Analysis Of M2M

Improved Essays
The M2M ecosystem is not secured by present information security policy (Lake, Milito, Morrow, & Vargheese, 2014). A research gap is present where current security frameworks fail to address needed protections for next generation systems like M2M. Present frameworks do not adequately consider next-generation threats from a system or device that is non-human driven, which weakens countermeasure implementations and security guideline development (Wash, 2010). There is a lack of sufficient research on the intersection of human interface, wireless, and M2M device risks and security countermeasures (Riahi, Natalizio, Challal, Mitton, & Iera, 2014). Presently, security for M2M is based on current mobile systems’ security frameworks. It is unknown …show more content…
The purpose was to seek out and solve the stated problem by developing a novel security framework that is focused on the study of the “functions” of M2M devices and improves the development life cycle processes in the M2M ecosystem. This effort (a) adequately considers restrictions and constraints; (b) identifies significant shortfalls; and (c) leads to a more thorough and detailed M2M security framework. Other existing methodologies do not provide representation of what or which M2M system components should be secured based on the function they perform. A framework approach that identifies devices, components, and functions that are harmed when left vulnerable helps to direct ecosystem-design principles and generates better security recommendations (Molotsi & Tait, 2013). Weaknesses in any security framework, or the lack of such a framework, threaten the overall protection of the system, because these jeopardize the confidentiality, integrity, and availability of the end-point device; where the system is most …show more content…
For example, Bring Your Own Device (BYOD) and the push to move security responsibility to the end user are exposing new issues for security and privacy (Armando, Costa, & Merlo, 2013). According to Armando et al. (2013), corporations are finding that security policies geared toward traditional desktop protections are antiquated and ineffective. A modernized approach is needed to protect the swiftly moving workforce from the environments offering information anywhere, at any time, and with any device (Lu, Li, Liang, Shen, & Lin, 2011). If the exchange of information or content is unprotected, confidentiality and privacy are lost. Next-generation devices, such as those used in M2M, will help control connected environments and provide a link to mobile systems, smart cities, and various sensor networks; therefore, the people using these platforms must protect all the information thereon (Kriesten, Tünnermann, Mertes, & Hermann, 2010). Enterprise IT policies protect the corporate information only if the users abide by the rules set in place (Harris, 2009). With the increase of attacks on personal mobile devices, companies have experienced an increased loss of protected data and compromise of company networks. These same vulnerabilities threaten the M2M

Related Documents

  • Improved Essays

    Certification Authority(CA):A certification Authority which is having private and public key pairs and trusted by sensors. The role of the CA in this process is to guarantee that the individual granted the unique certificate is in the fact who he or she claims to be. External Agent(EA):External Agent is an entity who tries communicate with the WSN.External agent agent also has a private and public key pair and the public key must be certified the CA.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Global Wholesale & Emerging Solutions Team, I wanted to take a moment to recognize our 2Q Accomplishments and Reiterate 3Q Priorities. In 2Q the team achieved its financial commitments and delivered on a number of key initiatives that continue to differentiate us from our competitors. We prove over and over again that we are a valued solutions enabler to our partners, growing their revenue, profitability and subscriber base. In 2Q we delivered $421.8M in Net Revenue; 108% of plan | $204.3M Gross Margin; 108% of plan. Net Subscriber Additions were380…

    • 761 Words
    • 4 Pages
    Decent Essays
  • Great Essays

    Essay On Zero Day

    • 1430 Words
    • 6 Pages

    Ensuring the security of the information systems associated with vital national infrastructure such as SCADA systems is of great importance to national security. The rapid rate in which technology is advancing creates a conundrum. As technology advances, it produces greater accessibility to information and increases efficiencies at home, as well as in SCADA associated organizations. Outdated policies and an organizational culture that does not limit the usage of technology such as removable devices, tablets, and mobile smart phones puts the SCADA organizations charged with protecting the nation’s essential services at great…

    • 1430 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Grounded Theory Summary

    • 2069 Words
    • 9 Pages

    Chapter One: Introduction The aim of this Grounded Theory study is to examine the paradoxical nature of tax avoidance, with a particular focus on Google Inc. operations in the United Kingdom (UK). According to Schmidt and Cohen (2014), the world is undergoing a global change whereby on one side the provision of cyberspace connectivity continues to improve the world’s ability to exchange data and interconnect. However, Waltzman and Shen (2015) article present an opposing argument, one of interconnection intermediaries exploiting technology to reduce overseas costs; by transferring accounts at the point of sale to countries with reduced taxation and regulations, thus increasing economic margins (Mostrous, 2016). As an illustration, Robertson…

    • 2069 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    Privacy denotes the capacity of a person to control or restrict access to his/her individual information by other people (Singer & Friedman, 2014). Consequently, positive cyber security should protect the privacy of participants on electronic platforms. However, shared information is likely to include some data that is considered private by given observers. Cyber security can serve as a way to protect individuals from unanticipated surveillance and information gathering from protected systems. However, in instances where the aim of the discussed concept is to advance protection against cyber-attacks, activities of such nature are likely to influence cyber security.…

    • 1213 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Social Security Threats

