M2M communications : a systems approach /
A comprehensive introduction to M2M Standards and systems architecture, from concept to implementation Focusing on the latest technological developments, M2M Communications: A Systems Approach is an advanced introduction to this important and rapidly evolving topic. It provides a systems perspective...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Chichester, West Sussex, U.K. :
Wiley,
2012.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Foreword
- List of Contributors
- List of Acronyms
- 1 Introduction to M2M
- 1.1 What is M2M?
- 1.2 The Business of M2M
- 1.3 Accelerating M2M Maturity
- 1.3.1 High-Level M2M Frameworks
- 1.3.2 Policy and Government Incentives
- 1.4 M2M Standards
- 1.4.1 Which Standards for M2M?
- 1.5 Roadmap of the Book
- References
- Part I M2M CURRENT LANDSCAPE
- 2 The Business of M2M
- 2.1 The M2M Market
- 2.1.1 Healthcare
- 2.1.2 Transportation
- 2.1.3 Energy
- 2.2 The M2M Market Adoption: Drivers and Barriers
- 2.3 The M2M Value Chain
- 2.4 Market Size Projections
- 2.5 Business Models
- 2.5.1 Network Operator- or CSP-Led Model
- 2.5.2 MVNO-Led Model
- 2.5.3 Corporate Customer-Led Model
- 2.6 M2M Business Metrics
- 2.7 Market Evolution
- Reference
- 3 Lessons Learned from Early M2M Deployments
- 3.1 Introduction
- 3.2 Early M2M Operational Deployments
- 3.2.1 Introduction
- 3.2.2 Early M2M Operational Deployment Examples
- 3.2.3 Common Questions in Early M2M Deployments
- 3.2.4 Possible Optimization of M2M Deployments
- 3.3 Chapter Conclusion
- Reference
- Part II M2M ARCHITECTURE AND PROTOCOLS
- 4 M2M Requirements and High-Level Architectural Principles
- 4.1 Introduction
- 4.2 Use-Case-Driven Approach to M2M Requirements
- 4.2.1 What is a Use Case?
- 4.2.2 ETSI M2M Work on Use Cases
- 4.2.3 Methodology for Developing Use Cases
- 4.3 Smart Metering Approach in ETSI M2M
- 4.3.1 Introduction
- 4.3.2 Typical Smart Metering Deployment Scenario
- 4.4 eHealth Approach in ETSI M2M
- 4.4.1 Introduction
- 4.5 ETSI M2M Service Requirements: High-Level Summary and Applicability to Different Market Segments
- 4.6 Traffic Models-/Characteristics-Approach to M2M Requirements and Considerations for Network Architecture Design
- 4.6.1 Why Focus on Wireless Networks?
- 4.7 Description of M2M Market Segments/Applications
- 4.7.1 Automotive
- 4.7.2 Smart Telemetry
- 4.7.3 Surveillance and Security
- 4.7.4 Point of Sale (PoS)
- 4.7.5 Vending Machines.
- 4.7.6 eHealth
- 4.7.7 Live Video
- 4.7.8 Building Automation
- 4.7.9 M2M Industrial Automation
- 4.8 M2M Traffic Characterization
- 4.8.1 Detailed Traffic Characterization for Smart Metering
- 4.8.2 Global Traffic Characterization
- 4.9 High-Level Architecture Principles for M2M Communications
- 4.10 Chapter Conclusions
- References
- 5 ETSI M2M Services Architecture
- 5.1 Introduction
- 5.2 High-Level System Architecture
- 5.3 ETSI TC M2M Service Capabilities Framework
- 5.4 ETSI TC M2M Release 1 Scenarios
- 5.5 ETSI M2M Service Capabilities
- 5.5.1 Reachability, Addressing, and Repository Capability (xRAR)
- 5.5.2 Remote Entity Management Capability (x REM)
- 5.5.3 Security Capability (xSEC)
- 5.6 Introducing REST Architectural Style for M2M
- 5.6.1 Introduction to REST
- 5.6.2 Why REST for M2M?
- 5.6.3 REST Basics
- 5.6.4 Applying REST to M2M
- 5.6.5 Additional Functionalities
- 5.7 ETSI TC M2M Resource-Based M2M Communication and Procedures
- 5.7.1 Introduction
- 5.7.2 Definitions Used in this Section
- 5.7.3 Resource Structure
- 5.7.4 Interface Procedures
- 5.8 Chapter Conclusion
- References
- 6 M2M Optimizations in Public Mobile Networks
- 6.1 Chapter Overview
- 6.2 M2M over a Telecommunications Network
- 6.2.1 Introduction
- 6.2.2 M2M Communication Scenarios
- 6.2.3 Mobile or Fixed Networks
- 6.2.4 Data Connections for M2M Applications
- 6.3 Network Optimizations for M2M
- 6.3.1 Introduction
- 6.3.2 3GPP Standardization of Network Improvements for Machine Type Communications
- 6.3.3 Cost Reduction
- 6.3.4 M2M Value-Added Services
- 6.3.5 Numbering, Identifiers, and Addressing
- 6.3.6 Triggering Optimizations
- 6.3.7 Overload and Congestion Control
- References
- 7 The Role of IP in M2M
- 7.1 Introduction
- 7.1.1 IPv6 in Brief
- 7.1.2 Neighbor Discovery Protocol
- 7.2 IPv6 for M2M
- 7.3 6LoWPAN
- 7.3.1 Framework
- 7.3.2 Header Compression
- 7.3.3 Neighbor Discovery
- 7.4 Routing Protocol for Low-Power and Lossy Networks (RPL).
