Main Article Content

Abstract

The Internet of Things (IoT) is going to be the next group of Internet revolution linking more and more devices on Internet network or encouraging domain for next-generation communication systems. The data transferred by the machines or set device over the internet should be safely secured, and the data should be transmitted only to the intended system, then delivering the data to any another users or devices. The Machine-To-Machines and Internet of Things (IoT) communications are used in the wide-areas of applications such as transportation, smart grids, interactive education, e-healthcare, home area networks, agriculture sector. This paper will focus the Machine-To-Machines and Internet of Things (IoT) and the subset of Industrial Internet of Things (IoT) ecosystem and also focuses on vulnerabilities and security prone issues, these paper will provide insight guidance and reference for future research works.

Keywords

Machine-To-Machines; Internet of Things(IoT); Industrial Internet of Things (IIoT); IoT architectures; Vulnerabilities; Security

Article Details

Author Biographies

Pavan Manjunathmin, Ph.D. Scholar in Computer Science, Jain University, Bangalore

Ph.D. Scholar in Computer Science, Jain University, Bangalore

Dr. Pritam Gajkumar Shah, Ph.D. Department of Computer Science, Jain University, Bangalore

Ph.D. Department of Computer Science, Jain University, Bangalore

How to Cite
[1]
P. Manjunathmin and D. P. Shah, “Machine to Machine Metamorphosis to the IOT”, Ausjournal, vol. 1, no. 1, pp. 31-34, Feb. 2019.

References

  1. White Paper on “Machine-to-Machine Communication (M2M)”
  2. Telecom ABC-M,M2M
  3. WIPRO,Applying Thought,MACHINE TO MACHINE,The Technology of the Future
  4. HowStuffWorks/Tech/Computer/ComputerHardware/Networking,How Machine-to-Machine Communication Works,BY TIM CROSBY
  5. Main/TERMI,IoT-Internet of Things,By Forrest Stroud,
  6. L.D.Xu,W.HeandS.Li,"Internet of Things in Industries: A Survey," in IEEE Transactions on Industrial Informatics, vol. 10, no. 4, pp. 2233-2243, Nov. 2014.doi: 10.1109/TII.2014.2300753
  7. J.Zheng,D.Simplot-Ryl,C.Bisdikian and H.T.Mouftah,"The internet of things [Guest Editorial],"in IEEE Communications Magazine, vol. 49, no. 11, pp. 30-31, November 2011
  8. The Industrial Internet of Things - What's the Difference Between IoT and IIoT?, Calum Mclelland,Dec 22, 2016
  9. HOME/TECH TOPICS/SMART TECHNOLOGY,How the Industrial Internet of Things Is Changing the Face of Manufacturing,
  10. New networks could reduce maintenance costs and make workplaces safer,By KATHY PRETZ 23 February 2018,
  11. What is the difference between the "Internet of Things" (IoT) and "Machine to Machine" (M2M)?,Lucas Wang, Founder of HWTrek, platform that brings hardware to life (IoT/wearables/etc),Updated Dec 1, 2016
  12. The road from M2M to IoT is paved with big data,by Marc Jadoul,Feb 16 2017
  13. Comarch Telecommunications Solutions IoT Connectivity Management,IoT Connectivity Management,
  14. eclipse,HOME/ECLIPSE/WIKI/IoT/M2MIWG/M2MIWG/charter draft,IoT
  15. S.Sen and A.Balasubramanian,"A highly resilient and scalable broker architecture for IoT applications," 2018 10th International Conference on Communication Systems & Networks (COMSNETS),Bengaluru,India,2018,pp.336341.doi:10.1109/COMSNETS.2018.8328216
  16. AUGMENTED REALITY SERVICES IMPLEMENTED WITHIN SMART CITIES, BASED ON AN INTERNET OF THINGS INFRASTRUCTURE,CONCEPTS AND CHALLENGES:AN OVERVIEWArticle (PDF Available)·March 2018
  17. The Industrial Internet of Things (IIoT)
  18. 7 STEPS TO IIOT,Posted February 21st, 2017 by Carl Henning & filed under IIoT.
  19. Industrial Internet of Things:Unleashing the Potential of Connected Products and Services,January 2015,
  20. A.R.Sadeghi, C. Wachsmann and M. Waidner,"Security and privacy challenges in industrial Internet of Things," 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, 2015, pp. 1-6.doi: 10.1145/2744769.2747942.
  21. Understanding IoT Security – Part 1 of 3: IoT Security Architecture on the Device and Communication Layers,November 29,2016, Padraig Scully