SlideShare a Scribd company logo
1 of 19
STUART BENNETT
ITC571 CAPSTONE
PROJECT
SEMINAR
ITC571 - Emerging Technologies and Innovation
(201630)
Assessment 6 – Project Blog and Seminar
Student: Stuart Bennett (ID: 11560606)
Subject Mentor: Dr. Mohsin Iftikhar
ITC571 - Emerging Technologies and Innovation
(201630)
Assessment 6 – Project Blog and Seminar
Student: Stuart Bennett (ID: 11560606)
Subject Mentor: Dr. Mohsin Iftikhar
SECURITY ISSUES AND
CHALLENGES WITH WIRELESS
M2M
UTILISING CLOUD
INFRASTRUCTURE
A bit of an overview of Wireless M2M
• Wireless Machine-to-Machine (M2M)
communication is viewed as one of the next
frontiers in wireless communications and has
grown dramatically over the past decade.
Source: Telecom Cloud
(2012)
A bit of an overview of Wireless M2M
• It is expected that the wireless M2M market to
account for nearly $200 Billion in revenue by the
end of 2022
A bit of an overview of Wireless M2M
• Some IT industry experts expect up to 50 billion
devices will be connected in the coming years.
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Intelligent metering and network
management for the Utilities
sector
Source: Netcomm Wireless
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Within the agricultural sector
allowing the remote
management of irrigation and
stock control.
Source: Sensor Measurement
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
e-Health applications such as
remote patient monitoring
Source: oneM2M
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Security and surveillance –
• monitoring of public
transportation systems
(roads, rail, buses)
• security applications (street
surveillance and corporate
security)
Source: iveda.com
Source: Forbes
Cloud Computing
Cloud computing is a new computing paradigm that has
significantly changed the global IT landscape.
• Cloud computing is flexible and scalable
• Allows the automatic provisioning and de-provisioning of
resources when required
Source: Shape Host Source: Simple Servers
Cloud Computing
Since Wireless M2M networks will generate vast
amount of data and have many resource-constrained
devices, it can be envisaged that cloud computing
will play a key role in Wireless M2M development by
offering desirable features such as:
• data storage
• data processing and
• virtualised infrastructure.
Source: Network World Source: Miami Technologist Source: PBJ Tech Solutions
CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: Security Issues
Security is a major concern in today’s internet.
Given the number of connected devices in the
future, we need to look at totally new and
innovative solutions to address security concerns.
We must focus on security at endpoints - device
security, cloud security, and network security.
Insufficient authentication and authorisation
solutions
Cloud based security concerns, such as multi-
tenanted environments
Source: IOT Business News
CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: Encryption
Encrypting information also tends to be a
processor-intensive task.
A lack of transport encryption between the M2M
device and the Cloud host.
There is a need to design a light-weight
encryption algorithm/scheme that can be used
with Wireless M2M devices
Source: TecTrade
CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: The Integration Challenge
 Successful M2M/Cloud implementations will
require a focus on how best to integrate these
technologies.
 We will also need to ensure that we have
adequate infrastructure that can move massive
amounts of data from heterogeneous sources.
 How to do this all securely is a very important
question? Source: Mobilize
FUTURE RESEARCH –
STANDARDISATION
• One area that need additional research is to develop
a global “Standard” for M2M devices, development
and deployment.
• One of the biggest challenges within the current M2M
ecosystem is the use of proprietary systems that
often span across a number of layers, from physical
to application.
• We need to ensure that we examine a number of use
cases, collected from a number of M2M domains, to
derive a set of requirements and functionalities for a
common standardisation platform.
FUTURE RESEARCH –
SECURITY
• It is vitally important that Wireless M2M developers
make privacy and security a priority for continued
M2M market growth. Additional research needs to be
done in this area.
• Adequately securing Wireless M2M devices can be a
complex activity. What is the best way to ensure that
these environments are secure?
• Security issues integrating Wireless M2M devices with
Cloud infrastructure
• We need to take into account that all Wireless M2M
devices require the same security as does the cloud
(firewalls, Anti-Virus programs, etc) and that we can
use encryption across all devices.
Source: GSMA
CONCLUSION
Wireless Machine-to-machine (M2M) technology will become a key enabler of
many of the higher-profile platforms that are revolutionising industry. These
include Cloud Services and the Industrial Internet of Things (IIoT).
Since wireless M2M networks will generate vast amount of data and have many
resource-constrained devices, it can be envisaged that Cloud Computing will
play a key role in Wireless M2M development.
Based on current research, is not completely clear how Wireless M2M and Cloud
technologies will fit together or how the many concerns around security and
privacy will be addressed.
Much more research needs to be done in these area to better understand and
address these concerns.
SECURITY ISSUES AND CHALLENGES
WITH WIRELESS M2M
UTILISING CLOUD INFRASTRUCTURE
MY CAPSTONE PROJECT BLOG SITE
Can be found at -
http://thinkspace.csu.edu.au/11560606itc571/

