Smart City Gnosys

Smart city article details

Title A Study On M2M (Machine To Machine) System And Communication: Its Security, Threats, And Intrusion Detection System
ID_Doc 5037
Authors Ahmad R.H.; Khan Pathan A.-S.
Year 2017
Published The Internet of Things: Breakthroughs in Research and Practice
DOI http://dx.doi.org/10.4018/978-1-5225-1832-7.ch010
Abstract The increase of the applications of numerous innovative technologies and associated devices has brought forward various new concepts like Cyber-Physical System (CPS), Internet of Things (IoT), Smart environment, Smart cities, and so on. While the boundary lines between these concepts and technologies are often kind of blur and perhaps, each one's development is helping the development of the other, M2M (Machine to Machine) communication would surely play a great role as a key enabler of all these emerging scenarios. When we see the same smart concept from different angles; for instance, from the participating device, or human being's angle, we get different definitions and concept-specific standards. In this chapter, our objective is to study M2M system and communication along with its security issues and intrusion detection systems. We have also proposed our framework in line with the standardization efforts for tackling security issues of M2M. © 2017 by IGI Global. All rights reserved.
Author Keywords


Similar Articles


Id Similarity Authors Title Published
5038 View0.996Ahmad R.H.; Pathan A.-S.K.A Study On M2M (Machine To Machine) System And Communication: Its Security, Threats, And Intrusion Detection SystemSecurity Solutions and Applied Cryptography in Smart Grid Communications (2016)
36099 View0.9Verma P.K.; Verma R.; Prakash A.; Agrawal A.; Naik K.; Tripathi R.; Alsabaan M.; Khalifa T.; Abdelkader T.; Abogharaf A.Machine-To-Machine (M2M) Communications: A SurveyJournal of Network and Computer Applications, 66 (2016)
33194 View0.887Babita; Kaushal S.; Kumar H.Interworking Of M2M And Onem2M2022 International Conference for Advancement in Technology, ICONAT 2022 (2022)
24353 View0.886Ennesser F.; Ganem H.Establishing Security In Machine-To-Machine (M2M) Communication Devices And ServicesMachine-to-machine (M2M) Communications: Architecture, Performance and Applications (2015)
36084 View0.879Sudarmani R.; Venusamy K.; Sivaraman S.; Jayaraman P.; Suriyan K.; Alagarsamy M.Machine To Machine Communication Enabled Internet Of Things: A ReviewInternational Journal of Reconfigurable and Embedded Systems, 11, 2 (2022)
1961 View0.862Kaushik S.; Aggarwal G.; Tejasvee S.A Glimpse On Key Applications Of Smart City Under M2M CommunicationIOP Conference Series: Materials Science and Engineering, 1022, 1 (2021)
30643 View0.86Castilho S.D.; Godoy E.P.; Salmen F.Implementing Security And Trust In Iot/M2M Using MiddlewareInternational Conference on Information Networking, 2020-January (2020)
26925 View0.857Sekhar K.R.; Murthy B.S.; Rao B.N.; Subash M.V.K.Formal Verification Of M2M Nodes For Secure CommunicationsIntegrated Technologies in Electrical, Electronics and Biotechnology Engineering (2025)