are sub-networks within home networks. They are used to monitor
peoples’ health and inform those being monitored, as well as possibly their doctors, of any
abnormal conditions that might occur. Data collectors in a health care network are body
sensors to monitor various measures of good health, including blood pressure, temperature,
heart rate, and cholesterol. Body sensors are connected to an on-person gateway, such as a
smart phone, which also acts as the aggregator for all data collectors. Sensors send data to the
smart phone which sends data over the Internet to health monitoring servers. Applications run
on the servers that monitor the health of patients.
The M2M paradigm allows for the health of an entire population to be monitored in real time.
Ambulances can be immediately dispatched to accident scenes and patients can be monitored
at their homes just as effectively as in hospitals. A patient’s doctor can also immediately be
informed if her patient suffers a heart attack, for example. Health care M2M can also help to
track the progression of a virus outbreak by monitoring specific symptoms of the population.
Patients that are suspected of being infected by the epidemic can be notified to seek medical
care.
2.4. Vehicular Networks
Several research efforts have been investigating M2M communications support for vehicular
networks [10] [11] [12]. In a vehicular network, vehicles communicate with other vehicles
7. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 7
(Vehicle-to-Vehicle (V2V)) or with an infrastructure (Vehicle-to-Infrastructure (V2I)).
Applications for vehicular networks can be divided into four broad categories, namely safety
and collision avoidance, traffic infrastructure management, vehicle telematics, and
entertainment services and Internet connectivity [13].
For the most part, previous vehicular network research has focused on point-to-point
communications or support for a limited set of vehicles. From a network architecture point of
view, this focus constitutes a bottom-up approach, where focus is initially placed on
developing routing protocols, PHYsical layer (PHY), Medium Access Control (MAC) layer,
and broadcasting [13]. M2M networks use centralized and autonomous monitoring, and
control of data-collecting devices that are spatially distributed, using a hierarchical top-down
approach. The M2M paradigm can therefore improve vehicular networks' capacity to support
features such as cross-platform networking, autonomous monitoring and control, and
visualization of the devices and information in the M2M network. Given the potential that
M2M holds for vehicular networks, we focus on M2M communications for vehicular
networks in this work.
To explain how vehicular networks are used, and to better understand the benefits of M2M
vehicular networks, four application areas for vehicular networking are presented below.
2.4.1. Safety and Collision Avoidance
When driving a non-networked vehicle, a driver makes decisions based only on information
within the driver’s Line of Sight (LoS). One of the fundamental reasons for using wireless
M2M communication between vehicles is to avoid accidents by overcoming the LoS
limitation [13]. In the event of an emergency, information from emergency-detecting sensors
(such as accelerometers and the braking system) is sent to other vehicles and to the road-side
communication infrastructure within its communication range. To avoid an accident or further
accidents, emergencies need to be detected and warning notifications need to be delivered fast
enough to allow the driver to respond. Since this message transmission needs to occur in as
little as tens of milliseconds, a Quality of Service (QoS) guarantee and low latency is
paramount for the communication between the notifying vehicle and the multiple receiving
vehicles [13]. Since the messages are only a few bytes, convey only the most critical
information [14], and are only sent during emergencies, the required bandwidth is low and
continuous connections are optional.
2.4.2. Traffic and Infrastructure Management
Road congestion is a common problem faced by many drivers around the world every day. The
number of vehicles on many countries' roads has quickly outgrown the ageing infrastructures.
The impact of congestion is not limited to personal discomfort. Congestion leads to increased
fuel consumption, which in turn increases costs, and increased emissions, which leads to an
increase in pollution [15]. Conversely, a better managed and tightly controlled infrastructure
improves productivity and reduces costs and pollution. This provides a strong incentive for
society to use road infrastructures more efficiently.
Vehicular networking aims to address this need by providing bidirectional M2M connections
between vehicles and the infrastructure that conveys traffic information [11]. Four
applications that could be based on traffic information are pay-as-you-drive tolling, real-time
8. 8 M.J. Booysen et al.: Machine-to-Machine (M2M) Communications in Vehicular Networks
management of the transport infrastructure, law enforcement, and planning of transportation
infrastructure. The positional information required to enable these applications does not
require sample rates of more than once every few seconds due to the slow rate of change for
typical driving [16]. Since only time, coordinates, speed, and car identification need to be
captured, only a few bytes are required per sample.
2.4.3. Vehicle Telematics
Vehicle telematics is used to monitor and control vehicles remotely, for example to track or
manage vehicle fleets, or to recover stolen vehicles. Physical properties of the vehicle are
recorded and transmitted to a central coordinating agent. These properties include Global
Positioning System (GPS) information, internal engine parameters such as engine
temperature, or video captured by an externally mounted camera. Bandwidth requirements are
not high when video capture is not required, and second-generation cellular data services (e.g.
General Packet Radio Service (GPRS) and Short Messaging Service (SMS)) are sufficient for
simple tracking applications. There is, however, a growing trend to support video telematics.
