SlideShare a Scribd company logo
1 of 12
STUART BENNETT
ITC571 CAPSTONE PROJECT
SEMINAR
ITC571 - Emerging Technologies and Innovation
(201630)
Assessment 6 – Project Blog and Seminar
Student: Stuart Bennett (ID: 11560606)
Subject Mentor: Dr. Mohsin Iftikhar
SECURITY ISSUES AND
CHALLENGES WITH WIRELESS
M2M
UTILISING CLOUD
INFRASTRUCTURE
ITC571 - Emerging Technologies and Innovation
(201630)
Assessment 6 – Project Blog and Seminar
Student: Stuart Bennett (ID: 11560606)
Subject Mentor: Dr. Mohsin Iftikhar
A bit of an overview of Wireless M2M
• Wireless Machine-to-Machine (M2M) communication is viewed as
one of the next frontiers in wireless communications and has grown
dramatically over the past decade.
• It is expected that the wireless M2M market to account for nearly
$196 Billion in revenue by the end of 2020
• Some IT industry experts expect that in excess of ten billion devices
will be connected in the coming years.
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
• Intelligent metering and network management for the Utilities sector
• Within the agricultural sector allowing the remote management of irrigation and
stock control.
• e-Health applications such as remote patient monitoring
• Security and surveillance –
• monitoring of public transportation systems (roads, rail, buses)
• security applications (street surveillance and corporate security)
Cloud Computing
Cloud computing is a new computing paradigm that has significantly
changed the global IT landscape.
• Cloud computing is flexible and scalable
• Allows the automatic provisioning and de-provisioning of resources when required
Since Wireless M2M networks will generate vast amount of data and have many
resource-constrained devices, it can be envisaged that cloud computing will play a
key role in Wireless M2M development by offering desirable features such as:
• data storage
• data processing and
• virtualised infrastructure.
CURRENT CHALLENGES
There are still many things to consider as we look to integrate Wireless M2M devices
with Cloud Computing.
Some of the major concerns are: Security Issues
 Security is a major concern in today’s internet. Given the number of connected
devices in the future, we need to look at totally new and innovative solutions to
address security concerns.
 We must focus on security at endpoints - device security, cloud security, and
network security.
 Insufficient authentication and authorisation solutions
 Cloud based security concerns, such as multi-tenanted environments
CURRENT CHALLENGES
There are still many things to consider as we look to integrate Wireless
M2M devices with Cloud Computing.
Some of the major concerns are: Encryption
Encrypting information also tends to be a processor-intensive
task.
A lack of transport encryption between the M2M device and the
Cloud host
There is a need to design a light-weight encryption
algorithm/scheme that can be used with Wireless M2M devices
CURRENT CHALLENGES
There are still many things to consider as we look to integrate Wireless
M2M devices with Cloud Computing.
Some of the major concerns are: The Integration Challenge
 Successful M2M/Cloud implementations will require a focus on how best to
integrate these technologies.
 We will also need to ensure that we have adequate infrastructure that can
move massive amounts of data from heterogeneous sources.
 How to do this all securely is a very important question?
FUTURE RESEARCH –
STANDARDISATION
• One area that need additional research is to develop a global “Standard” for
M2M devices, development and deployment.
• One of the biggest challenges within the current M2M ecosystem is the use
of proprietary systems that often span across a number of layers, from
physical to application.
• We need to ensure that we examine a number of use cases, collected from a
number of M2M domains, to derive a set of requirements and functionalities
for a common standardisation platform.
FUTURE RESEARCH –
SECURITY
• It is vitally important that Wireless M2M developers make privacy and
security a priority for continued M2M market growth. Additional research
needs to be done in this area.
• Adequately securing Wireless M2M devices can be a complex activity.
What is the best way to ensure that these environments are secure?
• Security issues integrating IoT or Wireless M2M devices with Cloud
infrastructure
• We need to take into account that all Wireless M2M devices require the
same security as does the cloud (firewalls, Anti-Virus programs, etc) and
that we can use encryption across all devices.
CONCLUSION
Wireless Machine-to-machine (M2M) technology will become a key enabler of many of the
higher-profile platforms that are revolutionising industry. These include Cloud Services
and the Industrial Internet of Things (IIoT).
Since wireless M2M networks will generate vast amount of data and have many resource-
constrained devices, it can be envisaged that Cloud Computing will play a key role in
Wireless M2M development.
Based on current research, is not completely clear how Wireless M2M and Cloud
technologies will fit together or how the many concerns around security and privacy will
be addressed.
Much more research needs to be done in these area to better understand and address
these concerns.
SECURITY ISSUES AND CHALLENGES WITH WIRELESS
M2M
UTILISING CLOUD INFRASTRUCTURE
MY CAPSTONE PROJECT BLOG SITE
Can be found at - http://thinkspace.csu.edu.au/11560606itc571/

