表紙
市場調査レポート

M2M市場の機会・ソリューション:エコシステム分析・主要アプリケーション・セキュリティ課題

M2M Market Opportunities and Solutions: Ecosystem Analysis, Leading Applications, and Security Challenges

発行 Mind Commerce Publishing LLC 商品コード 310900
出版日 ページ情報 英文 282 Pages
納期: 即日から翌営業日
価格
こちらの商品の販売は終了いたしました。
Back to Top
M2M市場の機会・ソリューション:エコシステム分析・主要アプリケーション・セキュリティ課題 M2M Market Opportunities and Solutions: Ecosystem Analysis, Leading Applications, and Security Challenges
出版日: 2014年08月22日 ページ情報: 英文 282 Pages

当商品の販売は、2016年06月14日を持ちまして終了しました。

概要

当レポートでは、M2Mのエコシステム、バリューチェーンおよびプラットフォームについて評価し、M2Mの機能的構成要素の評価、市場参入戦略の提言、標準の役割/重要性/課題、M2MとIoT(モノのインターネット)、ビジネスの促進因子および市場課題、およびサービスプロバイダーの選択に関するガイドラインなどをまとめています。

M2Mエコシステム、バリューチェーン、アプリケーションおよび規格

第1章 イントロダクション

第2章 予測

  • 産業別市場におけるM2M

第3章 産業ステークホルダーにとってのM2Mのメリット

  • 収益性
  • 経営効率
  • 競合上のメリット
  • 迅速な意思決定
  • 導入速度
  • 導入コスト
  • 資産流動性
  • プロセスオートメーション
  • その他のシステムとの統合

第4章 M2M技術拡大の主な障壁

  • 複雑なバリューチェーン
  • 顧客教育の不足
  • 成功例の不足
  • 規格の不足
  • 互換性の無い販売モデル・長期的販売サイクル

第5章 アプリケーション

  • フリート管理
  • スマート家電
  • スマートホーム
  • スマートビル
  • スマートシティ
  • 医療
  • ウェアラブルM2M
  • コネクテッドカー
  • サプライチェーン
  • 小売りPOS
  • 小売りデジタルサイネージ
  • 小売りコネクテッド自販機
  • 小売りキオスク
  • ユーティリティスマートメーター・グリッド
  • 利用に応じた保険
  • フィールドサービス
  • 製造
  • 安全性コンプライアンス
  • スマートドリル
  • セキュリティ・監視
  • 軍事
  • 農業
  • 環境モニタリング
  • 予防的メンテナンス
  • 製品モニタリング

第7章 M2Mの論理的構成要素

  • データ獲得
  • データ転送
  • データ分析

第8章 M2Mエコシステム

  • エンドデバイス/装置
  • 消費者
  • 通信リンク
  • センサー
  • アプリケーション
  • ミドルウェアプラットフォーム
  • 組込みモジュール
  • SIM
  • M2Mエコシステムの全体像

第9章 M2Mバリューチェーン

第10章 ワイヤレスエコシステムにおけるM2Mの役割

  • 装置サプライヤー
  • ソフトウェアパブリッシャー
  • 通信オペレーター
  • コンサルティング企業
  • インテグレーター
  • 流通業者

第11章 M2M技術の促進因子

第12章 モノのインターネット(IoT)

第13章 M2Mにおける衛星の役割

  • センサーのコスト
  • 通信媒体
  • ビッグデータ分析
  • ジオロケーションサービス
  • 手ごろな先進デバイス・チップセット
  • M2Mプラットフォームの利点

第14章 ワイヤレスサービスプロバイダーの選択

  • IIOT
  • IoE
  • GIoT
  • BIoT

第15章 M2M開発プロジェクトへの提言

第16章 M2M標準化

  • SIMカード
  • アクティベーション
  • ビリングサービス
  • ローミング
  • SLA
  • SMS/データブロックあたりのコスト
  • SMSデータリトライスキーム
  • 保存および転送
  • SMSデリバリーレシート
  • GPRSおよび3G付きSMS

第17章 結論

第18章

  • GSMA
  • oneM2M
  • ETSI
  • Zigbee
  • The Global M2M Association (GMA)
  • AllSeen Alliance
  • M2M World Alliance
  • European Standardization Organizations (ESO)
  • Industrial Internet Consortium (IIC)
  • ITU-T
  • 現在・将来のM2M規格

