A survey on information security threats and solutions for Machine to Machine (M2M) communications

dc.authoridTuna, Gurkan/0000-0002-6466-4696
dc.authoridKogias, Dimitrios/0000-0001-8985-6136
dc.authorwosidKogias, Dimitrios/AAP-7715-2021
dc.authorwosidTuna, Gurkan/AAG-4412-2019
dc.contributor.authorTuna, Gurkan
dc.contributor.authorKogias, Dimitrios G.
dc.contributor.authorGungor, V. Cagri
dc.contributor.authorGezer, Cengiz
dc.contributor.authorTaskin, Erhan
dc.contributor.authorAyday, Erman
dc.date.accessioned2024-06-12T11:07:57Z
dc.date.available2024-06-12T11:07:57Z
dc.date.issued2017
dc.departmentTrakya Üniversitesien_US
dc.description.abstractAlthough Machine to Machine (M2M) networks allow the development of new promising applications, the restricted resources of machines and devices in the M2M networks bring several constraints including energy, bandwidth, storage, and computation. Such constraints pose several challenges in the design of M2M networks. Furthermore, some elements that contributed to the rise of M2M applications have caused several new security threats and risks, typically due to the advancements in technology, increasing computing power, declining hardware costs, and freely available software tools. Due to the restricted capabilities of M2M devices, most of the recent research efforts on M2M have focused on computing, resource management, sensing, congestion control and controlling technologies. However, there are few studies on security aspects and there is a need to introduce the threats existing in M2M systems and corresponding solutions. Accordingly, in this paper, after presenting an overview of potential M2M applications, we present a survey of security threats against M2M networks and solutions to prevent or reduce their impact. Then, we investigate security-related challenges and open research issues in M2M networks to provide an insight for future research opportunities. Moreover, we discuss the oneM2M standard, one of the prominent standard initiatives for more secure and smoother M2M networks and the Internet of Things. (C) 2017 Elsevier Inc. All rights reserved.en_US
dc.description.sponsorshipTurkish Scientific and Technical Research Council (TUBITAK) [3140911]en_US
dc.description.sponsorshipThis work was supported by the Turkish Scientific and Technical Research Council (TUBITAK) under Grant no. 3140911.en_US
dc.identifier.doi10.1016/j.jpdc.2017.05.021
dc.identifier.endpage154en_US
dc.identifier.issn0743-7315
dc.identifier.issn1096-0848
dc.identifier.scopus2-s2.0-85021447987en_US
dc.identifier.scopusqualityQ1en_US
dc.identifier.startpage142en_US
dc.identifier.urihttps://doi.org/10.1016/j.jpdc.2017.05.021
dc.identifier.urihttps://hdl.handle.net/20.500.14551/22254
dc.identifier.volume109en_US
dc.identifier.wosWOS:000408298400012en_US
dc.identifier.wosqualityQ2en_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherAcademic Press Inc Elsevier Scienceen_US
dc.relation.ispartofJournal Of Parallel And Distributed Computingen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectMachine To Machine (M2M) Communicationsen_US
dc.subjectSecurity Threatsen_US
dc.subjectCountermeasuresen_US
dc.subjectOnem2m Standarden_US
dc.subjectWireless Sensor Networksen_US
dc.subjectTrust Managementen_US
dc.subjectInterneten_US
dc.subjectAuthenticationen_US
dc.subjectPrivacyen_US
dc.subjectStandardsen_US
dc.subjectMechanismen_US
dc.subjectSchemeen_US
dc.subjectThingsen_US
dc.titleA survey on information security threats and solutions for Machine to Machine (M2M) communicationsen_US
dc.typeArticleen_US

Dosyalar