Preliminary studies show that image capture and video streaming is possible from a vehicle
with access to a high-bandwidth wireless technology such as WiMAX or Wi-Fi [17].
2.4.4. In-car Entertainment and Internet Services
The ubiquity of wireless area networks (e.g. Wi-Fi), cellular broadband networks (e.g.
3rd
-Generation (3G) networks) and metropolitan area networks (e.g. WiMAX) makes it
possible to reliably deliver online content and entertainment to vehicles. The wireless network
requirements are dependent on the application, which can broadly be categorized as:
static low-bandwidth (e.g. text-based e-mail, news, RSS feeds, social media);
static high-bandwidth (e.g. Google Street View, Torrent-based file sharing); and
streaming video and audio, including videoconferencing (e.g. Skype).
Static content is less susceptible to bandwidth fluctuations and in some cases can be tolerant of
substantial transfer delays. Streaming content requires steady high bandwidth with quick
handover and a large receiving buffer, but the occasional loss of packets is acceptable.
9. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 9
3. M2M Communication Layers in Vehicular Networks
Figure 3 The M2M network architecture in a vehicular context.
Figure 3 shows the M2M network architecture for a vehicular network. Each component in
Figure 3 maps to a generic component described in Figure 1.
In a vehicular network, the instruments and sensors in the car are the data collectors. Examples
of data collectors are the airbag controller system and the Automatic Braking System (ABS).
Communications between instruments in a car is designated as intra-car communications and
generally occurs on a wired Controller Area Network (CAN) or fiber-optic Media Oriented
Systems Transport (MOST) ring [18]. Non-entertainment components are hosted on the CAN
bus and entertainment components are hosted on the MOST ring. An On-Board Unit (OBU)
acts as the data aggregator and is connected to the CAN bus. The MOST ring contains a bus
master that acts as a media data aggregator.
OBUs of different vehicles connect wirelessly to each other (inter-car) and to RSUs (extra-car)
using the Wireless Access in the Vehicular Environment (WAVE) standard, which is the de
facto standard for OBU and RSU communications for emergency and traffic management
information [19] [20]. The MOST ring master allows media components in the ring to connect
to available infrastructure though high-bandwidth wireless technologies (extra-car), such as
cellular, WiMAX, and Wi-Fi, to provide video, audio and other entertainment and Internet
10. 10 M.J. Booysen et al.: Machine-to-Machine (M2M) Communications in Vehicular Networks
connectivity.
The access points of these high-bandwidth wireless technologies and the RSUs act as
gateways to the Internet and to an Intelligent Transportation System (ITS) network as
backhaul services. ITS networks endeavor to put in place intelligent and cooperative
transportation infrastructures that include electronic tolling and traffic monitoring using
road-based sensors [21]. The ITS network and the Internet allow all vehicles connected to a
gateway to communicate with back-end servers. Although ITS in its broadest sense refers to
any communications infrastructure support to transportation networks, this is another use case
where the added benefit of applied M2M principles is clear.
Servers and databases connected to the Internet allow end-users to remotely access various
services of the vehicular network. The transportation authority or other third party service
providers can provide centralized management of the infrastructure and vehicles from servers
and databases connected to the ITS network. ITS information can also be uploaded to the
Internet to allow wide-spread accessibility for end-users.
Table 1 summarizes the communication areas shown in Figure 3, along with the most popular
standards that are currently used in those areas.
Table 1: Popular technologies in vehicular networks
Area Standard Description Ref.
Intra-car(wired)
CAN The Controller Area Network (CAN) connects the various electronic
components of a car, including the display cluster, electronic control
unit, accident sensors, GPS and OBU over an electronic wired network.
CAN supports high speed transmissions of small amounts of data,
which makes it ideally suited for safety applications.
[22]
[23]
MOST A Media Oriented Systems Transport (MOST) ring is used to connect
intra-car media devices. A MOST ring has a high communications cost
per node, compared to CAN, but can transmit at higher speeds than
CAN (25Mbps compared to 125Kbps).
[24]
V2VandV2I(wireless)
WAVE The WAVE standard contains a suite of protocols that make up the
WAVE communications protocol stack. The WAVE protocol suite
contains PHY and MAC layer standards as well as higher level support
for IPv6 and the WAVE short message protocol, designed for low-
latency transmission of short messages. There are, however, some areas
where WAVE is not ideal for V2V communications, such as a short
coverage range, the lack of high mobility support, and the lack of
support for extreme multipath effects.
[19]
[20]
[25]
[26]
[27]
Wi-Fi Wi-Fi or IEEE 802.11 is a wireless communications standard that
covers a relatively large area (250 m outdoors and 70 m indoors) and is
able to transmit at high speeds (54 Mbps for 802.11g to 600 Mbps for
802.11n).
[28]
[29]
[30]
WiMAX WiMAX (IEEE 802.16) covers a much larger area than Wi-Fi (6.5 to 16
km), but at a reduced speed (128 Mbps down and 56 Mbps up). The
IEEE 802.16e standard also adds mobility support to WiMAX. The
mobility support, high speed and long range makes WiMAX well suited
[31]
11. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 11
for vehicular communications. A disadvantage of WiMAX is that it is
expensive to deploy.
