How to Remove Document Management Hurdles with X-Docs?
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructure
1. STUART BENNETT
ITC571 CAPSTONE PROJECT
SEMINAR
ITC571 - Emerging Technologies and Innovation
(201630)
Assessment 6 – Project Blog and Seminar
Student: Stuart Bennett (ID: 11560606)
Subject Mentor: Dr. Mohsin Iftikhar
2. SECURITY ISSUES AND
CHALLENGES WITH WIRELESS
M2M
UTILISING CLOUD
INFRASTRUCTURE
ITC571 - Emerging Technologies and Innovation
(201630)
Assessment 6 – Project Blog and Seminar
Student: Stuart Bennett (ID: 11560606)
Subject Mentor: Dr. Mohsin Iftikhar
3. A bit of an overview of Wireless M2M
• Wireless Machine-to-Machine (M2M) communication is viewed as
one of the next frontiers in wireless communications and has grown
dramatically over the past decade.
• It is expected that the wireless M2M market to account for nearly
$196 Billion in revenue by the end of 2020
• Some IT industry experts expect that in excess of ten billion devices
will be connected in the coming years.
4. Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
• Intelligent metering and network management for the Utilities sector
• Within the agricultural sector allowing the remote management of irrigation and
stock control.
• e-Health applications such as remote patient monitoring
• Security and surveillance –
• monitoring of public transportation systems (roads, rail, buses)
• security applications (street surveillance and corporate security)
5. Cloud Computing
Cloud computing is a new computing paradigm that has significantly
changed the global IT landscape.
• Cloud computing is flexible and scalable
• Allows the automatic provisioning and de-provisioning of resources when required
Since Wireless M2M networks will generate vast amount of data and have many
resource-constrained devices, it can be envisaged that cloud computing will play a
key role in Wireless M2M development by offering desirable features such as:
• data storage
• data processing and
• virtualised infrastructure.
6. CURRENT CHALLENGES
There are still many things to consider as we look to integrate Wireless M2M devices
with Cloud Computing.
Some of the major concerns are: Security Issues
Security is a major concern in today’s internet. Given the number of connected
devices in the future, we need to look at totally new and innovative solutions to
address security concerns.
We must focus on security at endpoints - device security, cloud security, and
network security.
Insufficient authentication and authorisation solutions
Cloud based security concerns, such as multi-tenanted environments
7. CURRENT CHALLENGES
There are still many things to consider as we look to integrate Wireless
M2M devices with Cloud Computing.
Some of the major concerns are: Encryption
Encrypting information also tends to be a processor-intensive
task.
A lack of transport encryption between the M2M device and the
Cloud host
There is a need to design a light-weight encryption
algorithm/scheme that can be used with Wireless M2M devices
8. CURRENT CHALLENGES
There are still many things to consider as we look to integrate Wireless
M2M devices with Cloud Computing.
Some of the major concerns are: The Integration Challenge
Successful M2M/Cloud implementations will require a focus on how best to
integrate these technologies.
We will also need to ensure that we have adequate infrastructure that can
move massive amounts of data from heterogeneous sources.
How to do this all securely is a very important question?
9. FUTURE RESEARCH –
STANDARDISATION
• One area that need additional research is to develop a global “Standard” for
M2M devices, development and deployment.
• One of the biggest challenges within the current M2M ecosystem is the use
of proprietary systems that often span across a number of layers, from
physical to application.
• We need to ensure that we examine a number of use cases, collected from a
number of M2M domains, to derive a set of requirements and functionalities
for a common standardisation platform.
10. FUTURE RESEARCH –
SECURITY
• It is vitally important that Wireless M2M developers make privacy and
security a priority for continued M2M market growth. Additional research
needs to be done in this area.
• Adequately securing Wireless M2M devices can be a complex activity.
What is the best way to ensure that these environments are secure?
• Security issues integrating IoT or Wireless M2M devices with Cloud
infrastructure
• We need to take into account that all Wireless M2M devices require the
same security as does the cloud (firewalls, Anti-Virus programs, etc) and
that we can use encryption across all devices.
11. CONCLUSION
Wireless Machine-to-machine (M2M) technology will become a key enabler of many of the
higher-profile platforms that are revolutionising industry. These include Cloud Services
and the Industrial Internet of Things (IIoT).
Since wireless M2M networks will generate vast amount of data and have many resource-
constrained devices, it can be envisaged that Cloud Computing will play a key role in
Wireless M2M development.
Based on current research, is not completely clear how Wireless M2M and Cloud
technologies will fit together or how the many concerns around security and privacy will
be addressed.
Much more research needs to be done in these area to better understand and address
these concerns.
12. SECURITY ISSUES AND CHALLENGES WITH WIRELESS
M2M
UTILISING CLOUD INFRASTRUCTURE
MY CAPSTONE PROJECT BLOG SITE
Can be found at - http://thinkspace.csu.edu.au/11560606itc571/