M2M Market Opportunities and Solutions: Ecosystem Analysis, Leading Applications, and Security Challenges

M2M Market Opportunities and Solutions: Ecosystem Analysis, Leading Applications, and Security Challenges

Mind Commerce, Date of Publication: Aug 28, 2014, 282 Pages
US$2,995.00
MC6587

M2M Market Opportunities and Solutions: Ecosystem Analysis, Leading Applications, and Security Challenges

Machine-to-Machine (M2M) communications and related applications is radically changing many industries utilities, healthcare, local government services, insurance, consumer electronics, automotive, asset management and retail.  M2M  growth is expected to accelerate, particularly in certain industry verticals, and especially due to the anticipated Internet of Things (IoT) ecosystem.  With this rapid growth, the M2M industry is quickly recognizing the need to deal with security and privacy issues pertaining to M2M, but understanding the specific issues and solutions are not broadly understood.
 
This research includes M2M Ecosystem, Value Chain, Applications and Standards,  Smart Home, Building, and City M2M Applications, and M2M Security and Privacy: Challenges and Opportunities.  This research evaluates the M2M Ecosystem, Value Chain and Platforms. It also assesses the functional building blocks of M2M with a view towards incremental benefits. The report includes recommendations for go-to market strategies, standards role/importance/issues, M2M and Internet of Things (IoT), business drivers, and market issues. The report also includes guidelines for an enterprise to choose a service provider along with recommendations to manage M2M development projects.
 
This report purchase includes time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report.
 
Target Audience:

  • Standards organizations
  • Mobile network operators
  • Security solution providers
  • M2M/IoT platform providers
  • Wireless device manufacturers
  • Privacy infrastructure providers
  • Wireless infrastructure providers
  • M2M and IoT application developers
  • Enterprise employing M2M/IoT solutions
  • Security and privacy advocacy organizations
Report Benefits: 
  • Smart City Strategies
  • Go-to Market M2M Strategies
  • Essential Elements of Smart City
  • Global Smart City Development
  • Survey Findings focused on M2M Security
  • Framework for Smart City and Role of M2M
  • Understand M2M Security Issues and Challenges
  • Understand M2M Ecosystem, Value Chain and Platforms

Table of Contents:
 
