SlideShare a Scribd company logo
STUART BENNETT
ITC571 CAPSTONE
PROJECT
SEMINAR
ITC571 - Emerging Technologies and Innovation
(201630)
Assessment 6 – Project Blog and Seminar
Student: Stuart Bennett (ID: 11560606)
Subject Mentor: Dr. Mohsin Iftikhar
ITC571 - Emerging Technologies and Innovation
(201630)
Assessment 6 – Project Blog and Seminar
Student: Stuart Bennett (ID: 11560606)
Subject Mentor: Dr. Mohsin Iftikhar
SECURITY ISSUES AND
CHALLENGES WITH WIRELESS
M2M
UTILISING CLOUD
INFRASTRUCTURE
A bit of an overview of Wireless M2M
• Wireless Machine-to-Machine (M2M)
communication is viewed as one of the next
frontiers in wireless communications and has
grown dramatically over the past decade.
Source: Telecom Cloud
(2012)
A bit of an overview of Wireless M2M
• It is expected that the wireless M2M market to
account for nearly $200 Billion in revenue by the
end of 2022
A bit of an overview of Wireless M2M
• Some IT industry experts expect up to 50 billion
devices will be connected in the coming years.
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Intelligent metering and network
management for the Utilities
sector
Source: Netcomm Wireless
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Within the agricultural sector
allowing the remote
management of irrigation and
stock control.
Source: Sensor Measurement
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
e-Health applications such as
remote patient monitoring
Source: oneM2M
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Security and surveillance –
• monitoring of public
transportation systems
(roads, rail, buses)
• security applications (street
surveillance and corporate
security)
Source: iveda.com
Source: Forbes
Cloud Computing
Cloud computing is a new computing paradigm that has
significantly changed the global IT landscape.
• Cloud computing is flexible and scalable
• Allows the automatic provisioning and de-provisioning of
resources when required
Source: Shape Host Source: Simple Servers
Cloud Computing
Since Wireless M2M networks will generate vast
amount of data and have many resource-constrained
devices, it can be envisaged that cloud computing
will play a key role in Wireless M2M development by
offering desirable features such as:
• data storage
• data processing and
• virtualised infrastructure.
Source: Network World Source: Miami Technologist Source: PBJ Tech Solutions
CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: Security Issues
Security is a major concern in today’s internet.
Given the number of connected devices in the
future, we need to look at totally new and
innovative solutions to address security concerns.
We must focus on security at endpoints - device
security, cloud security, and network security.
Insufficient authentication and authorisation
solutions
Cloud based security concerns, such as multi-
tenanted environments
Source: IOT Business News
CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: Encryption
Encrypting information also tends to be a
processor-intensive task.
A lack of transport encryption between the M2M
device and the Cloud host.
There is a need to design a light-weight
encryption algorithm/scheme that can be used
with Wireless M2M devices
Source: TecTrade
CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: The Integration Challenge
 Successful M2M/Cloud implementations will
require a focus on how best to integrate these
technologies.
 We will also need to ensure that we have
adequate infrastructure that can move massive
amounts of data from heterogeneous sources.
 How to do this all securely is a very important
question? Source: Mobilize
FUTURE RESEARCH –
STANDARDISATION
• One area that need additional research is to develop
a global “Standard” for M2M devices, development
and deployment.
• One of the biggest challenges within the current M2M
ecosystem is the use of proprietary systems that
often span across a number of layers, from physical
to application.
• We need to ensure that we examine a number of use
cases, collected from a number of M2M domains, to
derive a set of requirements and functionalities for a
common standardisation platform.
FUTURE RESEARCH –
SECURITY
• It is vitally important that Wireless M2M developers
make privacy and security a priority for continued
M2M market growth. Additional research needs to be
done in this area.
• Adequately securing Wireless M2M devices can be a
complex activity. What is the best way to ensure that
these environments are secure?
• Security issues integrating Wireless M2M devices with
Cloud infrastructure
• We need to take into account that all Wireless M2M
devices require the same security as does the cloud
(firewalls, Anti-Virus programs, etc) and that we can
use encryption across all devices.
Source: GSMA
CONCLUSION
Wireless Machine-to-machine (M2M) technology will become a key enabler of
many of the higher-profile platforms that are revolutionising industry. These
include Cloud Services and the Industrial Internet of Things (IIoT).
Since wireless M2M networks will generate vast amount of data and have many
resource-constrained devices, it can be envisaged that Cloud Computing will
play a key role in Wireless M2M development.
Based on current research, is not completely clear how Wireless M2M and Cloud
technologies will fit together or how the many concerns around security and
privacy will be addressed.
Much more research needs to be done in these area to better understand and
address these concerns.
SECURITY ISSUES AND CHALLENGES
WITH WIRELESS M2M
UTILISING CLOUD INFRASTRUCTURE
MY CAPSTONE PROJECT BLOG SITE
Can be found at -
http://thinkspace.csu.edu.au/11560606itc571/