More Related Content

What's hot

CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSGeorge Wainblat
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsVandana Verma
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksYokogawa1
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...Dataconomy Media
 
SmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoTSmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoTShiven Chawla
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
 
Internet of things
Internet of thingsInternet of things
Internet of thingsvarungoyal98
 
Project Topics on Network Security
Project Topics on Network SecurityProject Topics on Network Security
Project Topics on Network SecurityPhdtopiccom
 
Industry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training CourseIndustry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training CourseBryan Len
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographicAtkins
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot deviceMayank Pandey
 
NATEG Days - Machine To Machine Communication
NATEG Days - Machine To Machine CommunicationNATEG Days - Machine To Machine Communication
NATEG Days - Machine To Machine CommunicationRachik Abidi
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceCigdem Sengul
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaCodeOps Technologies LLP
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?IndSightsResearchSG
 

What's hot (20)

CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_Infosecgirls
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
 
SmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoTSmartSecuritySolution_for_IoT
SmartSecuritySolution_for_IoT
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Project Topics on Network Security
Project Topics on Network SecurityProject Topics on Network Security
Project Topics on Network Security
 
Internet of Things (IoT
Internet of Things (IoTInternet of Things (IoT
Internet of Things (IoT
 
Industry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training CourseIndustry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training Course
 
Cyber resilient infrastructure infographic
Cyber resilient infrastructure infographicCyber resilient infrastructure infographic
Cyber resilient infrastructure infographic
 
Security of iot device
Security of iot deviceSecurity of iot device
Security of iot device
 
NATEG Days - Machine To Machine Communication
NATEG Days - Machine To Machine CommunicationNATEG Days - Machine To Machine Communication
NATEG Days - Machine To Machine Communication
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Cloud & Cybersecurity
Cloud & CybersecurityCloud & Cybersecurity
Cloud & Cybersecurity
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Nreca kickoff meeting
Nreca kickoff meetingNreca kickoff meeting
Nreca kickoff meeting
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
 

Viewers also liked

Directori català de l’economia col·laborativa
Directori català de l’economia col·laborativaDirectori català de l’economia col·laborativa
Directori català de l’economia col·laborativaDavid Rozas
 
Online Presence
Online PresenceOnline Presence
Online Presencecccowman
 
Дмитрий Полонский. Профессиональный гонщик, инструктор экстремального вождения
Дмитрий Полонский. Профессиональный гонщик, инструктор экстремального вожденияДмитрий Полонский. Профессиональный гонщик, инструктор экстремального вождения
Дмитрий Полонский. Профессиональный гонщик, инструктор экстремального вожденияDmitriy Polonskiy
 
la unión hace la fuerza
la unión hace la fuerza la unión hace la fuerza
la unión hace la fuerza Diocelinacepeda
 
Portfolio Designer | Projetista
Portfolio Designer | ProjetistaPortfolio Designer | Projetista
Portfolio Designer | ProjetistaDanilo
 
Estrategia De Pagos
Estrategia De PagosEstrategia De Pagos
Estrategia De Pagosguest0f500d
 
State Report Ashley
State Report AshleyState Report Ashley
State Report Ashleyjabernethy
 
