SlideShare a Scribd company logo
STUART BENNETT
ITC571 CAPSTONE
PROJECT
SEMINAR
ITC571 - Emerging Technologies and Innovation
(201630)
Assessment 6 – Project Blog and Seminar
Student: Stuart Bennett (ID: 11560606)
Subject Mentor: Dr. Mohsin Iftikhar
ITC571 - Emerging Technologies and Innovation
(201630)
Assessment 6 – Project Blog and Seminar
Student: Stuart Bennett (ID: 11560606)
Subject Mentor: Dr. Mohsin Iftikhar
SECURITY ISSUES AND
CHALLENGES WITH WIRELESS
M2M
UTILISING CLOUD
INFRASTRUCTURE
A bit of an overview of Wireless M2M
• Wireless Machine-to-Machine (M2M)
communication is viewed as one of the next
frontiers in wireless communications and has
grown dramatically over the past decade.
Source: Telecom Cloud
(2012)
A bit of an overview of Wireless M2M
• It is expected that the wireless M2M market to
account for nearly $200 Billion in revenue by the
end of 2022
A bit of an overview of Wireless M2M
• Some IT industry experts expect up to 50 billion
devices will be connected in the coming years.
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Intelligent metering and network
management for the Utilities
sector
Source: Netcomm Wireless
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Within the agricultural sector
allowing the remote
management of irrigation and
stock control.
Source: Sensor Measurement
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
e-Health applications such as
remote patient monitoring
Source: oneM2M
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Security and surveillance –
• monitoring of public
transportation systems
(roads, rail, buses)
• security applications (street
surveillance and corporate
security)
Source: iveda.com
Source: Forbes
Cloud Computing
Cloud computing is a new computing paradigm that has
significantly changed the global IT landscape.
• Cloud computing is flexible and scalable
• Allows the automatic provisioning and de-provisioning of
resources when required
Source: Shape Host Source: Simple Servers
Cloud Computing
Since Wireless M2M networks will generate vast
amount of data and have many resource-constrained
devices, it can be envisaged that cloud computing
will play a key role in Wireless M2M development by
offering desirable features such as:
• data storage
• data processing and
• virtualised infrastructure.
Source: Network World Source: Miami Technologist Source: PBJ Tech Solutions
CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: Security Issues
Security is a major concern in today’s internet.
Given the number of connected devices in the
future, we need to look at totally new and
innovative solutions to address security concerns.
We must focus on security at endpoints - device
security, cloud security, and network security.
Insufficient authentication and authorisation
solutions
Cloud based security concerns, such as multi-
tenanted environments
Source: IOT Business News
CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: Encryption
Encrypting information also tends to be a
processor-intensive task.
A lack of transport encryption between the M2M
device and the Cloud host.
There is a need to design a light-weight
encryption algorithm/scheme that can be used
with Wireless M2M devices
Source: TecTrade
CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: The Integration Challenge
 Successful M2M/Cloud implementations will
require a focus on how best to integrate these
technologies.
 We will also need to ensure that we have
adequate infrastructure that can move massive
amounts of data from heterogeneous sources.
 How to do this all securely is a very important
question? Source: Mobilize
FUTURE RESEARCH –
STANDARDISATION
• One area that need additional research is to develop
a global “Standard” for M2M devices, development
and deployment.
• One of the biggest challenges within the current M2M
ecosystem is the use of proprietary systems that
often span across a number of layers, from physical
to application.
• We need to ensure that we examine a number of use
cases, collected from a number of M2M domains, to
derive a set of requirements and functionalities for a
common standardisation platform.
FUTURE RESEARCH –
SECURITY
• It is vitally important that Wireless M2M developers
make privacy and security a priority for continued
M2M market growth. Additional research needs to be
done in this area.
• Adequately securing Wireless M2M devices can be a
complex activity. What is the best way to ensure that
these environments are secure?
• Security issues integrating Wireless M2M devices with
Cloud infrastructure
• We need to take into account that all Wireless M2M
devices require the same security as does the cloud
(firewalls, Anti-Virus programs, etc) and that we can
use encryption across all devices.
Source: GSMA
CONCLUSION
Wireless Machine-to-machine (M2M) technology will become a key enabler of
many of the higher-profile platforms that are revolutionising industry. These
include Cloud Services and the Industrial Internet of Things (IIoT).
Since wireless M2M networks will generate vast amount of data and have many
resource-constrained devices, it can be envisaged that Cloud Computing will
play a key role in Wireless M2M development.
Based on current research, is not completely clear how Wireless M2M and Cloud
technologies will fit together or how the many concerns around security and
privacy will be addressed.
Much more research needs to be done in these area to better understand and
address these concerns.
SECURITY ISSUES AND CHALLENGES
WITH WIRELESS M2M
UTILISING CLOUD INFRASTRUCTURE
MY CAPSTONE PROJECT BLOG SITE
Can be found at -
http://thinkspace.csu.edu.au/11560606itc571/

