GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications

被引:167
作者
Lu, Rongxing [1 ]
Li, Xu [1 ]
Liang, Xiaohui [1 ]
Shen, Xuemin
Lin, Xiaodong [2 ]
机构
[1] Univ Waterloo, BBCR Grp, Waterloo, ON N2L 3G1, Canada
[2] Univ Ontario, Inst Technol, Fac Business & Informat Technol, Oshawa, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
WIRELESS SENSOR NETWORKS;
D O I
10.1109/MCOM.2011.5741143
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Machine-to-machine communications is characterized by involving a large number of intelligent machines sharing information and making collaborative decisions without direct human intervention. Due to its potential to support a large number of ubiquitous characteristics and achieving better cost efficiency, M2M communications has quickly become a market-changing force for a wide variety of real-time monitoring applications, such as remote e-healthcare, smart homes, environmental monitoring, and industrial automation. However, the flourishing of M2M communications still hinges on fully understanding and managing the existing challenges: energy efficiency (green), reliability, and security (GRS). Without guaranteed GRS, M2M communications cannot be widely accepted as a promising communication paradigm. In this article, we explore the emerging M2M communications in terms of the potential GRS issues, and aim to promote an energy-efficient, reliable, and secure M2M communications environment. Specifically, we first formalize M2M communications architecture to incorporate three domains - the M2M, network, and application domains - and accordingly define GRS requirements in a systematic manner. We then introduce a number of GRS enabling techniques by exploring activity scheduling, redundancy utilization, and cooperative security mechanisms. These techniques hold promise in propelling the development and deployment of M2M communications applications.
引用
收藏
页码:28 / 35
页数:8
相关论文
共 10 条
[1]   Localized sensor area coverage with low communication overhead [J].
Gallais, Antoine ;
Carle, Jean ;
Simplot-Ryl, David ;
Stojmenovic, Ivan .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (05) :661-672
[2]  
Gilani S., 2009, The Promise of M2M: How Pervasive Connected Machines are Fueling the Next Wireless Revolution
[3]  
Hattangady S., WIRELESS M2M OPPOR 1
[4]  
Hodges R., 2008, Go green in ICT
[5]   Local vote decision fusion for target detection in wireless sensor networks [J].
Katenka, Natallia ;
Levina, Elizaveta ;
Michailidis, George .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2008, 56 (01) :329-338
[6]   SAGE: A Strong Privacy-Preserving Scheme Against Global Eavesdropping for eHealth Systems [J].
Lin, Xiaodong ;
Lu, Rongxing ;
Shen, Xuemin ;
Nemoto, Yoshiaki ;
Kato, Nei .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2009, 27 (04) :365-378
[7]  
Lin XX, 2009, PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON PUBLIC ECONOMICS AND MANAGEMENT ICPEM 2009, VOL 2, P1
[8]   SPREAD: Improving network security by multipath routing in mobile ad hoc networks [J].
Lou, Wenjing ;
Liu, Wei ;
Zhang, Yanchao ;
Fang, Yuguang .
WIRELESS NETWORKS, 2009, 15 (03) :279-294
[9]  
Lu R., 2010, IEEE T PARALLEL DIST
[10]   Localized network layer protocols in wireless sensor networks based on optimizing cost over progress ratio [J].
Stojmenovic, I .
IEEE NETWORK, 2006, 20 (01) :21-27