図表

M2Mセキュリティ・プライバシー:課題と機会

エグゼクティブサマリー

第1章 M2Mセキュリティ

  • 悪用される脆弱性と攻撃
  • M2Mのセキュリティ要件
  • M2Mアプリケーションにおいて複雑性を導く要因
  • M2Mアプリケーション向けセキュリティを保証する手段
  • M2M通信の攻撃における2つのポイント
  • GSMとCDMAのM2M通信の違い
  • M2Mデバイスが制御する重要なデバイス
  • アプリケーション設計においてセキュリティは不可欠な部分
  • M2Mセキュリティの高度化したセキュリティメカニズム
  • セキュリティの発展要素、ほか

第2章 M2Mプライバシー

  • プライバシーの懸念
  • ビッグデータのプライバシー・セキュリティ懸念
  • クラウドコンピューティングにおけるプライバシーの問題
  • アプリケーション設計においてプライバシーは不可欠な部分

第3章 セキュリティに対する産業の見解

  • セキュリティに関する業界調査

第4章 ワイヤレスセンサーネットワーク

  • ワイヤレスセンサーネットワークのイントロダクション
  • WSN用OSIレイヤーのセキュリティ脅威
  • ワイヤレスセンサーネットワークのセキュリティ目標
  • ワイヤレスセンサーネットワークの課題
  • センサーネットワークにおける攻撃の種類
  • アクティブ・パッシブ攻撃に対抗するセキュリティメカニズム
  • センサーネットワークの標準化
  • 結論

図表リスト

目次

Machine-to-Machine (M2M) communications and related applications is radically changing many industries utilities, healthcare, local government services, insurance, consumer electronics, automotive, asset management and retail. M2M growth is expected to accelerate, particularly in certain industry verticals, and especially due to the anticipated Internet of Things (IoT) ecosystem. With this rapid growth, the M2M industry is quickly recognizing the need to deal with security and privacy issues pertaining to M2M, but understanding the specific issues and solutions are not broadly understood.

This research includes M2M Ecosystem, Value Chain, Applications and Standards, Smart Home, Building, and City M2M Applications, and M2M Security and Privacy: Challenges and Opportunities. This research evaluates the M2M Ecosystem, Value Chain and Platforms. It also assesses the functional building blocks of M2M with a view towards incremental benefits. The report includes recommendations for go-to market strategies, standards role/importance/issues, M2M and Internet of Things (IoT), business drivers, and market issues. The report also includes guidelines for an enterprise to choose a service provider along with recommendations to manage M2M development projects.

All purchases of Mind Commerce reports includes time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report.

Report Benefits:

  • Smart City Strategies
  • Go-to Market M2M Strategies
  • Essential Elements of Smart City
  • Global Smart City Development
  • Survey Findings focused on M2M Security
  • Framework for Smart City and Role of M2M
  • Understand M2M Security Issues and Challenges
  • Understand M2M Ecosystem, Value Chain and Platforms