Cellular Cellular data (all 3GPP standards) includes GPRS, Enhanced Data for
Global Evolution (EDGE), 3G, High Speed Packet Access (HSPA),
Long Term Evolution (LTE) and LTE-Advanced. All these standards
have been designed with high mobility and large coverage areas in
mind. The latest cellular data standards offer high bandwidth
communication capabilities at low latencies. This makes cellular data
well suited for media distribution applications. Efforts also exist to add
functionality to the 3G standard to allow for ad-hoc operation, which
will allow for V2V communications.
[32]
4. M2M Support for Vehicular Networking Environments
Vehicular networks and M2M communications are complementary growing fields of research
that have developed independently. However, recent technological trends demonstrate that
vehicular communications could significantly benefit from the progress made in M2M
communications [16]. The focus of vehicular network research is on the lower layers in the
communication stack of point-to-point communications. M2M research focuses on centralized
and autonomous monitoring, with a spatially-distributed multitude of devices in a hierarchical
network [33] [34] [35] [36] [37].
The working group on communication patterns of the Dagstuhl Seminar recently presented a
report evaluating future trends in vehicular communication patterns [38]. This report
recognized that vehicular networks are a part of the emerging field of M2M communications
research. The group suggested that existing vehicular technologies, such as IEEE 802.11p
could also be adapted for the purpose of M2M communications.
In this section we review recent research efforts which have focused on leveraging M2M
support to improve communications and information transfer for vehicular networking. A few
of the goals of these recent projects are listed in Table 2 to provide some context of the works
discussed in the rest of this paper.
Table 2 Literature relevant to M2M and vehicular networking.
Goals of the project Ref
Greenwood et al. applied an M2M approach to develop a method for real-time road
transportation optimization. The goal of the research is to improve transportation time
and transportation costs in real-time.
[16]
Kapsalis et al. described an M2M networking platform designed to support real-time
monitoring and autonomous control of a vehicle fleet used in the transportation of
flammable and dangerous goods.
[10]
Lequerica et al. extended the features introduced by M2M to enable social networking
services and media distribution with vehicles as the network nodes.
[11]
In the project from [39], not limited to vehicles, the goal is to provide a complete M2M
asset management system through highly visual and embeddable middleware called
[39]
12. 12 M.J. Booysen et al.: Machine-to-Machine (M2M) Communications in Vehicular Networks
SMART.
Cha et al. explored ways to ensure trust and security in a vehicular M2M environment. [12]
Galetić et al. described a generic M2M architecture and presented examples of
different M2M architectures. Amongst these examples, the Ericsson CoCar project is
presented.
[37]
4.1. M2M Support for Diversity and Multitude of Devices
Due to the number of vehicles on the road (255 million registered vehicles in the USA in 2011
[40]), and the variety of devices present in each, a vehicular network will have to be able to
sustain a large number of devices. Moreover, the vehicular network is not fixed in size; it
needs to be scalable to adapt to the continuously changing network topology due to the nodes'
high mobility [13]. The variety of communications and sensing devices further compounds the
challenge for vehicular networks. Since the challenges of multitude and variety of devices and
communication standards are a common problem in M2M networks [37], other authors [16]
[10] [11] have proposed M2M solutions for vehicular communications. M2M supports
diversity and multitude of devices [35] [36] [33] in a vehicular network at the Intra-car level of
the network architecture illustrated in Figure 3.
In [16], the problem of multiple devices is addressed with a solution from the M2M paradigm,
by using the On-Board Units (OBUs) to aggregate, consolidate and filter measurements from
the multiple sensors in a vehicle, including the toll collection units, tachographs, on-board
management units, and load-status sensors. The consolidated information is stored in the OBU
to be transmitted only when required. The approach effectively reduces the number of devices
in the M2M network by substituting the devices in the vehicle with one representative OBU
aggregator, which consolidates information from the devices it represents in the vehicular
M2M hierarchy.
To address the challenges associated with heterogeneity and the large number of end-user
devices and communication buses on which these units reside, the vehicular M2M in [10]
connects to the devices through an Object Linking and Embedding (OLE) for Process Control
(OPC) server that provides a generic Application Programming Interface (API) to all
components. The server is set up to use an extended set of generic Input and Output (IO)
channels that are made available for end-user devices. The approach in [10] therefore ensures
a generic access method for different devices in the vehicular M2M network, and also
simplifies management of a large number of devices through the dedicated server.
To overcome the problems associated with the heterogeneity of communications and sensing
devices, to keep devices simple, and to keep device power consumption low, the authors of
[11] re-allocate as much as possible of the intelligence traditionally found in the device itself,
to higher tiers of the vehicular M2M network. Moreover, applications are executed as remote
services on the M2M server, rather than on the device. Software modules are developed to
provide standard APIs to the devices, which further support diverse device types. This
M2M-based approach facilitates easy software porting between devices, simplifies
management across the range of devices, and enables the authors to use a single
communication stack to access all devices in the same way.
13. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 13
4.2. M2M Support for Autonomy and System Management
The vehicular networking applications considered in this paper, namely safety and collision
avoidance, traffic infrastructure management, and vehicle telematics, require autonomous data
collection, aggregation of collected data, transmission and distribution of aggregated data, and
storing and reporting of information. Although autonomy is fundamental to vehicular
networking applications (for example, it is essential for collision avoidance), autonomy has
received little attention in the literature on vehicular networking. System autonomy is one of
the distinguishing features of an M2M network [33], and is important in several areas of the
vehicular M2M architecture illustrated in Figure 3, including the centralized management
system, connectivity, security, and sensing devices. We now investigate how system
autonomy can be achieved by exploring recent vehicular M2M networking literature.
The system in [16] applies M2M principles to a vehicular network by implementing
rules-based autonomy on all layers of the architecture shown in Figure 3. To autonomously
select between available communication connections (cellular, WiMAX or WAVE), the
vehicles (nodes) follow a rule-based system that uses information such as the vehicle's
location, connection availability and signal strength, transmission cost, and the priority and
size of the task to execute (e.g. whether new firmware must be downloaded, or whether GPS
location information must be transmitted). The authors hypothesize that this approach could
reduce communications costs for vehicles in the network. A similar rule-based Event Control
Action (ECA) mechanism is introduced in [10] to support autonomous control of vehicle
routes and early detection of critical situations in a vehicular M2M network. These
configurable rules are deployed in either the centralized control center or in the vehicles, or in
both, to provide adaptable autonomy.
In the vehicle-based M2M network described in [11], social networking information is
generated by drivers and other information is automatically logged by the sensing devices in
the vehicles. To support autonomous data acquisition and processing by the management
software, the vehicles are polled with a data query and the information is stored in the
centralized database. The system operator configures reports (traffic flow, road loading, etc.)
to be automatically generated periodically. Anomalies (accidents, breakdowns, etc.) are
defined by the operator as events, which are automatically flagged, and, more importantly,
autonomously distributed to and shared with other vehicles.
4.3. M2M Support for Visualization and Reporting
In a large and complex system which is managed centrally, such as a vehicular network, it is
beneficial to simplify visual representation of the entities, make device control easy, and to
automate reporting. We describe below how the M2M networking concept supports
visualization and reporting for vehicular communications at the Servers and Consumers level
of the network architecture illustrated in Figure 3.
To improve the interpretation and visualization of measurements obtained from the wide range
of sensing devices and nodes in the vehicular M2M network discussed in [10], a generic visual
presentation is used for all devices. This presentation is created with a representative graphical
visualization of the vehicle-based sensing devices (e.g. speedometer, OBU, etc.). A
user-configurable model is constructed for every type of entity in the vehicular M2M network.
For example, a model could be built for a generic airbag system and another model for a
14. 14 M.J. Booysen et al.: Machine-to-Machine (M2M) Communications in Vehicular Networks
generic wheel pressure gauge. To provide easy interpretation of information, the authors of
[39] propose highly visual data models with configurable dials and controls built in. For
example, a generic model for a location device (e.g. a GPS navigation device) is built to
indicate where the node is on a map, and to plot its speed. When speed control is required for
fleet management, this generic model can then be configured for individual vehicles to also
plot the speed limit, to report when this limit is exceeded and to control actuators (e.g. an
alarm) on the vehicle. The software is built on Google's OpenSocial Applications
Programming Interface (API), which can be embedded into a web page to provide ubiquitous
access [41] to the vehicle-based devices in the M2M network. Similar approaches are
presented in [42] and [43]; however, these works do not provide APIs that can be embedded
into a web page, and their visualization tools are not user-configurable, but predefined.
4.4. M2M Support for Cross-platform Networking and Connectivity
Vehicles are mobile by definition and the positional distribution of vehicles is variable.
Wireless communications, which is central to vehicular communications, has limited coverage,
and a variety of wireless technologies may be required to interoperate. Connectivity, of
vehicles to infrastructure and to other vehicles, and cross-platform networking are therefore
challenges for vehicular networking environments. A fundamental aspect of M2M
communications is the underlying network it uses, and the associated connectivity of remote
devices to this network. M2M supports the cross-platform networking and connectivity for
vehicular communication at the inter-car and extra-car levels of the network architecture
illustrated in Figure 3.
To support virtually ubiquitous backhaul connectivity and location information in a vehicular
M2M network, the vehicles described in [10] are equipped with GPRS cellular modems and
GPS devices. The CoCar project referenced in [37] investigates the feasibility of using only
existing 3rd-Generation (3G) cellular technology in an M2M network, to enable both
vehicle-to-vehicle and vehicle-to-infrastructure networks. The project envisions a
fully-connected vehicular network, where all vehicles are connected via road infrastructures to
support safety and media distribution applications. Cellular communication (HSPA) is also
used by SMART in [39]. SMART provides a network-agnostic interface to support devices
(without connectivity to the Internet) on any cellular network. To do this, cellular providers
were co-opted to make an access point available and host services for the project. The mobile
service providers were willing to do this because of the potential data revenue. Coverage of
cellular networks is near ubiquitous for the transportation infrastructure, which makes it suited
for connectivity in a vehicular M2M network with a distributed multitude of devices.