More Related Content

What's hot

Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadJatin Akar
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationSherin C Abraham
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesBiren Gandhi
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
Top 7 Platforms for IoT Application Development
Top 7 Platforms for IoT Application DevelopmentTop 7 Platforms for IoT Application Development
Top 7 Platforms for IoT Application DevelopmentB R SOFTECH PVT LTD
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Tyrone Systems
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of ThingsTushar Sharma
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsVandana Verma
 
Innovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachInnovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachAtanu Roy Chowdhury
 
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...Biren Gandhi
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)Iffat Anjum
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...IRJET Journal
 

What's hot (20)

Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M Communication
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and Architectures
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Blueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of ThingsBlueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of Things
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Top 7 Platforms for IoT Application Development
Top 7 Platforms for IoT Application DevelopmentTop 7 Platforms for IoT Application Development
Top 7 Platforms for IoT Application Development
 
76 s201918
76 s20191876 s201918
76 s201918
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of Things
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_Infosecgirls
 
Cps sec sg sg2017 conf_iran
Cps sec sg  sg2017 conf_iranCps sec sg  sg2017 conf_iran
Cps sec sg sg2017 conf_iran
 
Innovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachInnovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit Approach
 
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Fog
FogFog
Fog
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 

Viewers also liked

Smau Firenze 2016 - Future Food Institute
Smau Firenze 2016 - Future Food InstituteSmau Firenze 2016 - Future Food Institute
Smau Firenze 2016 - Future Food InstituteSMAU
 
Mg300 final presentation
Mg300   final presentationMg300   final presentation
Mg300 final presentationBrian McCann
 
Personal trainer
Personal trainerPersonal trainer
Personal trainerpersonyy27
 
The Food Chain Story
The Food Chain StoryThe Food Chain Story
The Food Chain Storyjabernethy
 
Mi aplicacion web
Mi aplicacion webMi aplicacion web
Mi aplicacion webjavier1811
 
Survey Research (SOC2029). Seminar 6: questionnaire design (II)
Survey Research (SOC2029). Seminar 6: questionnaire design (II) Survey Research (SOC2029). Seminar 6: questionnaire design (II)
Survey Research (SOC2029). Seminar 6: questionnaire design (II) David Rozas
 
Personal statement sample for masters
Personal statement sample for mastersPersonal statement sample for masters
Personal statement sample for mastersWriters Per Hour
 
Survey Research (SOC2029). Seminar 5: questionnaire design (I)
Survey Research (SOC2029). Seminar 5: questionnaire design (I)Survey Research (SOC2029). Seminar 5: questionnaire design (I)
Survey Research (SOC2029). Seminar 5: questionnaire design (I)David Rozas
 
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahat
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahatKhotbah rohani YESUS membebaskan orang yang kerasukan roh jahat
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahatDavid Syahputra
 
Effective Business Communication
Effective Business CommunicationEffective Business Communication
Effective Business CommunicationKeely Killpack, PhD
 

Viewers also liked (19)

Smau Firenze 2016 - Future Food Institute
Smau Firenze 2016 - Future Food InstituteSmau Firenze 2016 - Future Food Institute
Smau Firenze 2016 - Future Food Institute
 