M2M Ecosystem, Value Chain, Applications and Standards
 
1.0        INTRODUCTION                11
2.0        PREDICTIONS     13
2.1        M2M in Industry Verticals            17
2.1.1      Smart Grid          18
2.1.2      Smart City           18
2.1.3      Water Meters   18
2.1.4      Smart Meters    18
2.1.5      Healthcare          19
2.1.6      Big Data                20
2.1.7      Retail     20
2.1.8      Connected People          21
2.1.9      Connected Consumer Devices   21
2.1.10     Connected Money          21
2.1.11     Connected Infrastructure            21
2.1.12     Connected Building         21
2.1.13     Connected Vehicle          22
2.1.14     Connected Industrial Process     22
3.0        M2M BENEFITS FOR INDUSTRY STAKEHOLDERS  23
3.1        Profitability         23
3.2        Operational Efficiency    24
3.3        Competitive advantage 24
3.4        Quick Decision making   24
3.5        Speed of Deployment   24
3.6        Cost of Deployment       24
3.7        Asset Mobility   25
3.8        Process Automation       25
3.9        Integration with other systems 25
3.10       Mobility               25
4.0        THE KEY BARRIERS TO SCALING M2M TECHNOLOGIES     26
4.1        Complex Value Chain     26
4.2        Lack of Customer Education        26
4.3        Lack of Success Stories  27
4.4        Lack of Standards             27
4.5        Incompatible Sales Models and Long Sales Cycle               27
5.0        APPLICATIONS  28
5.1        Fleet Management         28
5.2        Smart Appliances             28
5.3        Smart Home       28
5.4        Smart Buildings 28
5.5        Smart City           29
5.6        Healthcare          29
5.7        Wearable M2M                29
5.8        Connected Car  30
5.9        Supply Chain      30
5.10       Retail Point-of-Sale (POS)            31
5.11       Retail Digital Signage       31
5.12       Retail Connected Vending           32
5.13       Retail Kiosks       32
5.14       Utilities Smart Meters and Grids               32
5.15       Usage-based Insurance                33
5.16       Field Service       33
5.17       Manufacturing  33
5.18       Safety Compliance          33
5.19       Smart Drilling     34
5.20       Security and Surveillance              34
5.21       Military 34
5.22       Agriculture          34
5.23       Environmental Monitoring           35
5.24       Predictive Maintenance                35
5.25       Product Monitoring        35
7.0        LOGICAL BUILDING-BLOCKS OF M2M     36
7.1        Data Acquisition               36
7.2        Data Transmission           37
7.3        Data Analysis     38
8.0        THE M2M ECOSYSTEM   39
8.1        End Device / Equipment               39
8.2        Consumer           39
8.3        Communication Link       39
8.4        Sensor  40
8.5        Application         40
8.6        Middleware Platform     41
8.7        Embedded Module         42
8.8        SIM        43
8.9        Complete M2M Ecosystem View              44
9.0        M2M VALUE CHAIN        45
10.1       Equipment Supplier        45
10.2       Software Publisher         45
10.3       Telecom Operator           45
10.4       Consulting Firm 46
10.5       Integrator           46
10.6       Distributor          46
10.0       M2M'S ROLE IN THE WIRELESS ECOSYSTEM          47
10.1       M2M and Wireless Technology  47
10.2       Vertical and Horizontal Platform                47
11.0       M2M TECHNOLOGY DRIVERS      49
13.2       Cost of Sensors 49
13.3       Communication Mediums            51
13.2.1     Cellular 52
13.2.2     Satellite                53
13.2.3     Wi-Fi      54
13.2.4     Bluetooth            54
13.2.5     ZigBee  54
13.4       Big Data Analytics             55
13.5       Geolocation Services      56
13.6       Affordable Advanced Devices and Chip-sets       58
13.5.1     M2M Devices    58
13.7       Increased Intelligence at End-points       59
13.8       The M2M Platform Advantage   60
12.0       INTERNET OF THINGS (IOT)         63
14.2       Industrial Internet of Things (IIoT)            65
14.3       The Internet of Everything (IoE)                66
14.4       The Government Internet of Things (GIoT)          67
14.5       The Business Internet of Things (BIoT)   67
13.0       ROLE OF SATELLITE IN M2M        68
15.2       Market for Satellite Players in M2M        68
14.0       CHOOSING A WIRELESS SERVICE PROVIDER         70
16.2       SIM Cards            70
16.3       Activation            71
16.4       Billing Services   71
16.5       Roaming              71
16.6       SLAs       71
16.7       Cost per SMS / Data Block            72
16.8       SMS Data Retry Scheme               72
16.9       Store and Forward          72
16.10      SMS Delivery Receipt     72
16.11      SMS with GPRS and 3G  73
15.0       RECOMMENDATIONS FOR M2M DEVELOPMENT PROJECTS          74
17.2       Project Manager              74
17.3       M2M Development and Launch Plan      75
17.4       Project's Business Model             75
17.5       Budgetary Control           76
17.6       Open Source M2M Frameworks for Product Development          76
17.7       Components Selection  76
17.8       Network Choice               77
17.9       Secured Connectivity     78
16.0       M2M STANDARDIZATION            79
18.2       GSMA   82
18.3       oneM2M             83
18.4       ETSI        84
18.5       Zigbee  84
18.6       The Global M2M Association (GMA)       86
18.7       AllSeen Alliance                87
18.8       M2M World Alliance       87
18.9       European Standardization Organizations (ESO)   88
18.10      Industrial Internet Consortium (IIC)         88
18.11      ITU-T     88
18.12      Present and Future of standards of M2M             88
17.0       CONCLUSIONS  91
 