In [16], an M2M network is used for remote navigation and vehicle-routing by using various
mobile-technology modems that include WAVE, Wi-Fi, cellular connections and satellite
services. The same connections are used to disseminate routing instructions back to the
vehicles. Selection of the appropriate connection is based on the vehicles' location, the local
connection availability and signal strength, transmission cost, and the task to be executed.
4.5. M2M Support for Security and Privacy
Many applications envisaged for vehicular networks require secure and private
communications [12]. In collision-avoidance applications, for example, data tampering could
15. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 15
be fatal, while privacy is important when considering vehicle tracking and electronic tolling.
Security in a VANET can be compromised by four types of attacks: unauthorized access,
malicious modification, denial of service, and repudiation [45]. Several conventional
approaches have been proposed to protect VANETs against these security attacks; a detailed
analysis of the threats and proposed solutions can be found in [46]. The conventional
centralized network security model is too rigid and is therefore unsuitable for vehicular M2M
architectures. Decentralized and scalable security models are therefore required in a vehicular
network, where the components are dispersed and often unguarded [12]. We explain how the
M2M concept supports security and privacy for vehicular communications at all levels of the
network architecture illustrated in Figure 3. M2M support for security in VANET stems from
the strong architectural definition of M2M networks.
In [11], third-party software, called Identity Provider (IdP), runs on the centralized server of
the vehicular M2M network. IdP is used to obscure the identity of the drivers in shared
information (e.g. location information) and to hide secure information (e.g. bank details) from
other users. The software works by requiring every node to sign in to IdP from a remote
location in the vehicular network in order to be authenticated. After authentication IdP
registers the identity information on a Drive and Share (DaS) server. After the identity
registration the vehicle sends encrypted information to the DaS via the M2M network without
compromising its own identity.
The authors of [12] evaluate autonomous, remote and semi-autonomous validation and
security enforcement in a vehicular M2M framework. Autonomous validation is beneficial
because of the ability to establish assurance in a device independent of the network, thus
overcoming the problem of unreliable connectivity. The drawback of autonomous validation
is the need for the M2M network to keep track of the state of every device, and always keep the
security components of the whole network synchronized. Remote validation overcomes the
requirement of state awareness, but makes security dependent on network coverage. The
vehicular network described in [12], uses semi-autonomous validation. This approach
balances device-centric trust and traditional security enforcement by relegating key security
functions to the individual vehicles. The vehicular network described in [12] uses an M2M
approach to ensure a secure system, based on the concept of a trust boundary. To implement a
distributed trust system, every device on the vehicle is equipped with a logically separate
entity called the TRust Environment (TRE). The TRE hides sensitive data and software (e.g.
encryption functions and keys, TRE identification, security policy functions etc.) from
untrusted access. The TRE forms a trust boundary upon a secure boot and is able to
communicate this trust to other devices and expand the trust boundary to other devices in the
vehicle, and to other vehicles using validation of expected TRE states. Hardware security
measures are centered on a Root of Trust (RoT) set of fundamentally trusted functions, which
are used to protect the trust anchor and to prevent tampering with it. The RoT secures internal
operations of its device and is able to convey sensitive information to external entities. A
configurable set of security functions is kept centrally in the M2M network.
5. M2M Challenges and Issues for Vehicular Networking
In this section we discuss some of the remaining challenges that need to be addressed to enable
the deployment of M2M-based vehicular networks.
16. 16 M.J. Booysen et al.: Machine-to-Machine (M2M) Communications in Vehicular Networks
5.1. Diversity and Multitude of Devices
Although progress has been made to overcome problems associated with the broad range of
devices in a vehicular M2M network, Lequerica et al. report that more work needs to be done
to adequately address technical limitations and cost ineffectiveness of the existing solutions
[11]. This concern relates to the rapid rate of change of consumer electronics that must be
integrated into vehicular networks, such as smart phones, tablets, and navigation devices.
5.2. Autonomy, System Management, and Applications
Autonomy is required at several layers of the M2M architecture, namely centralized
management systems, dynamic connectivity, security, and sensing devices. However,
substantial research is still needed to apply M2M autonomy in vehicular networks [10] [16].
For example, Greenwood et al. [16] state that legacy sensing-device and OBU technology
have limited processing capability. This limits such devices’ ability to be used as autonomous
data sources and aggregators in a vehicular M2M networks. They recommend that further
research should be undertaken to make vehicular M2M systems more autonomous by
including presence-announcing and auto-negotiating features on the OBUs and combining this
with RFID technology [16].