    • 1071 Words
    • 5 Pages

    Introduction As time passes, technology continue to evolve, become more advanced and easier to use and people also become more knowledgeable about technology. But this also create a huge problem such as hackers, people who do not respect the privacy of others. This was demonstrated when thousands of personal records from normal users was exposed online. This could be preventing if the system was tested carefully, which is what happened to Samsung newest smartphone when thousands of people reported the phone was busted into fire. Issue 1 Source…

    • 1071 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    5G Case Study

    • 989 Words
    • 4 Pages

    ABSTRACT: The cellular industry has already started laying the foundation for 5G, as the 4G deployments are happening worldwide. However, there are few questions that are being discussed among research institutions, standards bodies, operators, the supplier community, trade organizations and governments – What will be the 5G deployment time frame? What will characterize networks beyond 2020? What are the likely technologies that will come in to play for 5G?…

    • 989 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Internet Privacy Report

    • 1380 Words
    • 6 Pages

    Recent events have caused the media to portray the government as watching every move of its citizens and the people that it was meant to protect. Critics might say that it is a violation of the United States constitution to spy on the people who live in this country. But on the other hand, some people may say that it is ultimately for the good of the United States. According to President Barack Obama, throughout our nation’s history, people were spied on for the sake of national security. He claims that people who are not a threat to national security were not spied on (Obama).…

    • 1380 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Introduction In our world, the advancement of technology is rapidly ongoing. The development and the revolution of the Internet of Things (IoT) is one breakthrough technological advancement that is changing business models in all aspects of society. SAS Institute Incorporated defines the IoT as “the concept of everyday objects – from industrial machines to wearable devices – using built-in sensors to gather data and take action on that data across a network” [1]. The theory of the IoT is simple, but the rewards and benefits are incredible; according to Gartner, revenue resulting from IoT products and services is expected to exceed $300 billion in 2020, and that estimate is assumed to be on the safe-end [2].…

    • 962 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    We all currently live in the most technologically advanced eras we have ever seen, we have access to so much more information than any of our ancestors. We can find almost anything we can think of with a few clicks of a mouse. Now technology is evolving even further with the advancements of “Internet of Things” (IoT). The Internet of Things was a phrase that was coined by Kevin Ashton in 1999, to describe the system that real world objects could be connected to the internet by the use of sensors. So what that means is objects like your door lock, your thermostat, your lights will all be connected to the internet and can communicate to one another.…

    • 1312 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Biometric Security System

    • 1989 Words
    • 8 Pages

    In today’s world, one of the greatest challenges being faced by individuals across a vast array of disciplines is protection and security. If we are to take a moment and reflect upon every instance during our everyday lives in which we use some sort of technology to access personal information or encounter something in which we are required to prove our identity, we can clearly see that there are numerous opportunities through the day in which our information is at risk. Therefore, it becomes very evident that we must find ways to protect not only this information but the channels through which we access it. In the past, this concern has been widely addressed through the use of passwords, but as technology advances and thieves become more tech savvy vulnerabilities to secure information and facilities increase greatly and passwords simply don’t cut in today’s world.…

    • 1989 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Internet of Things (IoT) is a common phrase, even for people who are not deeply interested in technology and research. From a simple household Thermostat to complex Industry of Intelligent Things (IIoT), IoT is steadily influencing our present and the future. Schwab (2016) refers this change as “Fourth Industrial Revolution”. Advances in Artificial Intelligence is accelerating this revolution by spawning a new flavor of Internet of Things, which is referred as Internet of Intelligent Things (Bello & Zeadally, 2016). This concept has always been of great interest for me and remains a driving gear for my motivations in research.…

    • 732 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The Internet of Things is a concept of having multiple objects or devices connected and controlled through a single, common network. Some examples of these devices or objects include a heart monitor implant, the built-in sensors in a car that determines tire pressure, or any smart device currently being sold on the market.. This technology is not all that new, in fact it has been around and in use for quite some time. With that said, this technology has a vast future ahead of it and the possibilities are virtually endless. To begin, the Internet of Things (IoT) has had a steady increase in use throughout all of it’s history.…

    • 1483 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    1. INTRODUCTION Ubiquitous computing (or "ubicomp") is a concept in software engineering and computer science where computing is made to appear anytime and everywhere. In contrast to desktop computing, ubiquitous computing can occur using any device, in any location, and in any format. A user interacts with the computer, which can exist in many different forms, including laptop computers, tablets and terminals in everyday objects such as a fridge or a pair of glasses. The underlying technologies to support ubiquitous computing include Internet, advanced middleware, operating system, mobile code, sensors, microprocessors, new I/O and user interfaces, networks, mobile protocols, location and positioning and new materials.…

    • 2026 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    Biometric Security

    • 2314 Words
    • 10 Pages

    Nowadays, not many people can walk down the street without running into someone connected to cyberspace. The Internet of Things is a broad term used to define an entire system of devices connected to cyberspace that can communicate with one another. As shown in figure 1.1, there are many devices just at home that can be considered a part of the IoT. This figure is just a small example of all devices that are connected to cyberspace. The term IoT can cover phones, watches, laptops and just about anything mobile that connects to cyberspace. With the IoT constantly expanding due to new internet ready devices introduced, new security measures must be taken to protect these devices.…

    • 2314 Words
    • 10 Pages
    Improved Essays