Abstract
In recent times, smart devices, smart homes, smart manufacturing, and even smart cities, all of which are connected to the Internet of Things (IoT) have become quite common. IoT technology heavily relies on Machine-to-Machine (M2M) communication in order to make all smart technologies behave in a smart way. Any type of connection between two devices that does not require human intervention is referred to as "machine-to-machine" communication technology. The IoT is a system of devices with unique identifiers that can transmit information over a network. There is no interaction between humans or machines in the IoT. The IoT is now widely used in a variety of sectors, including banking (connected branches), and industries where secrecy and privacy of data are the important components. The IoT allows multiple machines to design a connected data network, whereas M2M makes it possible for devices to communicate with one another. Therefore, this paper gives a brief review work on security challenges faced in the connection between IoT and M2M communication and the significance of both technologies.
References
- Zeinab, Kamal Aldein Mohammed, and Sayed Ali Ahmed Elmustafa. "Internet of things applications, challenges and related future technologies." World Scientific News 67, no. 2 (2017): 126-148.
- Yugha, R., and S. Chithra. "A survey on technologies and security protocols: Reference for future generation IoT." Journal of Network and Computer Applications 169 (2020): 102763.
- Parne, Balu L., Shubham Gupta, and Narendra S. Chaudhari. "Segb: Security enhanced group based aka protocol for m2m communication in an iot enabled lte/lte-a network." IEEE Access 6 (2018): 3668-3684.
- Chen, Hsing-Chung, Ilsun You, Chien-Erh Weng, Chia-Hsin Cheng, and Yung-Fa Huang. "A security gateway application for End-to-End M2M communications." Computer Standards & Interfaces 44 (2016): 85-93.
- Pradhan, Devasis, Hla Myo Tun, and Ajit Kumar Dash. "IoT: Security & Challenges of 5G Network in Smart Cities." Asian Journal For Convergence In Technology (AJCT) ISSN-2350-1146 8, no. 2 (2022): 45-50.
- Mohanty, Jayashree, Sushree Mishra, Sibani Patra, Bibudhendu Pati, and Chhabi Rani Panigrahi. "IoT security, challenges, and solutions: a review." Progress in Advanced Computing and Intelligent Engineering (2021): 493-504.
- Varga, Pal, Sandor Plosz, Gabor Soos, and Csaba Hegedus. "Security threats and issues in automation IoT." In 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), pp. 1-6. IEEE, 2017.
- Weber, Mario, and Marija Boban. "Security challenges of the internet of things." In 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 638-643. IEEE, 2016.
- Castilho, Sergio D., Eduardo P. Godoy, and Fadir Salmen. "Implementing security and trust in iot/m2m using middleware." In 2020 International Conference on Information Networking (ICOIN), pp. 726-731. Ieee, 2020.
- Imani, Amirhosein, Alireza Keshavarz-Haddad, Mohsen Eslami, and Javad Haghighat. "Security challenges and attacks in m2m communications." In 2018 9th International Symposium on Telecommunications (IST), pp. 264-269. IEEE, 2018.
- Hameed, Sufian, Faraz Idris Khan, and Bilal Hameed. "Understanding security requirements and challenges in Internet of Things (IoT): A review." Journal of Computer Networks and Communications 2019 (2019).
- Shabandri, Bilal, and Piyush Maheshwari. "Enhancing IoT security and privacy using distributed ledgers with IOTA and the tangle." In 2019 6th International conference on signal processing and integrated networks (SPIN), pp. 1069-1075. IEEE, 2019.
- Pradhan, Devasis, Hla Myo Tun, Naw Khu Say Wah, Thandar Oo, K. C. Priyanka, and Ajit Dash. "Efficient Usage of Energy in 5G toward Sustainable Development inclined to Industry 4.0 Connectivity." In 2022 IEEE Region 10 Symposium (TENSYMP), pp. 1-6. IEEE, 2022.
- Pramanik, Sabyasachi. "An Effective Secured Privacy-Protecting Data Aggregation Method in IoT." In Achieving Full Realization and Mitigating the Challenges of the Internet of Things, pp. 186-217. IGI Global, 2022.
- Pradhan, Devasis, Prasanna Kumar Sahu, Mangesh M. Ghonge, and Hla Myo Tun. "Security Approaches to SDN-Based Ad hoc Wireless Network Toward 5G Communication." In Software Defined Networking for Ad Hoc Networks, pp. 141-156. Springer, Cham, 2022.
- Pradhan, Devasis, Prasanna Kumar Sahu, A. Dash, and Hla Myo Tun. "Sustainability of 5G green network toward D2D communication with RF-energy techniques." In 2021 International Conference on Intelligent Technologies (CONIT), pp. 1-10. IEEE, 2021.
- Pradhan, Devasis, and K. C. Priyanka. "A comprehensive study of renewable energy management for 5G green communications: Energy saving techniques and its optimization." Journal of Seybold Report ISSN NO 1533 (2020): 9211.
- Dash, A., Devasis Pradhan, Hla Myo Tun, and Zaw Min Naing. “M-MTC for Optimized Communication in 5G.” Journal of Network Security Computer Networks 8, no. 3 (September 28, 2022): 1–8. https://doi.org/10.46610/jonscn.2022.v08i03.001.
- Devasis Pradhan et al.;Critical Security & Privacy Issue in Blockchain Technology Intended to Industry 4.0. Middle East Res J. Eng. Technol, 2022 Jan-Feb 2(1): 1-7.
- Devasis Pradhan et al.; Green WPC: Energy Harvesting in Smart Cities‖. Middle East Res J. Eng. Technol, 2022 Jan-Feb 2(1): 8-12