Another anticipated M2M-related contribution to vehicular networks, is the use of centralized
intelligence to more efficiently share information in the network. The usefulness of
inter-vehicular communication is hamstrung by the apparent random behavior of neighboring
nodes. A central agent which is in contact with all vehicles, and aware of their locations and
headings, could use knowledge of data supply and demand to improve the coordination and
management of information transfer among nodes. For example, a centralized agent could use
a cellular or WiMAX network to orchestrate inter-vehicle information sharing, which in turn
uses Wi-Fi or WAVE technologies.
5.3. Security and Privacy
Innovative solutions are needed to ensure the privacy of drivers and passengers in a vehicular
M2M network, especially in applications where vehicles are tracked or driver behavior is
monitored (e.g. for fleet management and traffic reporting). Cha et al. [12] highlight other
security challenges that relate to the method employed to validate the state of the TRE during
autonomous node validation. For example, when using autonomous node validation, the
labeling of rogue devices is impossible and remote management is difficult. Also, the network
needs to be aware of the maintenance state of every device, which is not practically feasible
[12]. Further work needs to be done to address these shortcomings [12].
In [11], Lequerica et al. note that more work needs to be done to address privacy concerns.
Users need to be able to set levels of anonymity for different types of shared information.
Security in general is also highlighted as a remaining challenge in [10].
6. Conclusion
In this paper we described concepts key to the development of M2M communications systems.
We gave a brief overview of four prominent M2M applications, namely health care, home
17. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 17
networking, smart grid, and vehicular networking. We then focused on vehicular networking,
introducing an M2M perspective on vehicular communications, and highlighted the specific
applications, requirements and protocols relating to M2M-based vehicular networks. To
establish where M2M communications could add value to vehicular networks, we provided a
thorough survey of research and development projects that intersect both technologies. Five
areas were identified: Multiplicity, Autonomy, Connectivity, Visualization and Security.
Finally, we performed an analysis of the remaining challenges faced by vehicular M2M
systems. The most significant challenge is the standardization of communication interfaces in
a network with exceedingly high mobility and variability of components. Managing security
and privacy in such a dynamic network requires further attention.
7. Acknowledgements
We thank the anonymous reviewers for their constructive feedback which greatly helped us to
improve the quality and presentation of this paper. This research was partially funded by MIH
Holdings through the Media Lab at Stellenbosch University. Sherali Zeadally was partly
funded by a District of Columbia NASA Space grant.
8. References
[1] D. Niyato, Lu Xiao, and Wang Ping, “Machine-to-machine communications for home
energy management system in smart grid,” Communications Magazine, IEEE, vol. 49,
no. 4, pp. 53-59.
Article (CrossRef Link)
[2] G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K.D. Johnson, “M2M: From mobile to
embedded internet,” IEEE Communications Magazine, vol. 49, no. 4, pp. 36 – 43, 2011.
Article (CrossRef Link)
[3] R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The green, reliability, and security of
emerging machine to machine communications,” IEEE Communications Magazine, vol.
49, no. 4, pp. 28 – 35, 2011.
Article (CrossRef Link)
[4] Y. Zhang et al., “Home M2M networks: Architectures, standards, and QoS
improvement,” IEEE Communciations Magazine, vol. 49, no. 4, pp. 44 – 52, 2011.
Article (CrossRef Link)
[5] C.-Y. Chan, “Connected vehicles in a connected world,” in VLSI Technology, Systems
and Applications (VLSI-TSA), 2011 International Symposium on , Hsinchu, Taiwan,
25-27 April 2011 , pp. 1 – 4.
Article (CrossRef Link)
[6] Y. Chen and W. Wang, “Machine-to-Machine Communication in LTE-A,” in Vehicular
Technology Conference Fall (VTC 2010-Fall), 2010 IEEE 72nd
, Ottawa, ON, Canada, 6 –
9 Sept 2010, pp. 1 – 4.
Article (CrossRef Link)
[7] Z.M. Fadlullah et al., “Toward intelligent machine-to-machine communications in smart
grid,” IEEE Communications Magazine, vol. 49, no. 4, pp. 60-65, 2011.
18. 18 M.J. Booysen et al.: Machine-to-Machine (M2M) Communications in Vehicular Networks
Article (CrossRef Link)
[8] S.-Y. Lien, K.-C. Chen, and Y. Lin, “Toward ubiquitous massive accesses in 3GPP
machine-to-machine communications,” Communications Magazine, IEEE, vol. 49, no. 4,
pp. 66 -74, 2011.
Article (CrossRef Link)
[9] M. Starsinic, “System architecture challenges in the home M2M network,” in
Applications and Technology Conference (LISAT), 2010 Long Island Systems ,
Farmingdale, 2010, pp. 1 – 7.
Article (CrossRef Link)
[10] V. Kapsalis et al., “A networking platform for real-time monitoring and rule-based
control of transport fleets and transferred goods,” in Intelligent Transportation Systems
(ITSC), 2010 13th
International IEEE Conference on , Madeira Island, Portugal, Sept.
2010, pp. 295 – 300.
Article (CrossRef Link)
[11] I. Lequerica, M. García Longaron, and P.M. Ruiz, “Drive and share: efficient
provisioning of social networks in vehicular scenarios,” Communications Magazine,
IEEE , vol. 48, no. 11, pp. 90 – 97, 2010.