Conpu
ConpuConpu
Conpu
 
Mg300 final presentation
Mg300   final presentationMg300   final presentation
Mg300 final presentation
 
Personal trainer
Personal trainerPersonal trainer
Personal trainer
 
Для спонсоров
Для спонсоровДля спонсоров
Для спонсоров
 
BD202 AUSA MECHANICAL SWEEPER
BD202 AUSA MECHANICAL SWEEPERBD202 AUSA MECHANICAL SWEEPER
BD202 AUSA MECHANICAL SWEEPER
 
8
88
8
 
Why 4Segments
Why 4SegmentsWhy 4Segments
Why 4Segments
 
The Food Chain Story
The Food Chain StoryThe Food Chain Story
The Food Chain Story
 
Mi aplicacion web
Mi aplicacion webMi aplicacion web
Mi aplicacion web
 
capable
capablecapable
capable
 
Survey Research (SOC2029). Seminar 6: questionnaire design (II)
Survey Research (SOC2029). Seminar 6: questionnaire design (II) Survey Research (SOC2029). Seminar 6: questionnaire design (II)
Survey Research (SOC2029). Seminar 6: questionnaire design (II)
 
Roh kudus
Roh kudusRoh kudus
Roh kudus
 
Personal statement sample for masters
Personal statement sample for mastersPersonal statement sample for masters
Personal statement sample for masters
 
Survey Research (SOC2029). Seminar 5: questionnaire design (I)
Survey Research (SOC2029). Seminar 5: questionnaire design (I)Survey Research (SOC2029). Seminar 5: questionnaire design (I)
Survey Research (SOC2029). Seminar 5: questionnaire design (I)
 
116423998 power-point-tentang-ibadah-puasa
116423998 power-point-tentang-ibadah-puasa116423998 power-point-tentang-ibadah-puasa
116423998 power-point-tentang-ibadah-puasa
 
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahat
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahatKhotbah rohani YESUS membebaskan orang yang kerasukan roh jahat
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahat
 
Effective Business Communication
Effective Business CommunicationEffective Business Communication
Effective Business Communication
 
Nrg 33
Nrg 33Nrg 33
Nrg 33
 

Similar to CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with Wireless M2M utilising Cloud Computing

A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
 
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...IRJET Journal
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case StudyAngie Miller
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesMartyn Taylor
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlockArmour1
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud ComputingBhaktiKarale
 
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...IRJET Journal
 
Software Defined Networks Explained
Software Defined Networks ExplainedSoftware Defined Networks Explained
Software Defined Networks ExplainedCM Research
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...IJECEIAES
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud DrainEswar Publications
 
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdfA Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdfKarla Long
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2MLeKhanhAnh
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
 
etfa2014-CR.pdf
etfa2014-CR.pdfetfa2014-CR.pdf
etfa2014-CR.pdfJohn Paul
 

Similar to CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with Wireless M2M utilising Cloud Computing (20)

A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issues
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for Telcom
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
 
Software Defined Networks Explained
Software Defined Networks ExplainedSoftware Defined Networks Explained
Software Defined Networks Explained
 
The M2M platform for a connected world
The M2M platform for a connected worldThe M2M platform for a connected world
The M2M platform for a connected world
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdfA Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
 
Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2M
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
etfa2014-CR.pdf
etfa2014-CR.pdfetfa2014-CR.pdf
etfa2014-CR.pdf
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 

CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with Wireless M2M utilising Cloud Computing