Estrategia comunicacional para la adopción de proyectos estratégicos de gobie...
Estrategia comunicacional para la adopción de proyectos estratégicos de gobie...Estrategia comunicacional para la adopción de proyectos estratégicos de gobie...
Estrategia comunicacional para la adopción de proyectos estratégicos de gobie...Ramón Ramón Sánchez
 
Building a Bibliography
Building a BibliographyBuilding a Bibliography
Building a BibliographyEric Aitala
 

Viewers also liked (14)

Directori català de l’economia col·laborativa
Directori català de l’economia col·laborativaDirectori català de l’economia col·laborativa
Directori català de l’economia col·laborativa
 
biz pic
biz  picbiz  pic
biz pic
 
Online Presence
Online PresenceOnline Presence
Online Presence
 
Дмитрий Полонский. Профессиональный гонщик, инструктор экстремального вождения
Дмитрий Полонский. Профессиональный гонщик, инструктор экстремального вожденияДмитрий Полонский. Профессиональный гонщик, инструктор экстремального вождения
Дмитрий Полонский. Профессиональный гонщик, инструктор экстремального вождения
 
la unión hace la fuerza
la unión hace la fuerza la unión hace la fuerza
la unión hace la fuerza
 
Portfolio Designer | Projetista
Portfolio Designer | ProjetistaPortfolio Designer | Projetista
Portfolio Designer | Projetista
 
Estrategia De Pagos
Estrategia De PagosEstrategia De Pagos
Estrategia De Pagos
 
IELTS
IELTSIELTS
IELTS
 
State Report Ashley
State Report AshleyState Report Ashley
State Report Ashley
 
Estrategia comunicacional para la adopción de proyectos estratégicos de gobie...
Estrategia comunicacional para la adopción de proyectos estratégicos de gobie...Estrategia comunicacional para la adopción de proyectos estratégicos de gobie...
Estrategia comunicacional para la adopción de proyectos estratégicos de gobie...
 
Building a Bibliography
Building a BibliographyBuilding a Bibliography
Building a Bibliography
 
Wolves
WolvesWolves
Wolves
 
Yt 39
Yt 39Yt 39
Yt 39
 
Yamada 105
Yamada 105Yamada 105
Yamada 105
 

Similar to Security Issues and challenges with Wireless M2M utilising Cloud infrastructure

VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...IRJET Journal
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case StudyAngie Miller
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlockArmour1
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
 
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...IRJET Journal
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesMartyn Taylor
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443WoMaster
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistancePhD Assistance
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
 
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join ForcesThe Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join ForcesVolker Schiecke
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Ericsson
 
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-22nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2Jorge Rivero Sanchez
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2MLeKhanhAnh
 
M2M Interview april may 2015
M2M Interview april may 2015M2M Interview april may 2015
M2M Interview april may 2015Roberto Siagri
 
Best 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenBest 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenSecurity Gen
 
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern OperationsSecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern OperationsSecurityGen1
 
5G Security Program -Case Studies
5G Security Program -Case Studies 5G Security Program -Case Studies
5G Security Program -Case Studies Security Gen
 

Similar to Security Issues and challenges with Wireless M2M utilising Cloud infrastructure (20)

VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for Telcom
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issues
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
 
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join ForcesThe Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
The Relevance of IoT and 5G for Multicloud - Vodafone and IBM join Forces
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network”
 
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-22nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
2nd Annual M2M and IoT Strategies Summit - production-1-new brochure-2
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2M
 
M2M Interview april may 2015
M2M Interview april may 2015M2M Interview april may 2015
M2M Interview april may 2015
 
Best 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGenBest 5G Security Solutions - SecurityGen
Best 5G Security Solutions - SecurityGen
 
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern OperationsSecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
SecurityGen's OSS/BSS Solutions: Navigating the Complexity of Modern Operations
 
5G Security Program -Case Studies
5G Security Program -Case Studies 5G Security Program -Case Studies
5G Security Program -Case Studies
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