Article (CrossRef Link)
[12] I. Cha, Y. Shah, A.U. Schmidt, A. Leicher, and M.V. Meyerstein, “Trust in M2M
communication,” Vehicular Technology Magazine, IEEE , vol. 4, no. 3, pp. 69 – 75, Sept.
2009.
Article (CrossRef Link)
[13] M.J. Booysen, S Zeadally, and G.-J. van Rooyen, “Survey of media access control
protocols for,” IET Communications, vol. 5, no. 11, pp. 1619–1631, 22 July 2011.
Article (CrossRef Link)
[14] K Bilstrup, E. Uhlemann, E.G. Ström, and U. Bilstrup, “On the ability of the 802.11p
MAC method and STDMA to support real-time vehicle-to-vehicle communication,”
EURASIP Journal on Wireless Communications and Networking, vol. Vol. 2009, no.
Article ID 902414, March 2009.
Article (CrossRef Link)
[15] H. Li, “Calculation of additional pollutant gas emissions and their social cost from
transport congestion,” in Mechanic Automation and Control Engineering (MACE), 2011
Second International Conference on , Inner Mongolia, China , 15-17 July 2011 , pp. 5639
– 5641.
Article (CrossRef Link)
[16] D. Greenwood, C. Dannegger, K. Dorer, and M. Calisti, “Dynamic Dispatching and
Transport Optimization – Real-World Experience with Perspectives on Pervasive
Technology Integration,” in System Sciences, 2009. HICSS ‘09. 42nd
Hawaii
International Conference on , Hawaii , 2009, pp. 1 – 9.
Article (CrossRef Link)
[17] M. Aguado, J. Matias, E. Jacob and M. Berbineau, “The WiMAX ASN Network in the
V2I scenario,” IEEE 68th Vehicular Technology Conference, 2008. VTC 2008-Fall.,
Sept 2008, pp. 1 - 5.
Article (CrossRef Link)
[18] N. Navet, Y. Song, F. Simonot-Lion, and C. Wilwert, “Trends in Automotive
Communication Systems,” Proceedings of the IEEE , vol. 93, no. 6, pp. 1204 – 1223 ,
19. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 19
June 2005.
Article (CrossRef Link)
[19] IEEE 802.11p, “IEEE Standard for Information technology-Telecommunications and
information exchange between systems-Local and metropolitan area networks-Specific
requirements, Part 11, Amendment 6: Wireless Access in Vehicular Environments,”
IEEE Std doi: 10.1109/IEEESTD.2010.5514475, 2010.
Article (CrossRef Link)
[20] IEEE 1609.2, “IEEE Trial-Use Standard for Wireless Access in Vehicular Environments
– Security Services for Applications and Management Messages,” IEEE Std doi:
Article (CrossRef Link).
[21] M.D. Nuri and H.H. Nuri, “Strategy for efficient routing in VANET,” in Information
Technology (ITSim), 2010 International Symposium in, Kuala Lumpur , June 2010, pp.
903 – 908.
Article (CrossRef Link)
[22] ISO 11898, “Road vehicles – Controller area network (CAN),” Internation Organisation
for Standardisation, Standard 2007.
[23] ISO 11519, “Road vehicles – Low-speed serial data communication,” International
Organisation for Standardisation, Standard 1994.
http://dx.doi.org
[24] MOST Cooperation, “MOST Specification [CP/DK],” MOST Cooperation, Karlsruhe,
Germany, 2008.
[25] IEEE 1609.3, “IEEE Standard for Wireless Access in Vehicular Environments (WAVE)
– Networking Services,” IEEE Std doi: 10.1109/IEEESTD.2010.5680697, 2010.
Article (CrossRef Link)
[26] IEEE 1609.4, “IEEE Standard for Wireless Access in Vehicular Environments
(WAVE)–Multi-channel Operation,” IEEE Std doi: 10.1109/IEEESTD.2011.5712769,
2011.
Article (CrossRef Link)
[27] IEEE P1609.1, “IEEE Trial-Use Standard for Wireless Access in Vehicular
Environments (WAVE) – Resource Manager,” IEEE Std doi:
10.1109/IEEESTD.2006.246485, 2006.
Article (CrossRef Link)
[28] IEEE 802.11n, “IEEE Standard for Information technology – Telecommunications and
information exchange between systems – Local and metropolitan area networks –
Specific requirments – Part 11, Amendment 5,” IEEE computer society, Standard 2009.
[29] M. Wellens, B. Westphal, and P. Mahonen, “Performance Evaluation of IEEE
8002.11-based WLANs in Vehicular Scenarios,” in IEEE VTC, Baltimore, USA, 2007,
pp. 1167-1171.
Article (CrossRef Link)
[30] C. Chou, C. Li, W. Chien, and K. Lan, “A Feasibility Study on Vehicle-to-Infrastructure
Communication: Wi-Fi vs. WiMAX,” in MDM ‘09 Proceedings of the 2009 Tenth
International Conference on Mobile Data Management, Washington DC, USA, 2009,
pp. 397–398.