- 7.4.1 RPL Topology
- 7.5 CoRE
- 7.5.1 Message Formats
- 7.5.2 Transport Protocol
- 7.5.3 REST Architecture
- References
- 8 M2M Security
- 8.1 Introduction
- 8.1.1 Security Characteristics of Cellular M2M
- 8.2 Trust Relationships in the M2M Ecosystem
- 8.3 Security Requirements
- 8.3.1 Customer/M2M Device User
- 8.3.2 Access Network Provider
- 8.3.3 M2M Service Provider
- 8.3.4 Application Provider
- 8.3.5 Bootstrapping Requirements
- 8.4 Which Types of Solutions are Suitable?
- 8.4.1 Approaches Against Hijacking
- 8.4.2 Public Key Solutions
- 8.4.3 Smart Card-Based Solutions
- 8.4.4 Methods Based on Pre-Provisioned Symmetric Keys
- 8.4.5 Protocol for Automated Bootstrapping Based on Identity-Based Encryption
- 8.4.6 Security for Groups of M2M Devices
- 8.5 Standardization Efforts on Securing M2M and MTC Communications
- 8.5.1 ETSI M2M Security
- 8.5.2 3GPP Security Related to Network Improvements for Machine Type Communications
- References
- 9 M2M Terminals and Modules
- 9.1 M2M Module Categorization
- 9.1.1 Access Technology
- 9.1.2 Physical Form Factors
- 9.2 Hardware Interfaces
- 9.2.1 Power Interface
- 9.2.2 USB (Universal Serial Bus) Interface
- 9.2.3 UART (Universal Asynchronous Receiver/ Transmitter) Interface
- 9.2.4 Antenna Interface
- 9.2.5 UICC (Universal Integrated Circuit Card) Interface
- 9.2.6 GPIO (General-Purpose Input/Output Port) Interface
- 9.2.7 SPI (Serial Peripheral Interface) Interface
- 9.2.8 I2C (Inter-Integrated Circuit Bus) Interface
- 9.2.9 ADC (Analog-to-Digital Converter) Interface
- 9.2.10 PCM (Pulse Code Modulation) Interface
- 9.2.11 PWM (Pulse Width Modulation) Interface
- 9.2.12 Analog Audio Interface
- 9.3 Temperature and Durability
- 9.4 Services
- 9.4.1 Application Execution Environment
- 9.4.2 Connectivity Services
- 9.4.3 Management Services
- 9.4.4 Application Services
- 9.5 Software Interface
- 9.5.1 AT Commands
- 9.5.2 SDK Interface
- 9.6 Cellular Certification
- 9.6.1 Telecom Industry Certification.
- 9.6.2 MNO Certification
- 10 Smart Cards in M2M Communication
- 10.1 Introduction
- 10.2 Security and Privacy Issues in M2M Communication
- 10.3 The Grounds for Hardware-Based Security Solutions
- 10.4 Independent Secure Elements and Trusted Environments
- 10.4.1 Trusted Environments in M2M Devices
- 10.4.2 Trusting Unknown Devices: The Need for Security Certification
- 10.4.3 Advantages of the Smart Card Model
- 10.5 Specific Smart Card Properties for M2M Environments
- 10.5.1 Removable Smart Cards versus Embedded Secure Elements
- 10.5.2 UICC Resistance to Environmental Constraints
- 10.5.3 Adapting the Card Application Toolkit to Unattended Devices
- 10.5.4 Reaching UICC Peripheral Devices with Toolkit Commands
- 10.5.5 Confidential Remote Management of Third-Party Applications
- 10.6 Smart Card Future Evolutions in M2M Environments
- 10.6.1 UICC-Based M2M Service Identity Module Application
- 10.6.2 Internet Protocol Integration of the UICC
- 10.7 Remote Administration of M2M Secure Elements
- 10.7.1 Overview
- 10.7.2 Late Personalization of Subscription
- 10.7.3 Remote Management of Subscriptions on the Field
- References
- Part III BOOK CONCLUSIONS AND FUTURE VISION
- 11 Conclusions
- Index.