Browse > Article
http://dx.doi.org/10.5573/ieie.2016.53.3.076

Common Services Platform for M2M Supporting Security Standards  

Vakkosov, Sardorjon (Department of Financial Information Security, Kookmin University)
Namgung, Jung-Il (Department of Financial Information Security, Kookmin University)
Park, Soo-Hyun (Department of Financial Information Security, Kookmin University)
Publication Information
Journal of the Institute of Electronics and Information Engineers / v.53, no.3, 2016 , pp. 76-88 More about this Journal
Abstract
Machine to Machine (M2M) is a technology that presents communication between two or more devices with or without human intervention. M2M communications can be applied for various use cases such as environmental monitoring, health care, smart metering and etc. In most use cases, M2M utilizes sensor nodes to collect data from the intended environment and the data is transmitted back to M2M application through other devices (gateways, sink nodes). In some use cases, M2M devices are being designed to store and process sensor data for improving the reliability of the service; Gateways and sink nodes are also intended to store and process the gathered data from sensor nodes. This kind of approach is very challenging for both academy and industry. In order to enhance the performance of this approach, in this paper, we propose our Common Service Security Platform (CSSP) for M2M devices and gateways. CSSP platform presents solutions for the devices and gateways by making them operate more accurately and efficiently. Besides, we present a comparative analysis of communication protocols and present their performance in accordance with selected metrics.
Keywords
M2M; M2M platform; M2M architecture; M2M technologies; Protocols;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Chen, Min, et al. "Body area networks: A survey." Mobile networks and applications 16.2 (2011): 171-193.   DOI
2 M.R. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L.A. Grieco, G. Boggia, M. Dohler, "Standardized Protocol Stack For The Internet Of (Important) Things," IEEE Commun. Surveys and Tutorials, DOI 10.1109/SURV.2012.111412.00158.   DOI
3 M.R. Palattella, N. Accettura, X. Vilajosana, T. Watteyne, L.A. Grieco, G. Boggia, M. Dohler, "Standardized Protocol Stack For The Internet Of (Important) Things," IEEE Commun. Surveys and Tutorials, DOI 10.1109/SURV.2012.111412.00158.   DOI
4 G. Wu et al., "M2M: From mobile to embedded internet," IEEE Commun. Mag., vol. 49, no. 4, pp. 36-43, Apr. 2011.   DOI
5 Digi International Inc. (2011) Connectport(R) X2 for Smart Energy. [Online]. Available: http://www.digi.com/products/wireless-routers-gateways/gateways/
6 IEEE 802.15 $WPAN^{TM}$ Task Group 4, http://www.ieee802.org/15/pub/TG4.html
7 IEEE 802 working group, Part 15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), IEEE Computer Society, Standard specification, [WWW], http://standards.ieee.org/getieee802/ download/ 802.15.4-2006.pdf
8 A UDP/IP Adaptation of the ZigBee Application Protocol, G. Tolle, October 8 2008, [WWW], http://tools.ietf.org/html/draft-tolle-cap-00
9 P. Kasinathan, C. Pastrone, M. A. Spirito, and M. Vinkovits, "Denial-ofService detection in 6LoWPAN based Internet of Things," Proceedings of 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2013, pp. 600- 607.
10 Y. Zhou, Z. Jia, X. Sun, X. Li, and L. Ju, "Design of embedded secure gateway based on 6LoWPAN," Proceedings of 2011 IEEE 13th International Conference on Communication Technology (ICCT), 2011, pp. 732-736.
11 S. Raza, S. Duquennoy, T. Chung, D. Yazar, T. Voigt, and U. Roedig, "Securing communication in 6LoWPAN with compressed IPsec," Proceedings of 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), 2011, pp. 1-8
12 H. R. Hussen, G. A. Tizazu, T. Miao, L. Taekkyeun, C. Youngjun, and K. Ki-Hyung, "SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN)," Proceedings of 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN), 2013, pp. 246-251.
13 L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer Networks, vol. 54, no. 15, pp. 2787-2805, 2010. [Online]. Available: http://www.sciencedirect.com/ science/article/pii/S1389128610001568   DOI
14 E. Fasolo, M. Rossi, J. Widmer, and M. Zorzi, "In-network aggregation techniques for wireless sensor networks: a survey," Wireless Communications, IEEE, vol. 14, no. 2, pp. 70-87, April 2007.
15 A. Dimakis, P. Godfrey, Y. Wu, M. Wainwright, and K. Ramchandran, "Network coding for distributed storage systems," Information Theory, IEEE Transactions on, vol. 56, no. 9, pp. 4539-4551, Sept 2010.   DOI