Table of Contents

M2M Ecosystem, Value Chain, Applications and Standards

  • 1.0. INTRODUCTION
  • 2.0. PREDICTIONS
  • 2.1. M2M in Industry Verticals
  • 2.1.1. Smart Grid
  • 2.1.2. Smart City
  • 2.1.3. Water Meters
  • 2.1.4. Smart Meters
  • 2.1.5. Healthcare
  • 2.1.6. Big Data
  • 2.1.7. Retail
  • 2.1.8. Connected People
  • 2.1.9. Connected Consumer Devices
  • 2.1.10. Connected Money
  • 2.1.11. Connected Infrastructure
  • 2.1.12. Connected Building
  • 2.1.13. Connected Vehicle
  • 2.1.14. Connected Industrial Process
  • 3.0. M2M BENEFITS FOR INDUSTRY STAKEHOLDERS
  • 3.1. Profitability
  • 3.2. Operational Efficiency
  • 3.3. Competitive advantage
  • 3.4. Quick Decision making
  • 3.5. Speed of Deployment
  • 3.6. Cost of Deployment
  • 3.7. Asset Mobility
  • 3.8. Process Automation
  • 3.9. Integration with other systems
  • 3.10. Mobility
  • 4.0. THE KEY BARRIERS TO SCALING M2M TECHNOLOGIES
  • 4.1. Complex Value Chain
  • 4.2. Lack of Customer Education
  • 4.3. Lack of Success Stories
  • 4.4. Lack of Standards
  • 4.5. Incompatible Sales Models and Long Sales Cycle
  • 5.0. APPLICATIONS
  • 5.1. Fleet Management
  • 5.2. Smart Appliances
  • 5.3. Smart Home
  • 5.4. Smart Buildings
  • 5.5. Smart City
  • 5.6. Healthcare
  • 5.7. Wearable M2M
  • 5.8. Connected Car
  • 5.9. Supply Chain
  • 5.10. Retail Point-of-Sale (POS)
  • 5.11. Retail Digital Signage
  • 5.12. Retail Connected Vending
  • 5.13. Retail Kiosks
  • 5.14. Utilities Smart Meters and Grids
  • 5.15. Usage-based Insurance
  • 5.16. Field Service
  • 5.17. Manufacturing
  • 5.18. Safety Compliance
  • 5.19. Smart Drilling
  • 5.20. Security and Surveillance
  • 5.21. Military
  • 5.22. Agriculture
  • 5.23. Environmental Monitoring
  • 5.24. Predictive Maintenance
  • 5.25. Product Monitoring
  • 7.0. LOGICAL BUILDING-BLOCKS OF M2M
  • 7.1. Data Acquisition
  • 7.2. Data Transmission
  • 7.3. Data Analysis
  • 8.0. THE M2M ECOSYSTEM
  • 8.1. End Device / Equipment
  • 8.2. Consumer
  • 8.3. Communication Link
  • 8.4. Sensor
  • 8.5. Application
  • 8.6. Middleware Platform
  • 8.7. Embedded Module
  • 8.8. SIM
  • 8.9. Complete M2M Ecosystem View
  • 9.0. M2M VALUE CHAIN
  • 10.1. Equipment Supplier
  • 10.2. Software Publisher
  • 10.3. Telecom Operator
  • 10.4. Consulting Firm
  • 10.5. Integrator
  • 10.6. Distributor
  • 10.0. M2M'S ROLE IN THE WIRELESS ECOSYSTEM
  • 10.1. M2M and Wireless Technology
  • 10.2. Vertical and Horizontal Platform
  • 11.0. M2M TECHNOLOGY DRIVERS
  • 13.2. Cost of Sensors
  • 13.3. Communication Mediums
  • 13.2.1. Cellular
  • 13.2.2. Satellite
  • 13.2.3. Wi-Fi
  • 13.2.4. Bluetooth
  • 13.2.5. ZigBee
  • 13.4. Big Data Analytics
  • 13.5. Geolocation Services
  • 13.6. Affordable Advanced Devices and Chip-sets
  • 13.5.1. M2M Devices
  • 13.7. Increased Intelligence at End-points
  • 13.8. The M2M Platform Advantage
  • 12.0. INTERNET OF THINGS (IOT)
  • 14.2. Industrial Internet of Things (IIoT)
  • 14.3. The Internet of Everything (IoE)
  • 14.4. The Government Internet of Things (GIoT)
  • 14.5. The Business Internet of Things (BIoT)
  • 13.0. ROLE OF SATELLITE IN M2M
  • 15.2. Market for Satellite Players in M2M
  • 14.0. CHOOSING A WIRELESS SERVICE PROVIDER
  • 16.2. SIM Cards
  • 16.3. Activation
  • 16.4. Billing Services
  • 16.5. Roaming
  • 16.6. SLAs
  • 16.7. Cost per SMS / Data Block
  • 16.8. SMS Data Retry Scheme
  • 16.9. Store and Forward
  • 16.10. SMS Delivery Receipt
  • 16.11. SMS with GPRS and 3G
  • 15.0. RECOMMENDATIONS FOR M2M DEVELOPMENT PROJECTS
  • 17.2. Project Manager
  • 17.3. M2M Development and Launch Plan
  • 17.4. Project's Business Model
  • 17.5. Budgetary Control
  • 17.6. Open Source M2M Frameworks for Product Development
  • 17.7. Components Selection
  • 17.8. Network Choice
  • 17.9. Secured Connectivity
  • 16.0. M2M STANDARDIZATION
  • 18.2. GSMA
  • 18.3. oneM2M
  • 18.4. ETSI
  • 18.5. Zigbee
  • 18.6. The Global M2M Association (GMA)
  • 18.7. AllSeen Alliance
  • 18.8. M2M World Alliance
  • 18.9. European Standardization Organizations (ESO)
  • 18.10. Industrial Internet Consortium (IIC)
  • 18.11. ITU-T
  • 18.12. Present and Future of standards of M2M
  • 17.0. CONCLUSIONS

