Hücresel Şebekelerde Makineler Arası İletişim ve Güvenlik Önerileri

Internet teknolojilerinin gelişimi ve Internet’in yaygınlaşması ile birlikte hayatımızda önemli değişiklikler meydana gelmiştir. Her yerden ve herhangi bir zamanda bilgiye ulaşma ve analiz edilmesi ihtiyacı; akıllı cihazlar arasında herhangi bir yöntem ile haberleşmenin gelişmesini sağlamıştır. Nesneler arası Internetin (IoT) en önemli parçalarından birisi olarak kabul edilen, makineler arası iletişim (M2M) olarak ta adlandırılan teknolojik gelişim ile makinelerin bağlantı ve birlikte çalışabilirliğinin sağlanması amaçlanmaktadır. Mobil haberleşme teknolojilerinin ve mobil Internet teknolojilerindeki yenilikler ile birlikte telekomünikasyon sektöründe mobil abone sayısı giderek artmaktadır, söz konusu gelişmeler ile birlikte M2M uygulamaların günlük hayatımızın ayrılmaz bir parçası haline geleceği kaçınılmazdır. Bu çalışma kapsamında Nesneler arası Internet (IoT), makineler arası iletişim (M2M) teknolojileri ve uygulamaları, olası güvenlik riskleri ve alınması gereken tedbirlere yer verilmiştir.