Article (CrossRef Link)
[31] IEEE 802.16, “IEEE Standard for Local and metropolitan area networks – Part 16: Air
20. 20 M.J. Booysen et al.: Machine-to-Machine (M2M) Communications in Vehicular Networks
Interface for Broadband Wireless Access Systems,” IEEE computer society and the IEEE
Microwave Theory and Techniques Society, Standard 2009.
Article (CrossRef Link)
[32] Third Generation Partnership Project 2 (3GPP2). (Accessed 10 Aug 2011) The Third
Generation Partnership Project 2. (Accessed: 2 Aug 2011]. http://www.3gpp2.org/
[33] IEEE, “IEEE 802.16p Machine to Machine (M2M) System Requirements Document
(SRD)”, IEEE, IEEE 802.16p-10/0004 (draft), 2011.
[34] IEEE, “Machine to Machine (M2M) Communications Technical Report,” IEEE, IEEE
802.16p-10/0005, 2010.
[35] ETSI, “Machine to Machine Communications (M2M); M2M definitions,” ETSI,
DTR/M2M-00004 (draft), 2011.
[36] ETSI, “Machine to Machine Communications (M2M); M2M functional architecture,”
ETSI, TS 102 690 (draft), 2011.
[37] V. Galetić et al., “Basic principles of Machine-to-Machine communication and its impact
on telecommunications industry,” in Proceedings of 34th
International Convention on
Information and Communication Technology, Electronics and Microelectronics,
MIPRO, 2011, pp. 89-94.
[38] C. Casetti et al., “10402 Report – Working Group on Communication Patterns,” in
Inter-Vehicular Communication at Dagstuhl Seminar Proceedings, 2011.
[39] Trinity Telecommunications. (Accessed 2 August 2011) Trinity SMART sense for
remotedevice management. [Online].
[40] Research and Innovative Technology Administration (RITA) – U.S. Department of
Transportation (US DOT), “National Transportation Statistics,” U.S. Department of
Transportation (US DOT), 2011.
[41] Open Social. OpenSocial 2.0. (Accessed: 2 Aug 2011). http://opensocial.org
[42] BITX. (Accessed: 2 Aug 2011) BITX for Automotive. [Online].
http://www.bitx.com/sites/bitx.mediagrouptv.com/files/attachments_public/BITX_APP
WARE_AUTOMOTIVE_ENG_1.0.pdf
[43] mtelematics. (Accessed: 2 Aug 2011) Next Generation M2M Middleware. [Online].
http://www.mtelematics.com/mtelematics_middleware.php
[44] R. Uzcategui and G. Acosta-Marum, “Wave: A tutorial,” Communications Magazine,
IEEE, vol. 47, no. 5, pp. 126-133, 2009.
Article (CrossRef Link)
[45] M. Al-Qutayri, C. Yeun, F. Al-Hawi, “Security and Privacy of Intelligent VANETs,”
Chapter 13, Computational Intelligence and Modern Heuristics, ISBN
978-953-7619-28-2, InTech, February 2010
Article (CrossRef Link)
[46] J.T. Isaac, S. Zeadally, J.S. Camara, “Security attacks and solutions for vehicular ad hoc
networks,” IET Communications, vol. 4, no. 7, pp. 894 – 903, 2010.
Article (CrossRef Link)
21. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS 21
Gert-Jan van Rooyen is Senior Lecturer in Telecommunications
at Stellenbosch University, and holds a PhD in Electronic
Engineering from the same institution. He is the director of the
MIH Media Lab, an interdisciplinary research laboratory that
focuses on the broad application of emerging communications
media. His research interests include software radio, digital signal
processing and vehicular networks.
John S Gilmore obtained his Bachelor's and Master's degrees in
Electrical & Electronic Engineering with Computer Science from
Stellenbosch University in 2007 and 2010 respectively. He is
currently pursuing his PhD at the MIH Media Lab at Stellenbosch
University. His research interests include peer-to-peer massively
multiuser virtual environments, computer networks, distributed
systems and communication protocols.
Sherali Zeadally is an Associate Professor in the Department of
Computer Science and Information Technology at the University
of the District of Columbia, Washington DC, USA. He currently
serves on the editorial boards of over 15 peer-reviewed scholarly
journals. He has Guest-edited over 15 special issues of refereed
scholarly journals. He is a Fellow of the British Computer Society
(FBCS) and a Fellow of the Institution of Engineering Technology
(FIET).
Marthinus J Booysen is currently pursuing a PhD at the MIH
Media Lab, and is a Lecturer at the Electrical & Electronic
Engineering Department at Stellenbosch University, South Africa.
He is a Member of the Institution of Engineering Technology
(MIET) and a Chartered Engineer (CEng) at the Engineering
Council, UK. He has ten years’ experience in the aerospace and
automotive industries with companies that include SunSpace,
Rolls-Royce, Boeing, BMW, and Jaguar Land Rover.