CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with Wireless M2M utilising Cloud Computing
1. STUART BENNETT
ITC571 CAPSTONE
PROJECT
SEMINAR
ITC571 - Emerging Technologies and Innovation
(201630)
Assessment 6 – Project Blog and Seminar
Student: Stuart Bennett (ID: 11560606)
Subject Mentor: Dr. Mohsin Iftikhar
2. ITC571 - Emerging Technologies and Innovation
(201630)
Assessment 6 – Project Blog and Seminar
Student: Stuart Bennett (ID: 11560606)
Subject Mentor: Dr. Mohsin Iftikhar
SECURITY ISSUES AND
CHALLENGES WITH WIRELESS
M2M
UTILISING CLOUD
INFRASTRUCTURE
3. A bit of an overview of Wireless M2M
• Wireless Machine-to-Machine (M2M)
communication is viewed as one of the next
frontiers in wireless communications and has
grown dramatically over the past decade.
Source: Telecom Cloud
(2012)
4. A bit of an overview of Wireless M2M
• It is expected that the wireless M2M market to
account for nearly $200 Billion in revenue by the
end of 2022
5. A bit of an overview of Wireless M2M
• Some IT industry experts expect up to 50 billion
devices will be connected in the coming years.
6. Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Intelligent metering and network
management for the Utilities
sector
Source: Netcomm Wireless
7. Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Within the agricultural sector
allowing the remote
management of irrigation and
stock control.
Source: Sensor Measurement
8. Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
e-Health applications such as
remote patient monitoring
Source: oneM2M
9. Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Security and surveillance –
• monitoring of public
transportation systems
(roads, rail, buses)
• security applications (street
surveillance and corporate
security)
Source: iveda.com
11. Cloud Computing
Cloud computing is a new computing paradigm that has
significantly changed the global IT landscape.
• Cloud computing is flexible and scalable
• Allows the automatic provisioning and de-provisioning of
resources when required
Source: Shape Host Source: Simple Servers
12. Cloud Computing
Since Wireless M2M networks will generate vast
amount of data and have many resource-constrained
devices, it can be envisaged that cloud computing
will play a key role in Wireless M2M development by
offering desirable features such as:
• data storage
• data processing and
• virtualised infrastructure.
Source: Network World Source: Miami Technologist Source: PBJ Tech Solutions
13. CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: Security Issues
Security is a major concern in today’s internet.
Given the number of connected devices in the
future, we need to look at totally new and
innovative solutions to address security concerns.
We must focus on security at endpoints - device
security, cloud security, and network security.
Insufficient authentication and authorisation
solutions
Cloud based security concerns, such as multi-
tenanted environments
Source: IOT Business News
14. CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: Encryption
Encrypting information also tends to be a
processor-intensive task.
A lack of transport encryption between the M2M
device and the Cloud host.
There is a need to design a light-weight
encryption algorithm/scheme that can be used
with Wireless M2M devices
Source: TecTrade
15. CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: The Integration Challenge
Successful M2M/Cloud implementations will
require a focus on how best to integrate these
technologies.
We will also need to ensure that we have
adequate infrastructure that can move massive
amounts of data from heterogeneous sources.
How to do this all securely is a very important
question? Source: Mobilize
16. FUTURE RESEARCH –
STANDARDISATION
• One area that need additional research is to develop
a global “Standard” for M2M devices, development
and deployment.
• One of the biggest challenges within the current M2M
ecosystem is the use of proprietary systems that
often span across a number of layers, from physical
to application.
• We need to ensure that we examine a number of use
cases, collected from a number of M2M domains, to
derive a set of requirements and functionalities for a
common standardisation platform.
17. FUTURE RESEARCH –
SECURITY
• It is vitally important that Wireless M2M developers
make privacy and security a priority for continued
M2M market growth. Additional research needs to be
done in this area.
• Adequately securing Wireless M2M devices can be a
complex activity. What is the best way to ensure that
these environments are secure?
• Security issues integrating Wireless M2M devices with
Cloud infrastructure
• We need to take into account that all Wireless M2M
devices require the same security as does the cloud
(firewalls, Anti-Virus programs, etc) and that we can
use encryption across all devices.
Source: GSMA
18. CONCLUSION
Wireless Machine-to-machine (M2M) technology will become a key enabler of
many of the higher-profile platforms that are revolutionising industry. These
include Cloud Services and the Industrial Internet of Things (IIoT).
Since wireless M2M networks will generate vast amount of data and have many
resource-constrained devices, it can be envisaged that Cloud Computing will
play a key role in Wireless M2M development.
Based on current research, is not completely clear how Wireless M2M and Cloud
technologies will fit together or how the many concerns around security and
privacy will be addressed.
Much more research needs to be done in these area to better understand and
address these concerns.
19. SECURITY ISSUES AND CHALLENGES
WITH WIRELESS M2M
UTILISING CLOUD INFRASTRUCTURE
MY CAPSTONE PROJECT BLOG SITE
Can be found at -
http://thinkspace.csu.edu.au/11560606itc571/