Cyber Security for Intelligent World with Internet of Things and Machine to Machine Communication
DOI:
https://doi.org/10.13052/jcsm2245-1439.412Keywords:
Internet of Things (IoT), Machine to Machine Communication (M2M), Cyber Security, Cybercrime, etcAbstract
The growth of interconnected objects through Internet of Things (IoT) and Machine to Machine Communication (M2M) is no doubt inevitable. The researchers have predicted that by 2020, around fifty billion objects throughout the world will be connected with each other with the help of internetwork of smart objects. With the number of networked objects, grows the number of cyber-crime threats. Forthcoming fifth generation of mobile communication will be the converged version of all the wired and wireless networking services and technologies. The heterogeneous networking approach gives rise to various cyber threats. Design of robust cyber security solutions for such heterogeneous networks with smart devices is challenging task.
Downloads
References
Georgios Tselentis, “Towards the Future Internet: A European Research Perspective”, IOS Press, Netherlands, 2009.
CTIA IoT White Paper, “Mobile Cybersecurity and the Internet of Things – Empowering M2M Communication”, May 2014.
Luigi Atzori, Antonio Iera, Giacomo Morabito, “The Internet of Things: A Survey”, Elsevier 2010.
Elgar Fleisch, “What is the Internet of Things? – An Economic Perspective”, Auto-ID Labs White Paper WP-BIZAPP-053, January 2010.
Sudha Nagesh, “Roll of Data Mining in Cyber Security” Journal of Exclusive Management Science, Vol. 2 Issue 5, pp. 2277–5684, May 2013.
A. Q. Ansari, Tapasya Patki, A. B. Patki, V. Kumar, “Integrating Fuzzy Logic and Data Mining: Impact on Cyber Security”, Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007.
Chen Hongsong, “Security and Trust Research in M2M System”, IEEE International Conference on Vehicular Electronics and Safety (ICVES), 2011.
Fibocom Perfect Wireless Experience, “The Coming Boom in Smart Buildings”, http://www.fibocom.com/news/2-4-4-2-44.html
Smart Grid News, “Smart grid advice from SMUD (Home gateways? Really?) http://www.smartgridnews.com/story/smart-grid-advice-smud-home-gateways-really/2014-07-21
Nano Markets, “Smart-Grid Sensor Market Steadily Climbing to $39 Billion by 2019”, http://nanomarkets.net/news/article/smart-grid-sensor-market-steadily-climbing-to-39-billion-by-2019-according
M2M Now, Sep 12 2014, “Electric scooter with smartphone connection is launched in Europe by Terra Motors”. http://news.ne2ne.com/articles/ 951843/electric-scooter-with-smartphone-connection-is-lau/
Fibocom Perfect Wireless Experience, “Smart connected homes driving IoT”. http://www.fibocom.com/news/2-4-4-2-39.html
Machina Research, m2m now- Latest Machine to Machine Industry News, Connected Car Report http://www.connectedcar.org.uk/ machinaltem2mnow/4586932250
Machina Research, m2m now- Latest Machine to Machine Industry News http://www.m2mnow.biz/2013/10/25/16033-technology-migration-strat egies-of-us-carriers-will-trigger-a-new-era-of-lte-for-the-m2m-industry/
Machina Research, m2m now- Latest Machine to Machine Industry News http://www.m2mnow.biz/2013/11/26/16748-the-connected-car-a-usd282-billion-opportunity-but-who-pays/
Machina Research, m2m now- Latest Machine to Machine Industry News http://www.m2mnow.biz/2013/12/13/17392-the-rise-of-m2miot-platforms-highlights-new-commercial-dynamics-and-new-challenges/
Telematics Business Arena | Avlgps M2m Lbs | Fleet Management, Tracking, Rastreo, Gestion De Flotas Https://Www.Linkedin.Com/Groups/ Berg-Insight-Says-28-Million-1878321.S.204554388
m2m now- latest machine to machine industry news http://www.m2mnow .biz/2013/06/17/12936-m2m-the-focus-is-still-on-people/
ABI Research, Technology Market Intelligence. https://www.abiresearch .com/press/v2v-penetration-in-new-vehicles-to-reach-62-by-202
Yi Cheng, Mats Naslund, Goran Selander, and Eva Fogelstrom, “Privacy in Machine-to-Machine Communications”, IEEE International Conference on Communication Systems (ICCS), 2012.
A. Q. Ansari, Tapasya Patki, A. B. Patki, V. Kumar, “Integrating Fuzzy Logic and Data Mining: Impact on Cyber Security”, Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007.
Radrigo Roman, Jianiying Zhou, “On the feature and challenges of security and privacy in distributed Internet of Things”, Elsevier Journal on Computer Networks, Volume 57, Issue 10, Pages 2266–2279, July 2013.
Danny Palmer, Computing News Security Threats and Risks, 2014. http://www.computing.co.uk/ctg/news/2323661/cyber-attack-launched-through-fridge-as-internet-of-things-vulnerabilities-become-apparent
Kaoru Hayashi, Computing News Security Threats and Risks, 2013. http://www.computing.co.uk/ctg/news/2309972/new-internet-of-things-worm-discovered
Orlando Debruce, Proofpoint U.S. http://www.computing.co.uk/ctg/ news/2309972/new-internet-of-things-worm-discovered
M2M – Latest Machine to Machine Industry News http://www.m2mno w.biz/2014/09/10/25004-9-meals-anarchy-take-cybersecurity-threat-iot-seriously-says-beecham-report/
Manu Namboodiri, “Thoughts on M2M and IoT security and privacy for 2015” Blog on Thoughts about M2M and Internet of Things as well as related worlds from the M2Mi team.
Michael Huth N. Asokan, Srdjan Capkun Ivan Flechais, Lizzie Coles-Kemp (Eds.), “Trust and Trustworthy Computing”, 6th International Conference, TRUST 2013, London, UK, June 2013 Proceedings, Springer.
Vangelis Gazis, Konstantinos Sasloglou, Nikolaos Frangiadakis, and Panayotis Kikiras, “Wireless Sensor Networking, Automation Technologies and Machine to Machine Developments on the Path to the Internet of Things,” 16th Panhellenic Conference on Informatics, 2012.
Ivan Stojmenovic, “Large Scale Cyber-Physical Systems: Distributed Actuation, In-Network Processing and Machine-to-Machine Communications”, Mediterranean Conference on Embedded Computing, 2013.
Giacomo Ghidini, Stephen P. Emmons, Farhad A. Kamangar, and Jeffrey O. Smith, “Advancing M2M Communications Management: A Cloud-based System for Cellular Traffic Analysis”, 15th International IEEE Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2014.
Min Chen, Jiafu Wan, “A Survey of Recent Developments in Home M2M Networks”, IEEE Communications Surveys and Tutorials, Volume: 16, Issue: 1, 2014.
Hui Wang, Suman Roy, Amitabha Das, and Sanjoy Paul, “A Framework for Security Quantification of Networked Machines”, Second International IEEE Conference on Communication Systems and Networks (COMSNETS), 2010.