Machine-to-Machine Communications and Security Solution in Cellular Systems

Machine-to-Machine Communications and Security Solution in Cellular Systems

Mahdy Saedy, Vahideh Mojtahed
DOI: 10.4018/978-1-4666-2154-1.ch010
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This paper introduces an efficient machine-to-machine (M2M) communication model based on 4G cellular systems. M2M terminals are capable of establishing Ad Hoc clusters wherever they are close enough. It is also possible to extend the cellular coverage for M2M terminals through multi-hop Ad Hoc connections. The M2M terminal structure is proposed accordingly to meet the mass production and security requirements. The security becomes more critical in Ad Hoc mode as new nodes attach to the cluster. A simplified protocol stack is considered here, while key components are introduced to provide secure communications between M2M and the network and also amongst M2M terminals.
Chapter Preview
Top

2. Conventional M2m Solution

Figure 1 shows a typical wireless M2M implementation based on 2G system (GSM) via protocols such as TCP/IP. The system sends the information to a back-end server, which processes the data and sends it via the Internet to a monitoring center that monitors and controls the machines.

Figure 1.

Conventional M2M solution

978-1-4666-2154-1.ch010.f01

In current networks, the M2M terminal acts similar to a normal mobile phone, which communicates with the base station and then with the M2M server via the upper layer (i.e. NAS in 3GPP).The difference might be that the machine is triggered by a specific event other than human being (Chen & Yang, 2009). The actual data to be sent may be of very small volume due to successive handshakes with the network. These transmissions and extra overheads cause power waste which makes the current system not economic for M2M communications (Cristaldi, Faifer, Grande, & Ottoboni, 2005).

Complete Chapter List

Search this Book:
Reset