SlideShare une entreprise Scribd logo
1  sur  19
STUART BENNETT
ITC571 CAPSTONE
PROJECT
SEMINAR
ITC571 - Emerging Technologies and Innovation
(201630)
Assessment 6 – Project Blog and Seminar
Student: Stuart Bennett (ID: 11560606)
Subject Mentor: Dr. Mohsin Iftikhar
ITC571 - Emerging Technologies and Innovation
(201630)
Assessment 6 – Project Blog and Seminar
Student: Stuart Bennett (ID: 11560606)
Subject Mentor: Dr. Mohsin Iftikhar
SECURITY ISSUES AND
CHALLENGES WITH WIRELESS
M2M
UTILISING CLOUD
INFRASTRUCTURE
A bit of an overview of Wireless M2M
• Wireless Machine-to-Machine (M2M)
communication is viewed as one of the next
frontiers in wireless communications and has
grown dramatically over the past decade.
Source: Telecom Cloud
(2012)
A bit of an overview of Wireless M2M
• It is expected that the wireless M2M market to
account for nearly $200 Billion in revenue by the
end of 2022
A bit of an overview of Wireless M2M
• Some IT industry experts expect up to 50 billion
devices will be connected in the coming years.
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Intelligent metering and network
management for the Utilities
sector
Source: Netcomm Wireless
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Within the agricultural sector
allowing the remote
management of irrigation and
stock control.
Source: Sensor Measurement
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
e-Health applications such as
remote patient monitoring
Source: oneM2M
Wireless M2M
Implementation of Wireless M2M applications are
growing at a rapid pace lead by many new and varied
business cases, such as:
Security and surveillance –
• monitoring of public
transportation systems
(roads, rail, buses)
• security applications (street
surveillance and corporate
security)
Source: iveda.com
Source: Forbes
Cloud Computing
Cloud computing is a new computing paradigm that has
significantly changed the global IT landscape.
• Cloud computing is flexible and scalable
• Allows the automatic provisioning and de-provisioning of
resources when required
Source: Shape Host Source: Simple Servers
Cloud Computing
Since Wireless M2M networks will generate vast
amount of data and have many resource-constrained
devices, it can be envisaged that cloud computing
will play a key role in Wireless M2M development by
offering desirable features such as:
• data storage
• data processing and
• virtualised infrastructure.
Source: Network World Source: Miami Technologist Source: PBJ Tech Solutions
CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: Security Issues
Security is a major concern in today’s internet.
Given the number of connected devices in the
future, we need to look at totally new and
innovative solutions to address security concerns.
We must focus on security at endpoints - device
security, cloud security, and network security.
Insufficient authentication and authorisation
solutions
Cloud based security concerns, such as multi-
tenanted environments
Source: IOT Business News
CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: Encryption
Encrypting information also tends to be a
processor-intensive task.
A lack of transport encryption between the M2M
device and the Cloud host.
There is a need to design a light-weight
encryption algorithm/scheme that can be used
with Wireless M2M devices
Source: TecTrade
CURRENT CHALLENGES
There are still many things to consider as we look to integrate
Wireless M2M devices with Cloud Computing.
Some of the major concerns are: The Integration Challenge
 Successful M2M/Cloud implementations will
require a focus on how best to integrate these
technologies.
 We will also need to ensure that we have
adequate infrastructure that can move massive
amounts of data from heterogeneous sources.
 How to do this all securely is a very important
question? Source: Mobilize
FUTURE RESEARCH –
STANDARDISATION
• One area that need additional research is to develop
a global “Standard” for M2M devices, development
and deployment.
• One of the biggest challenges within the current M2M
ecosystem is the use of proprietary systems that
often span across a number of layers, from physical
to application.
• We need to ensure that we examine a number of use
cases, collected from a number of M2M domains, to
derive a set of requirements and functionalities for a
common standardisation platform.
FUTURE RESEARCH –
SECURITY
• It is vitally important that Wireless M2M developers
make privacy and security a priority for continued
M2M market growth. Additional research needs to be
done in this area.
• Adequately securing Wireless M2M devices can be a
complex activity. What is the best way to ensure that
these environments are secure?
• Security issues integrating Wireless M2M devices with
Cloud infrastructure
• We need to take into account that all Wireless M2M
devices require the same security as does the cloud
(firewalls, Anti-Virus programs, etc) and that we can
use encryption across all devices.
Source: GSMA
CONCLUSION
Wireless Machine-to-machine (M2M) technology will become a key enabler of
many of the higher-profile platforms that are revolutionising industry. These
include Cloud Services and the Industrial Internet of Things (IIoT).
Since wireless M2M networks will generate vast amount of data and have many
resource-constrained devices, it can be envisaged that Cloud Computing will
play a key role in Wireless M2M development.
Based on current research, is not completely clear how Wireless M2M and Cloud
technologies will fit together or how the many concerns around security and
privacy will be addressed.
Much more research needs to be done in these area to better understand and
address these concerns.
SECURITY ISSUES AND CHALLENGES
WITH WIRELESS M2M
UTILISING CLOUD INFRASTRUCTURE
MY CAPSTONE PROJECT BLOG SITE
Can be found at -
http://thinkspace.csu.edu.au/11560606itc571/

