Affiliation:
1. Technische Universität Berlin (TU Berlin), Lebanon
2. Southeast University, Bangladesh
Abstract
The increase of the applications of numerous innovative technologies and associated devices has brought forward various new concepts like Cyber-Physical System (CPS), Internet of Things (IoT), Smart environment, Smart cities, and so on. While the boundary lines between these concepts and technologies are often kind of blur and perhaps, each one's development is helping the development of the other, M2M (Machine to Machine) communication would surely play a great role as a key enabler of all these emerging scenarios. When we see the same smart concept from different angles; for instance, from the participating device, or human being's angle, we get different definitions and concept-specific standards. In this chapter, our objective is to study M2M system and communication along with its security issues and intrusion detection systems. We have also proposed our framework in line with the standardization efforts for tackling security issues of M2M.
Reference142 articles.
1. Abduvaliyev, A. Pathan, A.-S.K., Zhou, J., Roman, R., & Wong, W.-C. (2013). On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks. IEEE Communications Surveys & Tutorials, 15(3), 1223-1237.
2. Current and future trends in sensor networks: a survey
3. Abnormal node detection in wireless sensor network by pair based approach using IDS secure routing methodology. Int J Comput Sci Netw.;K. R.Ahmed;Sec,2008
4. Anggorojati, B., & Prasad, N. R. (2013). An Intrusion Detection game in access control system for the M2M local cloud platform. 2013 19th Asia-Pacific Conference on Communications (APCC).
5. Anggorojati, B., & Prasad, N. R. (2014). Secure capability-based access control in the M2M local cloud platform. 2014-4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE’14).