___

  • 1- Borgia E., The Internet of Things vision: Key features, applications and open issues, Computer Communications 54 (2014) 1–31
  • 2- Wu G., Talwar S., Johnsson K., M2M: From Mobile to Embedded Internet, IEEE Communications Magazine 49 (2011) 36-43
  • 3- Atzori L.,Iera A.,Morabito G., The Internet of Things: A survey, Computer Networks 54 (2010) 2787–2805
  • 4- Ricciato F., Coluccia A, Alconzo A., A review of DoS attack models for 3G cellular networks from a system-design perspective, Computer Communications 33 (2010) 551–558
  • 5- Pereira C., Aguiar A., Towards Efficient Mobile M2M Communications: Survey and Open Challenges, Sensors 2014, 14, 19582-19608
  • 6- Gubbi J. Buyya R., Internet of Things (IoT): A vision, architectural elements, and future directions, Future Generation Computer Systems 29 (2013) 1645–1660
  • 7- Fengming Cao F., Zhong Fan Z.,Cellular M2M Network Access Congestion: Performance Analysis and Solutions, 1st International Workshop on Internet of Things Communications and Technologies, 2013
  • 8- Hongsong C., Security and Trust Research in M2M System, Vehicular Electronics and Safety (ICVES), 2011 IEEE International Conference, 286 – 2901
  • 9- Lu R., Xu Li X., Liang X., GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications, Communications Magazine, IEEE , 2011, (Volume:49 , Issue: 4 ), 28-35
  • 10- Cha, I., Shah, Y., Schmidt, A. U., Leicher, A., & Meyerstein, M. V. (2009). Trust in M2M communication. Vehicular Technology Magazine, IEEE, 4(3), 69-75.
  • 11- J. Kim, J. Lee, J. Kim, and J. Yun, “M2M service platforms: Survey, issues, and enabling technologies,” IEEE Commun. Surveys Tuts., vol. 16,no. 1, pp. 61–76, 2014.
  • 12- Zhang Y., Home M2M Networks: Architectures, Standards, and QoS Improvement, Communications Magazine, IEEE ,2011 (Volume:49 , Issue: 4 ),44-52
  • 13- Walczak, D., Wrzos, M., Radziuk, A., Lewandowski, B., & Mazurek, C. (2012, July). Machine-to-Machine communication and data processing approach in Future Internet applications. In Communication Systems, Networks & Digital Signal Processing (CSNDSP), 2012 8th International Symposium on (pp. 1-5). IEEE.
  • 14- Murrynets I., Anomaly Detection in Cellular Machine-to-Machine Communications, Communications (ICC), 2013 IEEE, 2013, 2138-2143
  • 15- Pandey, S., Choi, M. J., Kim, M. S., & Hong, J. W. (2011, September). Towards management of machine to machine networks. In Network Operations and Management Symposium (APNOMS), 2011 13th Asia-Pacific (pp. 1-7). IEEE.
  • 16- Katusic, D., Weber, M., Bojic, I., Jezic, G., & Kusek, M. (2012, September). Market, standardization, and regulation development in machine-to-machine communications. In Software, Telecommunications and Computer Networks (SoftCOM), 2012 20th International Conference on (pp. 1-7). IEEE.
  • 17- Bojic, I., Jezic, G., Katusic, D., Desic, S., Kusek, M., & Huljenic, D. (2012, September). Communication in machine-to-machine environments. In Proceedings of the Fifth Balkan Conference in Informatics (pp. 283-286). ACM.
  • 18- Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: perspectives and challenges. Wireless Networks, 20(8), 2481-2501.
  • 19- Saied Y., A survey of collaborative services and security-related issues in modern wireless Ad-Hoc communications, Journal of Network and Computer Applications45 (2014)215–227
  • 20- Internet: Probe-IT, ETSI M2M Standarts, http://www.probe-it.eu/wp-content/uploads/2012/06/K1_ETSI-M2M-oneM2M-and-the-need-for-semantics-IoTWeek2012.pdf, Son Erişim: 18/11/2020
  • 21- Chen, Kwang-Cheng, and Shao-Yu Lien. "Machine-to-machine communications: Technologies and challenges." Ad Hoc Networks 18 (2014): 3-23.
  • 22- Luis Barriga, et al. "M2M Remote-Subscription Management", Ericsson Review 2011
  • 23- M. J. Booysen, J. S. Gilmore, S. Zeadally and G. J. van Rooyen, “Machine-to-machine (M2M) communications in vehicular networks,” KSII Transactions on Internet and Information Systems, vol. 6, no. 2, pp. 480–497, Feb. 2012.
  • 24- Bojic, I., Granjal, J., Monteiro, E., Katusic, D., Skocir, P., Kusek, M., & Jezic, G. Communication and Security in Machine-to-Machine Systems.
  • 25- Galetić, Vedran, et al. "Basic principles of Machine-to-Machine communication and its impact on telecommunications industry." MIPRO, 2011 Proceedings of the 34th International Convention. IEEE, 2011.
  • 26- I. Cha, Y. Shah, A. U. Schmidt, A. Leicher, and M. Meyerstein, ‘‘Security and trust for M2M communications,’’ presented at WWRF Meeting 22, Paris, France, 2009.
  • 27- Chen, M.; Wan, J.; Gonzalez, S.; Liao, X.; Leung, V. A Survey of Recent Developments in Home M2M Networks. IEEE Commun. Surv. Tutor. 2014, 16, 98–114.
  • 28- R. Roman, P. Najera, J. Lopez, Securing the internet of things, IEEE Computer 44 (9) (2011) 51–58.
  • 29- Taleb, Tarik, and Andreas Kunz. "Machine type communications in 3GPP networks: potential, challenges, and solutions." Communications Magazine, IEEE 50.3 (2012): 178-184.
  • 30- Cao, J., Ma, M., Li, H., Zhang, Y., & Luo, Z. (2014). A survey on security aspects for LTE and LTE-A networks. Communications Surveys & Tutorials, IEEE, 16(1), 283-302.
  • 31- Zhang, Y., Yu, R., Nekovee, M., Liu, Y., Xie, S., & Gjessing, S. (2012). Cognitive machine-to-machine communications: visions and potentials for the smart grid. Network, IEEE, 26(3), 6-13.
  • 32- Wan, J., Chen, M., Xia, F., Di, L., & Zhou, K. (2013). From machine-to-machine communications towards cyber-physical systems. Computer Science and Information Systems, 10(3), 1105-1128.
  • 33- A. Laya, L. Alonso, and J. Alonso-Zarate, “Is the Random Access Channel of LTE and LTE-A Suitable for M2M Communications? A Survey of Alternatives,” IEEE Surveys and Tutorials on Commun., vol. 16, no. 1, Jan. 2014, pp. 4–16.
  • 34- C.-W. Tsai, C.-F. Lai, M-C. Chiang, and L. T. Yang, “Data mining for Internet of things: A survey,” Commun. Surveys Tuts., vol. PP, no. 99, pp. 1–21, Nov. 2013.
  • 35- Ksentini, Adlen, Yassine Hadjadj-Aoul, and Tarik Taleb. "Cellular-based machine-to-machine: overload control." Network, IEEE 26.6 (2012): 54-60.
  • 36- S. Mirzadeh, H. Cruickshank, and R. Tafazolli, “Secure device pairing: A survey,” IEEE Commun. Surv.-Tuts., vol. 16, no. 1, pp. 1–24, Dec. 2013.
  • 37- M. Chen, J. Wan, and F. Li, "Machine-to-Machine Communications: Architectures, Standards and Applications," KSII ransactions on Internet & Information Systems, vol. 6, pp. 480-497, 2012.
  • 38- Chen, M., Gonzalez, S., Leung, V., Zhang, Q., & Li, M. (2010). A 2G-RFID-based e-healthcare system. Wireless Communications, IEEE, 17(1), 37-43.
  • 39- Pereira C., Aguiar A., Towards Efficient Mobile M2M Communications: Survey and Open Challenges, Sensors 2014, 14, 19582-19608
  • 40- Cha, Inhyok, et al. " Trust in M2M communication." Vehicular Technology Magazine, IEEE 4.3 (2009): 69-75.
  • 41- Internet: beecham research, Towards Smart Cities, http://m2msummit.pl/wp-content/uploads/sites/6/2014/10/brl-m2m-towards-smart-cities-wp-2014-sep.pdf, Son Erişim: 18/11/2020
  • 42- Internet: Ericsson, M2M: the Internet of 50 billion devices, http://www.ericsson.com/au/res/region_RASO/docs/2010/ericsson_50_billion_paper.pdf, Son Erişim: 18/11/2020
  • 43- Internet: Huawei, M2M: the Internet of 50 billion devices, http://www.huawei.com/en/about-huawei/publications/winwin-magazine/hw-079060.htm, Son Erişim: 18/11/2020
  • 44- Internet: Hunz, Machine-to-machine (M2M) security, http://events.ccc.de/camp/2011/Fahrplan/attachments/1883_m2m.pdf, Son Erişim: 18/11/2020
  • 45- Internet: IEEE, M2M Service Architecture: Delivering M2M Services Over Heterogeneous Networks, http://www.ieee-cqr.org/2012/May17/Session%209/Chonggang_Wang_InterDigital.pdf, Son Erişim: 18/11/2020
  • 46- Internet: NEC, Standards for Machine-to-Machine communication, http://www.cambridgewireless.co.uk/presentation/joergswetina010713.pdf, Son Erişim: 18/11/2020