Contenu connexe

Tendances

Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
priyanka reddy
 

Tendances (20)

Different applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin AkadDifferent applications and security concerns in Iot by Jatin Akad
Different applications and security concerns in Iot by Jatin Akad
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Internet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M CommunicationInternet of Things with Cloud Computing and M2M Communication
Internet of Things with Cloud Computing and M2M Communication
 
Fog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and ArchitecturesFog Computing Reality Check: Real World Applications and Architectures
Fog Computing Reality Check: Real World Applications and Architectures
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Blueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of ThingsBlueprint for the Industrial Internet of Things
Blueprint for the Industrial Internet of Things
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Top 7 Platforms for IoT Application Development
Top 7 Platforms for IoT Application DevelopmentTop 7 Platforms for IoT Application Development
Top 7 Platforms for IoT Application Development
 
76 s201918
76 s20191876 s201918
76 s201918
 
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
Blockchain and the Internet Of Things - Benefits of combining these two Mega ...
 
IoT-The Internet of Things
IoT-The Internet of ThingsIoT-The Internet of Things
IoT-The Internet of Things
 
Chariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_InfosecgirlsChariot generic presentation owaspwia_Infosecgirls
Chariot generic presentation owaspwia_Infosecgirls
 
Cps sec sg sg2017 conf_iran
Cps sec sg  sg2017 conf_iranCps sec sg  sg2017 conf_iran
Cps sec sg sg2017 conf_iran
 
Innovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachInnovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit Approach
 
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...Drones and Fog Computing  - New Frontiers of IoT and Digital Transformation -...
Drones and Fog Computing - New Frontiers of IoT and Digital Transformation -...
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Fog
FogFog
Fog
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 

En vedette

Mi aplicacion web
Mi aplicacion webMi aplicacion web
Mi aplicacion web
javier1811
 

En vedette (19)

Smau Firenze 2016 - Future Food Institute
Smau Firenze 2016 - Future Food InstituteSmau Firenze 2016 - Future Food Institute
Smau Firenze 2016 - Future Food Institute
 
Conpu
ConpuConpu
Conpu
 
Mg300 final presentation
Mg300   final presentationMg300   final presentation
Mg300 final presentation
 
Personal trainer
Personal trainerPersonal trainer
Personal trainer
 
Для спонсоров
Для спонсоровДля спонсоров
Для спонсоров
 
BD202 AUSA MECHANICAL SWEEPER
BD202 AUSA MECHANICAL SWEEPERBD202 AUSA MECHANICAL SWEEPER
BD202 AUSA MECHANICAL SWEEPER
 
8
88
8
 
Why 4Segments
Why 4SegmentsWhy 4Segments
Why 4Segments
 
The Food Chain Story
The Food Chain StoryThe Food Chain Story
The Food Chain Story
 