More Related Content

What's hot

Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
Jatin Akar
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
Saisharan Amaravadhi
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M Communication
Sherin C Abraham
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and Architectures
Biren Gandhi
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
Blueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of ThingsBlueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of Things
Real-Time Innovations (RTI)
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
omkar parab
 
Seminar report
Seminar reportSeminar report
Seminar report
archana lisbon
 
Top 7 Platforms for IoT Application Development
Top 7 Platforms for IoT Application DevelopmentTop 7 Platforms for IoT Application Development
Top 7 Platforms for IoT Application Development
B R SOFTECH PVT LTD
 
76 s201918
76 s20191876 s201918
76 s201918
IJRAT
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Tyrone Systems
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of Things
Tushar Sharma
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_Infosecgirls
Vandana Verma
 
Cps sec sg sg2017 conf_iran
Cps sec sg  sg2017 conf_iranCps sec sg  sg2017 conf_iran
Cps sec sg sg2017 conf_iran
Ahmadreza Ghaznavi
 
Innovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachInnovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit Approach
Atanu Roy Chowdhury
 
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Biren Gandhi
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
Ahmed Banafa
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
Iffat Anjum
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
IRJET Journal
 

What's hot (20)

Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M Communication
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and Architectures
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Blueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of ThingsBlueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of Things
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Top 7 Platforms for IoT Application Development
Top 7 Platforms for IoT Application DevelopmentTop 7 Platforms for IoT Application Development
Top 7 Platforms for IoT Application Development
 
76 s201918
76 s20191876 s201918
76 s201918
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of Things
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_Infosecgirls
 
Cps sec sg sg2017 conf_iran
Cps sec sg  sg2017 conf_iranCps sec sg  sg2017 conf_iran
Cps sec sg sg2017 conf_iran
 
Innovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachInnovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit Approach
 
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Fog
FogFog
Fog
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 

Viewers also liked

Smau Firenze 2016 - Future Food Institute
Smau Firenze 2016 - Future Food InstituteSmau Firenze 2016 - Future Food Institute
Smau Firenze 2016 - Future Food Institute
SMAU
 
Mg300 final presentation
Mg300   final presentationMg300   final presentation
Mg300 final presentation
Brian McCann
 
Personal trainer
Personal trainerPersonal trainer
Personal trainer
personyy27
 
Для спонсоров
Для спонсоровДля спонсоров
Для спонсоров
Alexander Olehnovich
 
BD202 AUSA MECHANICAL SWEEPER
BD202 AUSA MECHANICAL SWEEPERBD202 AUSA MECHANICAL SWEEPER
BD202 AUSA MECHANICAL SWEEPER
AUSA Center S.L.U.
 
Why 4Segments
Why 4SegmentsWhy 4Segments
Why 4Segments
4Thought Marketing
 
The Food Chain Story
The Food Chain StoryThe Food Chain Story
The Food Chain Story
jabernethy
 
Mi aplicacion web
Mi aplicacion webMi aplicacion web
Mi aplicacion webjavier1811
 
Survey Research (SOC2029). Seminar 6: questionnaire design (II)
Survey Research (SOC2029). Seminar 6: questionnaire design (II) Survey Research (SOC2029). Seminar 6: questionnaire design (II)
Survey Research (SOC2029). Seminar 6: questionnaire design (II)
David Rozas
 
Personal statement sample for masters
Personal statement sample for mastersPersonal statement sample for masters
Personal statement sample for masters
Writers Per Hour
 
Survey Research (SOC2029). Seminar 5: questionnaire design (I)
Survey Research (SOC2029). Seminar 5: questionnaire design (I)Survey Research (SOC2029). Seminar 5: questionnaire design (I)
Survey Research (SOC2029). Seminar 5: questionnaire design (I)
David Rozas
 
116423998 power-point-tentang-ibadah-puasa
116423998 power-point-tentang-ibadah-puasa116423998 power-point-tentang-ibadah-puasa
116423998 power-point-tentang-ibadah-puasa
Kementerian Pelajaran Malaysia
 