More Related Content

CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with Wireless M2M utilising Cloud Computing

  • 1. STUART BENNETT ITC571 CAPSTONE PROJECT SEMINAR ITC571 - Emerging Technologies and Innovation (201630) Assessment 6 – Project Blog and Seminar Student: Stuart Bennett (ID: 11560606) Subject Mentor: Dr. Mohsin Iftikhar
  • 2. ITC571 - Emerging Technologies and Innovation (201630) Assessment 6 – Project Blog and Seminar Student: Stuart Bennett (ID: 11560606) Subject Mentor: Dr. Mohsin Iftikhar SECURITY ISSUES AND CHALLENGES WITH WIRELESS M2M UTILISING CLOUD INFRASTRUCTURE
  • 3. A bit of an overview of Wireless M2M • Wireless Machine-to-Machine (M2M) communication is viewed as one of the next frontiers in wireless communications and has grown dramatically over the past decade. Source: Telecom Cloud (2012)
  • 4. A bit of an overview of Wireless M2M • It is expected that the wireless M2M market to account for nearly $200 Billion in revenue by the end of 2022
  • 5. A bit of an overview of Wireless M2M • Some IT industry experts expect up to 50 billion devices will be connected in the coming years.
  • 6. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: Intelligent metering and network management for the Utilities sector Source: Netcomm Wireless
  • 7. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: Within the agricultural sector allowing the remote management of irrigation and stock control. Source: Sensor Measurement
  • 8. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: e-Health applications such as remote patient monitoring Source: oneM2M
  • 9. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: Security and surveillance – • monitoring of public transportation systems (roads, rail, buses) • security applications (street surveillance and corporate security) Source: iveda.com
  • 11. Cloud Computing Cloud computing is a new computing paradigm that has significantly changed the global IT landscape. • Cloud computing is flexible and scalable • Allows the automatic provisioning and de-provisioning of resources when required Source: Shape Host Source: Simple Servers
  • 12. Cloud Computing Since Wireless M2M networks will generate vast amount of data and have many resource-constrained devices, it can be envisaged that cloud computing will play a key role in Wireless M2M development by offering desirable features such as: • data storage • data processing and • virtualised infrastructure. Source: Network World Source: Miami Technologist Source: PBJ Tech Solutions
  • 13. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: Security Issues Security is a major concern in today’s internet. Given the number of connected devices in the future, we need to look at totally new and innovative solutions to address security concerns. We must focus on security at endpoints - device security, cloud security, and network security. Insufficient authentication and authorisation solutions Cloud based security concerns, such as multi- tenanted environments Source: IOT Business News
  • 14. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: Encryption Encrypting information also tends to be a processor-intensive task. A lack of transport encryption between the M2M device and the Cloud host. There is a need to design a light-weight encryption algorithm/scheme that can be used with Wireless M2M devices Source: TecTrade
  • 15. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: The Integration Challenge  Successful M2M/Cloud implementations will require a focus on how best to integrate these technologies.  We will also need to ensure that we have adequate infrastructure that can move massive amounts of data from heterogeneous sources.  How to do this all securely is a very important question? Source: Mobilize
  • 16. FUTURE RESEARCH – STANDARDISATION • One area that need additional research is to develop a global “Standard” for M2M devices, development and deployment. • One of the biggest challenges within the current M2M ecosystem is the use of proprietary systems that often span across a number of layers, from physical to application. • We need to ensure that we examine a number of use cases, collected from a number of M2M domains, to derive a set of requirements and functionalities for a common standardisation platform.
  • 17. FUTURE RESEARCH – SECURITY • It is vitally important that Wireless M2M developers make privacy and security a priority for continued M2M market growth. Additional research needs to be done in this area. • Adequately securing Wireless M2M devices can be a complex activity. What is the best way to ensure that these environments are secure? • Security issues integrating Wireless M2M devices with Cloud infrastructure • We need to take into account that all Wireless M2M devices require the same security as does the cloud (firewalls, Anti-Virus programs, etc) and that we can use encryption across all devices. Source: GSMA
  • 18. CONCLUSION Wireless Machine-to-machine (M2M) technology will become a key enabler of many of the higher-profile platforms that are revolutionising industry. These include Cloud Services and the Industrial Internet of Things (IIoT). Since wireless M2M networks will generate vast amount of data and have many resource-constrained devices, it can be envisaged that Cloud Computing will play a key role in Wireless M2M development. Based on current research, is not completely clear how Wireless M2M and Cloud technologies will fit together or how the many concerns around security and privacy will be addressed. Much more research needs to be done in these area to better understand and address these concerns.
  • 19. SECURITY ISSUES AND CHALLENGES WITH WIRELESS M2M UTILISING CLOUD INFRASTRUCTURE MY CAPSTONE PROJECT BLOG SITE Can be found at - http://thinkspace.csu.edu.au/11560606itc571/