Figures
 
Figure 1: Benefits of Using M2M               23
Figure 2: Key Barriers of Scaling M2M Technologies          26
Figure 3: Basic Building Blocks of M2M    36
Figure 4: M2M Ecosystem (Concise View)             39
Figure 5: M2M Ecosystem (Expanded View)        40
Figure 6: M2M Ecosystem (Further Expanded)   41
Figure 7: M2M Ecosystem (Fully Expanded)         42
Figure 8: Complete View of M2M Ecosystem      44
Figure 9: M2M Value Chain          45
Figure 10: M2M Technology Drivers         49
Figure 11: Sensors Expand to a Wide variety of Uses        50
Figure 12: M2M Communication Mediums           52
Figure 13: Difference between Bluetooth and Zigbee protocol   55
Figure 14: GPS enabled Tracking of Assets on Global Scale            57
Figure 15: Wireless Sensor Communications Module       58
Figure 16: Pre-configured Sensor Board for Agriculture  59
Figure 17: Conceptual M2M Platform      62
Figure 18: Groups driving IoT      64
Figure 19: Internet of Everything including Network Effects         67
Figure 20: Service Requirements for Planning M2M         70
Figure 21: Managing M2M Projects for Businesses           74
Figure 22: Advantages of Standards         80
Figure 23: Comparison of M2M Standards            82
 
Smart Home, Building, and City M2M Applications
 
EXECUTIVE SUMMARY
1.0        SMART HOME   1
2.1        Primary Elements of Smart Home             1
2.1.1      Infrastructure    1
2.1.2      Sensors                2
2.1.3      Actuators            2
2.1.4      Applications       3
2.1.5      Hub        4
2.2        Real-life applications and solutions available for Smart Home      7
2.3        Smart Home Vision         17
2.4        Requirement of Smart Home Services    18
2.4.1      Affordability       19
2.4.2      Usability               19
2.4.3      Reliability             20
2.5        Stages of Smart Home Services 20
2.5.1      Stage 1 - Connected Standalone Devices              21
2.5.2      Stage 2 - Connected Service Silos             22
2.5.3      Stage 3 - Integrated Smart Home              24
2.6        Smart Home Ecosystem Requirements  25
2.6.1      Home Environment        26
2.6.2      Wide Area Connectivity                27
2.6.3      Back-end Environment  27
2.6.4      Enabling Service Features            28
2.6.5      Third Party Service Providers      28
2.0        SMART HOME SOLUTION FOR SUSTAINABLE HOMES      32
3.1        Sustainability     32
3.2        Smart Home parameters to support sustainable home concept 32
3.2.1      Thermal Comfort             33
3.2.2      Water   34
3.2.3      Communications and Entertainment       34
3.2.4      Safety & Security             35
3.2.5      Lighting                35
3.2.6      Heath & Wellbeing          36
3.2.7      Smart Meter      36
3.2.8      Protecting the Building fabric      37
3.0        SMART BUILDING            38
4.1        Security Solution              39
4.2        Facilities Control               40
4.3        Standardization in Smart Home Arena    42
4.0        CASE STUDY - SMART HOME AND SMART BUILDING        43
5.1        Case: Smart Home Solution for Art Collector        43
5.1.1      The Challenge   43
5.1.2      The Solution       43
5.1.3      The Result           45
5.2        Case: Total Home Control Solution           45
5.2.1      The Challenge   45
5.2.2      The Solution       45
5.2.3      The Result           46
5.3        Case: Sir Richard Branson's Caribbean Smart Home          47
5.3.1      The Challenge   47
5.3.2      The Solution       47
5.3.3      The Result           48
5.4        Case: Energy Management         48
5.4.1      The Challenge   48
5.4.2      The Solution       49
5.4.3      The Result           49
5.5        Case : Real-time monitoring of oil levels                50
5.5.1      The Challenge   50
5.5.2      The Solution       50
5.5.3      The Result           50
5.5.4      Author's Note   50
5.6        Case: Professional Golfer's Smart Home               50
5.6.1      The Challenge   51
5.6.2      The Solution       51
5.6.3      The Result           53
5.7        Case : Monitor Structural parameters in Real time            53
5.7.1      The Challenge   54
5.7.2      The Solution       54
5.7.3      The Result           54
5.7.4      Author's Note   55
5.0        CONCEPTS OF SMART CITY          56
5.8        Objective of Smart City 57
5.9        Essential Elements of Smart City               59
5.10       Initial Steps for Creating Smart Cities       60
5.11       Framework for Smart City            60
5.12       Features of Smart City   63
5.13       Use of M2M for Smart City          65
5.14       Development activities for Smart City in India     67
5.15       Development activities for Smart City in China    69
5.16       Development activities for Smart City in Spain    70
5.16.1     Wireless network in Santander  70
5.17       Development activities for Smart City in Brazil    72
5.18       Development activities for Smart City across the Globe  73
5.19       Standards (or lack of it) for Smart City     75
5.20       Open-Source Platform for developing Applications          75
6.0        CASE STUDY - SMART CITY          78
6.1        Case : Solution for Traffic Safety                78
6.1.1      The Challenge   78
6.1.2      The Solution       78
6.1.3      The Result           79
6.1.4      Author's Note   79
6.2        Case : Solution for Parking Meters           80
6.2.1      The Challenge   80
6.2.2      The Solution       80
6.2.3      The Result           81
6.2.4      Author's Note   81
6.3        Case : Solution for 'smart' public convenience system    81
6.3.1      The Challenge   81
6.3.2      The Solution       82
6.3.3      The Result           83
6.3.4      Author's Note   83
6.4        Case : Solution for Waste Disposal            83
6.4.1      The Challenge   83
6.4.2      The Solution       84
6.4.3      The Result           84
6.4.4      Author's Note   84
6.5        Case : Experimental Research Facility for Smart City         85
6.5.1      The Challenge   85
6.5.2      The Solution       85
6.5.3      The Result           85
6.5.4      Author's Note   86
7.0        CONCLUDING REMARKS               87
 
