DOI QR코드

DOI QR Code

Common Services Platform for M2M Supporting Security Standards

보안 표준 지원 M2M 공통 서비스 플랫폼

  • Vakkosov, Sardorjon (Department of Financial Information Security, Kookmin University) ;
  • Namgung, Jung-Il (Department of Financial Information Security, Kookmin University) ;
  • Park, Soo-Hyun (Department of Financial Information Security, Kookmin University)
  • Received : 2016.01.13
  • Accepted : 2016.03.07
  • Published : 2016.03.25

Abstract

Machine to Machine (M2M) is a technology that presents communication between two or more devices with or without human intervention. M2M communications can be applied for various use cases such as environmental monitoring, health care, smart metering and etc. In most use cases, M2M utilizes sensor nodes to collect data from the intended environment and the data is transmitted back to M2M application through other devices (gateways, sink nodes). In some use cases, M2M devices are being designed to store and process sensor data for improving the reliability of the service; Gateways and sink nodes are also intended to store and process the gathered data from sensor nodes. This kind of approach is very challenging for both academy and industry. In order to enhance the performance of this approach, in this paper, we propose our Common Service Security Platform (CSSP) for M2M devices and gateways. CSSP platform presents solutions for the devices and gateways by making them operate more accurately and efficiently. Besides, we present a comparative analysis of communication protocols and present their performance in accordance with selected metrics.

사물통신(M2M)은 사람의 개입이나 간섭 없이도 2개 이상의 단말 간에 통신을 가능하게 하는 기술이다. M2M 통신은 환경 모니터링, 헬스 케어 등과 같은 다양한 유즈케이스에 적용될 수 있다. 대부분의 유즈케이스에서 M2M은 관심 있는 환경으로부터 데이터를 수집하기 위해서 센서 노드를 활용하며 데이터는 다른 기기(즉, 게이트웨이, 싱크 노드)를 거쳐 M2M 응용으로 전송된다. 어떤 유즈케이스에서는 M2M 단말들이 서비스의 신뢰성을 향상시키기 위해서 센서 데이터를 저장하고 처리할 수 있도록 설계되어진다. 게이트웨이와 싱크노드 또한 센서 노드들로부터 수집된 데이터를 저장 및 처리할 수 있다. 이러한 형태의 접근방법은 학계 및 산업계 모두에 매우 도전적으로 받아들여지고 있다. 이러한 접근방법의 성능을 개선하기 위해 본 논문에서는 M2M 단말과 게이트웨이를 위한 공통 서비스 보안 플랫폼(CSSP)를 제안한다. CSSP 플랫폼은 단말과 게이트웨이를 보다 정확하고 효율적으로 만들기 위한 솔루션을 제공한다. 게다가, 통신 프로토콜간의 비교 및 선정된 메트릭스에 따른 프로토콜들의 성능 분석을 제시한다.

Keywords

References

  1. Chen, Min, et al. "Body area networks: A survey." Mobile networks and applications 16.2 (2011): 171-193. https://doi.org/10.1007/s11036-010-0260-8
  2. M.R. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L.A. Grieco, G. Boggia, M. Dohler, "Standardized Protocol Stack For The Internet Of (Important) Things," IEEE Commun. Surveys and Tutorials, DOI 10.1109/SURV.2012.111412.00158.
  3. M.R. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L.A. Grieco, G. Boggia, M. Dohler, "Standardized Protocol Stack For The Internet Of (Important) Things," IEEE Commun. Surveys and Tutorials, DOI 10.1109/SURV.2012.111412.00158.
  4. G. Wu et al., "M2M: From mobile to embedded internet," IEEE Commun. Mag., vol. 49, no. 4, pp. 36-43, Apr. 2011. https://doi.org/10.1109/MCOM.2011.5741144
  5. Digi International Inc. (2011) Connectport(R) X2 for Smart Energy. [Online]. Available: http://www.digi.com/products/wireless-routers-gateways/gateways/
  6. IEEE 802.15 $WPAN^{TM}$ Task Group 4, http://www.ieee802.org/15/pub/TG4.html
  7. IEEE 802 working group, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), IEEE Computer Society, Standard specification, [WWW], http://standards.ieee.org/getieee802/ download/ 802.15.4-2006.pdf
  8. A UDP/IP Adaptation of the ZigBee Application Protocol, G. Tolle, October 8 2008, [WWW], http://tools.ietf.org/html/draft-tolle-cap-00
  9. P. Kasinathan, C. Pastrone, M. A. Spirito, and M. Vinkovits, "Denial-ofService detection in 6LoWPAN based Internet of Things," Proceedings of 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2013, pp. 600- 607.
  10. Y. Zhou, Z. Jia, X. Sun, X. Li, and L. Ju, "Design of embedded secure gateway based on 6LoWPAN," Proceedings of 2011 IEEE 13th International Conference on Communication Technology (ICCT), 2011, pp. 732-736.
  11. S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig, "Securing communication in 6LoWPAN with compressed IPsec," Proceedings of 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011, pp. 1-8
  12. H. R. Hussen, G. A. Tizazu, T. Miao, L. Taekkyeun, C. Youngjun, and K. Ki-Hyung, "SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN)," Proceedings of 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN), 2013, pp. 246-251.
  13. L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010. [Online]. Available: http://www.sciencedirect.com/ science/article/pii/S1389128610001568 https://doi.org/10.1016/j.comnet.2010.05.010
  14. E. Fasolo, M. Rossi, J. Widmer, and M. Zorzi, "In-network aggregation techniques for wireless sensor networks: a survey," Wireless Communications, IEEE, vol. 14, no. 2, pp. 70-87, April 2007.
  15. A. Dimakis, P. Godfrey, Y. Wu, M. Wainwright, and K. Ramchandran, "Network coding for distributed storage systems," Information Theory, IEEE Transactions on, vol. 56, no. 9, pp. 4539-4551, Sept 2010. https://doi.org/10.1109/TIT.2010.2054295