Mi aplicacion web
Mi aplicacion webMi aplicacion web
Mi aplicacion web
 
capable
capablecapable
capable
 
Survey Research (SOC2029). Seminar 6: questionnaire design (II)
Survey Research (SOC2029). Seminar 6: questionnaire design (II) Survey Research (SOC2029). Seminar 6: questionnaire design (II)
Survey Research (SOC2029). Seminar 6: questionnaire design (II)
 
Roh kudus
Roh kudusRoh kudus
Roh kudus
 
Personal statement sample for masters
Personal statement sample for mastersPersonal statement sample for masters
Personal statement sample for masters
 
Survey Research (SOC2029). Seminar 5: questionnaire design (I)
Survey Research (SOC2029). Seminar 5: questionnaire design (I)Survey Research (SOC2029). Seminar 5: questionnaire design (I)
Survey Research (SOC2029). Seminar 5: questionnaire design (I)
 
116423998 power-point-tentang-ibadah-puasa
116423998 power-point-tentang-ibadah-puasa116423998 power-point-tentang-ibadah-puasa
116423998 power-point-tentang-ibadah-puasa
 
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahat
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahatKhotbah rohani YESUS membebaskan orang yang kerasukan roh jahat
Khotbah rohani YESUS membebaskan orang yang kerasukan roh jahat
 
Effective Business Communication
Effective Business CommunicationEffective Business Communication
Effective Business Communication
 
Nrg 33
Nrg 33Nrg 33
Nrg 33
 

Similaire à CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with Wireless M2M utilising Cloud Computing

A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
IJECEIAES
 
Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
Market Engel SAS
 

Similaire à CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with Wireless M2M utilising Cloud Computing (20)

A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
 
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
Navigating the Horizon: The Evolution of the IT Industry and the Odyssey to S...
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
Telecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issuesTelecoms in a convergent world - Emerging issues
Telecoms in a convergent world - Emerging issues
 
Block Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for TelcomBlock Armour Zero Trust Cybersecurity Mesh for Telcom
Block Armour Zero Trust Cybersecurity Mesh for Telcom
 
Eb31854857
Eb31854857Eb31854857
Eb31854857
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
Study on Mobile Cloud Computing, It's Architecture, Challenges and Various Tr...
 
Software Defined Networks Explained
Software Defined Networks ExplainedSoftware Defined Networks Explained
Software Defined Networks Explained
 
The M2M platform for a connected world
The M2M platform for a connected worldThe M2M platform for a connected world
The M2M platform for a connected world
 
Challenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure Components
 
Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
 
Securing Cloud from Cloud Drain
Securing Cloud from Cloud DrainSecuring Cloud from Cloud Drain
Securing Cloud from Cloud Drain
 
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdfA Survey on Mobile Cloud Computing  Concept, Applications and Challenges..pdf
A Survey on Mobile Cloud Computing Concept, Applications and Challenges..pdf
 
Sigfox whitepaper
Sigfox whitepaperSigfox whitepaper
Sigfox whitepaper
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2M
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
etfa2014-CR.pdf
etfa2014-CR.pdfetfa2014-CR.pdf
etfa2014-CR.pdf
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with Wireless M2M utilising Cloud Computing