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahat
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahatKhotbah rohani YESUS membebaskan orang yang kerasukan roh jahat
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahat
David Syahputra
 
Effective Business Communication
Effective Business CommunicationEffective Business Communication
Effective Business Communication
Keely Killpack, PhD
 
Nrg 33
Nrg 33Nrg 33

Viewers also liked (19)

Smau Firenze 2016 - Future Food Institute
Smau Firenze 2016 - Future Food InstituteSmau Firenze 2016 - Future Food Institute
Smau Firenze 2016 - Future Food Institute
 
Conpu
ConpuConpu
Conpu
 
Mg300 final presentation
Mg300   final presentationMg300   final presentation
Mg300 final presentation
 
Personal trainer
Personal trainerPersonal trainer
Personal trainer
 
Для спонсоров
Для спонсоровДля спонсоров
Для спонсоров
 
BD202 AUSA MECHANICAL SWEEPER
BD202 AUSA MECHANICAL SWEEPERBD202 AUSA MECHANICAL SWEEPER
BD202 AUSA MECHANICAL SWEEPER
 
8
88
8
 
Why 4Segments
Why 4SegmentsWhy 4Segments
Why 4Segments
 
The Food Chain Story
The Food Chain StoryThe Food Chain Story
The Food Chain Story
 
Mi aplicacion web
Mi aplicacion webMi aplicacion web
Mi aplicacion web
 
capable
capablecapable
capable
 
Survey Research (SOC2029). Seminar 6: questionnaire design (II)
Survey Research (SOC2029). Seminar 6: questionnaire design (II) Survey Research (SOC2029). Seminar 6: questionnaire design (II)
Survey Research (SOC2029). Seminar 6: questionnaire design (II)
 
Roh kudus
Roh kudusRoh kudus
Roh kudus
 
Personal statement sample for masters
Personal statement sample for mastersPersonal statement sample for masters
Personal statement sample for masters
 
Survey Research (SOC2029). Seminar 5: questionnaire design (I)
Survey Research (SOC2029). Seminar 5: questionnaire design (I)Survey Research (SOC2029). Seminar 5: questionnaire design (I)
Survey Research (SOC2029). Seminar 5: questionnaire design (I)
 
116423998 power-point-tentang-ibadah-puasa
116423998 power-point-tentang-ibadah-puasa116423998 power-point-tentang-ibadah-puasa
116423998 power-point-tentang-ibadah-puasa
 
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahat
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahatKhotbah rohani YESUS membebaskan orang yang kerasukan roh jahat
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahat
 
Effective Business Communication
Effective Business CommunicationEffective Business Communication
Effective Business Communication
 
Nrg 33
Nrg 33Nrg 33
Nrg 33
 

Similar to CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with Wireless M2M utilising Cloud Computing

A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
 
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
IRJET Journal
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Angie Miller
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
Karel Van Isacker
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issues
Martyn Taylor
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for Telcom
BlockArmour1
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
IJERA Editor
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
IJERA Editor
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
BhaktiKarale
 
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
IRJET Journal
 
Software Defined Networks Explained
Software Defined Networks ExplainedSoftware Defined Networks Explained
Software Defined Networks Explained
CM Research
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
Mubashir Ali
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
IJECEIAES
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
Eswar Publications
 
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdfA Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
Karla Long
 
Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
Market Engel SAS
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2M
LeKhanhAnh
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
PhD Assistance
 
etfa2014-CR.pdf
etfa2014-CR.pdfetfa2014-CR.pdf
etfa2014-CR.pdf
John Paul
 

Similar to CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with Wireless M2M utilising Cloud Computing (20)

A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issues
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for Telcom
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
 
Software Defined Networks Explained
Software Defined Networks ExplainedSoftware Defined Networks Explained
Software Defined Networks Explained
 
The M2M platform for a connected world
The M2M platform for a connected worldThe M2M platform for a connected world
The M2M platform for a connected world
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdfA Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
 
Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2M
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
etfa2014-CR.pdf
etfa2014-CR.pdfetfa2014-CR.pdf
etfa2014-CR.pdf
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with Wireless M2M utilising Cloud Computing