Figures

  • Figure 1: Benefits of Using M2M
  • Figure 2: Key Barriers of Scaling M2M Technologies
  • Figure 3: Basic Building Blocks of M2M
  • Figure 4: M2M Ecosystem (Concise View)
  • Figure 5: M2M Ecosystem (Expanded View)
  • Figure 6: M2M Ecosystem (Further Expanded)
  • Figure 7: M2M Ecosystem (Fully Expanded)
  • Figure 8: Complete View of M2M Ecosystem
  • Figure 9: M2M Value Chain
  • Figure 10: M2M Technology Drivers
  • Figure 11: Sensors Expand to a Wide variety of Uses
  • Figure 12: M2M Communication Mediums
  • Figure 13: Difference between Bluetooth and Zigbee protocol
  • Figure 14: GPS enabled Tracking of Assets on Global Scale
  • Figure 15: Wireless Sensor Communications Module
  • Figure 16: Pre-configured Sensor Board for Agriculture
  • Figure 17: Conceptual M2M Platform
  • Figure 18: Groups driving IoT
  • Figure 19: Internet of Everything including Network Effects
  • Figure 20: Service Requirements for Planning M2M
  • Figure 21: Managing M2M Projects for Businesses
  • Figure 22: Advantages of Standards
  • Figure 23: Comparison of M2M Standards

Smart Home, Building, and City M2M Applications

EXECUTIVE SUMMARY

  • 1.0. SMART HOME
  • 2.1. Primary Elements of Smart Home
  • 2.1.1. Infrastructure
  • 2.1.2. Sensors
  • 2.1.3. Actuators
  • 2.1.4. Applications
  • 2.1.5. Hub
  • 2.2. Real-life applications and solutions available for Smart Home
  • 2.3. Smart Home Vision
  • 2.4. Requirement of Smart Home Services
  • 2.4.1. Affordability
  • 2.4.2. Usability
  • 2.4.3. Reliability
  • 2.5. Stages of Smart Home Services
  • 2.5.1. Stage 1 - Connected Standalone Devices
  • 2.5.2. Stage 2 - Connected Service Silos
  • 2.5.3. Stage 3 - Integrated Smart Home
  • 2.6. Smart Home Ecosystem Requirements
  • 2.6.1. Home Environment
  • 2.6.2. Wide Area Connectivity
  • 2.6.3. Back-end Environment
  • 2.6.4. Enabling Service Features
  • 2.6.5. Third Party Service Providers
  • 2.0. SMART HOME SOLUTION FOR SUSTAINABLE HOMES
  • 3.1. Sustainability
  • 3.2. Smart Home parameters to support sustainable home concept
  • 3.2.1. Thermal Comfort
  • 3.2.2. Water
  • 3.2.3. Communications and Entertainment
  • 3.2.4. Safety & Security
  • 3.2.5. Lighting
  • 3.2.6. Heath & Wellbeing
  • 3.2.7. Smart Meter
  • 3.2.8. Protecting the Building fabric
  • 3.0. SMART BUILDING
  • 4.1. Security Solution
  • 4.2. Facilities Control
  • 4.3. Standardization in Smart Home Arena
  • 4.0. CASE STUDY - SMART HOME AND SMART BUILDING
  • 5.1. Case: Smart Home Solution for Art Collector
  • 5.1.1. The Challenge
  • 5.1.2. The Solution
  • 5.1.3. The Result
  • 5.2. Case: Total Home Control Solution
  • 5.2.1. The Challenge
  • 5.2.2. The Solution
  • 5.2.3. The Result
  • 5.3. Case: Sir Richard Branson's Caribbean Smart Home
  • 5.3.1. The Challenge
  • 5.3.2. The Solution
  • 5.3.3. The Result
  • 5.4. Case: Energy Management
  • 5.4.1. The Challenge
  • 5.4.2. The Solution
  • 5.4.3. The Result
  • 5.5. Case : Real-time monitoring of oil levels
  • 5.5.1. The Challenge
  • 5.5.2. The Solution
  • 5.5.3. The Result
  • 5.5.4. Author's Note
  • 5.6. Case: Professional Golfer's Smart Home
  • 5.6.1. The Challenge
  • 5.6.2. The Solution
  • 5.6.3. The Result
  • 5.7. Case : Monitor Structural parameters in Real time
  • 5.7.1. The Challenge
  • 5.7.2. The Solution
  • 5.7.3. The Result
  • 5.7.4. Author's Note
  • 5.0. CONCEPTS OF SMART CITY
  • 5.8. Objective of Smart City
  • 5.9. Essential Elements of Smart City
  • 5.10. Initial Steps for Creating Smart Cities
  • 5.11. Framework for Smart City
  • 5.12. Features of Smart City
  • 5.13. Use of M2M for Smart City
  • 5.14. Development activities for Smart City in India
  • 5.15. Development activities for Smart City in China
  • 5.16. Development activities for Smart City in Spain
  • 5.16.1. Wireless network in Santander
  • 5.17. Development activities for Smart City in Brazil
  • 5.18. Development activities for Smart City across the Globe
  • 5.19. Standards (or lack of it) for Smart City
  • 5.20. Open-Source Platform for developing Applications
  • 6.0. CASE STUDY - SMART CITY
  • 6.1. Case : Solution for Traffic Safety
  • 6.1.1. The Challenge
  • 6.1.2. The Solution
  • 6.1.3. The Result
  • 6.1.4. Author's Note
  • 6.2. Case : Solution for Parking Meters
  • 6.2.1. The Challenge
  • 6.2.2. The Solution
  • 6.2.3. The Result
  • 6.2.4. Author's Note
  • 6.3. Case : Solution for 'smart' public convenience system
  • 6.3.1. The Challenge
  • 6.3.2. The Solution
  • 6.3.3. The Result
  • 6.3.4. Author's Note
  • 6.4. Case : Solution for Waste Disposal
  • 6.4.1. The Challenge
  • 6.4.2. The Solution
  • 6.4.3. The Result
  • 6.4.4. Author's Note
  • 6.5. Case : Experimental Research Facility for Smart City
  • 6.5.1. The Challenge
  • 6.5.2. The Solution
  • 6.5.3. The Result
  • 6.5.4. Author's Note
  • 7.0. CONCLUDING REMARKS