List of Figures
 
Figure 1: Primary Elements of Smart Home          6
Figure 2: Samsung Smart Home Service 7
Figure 3: Revolv                8
Figure 4: Device by Savant Systems         9
Figure 5: Archos                10
Figure 6: HAPIfork           10
Figure 7: Belkin WeMo Smart Slow Cooker           11
Figure 8: LeakSmart Water Valve              11
Figure 9: Sleep Number x12 Bed               12
Figure 10: Whirlpool Smart Dishwasher  12
Figure 11: Netatmo Connected Weather Station               13
Figure 12: Koubachi Wi-Fi Plant Sensor   14
Figure 13: Nest Thermostat         15
Figure 14: Canary's multi-sensor security hub     15
Figure 16: Staples Connect           16
Figure 17: Belkin WeMo Home Automation         17
Figure 18: Smart Home Vision     18
Figure 19: Requirement of Smart Home Services               19
Figure 20: Stages of Smart Home Services             21
Figure 21: Stage 1: Connected Standalone Devices           22
Figure 22: Stage 2: Connected Service Silos          23
Figure 23: Stage 3: Integrated Smart Home          25
Figure 24: Smart Home Ecosystem Requirements             26
Figure 25: Smart Home parameters to support sustainable home concept             33
Figure 26: Intelligent Building      40
Figure 27: Objectives of Smart City           57
Figure 28: Essential elements of Smart City          59
Figure 29: Initial Steps for Creating Smart Cities  60
Figure 30: Important Tasks for Smart City              61
Figure 31: Smart City Framework              62
Figure 32: Features of Smart City              64
 
