Main Article Content

Abstract

The Internet of Things (IoT) is going to be the next group of Internet revolution linking more and more devices on Internet network or encouraging domain for next-generation communication systems. The data transferred by the machines or set device over the internet should be safely secured, and the data should be transmitted only to the intended system, then delivering the data to any another users or devices. The Machine-To-Machines and Internet of Things (IoT) communications are used in the wide-areas of applications such as transportation, smart grids, interactive education, e-healthcare, home area networks, agriculture sector. This paper will focus the Machine-To-Machines and Internet of Things (IoT) and the subset of Industrial Internet of Things (IoT) ecosystem and also focuses on vulnerabilities and security prone issues, these paper will provide insight guidance and reference for future research works.

Article Details

Author Biographies

Pavan Manjunathmin, Ph.D. Scholar in Computer Science, Jain University, Bangalore

Ph.D. Scholar in Computer Science, Jain University, Bangalore

Dr. Pritam Gajkumar Shah, Ph.D. Department of Computer Science, Jain University, Bangalore

Ph.D. Department of Computer Science, Jain University, Bangalore

How to Cite
[1]
P. Manjunathmin and D. P. Shah, “Machine to Machine Metamorphosis to the IOT”, Ausjournal, vol. 1, no. 1, pp. 31-34, Feb. 2019.

References

[1] White Paper on “Machine-to-Machine Communication (M2M)”
[2] Telecom ABC-M,M2M
[3] WIPRO,Applying Thought,MACHINE TO MACHINE,The Technology of the Future
[4] HowStuffWorks/Tech/Computer/ComputerHardware/Networking,How Machine-to-Machine Communication Works,BY TIM CROSBY
[5] Main/TERMI,IoT-Internet of Things,By Forrest Stroud,
[6] L.D.Xu,W.HeandS.Li,"Internet of Things in Industries: A Survey," in IEEE Transactions on Industrial Informatics, vol. 10, no. 4, pp. 2233-2243, Nov. 2014.doi: 10.1109/TII.2014.2300753
[7] J.Zheng,D.Simplot-Ryl,C.Bisdikian and H.T.Mouftah,"The internet of things [Guest Editorial],"in IEEE Communications Magazine, vol. 49, no. 11, pp. 30-31, November 2011
[8] The Industrial Internet of Things - What's the Difference Between IoT and IIoT?, Calum Mclelland,Dec 22, 2016
[9] HOME/TECH TOPICS/SMART TECHNOLOGY,How the Industrial Internet of Things Is Changing the Face of Manufacturing,
New networks could reduce maintenance costs and make workplaces safer,By KATHY PRETZ 23 February 2018,
[10] What is the difference between the "Internet of Things" (IoT) and "Machine to Machine" (M2M)?,Lucas Wang, Founder of HWTrek, platform that brings hardware to life (IoT/wearables/etc),Updated Dec 1, 2016
[11] The road from M2M to IoT is paved with big data,by Marc Jadoul,Feb 16 2017
[12] Comarch Telecommunications Solutions IoT Connectivity Management,IoT Connectivity Management,
[13] eclipse,HOME/ECLIPSE/WIKI/IoT/M2MIWG/M2MIWG/charter draft,IoT
[14] S.Sen and A.Balasubramanian,"A highly resilient and scalable broker architecture for IoT applications," 2018 10th International Conference on Communication Systems & Networks (COMSNETS),Bengaluru,India,2018,pp.336341.doi:10.1109/COMSNETS.2018.8328216
[15] AUGMENTED REALITY SERVICES IMPLEMENTED WITHIN SMART CITIES, BASED ON AN INTERNET OF THINGS INFRASTRUCTURE,CONCEPTS AND CHALLENGES:AN OVERVIEWArticle (PDF Available)·March 2018
[16] The Industrial Internet of Things (IIoT)
[17] 7 STEPS TO IIOT,Posted February 21st, 2017 by Carl Henning & filed under IIoT.
[18] Industrial Internet of Things:Unleashing the Potential of Connected Products and Services,January 2015,
[19] A.R.Sadeghi, C. Wachsmann and M. Waidner,"Security and privacy challenges in industrial Internet of Things," 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, 2015, pp. 1-6.doi: 10.1145/2744769.2747942.
[20] Understanding IoT Security – Part 1 of 3: IoT Security Architecture on the Device and Communication Layers,November 29,2016, Padraig Scully