List of Figures

  • Figure 1: Primary Elements of Smart Home
  • Figure 2: Samsung Smart Home Service
  • Figure 3: Revolv
  • Figure 4: Device by Savant Systems
  • Figure 5: Archos
  • Figure 6: HAPIfork
  • Figure 7: Belkin WeMo Smart Slow Cooker
  • Figure 8: LeakSmart Water Valve
  • Figure 9: Sleep Number x12 Bed
  • Figure 10: Whirlpool Smart Dishwasher
  • Figure 11: Netatmo Connected Weather Station
  • Figure 12: Koubachi Wi-Fi Plant Sensor
  • Figure 13: Nest Thermostat
  • Figure 14: Canary's multi-sensor security hub
  • Figure 16: Staples Connect
  • Figure 17: Belkin WeMo Home Automation
  • Figure 18: Smart Home Vision
  • Figure 19: Requirement of Smart Home Services
  • Figure 20: Stages of Smart Home Services
  • Figure 21: Stage 1: Connected Standalone Devices
  • Figure 22: Stage 2: Connected Service Silos
  • Figure 23: Stage 3: Integrated Smart Home
  • Figure 24: Smart Home Ecosystem Requirements
  • Figure 25: Smart Home parameters to support sustainable home concept
  • Figure 26: Intelligent Building
  • Figure 27: Objectives of Smart City
  • Figure 28: Essential elements of Smart City
  • Figure 29: Initial Steps for Creating Smart Cities
  • Figure 30: Important Tasks for Smart City
  • Figure 31: Smart City Framework
  • Figure 32: Features of Smart City