M2M Security and Privacy: Challenges and Opportunities
 
EXECUTIVE SUMMARY
 
Part One: Machine-to-Machine Security               12
 
1.0          EXPLOITED VULNERABILITIES AND ATTACKS        12
2.0          SECURITY REQUIREMENTS FOR M2M      14
2.1          Authentication  14
2.2          Confidentiality  14
2.3          Access control   14
2.4          Integrity               15
2.5          Privacy  15
2.6          Availability          15
2.7          Non-repudiation              15
3.0          FACTORS LEADING TO COMPLEXITY IN M2M APPLICATIONS        16
3.1          Proliferation of Nodes in Network           16
3.2          Limited Computational Power    16
3.3          Lack of Awareness          16
3.4          Lack of Pre-set Rules      17
3.5          Difficult to Tackle Denial of Power Attacks            17
3.6          Need to Reduce Risk Exposure  17
3.7          DDoS Attack from Compromised Nodes                17
3.8          Users Responsible for Enabling Security Protection          18
3.9          Security is Not highest Priority   18
4.0          MEASURES TO ENSURE SECURITY FOR M2M APPLICATIONS         19
4.1          Security Considerations during Design Phase      19
4.2          Define User-level Security           19
4.3          Limited Access to Internet           20
4.4          Use of Open-source Software to Configure Specific Security Settings      20
4.5          Vendors to Disclose Vulnerabilities          20
4.6          Analyze Attack Surface to Understand Probable Attack Points    21
4.7          Ensure Secure Design    21
4.8          Code Signing to Confirm Integrity             21
4.9          All Value Chain Layers Must be Secured                22
4.10         Stakeholders to Work in Sync for Security Measures       22
4.11         Do not Allow Permanent Access               24
4.12         Implement Typical Security Measures    24
5.0          TWO POINTS OF ATTACK ON M2M COMMUNICATIONS                25
5.1          Physical Attacks on Unattended Devices               25
5.1.1        Recommendations to Increase Security of Physical Devices          26
5.2          Network-side Attacks    26
5.2.1        Recommendations to Increase Security on Network Side              27
6.0          DIFFERENCE IN M2M COMMUNICATION OVER GSM AND CDMA              28
7.0          CRITICAL DEVICE CONTROLS BY M2M APPLICATIONS      29
8.0          SECURITY AN INTEGRAL PART OF APPLICATION DESIGN                30
9.0          SOPHISTICATED SECURITY MECHANISMS FOR M2M SECURITY    31
9.1          Early Detection of Compromised Nodes                31
9.2          Bandwidth Efficient Cooperative Authentication               31
10.0         EVOLVING ELEMENTS OF SECURITY         32
11.0         SECURITY IS ONE OF MANY GO-TO-MARKET FACTORS    33
12.0         SECURING THE COMMUNICATIONS AND NOT JUST DEVICES       34
13.0         USE OF IPV6: ADDED SECURITY PROBLEMS           35
14.0         ADEQUATE USE OF CERTIFICATE FOR SECURITY  36
15.0         SPECIAL SKILL-SET REQUIRED FOR DEPLOYING SECURITY TOOLS 37
16.0         ORGANIZATIONS AND COLLABORATIONS FOR STANDARDS         38
16.1         AllSeen Alliance                38
16.2         IETF        39
16.3         Mobile App Security Working Group       39
16.4         Machine-to-Machine Standardization Task Force (MSTF)              39
16.5         Standards by Verticals   40
 
Part Two: Machine-to-Machine Privacy 41
 
17.0        PRIVACY CONCERNS       41
17.1        Data Ownership Unclear               42
17.2        Control Factor Unclear   42
17.3        Government Initiatives 43
17.4        Across Boundaries and Verticals                43
17.5        Aspects of Privacy and Security to be Re-addressed        44
18.0        PRIVACY AND SECURITY CONCERNS FOR BIG DATA          45
18.1        Automated Access through Authorizations          45
18.2        Non-standard Approach to Granting Access        46
18.3        Business Continuity Risk               47
18.4        Best Practices    47
19.0        PRIVACY ISSUES IN CLOUD COMPUTING               49
20.0        PRIVACY AN INTEGRAL PART OF APPLICATION DESIGN  50
 
Part Three: Industry Views on Security  51
 
21.0        INDUSTRY SURVEY ON SECURITY              51
21.1        Introduction       51
21.2        Survey Participants         51
21.3        Geographic Reach           52
21.4        Role of M2M in Applications       53
21.5        Highest Concerns of M2M Solution Deployment               53
21.6        Highest Security Concern while Deploying M2M Solutions            54
21.7        Security Solution              55
21.8        Concluding Remarks on Industry Survey                55
 