  • 1. STUART BENNETT ITC571 CAPSTONE PROJECT SEMINAR ITC571 - Emerging Technologies and Innovation (201630) Assessment 6 – Project Blog and Seminar Student: Stuart Bennett (ID: 11560606) Subject Mentor: Dr. Mohsin Iftikhar
  • 2. ITC571 - Emerging Technologies and Innovation (201630) Assessment 6 – Project Blog and Seminar Student: Stuart Bennett (ID: 11560606) Subject Mentor: Dr. Mohsin Iftikhar SECURITY ISSUES AND CHALLENGES WITH WIRELESS M2M UTILISING CLOUD INFRASTRUCTURE
  • 3. A bit of an overview of Wireless M2M • Wireless Machine-to-Machine (M2M) communication is viewed as one of the next frontiers in wireless communications and has grown dramatically over the past decade. Source: Telecom Cloud (2012)
  • 4. A bit of an overview of Wireless M2M • It is expected that the wireless M2M market to account for nearly $200 Billion in revenue by the end of 2022
  • 5. A bit of an overview of Wireless M2M • Some IT industry experts expect up to 50 billion devices will be connected in the coming years.
  • 6. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: Intelligent metering and network management for the Utilities sector Source: Netcomm Wireless
  • 7. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: Within the agricultural sector allowing the remote management of irrigation and stock control. Source: Sensor Measurement
  • 8. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: e-Health applications such as remote patient monitoring Source: oneM2M
  • 9. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: Security and surveillance – • monitoring of public transportation systems (roads, rail, buses) • security applications (street surveillance and corporate security) Source: iveda.com
  • 11. Cloud Computing Cloud computing is a new computing paradigm that has significantly changed the global IT landscape. • Cloud computing is flexible and scalable • Allows the automatic provisioning and de-provisioning of resources when required Source: Shape Host Source: Simple Servers
  • 12. Cloud Computing Since Wireless M2M networks will generate vast amount of data and have many resource-constrained devices, it can be envisaged that cloud computing will play a key role in Wireless M2M development by offering desirable features such as: • data storage • data processing and • virtualised infrastructure. Source: Network World Source: Miami Technologist Source: PBJ Tech Solutions
  • 13. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: Security Issues Security is a major concern in today’s internet. Given the number of connected devices in the future, we need to look at totally new and innovative solutions to address security concerns. We must focus on security at endpoints - device security, cloud security, and network security. Insufficient authentication and authorisation solutions Cloud based security concerns, such as multi- tenanted environments Source: IOT Business News
  • 14. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: Encryption Encrypting information also tends to be a processor-intensive task. A lack of transport encryption between the M2M device and the Cloud host. There is a need to design a light-weight encryption algorithm/scheme that can be used with Wireless M2M devices Source: TecTrade
  • 15. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: The Integration Challenge  Successful M2M/Cloud implementations will require a focus on how best to integrate these technologies.  We will also need to ensure that we have adequate infrastructure that can move massive amounts of data from heterogeneous sources.  How to do this all securely is a very important question? Source: Mobilize
  • 16. FUTURE RESEARCH – STANDARDISATION • One area that need additional research is to develop a global “Standard” for M2M devices, development and deployment. • One of the biggest challenges within the current M2M ecosystem is the use of proprietary systems that often span across a number of layers, from physical to application. • We need to ensure that we examine a number of use cases, collected from a number of M2M domains, to derive a set of requirements and functionalities for a common standardisation platform.
  • 17. FUTURE RESEARCH – SECURITY • It is vitally important that Wireless M2M developers make privacy and security a priority for continued M2M market growth. Additional research needs to be done in this area. • Adequately securing Wireless M2M devices can be a complex activity. What is the best way to ensure that these environments are secure? • Security issues integrating Wireless M2M devices with Cloud infrastructure • We need to take into account that all Wireless M2M devices require the same security as does the cloud (firewalls, Anti-Virus programs, etc) and that we can use encryption across all devices. Source: GSMA
  • 18. CONCLUSION Wireless Machine-to-machine (M2M) technology will become a key enabler of many of the higher-profile platforms that are revolutionising industry. These include Cloud Services and the Industrial Internet of Things (IIoT). Since wireless M2M networks will generate vast amount of data and have many resource-constrained devices, it can be envisaged that Cloud Computing will play a key role in Wireless M2M development. Based on current research, is not completely clear how Wireless M2M and Cloud technologies will fit together or how the many concerns around security and privacy will be addressed. Much more research needs to be done in these area to better understand and address these concerns.
  • 19. SECURITY ISSUES AND CHALLENGES WITH WIRELESS M2M UTILISING CLOUD INFRASTRUCTURE MY CAPSTONE PROJECT BLOG SITE Can be found at - http://thinkspace.csu.edu.au/11560606itc571/