M2M Security and Privacy: Challenges and Opportunities

EXECUTIVE SUMMARY

Part One: Machine-to-Machine Security

  • 1.0. EXPLOITED VULNERABILITIES AND ATTACKS
  • 2.0. SECURITY REQUIREMENTS FOR M2M
  • 2.1. Authentication
  • 2.2. Confidentiality
  • 2.3. Access control
  • 2.4. Integrity
  • 2.5. Privacy
  • 2.6. Availability
  • 2.7. Non-repudiation
  • 3.0. FACTORS LEADING TO COMPLEXITY IN M2M APPLICATIONS
  • 3.1. Proliferation of Nodes in Network
  • 3.2. Limited Computational Power
  • 3.3. Lack of Awareness
  • 3.4. Lack of Pre-set Rules
  • 3.5. Difficult to Tackle Denial of Power Attacks
  • 3.6. Need to Reduce Risk Exposure
  • 3.7. DDoS Attack from Compromised Nodes
  • 3.8. Users Responsible for Enabling Security Protection
  • 3.9. Security is Not highest Priority
  • 4.0. MEASURES TO ENSURE SECURITY FOR M2M APPLICATIONS
  • 4.1. Security Considerations during Design Phase
  • 4.2. Define User-level Security
  • 4.3. Limited Access to Internet
  • 4.4. Use of Open-source Software to Configure Specific Security Settings
  • 4.5. Vendors to Disclose Vulnerabilities
  • 4.6. Analyze Attack Surface to Understand Probable Attack Points
  • 4.7. Ensure Secure Design
  • 4.8. Code Signing to Confirm Integrity
  • 4.9. All Value Chain Layers Must be Secured
  • 4.10. Stakeholders to Work in Sync for Security Measures
  • 4.11. Do not Allow Permanent Access
  • 4.12. Implement Typical Security Measures
  • 5.0. TWO POINTS OF ATTACK ON M2M COMMUNICATIONS
  • 5.1. Physical Attacks on Unattended Devices
  • 5.1.1. Recommendations to Increase Security of Physical Devices
  • 5.2. Network-side Attacks
  • 5.2.1. Recommendations to Increase Security on Network Side
  • 6.0. DIFFERENCE IN M2M COMMUNICATION OVER GSM AND CDMA
  • 7.0. CRITICAL DEVICE CONTROLS BY M2M APPLICATIONS
  • 8.0. SECURITY AN INTEGRAL PART OF APPLICATION DESIGN
  • 9.0. SOPHISTICATED SECURITY MECHANISMS FOR M2M SECURITY
  • 9.1. Early Detection of Compromised Nodes
  • 9.2. Bandwidth Efficient Cooperative Authentication
  • 10.0. EVOLVING ELEMENTS OF SECURITY
  • 11.0. SECURITY IS ONE OF MANY GO-TO-MARKET FACTORS
  • 12.0. SECURING THE COMMUNICATIONS AND NOT JUST DEVICES
  • 13.0. USE OF IPV6: ADDED SECURITY PROBLEMS
  • 14.0. ADEQUATE USE OF CERTIFICATE FOR SECURITY
  • 15.0. SPECIAL SKILL-SET REQUIRED FOR DEPLOYING SECURITY TOOLS
  • 16.0. ORGANIZATIONS AND COLLABORATIONS FOR STANDARDS
  • 16.1. AllSeen Alliance
  • 16.2. IETF
  • 16.3. Mobile App Security Working Group
  • 16.4. Machine-to-Machine Standardization Task Force (MSTF)
  • 16.5. Standards by Verticals

Part Two: Machine-to-Machine Privacy

  • 17.0. PRIVACY CONCERNS
  • 17.1. Data Ownership Unclear
  • 17.2. Control Factor Unclear
  • 17.3. Government Initiatives
  • 17.4. Across Boundaries and Verticals
  • 17.5. Aspects of Privacy and Security to be Re-addressed
  • 18.0. PRIVACY AND SECURITY CONCERNS FOR BIG DATA
  • 18.1. Automated Access through Authorizations
  • 18.2. Non-standard Approach to Granting Access
  • 18.3. Business Continuity Risk
  • 18.4. Best Practices
  • 19.0. PRIVACY ISSUES IN CLOUD COMPUTING
  • 20.0. PRIVACY AN INTEGRAL PART OF APPLICATION DESIGN

Part Three: Industry Views on Security

  • 21.0. INDUSTRY SURVEY ON SECURITY
  • 21.1. Introduction
  • 21.2. Survey Participants
  • 21.3. Geographic Reach
  • 21.4. Role of M2M in Applications
  • 21.5. Highest Concerns of M2M Solution Deployment
  • 21.6. Highest Security Concern while Deploying M2M Solutions
  • 21.7. Security Solution
  • 21.8. Concluding Remarks on Industry Survey

