Reference Hub5
A Study on M2M (Machine to Machine) System and Communication: Its Security, Threats, and Intrusion Detection System

A Study on M2M (Machine to Machine) System and Communication: Its Security, Threats, and Intrusion Detection System

Rami Haidar Ahmad, Al-Sakib Khan Pathan
ISBN13: 9781522518297|ISBN10: 1522518290|EISBN13: 9781522518303
DOI: 10.4018/978-1-5225-1829-7.ch010
Cite Chapter Cite Chapter

MLA

Ahmad, Rami Haidar, and Al-Sakib Khan Pathan. "A Study on M2M (Machine to Machine) System and Communication: Its Security, Threats, and Intrusion Detection System." Security Solutions and Applied Cryptography in Smart Grid Communications, edited by Mohamed Amine Ferrag and Ahmed Ahmim, IGI Global, 2017, pp. 179-214. https://doi.org/10.4018/978-1-5225-1829-7.ch010

APA

Ahmad, R. H. & Pathan, A. K. (2017). A Study on M2M (Machine to Machine) System and Communication: Its Security, Threats, and Intrusion Detection System. In M. Ferrag & A. Ahmim (Eds.), Security Solutions and Applied Cryptography in Smart Grid Communications (pp. 179-214). IGI Global. https://doi.org/10.4018/978-1-5225-1829-7.ch010

Chicago

Ahmad, Rami Haidar, and Al-Sakib Khan Pathan. "A Study on M2M (Machine to Machine) System and Communication: Its Security, Threats, and Intrusion Detection System." In Security Solutions and Applied Cryptography in Smart Grid Communications, edited by Mohamed Amine Ferrag and Ahmed Ahmim, 179-214. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-1829-7.ch010

Export Reference

Mendeley
Favorite

Abstract

The increase of the applications of numerous innovative technologies and associated devices has brought forward various new concepts like Cyber-Physical System (CPS), Internet of Things (IoT), Smart environment, Smart cities, and so on. While the boundary lines between these concepts and technologies are often kind of blur and perhaps, each one's development is helping the development of the other, M2M (Machine to Machine) communication would surely play a great role as a key enabler of all these emerging scenarios. When we see the same smart concept from different angles; for instance, from the participating device, or human being's angle, we get different definitions and concept-specific standards. In this chapter, our objective is to study M2M system and communication along with its security issues and intrusion detection systems. We have also proposed our framework in line with the standardization efforts for tackling security issues of M2M.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.