Security Issues and challenges with Wireless M2M utilising Cloud infrastructure

  • 1. STUART BENNETT ITC571 CAPSTONE PROJECT SEMINAR ITC571 - Emerging Technologies and Innovation (201630) Assessment 6 – Project Blog and Seminar Student: Stuart Bennett (ID: 11560606) Subject Mentor: Dr. Mohsin Iftikhar
  • 2. SECURITY ISSUES AND CHALLENGES WITH WIRELESS M2M UTILISING CLOUD INFRASTRUCTURE ITC571 - Emerging Technologies and Innovation (201630) Assessment 6 – Project Blog and Seminar Student: Stuart Bennett (ID: 11560606) Subject Mentor: Dr. Mohsin Iftikhar
  • 3. A bit of an overview of Wireless M2M • Wireless Machine-to-Machine (M2M) communication is viewed as one of the next frontiers in wireless communications and has grown dramatically over the past decade. • It is expected that the wireless M2M market to account for nearly $196 Billion in revenue by the end of 2020 • Some IT industry experts expect that in excess of ten billion devices will be connected in the coming years.
  • 4. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: • Intelligent metering and network management for the Utilities sector • Within the agricultural sector allowing the remote management of irrigation and stock control. • e-Health applications such as remote patient monitoring • Security and surveillance – • monitoring of public transportation systems (roads, rail, buses) • security applications (street surveillance and corporate security)
  • 5. Cloud Computing Cloud computing is a new computing paradigm that has significantly changed the global IT landscape. • Cloud computing is flexible and scalable • Allows the automatic provisioning and de-provisioning of resources when required Since Wireless M2M networks will generate vast amount of data and have many resource-constrained devices, it can be envisaged that cloud computing will play a key role in Wireless M2M development by offering desirable features such as: • data storage • data processing and • virtualised infrastructure.
  • 6. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: Security Issues  Security is a major concern in today’s internet. Given the number of connected devices in the future, we need to look at totally new and innovative solutions to address security concerns.  We must focus on security at endpoints - device security, cloud security, and network security.  Insufficient authentication and authorisation solutions  Cloud based security concerns, such as multi-tenanted environments
  • 7. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: Encryption Encrypting information also tends to be a processor-intensive task. A lack of transport encryption between the M2M device and the Cloud host There is a need to design a light-weight encryption algorithm/scheme that can be used with Wireless M2M devices
  • 8. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: The Integration Challenge  Successful M2M/Cloud implementations will require a focus on how best to integrate these technologies.  We will also need to ensure that we have adequate infrastructure that can move massive amounts of data from heterogeneous sources.  How to do this all securely is a very important question?
  • 9. FUTURE RESEARCH – STANDARDISATION • One area that need additional research is to develop a global “Standard” for M2M devices, development and deployment. • One of the biggest challenges within the current M2M ecosystem is the use of proprietary systems that often span across a number of layers, from physical to application. • We need to ensure that we examine a number of use cases, collected from a number of M2M domains, to derive a set of requirements and functionalities for a common standardisation platform.
  • 10. FUTURE RESEARCH – SECURITY • It is vitally important that Wireless M2M developers make privacy and security a priority for continued M2M market growth. Additional research needs to be done in this area. • Adequately securing Wireless M2M devices can be a complex activity. What is the best way to ensure that these environments are secure? • Security issues integrating IoT or Wireless M2M devices with Cloud infrastructure • We need to take into account that all Wireless M2M devices require the same security as does the cloud (firewalls, Anti-Virus programs, etc) and that we can use encryption across all devices.
  • 11. CONCLUSION Wireless Machine-to-machine (M2M) technology will become a key enabler of many of the higher-profile platforms that are revolutionising industry. These include Cloud Services and the Industrial Internet of Things (IIoT). Since wireless M2M networks will generate vast amount of data and have many resource- constrained devices, it can be envisaged that Cloud Computing will play a key role in Wireless M2M development. Based on current research, is not completely clear how Wireless M2M and Cloud technologies will fit together or how the many concerns around security and privacy will be addressed. Much more research needs to be done in these area to better understand and address these concerns.
  • 12. SECURITY ISSUES AND CHALLENGES WITH WIRELESS M2M UTILISING CLOUD INFRASTRUCTURE MY CAPSTONE PROJECT BLOG SITE Can be found at - http://thinkspace.csu.edu.au/11560606itc571/