Part Four: Wireless Sensor Networks

  • 22.0. INTRODUCTION TO WIRELESS SENSOR NETWORKS
  • 23.0. SECURITY THREATS ON OSI LAYERS FOR WSN
  • 23.1. Physical Layer of OSI Model
  • 23.1.1. Attacks in Physical Layer
  • 23.1.2. Countermeasures for Attack in Physical layer
  • 23.2. MAC Layer of OSI Model
  • 23.2.1. Attacks in MAC Layer
  • 23.2.2. Countermeasures for Attack in MAC Layer
  • 23.3. Network Layer of OSI Model
  • 23.3.1. Attacks in Network Layer
  • 23.3.2. Countermeasures for Attack in Network Layer
  • 23.4. Application Layer of OSI Model
  • 23.4.1. Attacks in Application Layer
  • 23.4.2. Countermeasures for Attack in Application layer
  • 23.5. Concluding Remarks on Security Threats on OSI layer
  • 24.0. SECURITY GOALS OF WIRELESS SENSOR NETWORKS
  • 24.1. Primary Security Goals
  • 24.1.1. Data Integrity
  • 24.1.2. Data Authentication
  • 24.1.3. Data Confidentiality
  • 24.1.4. Data Availability
  • 24.2. Secondary Security Goals
  • 24.2.1. Self-Organization
  • 24.2.2. Time Synchronization
  • 24.2.3. Data Freshness
  • 24.2.4. Secure Localization
  • 25.0. CHALLENGES FOR WIRELESS SENSOR NETWORKS
  • 25.1. Wireless Medium inherently Less Secure
  • 25.2. Security Tools to Adopt to Ad-Hoc Nature
  • 25.3. Hostile Environment of Sensor Nodes
  • 25.4. Resource Inadequacy of Sensor Devices
  • 25.5. Massive Scale of IoT / M2M
  • 25.6. Unreliable Communication
  • 25.6.1. Unreliable Transfer
  • 25.6.2. Conflicts
  • 25.6.3. Latency
  • 25.7. Unattended Sensor Nodes
  • 25.7.1. Exposure to Physical Attacks
  • 25.7.2. Managed Remotely
  • 25.7.3. No Central Management Point
  • 26.0. TYPES OF ATTACKS IN SENSOR NETWORKS
  • 26.1. Passive Attack
  • 26.1.1. Attacks against Privacy
  • 26.2. Active Attack
  • 26.2.1. Denial of Service (DoS) Attack
  • 26.2.2. Routing Attacks
  • 26.2.3. Physical Attacks on Devices
  • 26.2.4. Node Subversion
  • 26.2.5. Node Malfunction
  • 26.2.6. Node Outage
  • 26.2.7. Interception of the Messages of Sensor Nodes
  • 26.2.8. Modification of Message
  • 26.2.9. False Node
  • 26.2.10 Node Replication Attacks
  • 27.0. SECURITY MECHANISMS TO COMBAT ACTIVE AND PASSIVE ATTACKS
  • 27.1. Low-Level Mechanism
  • 27.1.1. Secrecy and Authentication
  • 27.1.2. Privacy
  • 27.1.3. Secure Routing
  • 27.1.4. Robustness to Communication Denial of Service
  • 27.1.5. Resilience to Node Capture
  • 27.1.6. Key Establishment and Trust Setup
  • 27.2. High-Level Mechanism
  • 27.2.1. Intrusion Detection
  • 27.2.2. Secure Data Aggregation
  • 27.2.3. Secure Group Management
  • 28.0. SENSOR NETWORK STANDARDIZATION
  • 29.0. CONCLUDINS

LIST OF FIGURES

  • Figure 1: Security Requirements for M2M
  • Figure 2: Factors leading to complexity in M2M Applications
  • Figure 3: Measures to Ensure Security for M2M Applications
  • Figure 4: Organizations and Collaborations for Standards for Safety
  • Figure 5: Privacy Concerns
  • Figure 6: Privacy and Security Concerns for Big Data
  • Figure 7: Industry Security Survey Participants
  • Figure 8: Geographic Reach of Companies
  • Figure 9: Topmost Concerns for Deploying M2M Solutions
  • Figure 10: Topmost M2M Security/Privacy Considerations by Enterprise
  • Figure 11: Attacks on OSI Layers
  • Figure 12: Counter Measures for Attacks in OSI Layers
  • Figure 13: Security Goals of Wireless Sensor Network
  • Figure 14: Challenges for Wireless Sensor Networks
  • Figure 15: Types of Attacks in Sensor Networks
  • Figure 16: Techniques employed to deploy Active attacks
  • Figure 17: Security Mechanisms to Combat Active and Passive Attacks
Back to Top