Part Four: Wireless Sensor Networks      57
 
22.0        INTRODUCTION TO WIRELESS SENSOR NETWORKS           57
23.0        SECURITY THREATS ON OSI LAYERS FOR WSN      58
23.1        Physical Layer of OSI Model        58
23.1.1      Attacks in Physical Layer               58
23.1.2      Countermeasures for Attack in Physical layer      59
23.2        MAC Layer of OSI Model              62
23.2.1      Attacks in MAC Layer     62
23.2.2      Countermeasures for Attack in MAC Layer           63
23.3        Network Layer of OSI Model      66
23.3.1      Attacks in Network Layer             67
23.3.2      Countermeasures for Attack in Network Layer   69
23.4        Application Layer of OSI Model  71
23.4.1      Attacks in Application Layer         72
23.4.2      Countermeasures for Attack in Application layer               73
23.5        Concluding Remarks on Security Threats on OSI layer      74
24.0        SECURITY GOALS OF WIRELESS SENSOR NETWORKS         76
24.1        Primary Security Goals   76
24.1.1      Data Integrity    76
24.1.2      Data Authentication       77
24.1.3      Data Confidentiality        77
24.1.4      Data Availability                77
24.2        Secondary Security Goals             77
24.2.1      Self-Organization             77
24.2.2      Time Synchronization     77
24.2.3      Data Freshness 78
24.2.4      Secure Localization          78
25.0        CHALLENGES FOR WIRELESS SENSOR NETWORKS              79
25.1        Wireless Medium inherently Less Secure              79
25.2        Security Tools to Adopt to Ad-Hoc Nature            79
25.3        Hostile Environment of Sensor Nodes    80
25.4        Resource Inadequacy of Sensor Devices               80
25.5        Massive Scale of IoT / M2M        80
25.6        Unreliable Communication          80
25.6.1      Unreliable Transfer         80
25.6.2      Conflicts               80
25.6.3      Latency                81
25.7        Unattended Sensor Nodes          81
25.7.1      Exposure to Physical Attacks       81
25.7.2      Managed Remotely        81
25.7.3      No Central Management Point  81
26.0        TYPES OF ATTACKS IN SENSOR NETWORKS           82
26.1        Passive Attack   82
26.1.1      Attacks against Privacy  82
26.2        Active Attack     83
26.2.1      Denial of Service (DoS) Attack    84
26.2.2      Routing Attacks                84
26.2.3      Physical Attacks on Devices         85
26.2.4      Node Subversion             86
26.2.5      Node Malfunction           86
26.2.6      Node Outage     86
26.2.7      Interception of the Messages of Sensor Nodes 86
26.2.8      Modification of Message              86
26.2.9      False Node         86
26.2.10     Node Replication Attacks             87
27.0        SECURITY MECHANISMS TO COMBAT ACTIVE AND PASSIVE ATTACKS     88
27.1        Low-Level Mechanism   88
27.1.1      Secrecy and Authentication        88
27.1.2      Privacy  89
27.1.3      Secure Routing 89
27.1.4      Robustness to Communication Denial of Service               89
27.1.5      Resilience to Node Capture         89
27.1.6      Key Establishment and Trust Setup          90
27.2        High-Level Mechanism  90
27.2.1      Intrusion Detection         90
27.2.2      Secure Data Aggregation              90
27.2.3      Secure Group Management       90
28.0        SENSOR NETWORK STANDARDIZATION 92
29.0        CONCLUDINS     93
 
Figures
 
Figure 1: Security Requirements for M2M            14
Figure 2: Factors leading to complexity in M2M Applications        16
Figure 3: Measures to Ensure Security for M2M Applications       19
Figure 4: Organizations and Collaborations for Standards for Safety          38
Figure 5: Privacy Concerns           42
Figure 6: Privacy and Security Concerns for Big Data         45
Figure 7: Industry Security Survey Participants    52
Figure 8: Geographic Reach of Companies            53
Figure 9: Topmost Concerns for Deploying M2M Solutions            54
Figure 10: Topmost M2M Security/Privacy Considerations by Enterprise                55
Figure 11: Attacks on OSI Layers                58
Figure 12: Counter Measures for Attacks in OSI Layers    74
Figure 13: Security Goals of Wireless Sensor Network     76
Figure 14: Challenges for Wireless Sensor Networks        79
Figure 15: Types of Attacks in Sensor Networks 82
Figure 16: Techniques employed to deploy Active attacks             84
Figure 17: Security Mechanisms to Combat Active and Passive Attacks    88

 

Date of Publication:
Aug 28, 2014
File Format:
PDF via E-mail
Number of Pages:
282 Pages
Type the characters you see in the picture above.