  • 1. STUART BENNETT ITC571 CAPSTONE PROJECT SEMINAR ITC571 - Emerging Technologies and Innovation (201630) Assessment 6 – Project Blog and Seminar Student: Stuart Bennett (ID: 11560606) Subject Mentor: Dr. Mohsin Iftikhar
  • 2. ITC571 - Emerging Technologies and Innovation (201630) Assessment 6 – Project Blog and Seminar Student: Stuart Bennett (ID: 11560606) Subject Mentor: Dr. Mohsin Iftikhar SECURITY ISSUES AND CHALLENGES WITH WIRELESS M2M UTILISING CLOUD INFRASTRUCTURE
  • 3. A bit of an overview of Wireless M2M • Wireless Machine-to-Machine (M2M) communication is viewed as one of the next frontiers in wireless communications and has grown dramatically over the past decade. Source: Telecom Cloud (2012)
  • 4. A bit of an overview of Wireless M2M • It is expected that the wireless M2M market to account for nearly $200 Billion in revenue by the end of 2022
  • 5. A bit of an overview of Wireless M2M • Some IT industry experts expect up to 50 billion devices will be connected in the coming years.
  • 6. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: Intelligent metering and network management for the Utilities sector Source: Netcomm Wireless
  • 7. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: Within the agricultural sector allowing the remote management of irrigation and stock control. Source: Sensor Measurement
  • 8. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: e-Health applications such as remote patient monitoring Source: oneM2M
  • 9. Wireless M2M Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as: Security and surveillance – • monitoring of public transportation systems (roads, rail, buses) • security applications (street surveillance and corporate security) Source: iveda.com
  • 11. Cloud Computing Cloud computing is a new computing paradigm that has significantly changed the global IT landscape. • Cloud computing is flexible and scalable • Allows the automatic provisioning and de-provisioning of resources when required Source: Shape Host Source: Simple Servers
  • 12. Cloud Computing Since Wireless M2M networks will generate vast amount of data and have many resource-constrained devices, it can be envisaged that cloud computing will play a key role in Wireless M2M development by offering desirable features such as: • data storage • data processing and • virtualised infrastructure. Source: Network World Source: Miami Technologist Source: PBJ Tech Solutions
  • 13. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: Security Issues Security is a major concern in today’s internet. Given the number of connected devices in the future, we need to look at totally new and innovative solutions to address security concerns. We must focus on security at endpoints - device security, cloud security, and network security. Insufficient authentication and authorisation solutions Cloud based security concerns, such as multi- tenanted environments Source: IOT Business News
  • 14. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: Encryption Encrypting information also tends to be a processor-intensive task. A lack of transport encryption between the M2M device and the Cloud host. There is a need to design a light-weight encryption algorithm/scheme that can be used with Wireless M2M devices Source: TecTrade
  • 15. CURRENT CHALLENGES There are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing. Some of the major concerns are: The Integration Challenge  Successful M2M/Cloud implementations will require a focus on how best to integrate these technologies.  We will also need to ensure that we have adequate infrastructure that can move massive amounts of data from heterogeneous sources.  How to do this all securely is a very important question? Source: Mobilize
  • 16. FUTURE RESEARCH – STANDARDISATION • One area that need additional research is to develop a global “Standard” for M2M devices, development and deployment. • One of the biggest challenges within the current M2M ecosystem is the use of proprietary systems that often span across a number of layers, from physical to application. • We need to ensure that we examine a number of use cases, collected from a number of M2M domains, to derive a set of requirements and functionalities for a common standardisation platform.
  • 17. FUTURE RESEARCH – SECURITY • It is vitally important that Wireless M2M developers make privacy and security a priority for continued M2M market growth. Additional research needs to be done in this area. • Adequately securing Wireless M2M devices can be a complex activity. What is the best way to ensure that these environments are secure? • Security issues integrating Wireless M2M devices with Cloud infrastructure • We need to take into account that all Wireless M2M devices require the same security as does the cloud (firewalls, Anti-Virus programs, etc) and that we can use encryption across all devices. Source: GSMA
  • 18. CONCLUSION Wireless Machine-to-machine (M2M) technology will become a key enabler of many of the higher-profile platforms that are revolutionising industry. These include Cloud Services and the Industrial Internet of Things (IIoT). Since wireless M2M networks will generate vast amount of data and have many resource-constrained devices, it can be envisaged that Cloud Computing will play a key role in Wireless M2M development. Based on current research, is not completely clear how Wireless M2M and Cloud technologies will fit together or how the many concerns around security and privacy will be addressed. Much more research needs to be done in these area to better understand and address these concerns.
  • 19. SECURITY ISSUES AND CHALLENGES WITH WIRELESS M2M UTILISING CLOUD INFRASTRUCTURE MY CAPSTONE PROJECT BLOG SITE Can be found at - http://thinkspace.csu.edu.au/11560606itc571/