  • 1. STUART BENNETT ITC571 CAPSTONE PROJECT SEMINAR ITC571 - Emerging Technologies and Innovation (201630) Assessment 6 – Project Blog and Seminar Student: Stuart Bennett (ID: 11560606) Subject Mentor: Dr. Mohsin Iftikhar
  • 2. ITC571 - Emerging Technologies and Innovation (201630) Assessment 6 – Project Blog and Seminar Student: Stuart Bennett (ID: 11560606) Subject Mentor: Dr. Mohsin Iftikhar SECURITY ISSUES AND CHALLENGES WITH WIRELESS M2M UTILISING CLOUD INFRASTRUCTURE
  • 3. A bit of an overview of Wireless M2M • Wireless Machine-to-Machine (M2M) communication is viewed as one of the next frontiers in wireless communications and has grown dramatically over the past decade. Source: Telecom Cloud (2012)
  • 4. A bit of an overview of Wireless M2M • It is expected that the wireless M2M market to account for nearly $200 Billion in revenue by the end of 2022
  • 5. A bit of an overview of Wireless M2M • Some IT industry experts expect up to 50 billion devices will be connected in the coming years.
  • 6. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: Intelligent metering and network management for the Utilities sector Source: Netcomm Wireless
  • 7. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: Within the agricultural sector allowing the remote management of irrigation and stock control. Source: Sensor Measurement
  • 8. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: e-Health applications such as remote patient monitoring Source: oneM2M
  • 9. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: Security and surveillance – • monitoring of public transportation systems (roads, rail, buses) • security applications (street surveillance and corporate security) Source: iveda.com
  • 11. Cloud Computing Cloud computing is a new computing paradigm that has significantly changed the global IT landscape. • Cloud computing is flexible and scalable • Allows the automatic provisioning and de-provisioning of resources when required Source: Shape Host Source: Simple Servers
  • 12. Cloud Computing Since Wireless M2M networks will generate vast amount of data and have many resource-constrained devices, it can be envisaged that cloud computing will play a key role in Wireless M2M development by offering desirable features such as: • data storage • data processing and • virtualised infrastructure. Source: Network World Source: Miami Technologist Source: PBJ Tech Solutions
  • 13. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: Security Issues Security is a major concern in today’s internet. Given the number of connected devices in the future, we need to look at totally new and innovative solutions to address security concerns. We must focus on security at endpoints - device security, cloud security, and network security. Insufficient authentication and authorisation solutions Cloud based security concerns, such as multi- tenanted environments Source: IOT Business News
  • 14. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: Encryption Encrypting information also tends to be a processor-intensive task. A lack of transport encryption between the M2M device and the Cloud host. There is a need to design a light-weight encryption algorithm/scheme that can be used with Wireless M2M devices Source: TecTrade
  • 15. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: The Integration Challenge  Successful M2M/Cloud implementations will require a focus on how best to integrate these technologies.  We will also need to ensure that we have adequate infrastructure that can move massive amounts of data from heterogeneous sources.  How to do this all securely is a very important question? Source: Mobilize
  • 16. FUTURE RESEARCH – STANDARDISATION • One area that need additional research is to develop a global “Standard” for M2M devices, development and deployment. • One of the biggest challenges within the current M2M ecosystem is the use of proprietary systems that often span across a number of layers, from physical to application. • We need to ensure that we examine a number of use cases, collected from a number of M2M domains, to derive a set of requirements and functionalities for a common standardisation platform.
  • 17. FUTURE RESEARCH – SECURITY • It is vitally important that Wireless M2M developers make privacy and security a priority for continued M2M market growth. Additional research needs to be done in this area. • Adequately securing Wireless M2M devices can be a complex activity. What is the best way to ensure that these environments are secure? • Security issues integrating Wireless M2M devices with Cloud infrastructure • We need to take into account that all Wireless M2M devices require the same security as does the cloud (firewalls, Anti-Virus programs, etc) and that we can use encryption across all devices. Source: GSMA
  • 18. CONCLUSION Wireless Machine-to-machine (M2M) technology will become a key enabler of many of the higher-profile platforms that are revolutionising industry. These include Cloud Services and the Industrial Internet of Things (IIoT). Since wireless M2M networks will generate vast amount of data and have many resource-constrained devices, it can be envisaged that Cloud Computing will play a key role in Wireless M2M development. Based on current research, is not completely clear how Wireless M2M and Cloud technologies will fit together or how the many concerns around security and privacy will be addressed. Much more research needs to be done in these area to better understand and address these concerns.
  • 19. SECURITY ISSUES AND CHALLENGES WITH WIRELESS M2M UTILISING CLOUD INFRASTRUCTURE MY CAPSTONE PROJECT BLOG SITE Can be found at - http://thinkspace.csu.edu.au/11560606itc571/