M2M communications: a systems approach

M2M communications: a systems approach

Boswarthick, David
Hersent, Olivier
Elloumi, Omar

81,63 €(IVA inc.)

A comprehensive introduction to M2M Standards and systems architecture, from concept to implementationFocusing on the latest technological developments, M2M Communications: A Systems Approach is an advanced introduction to this important and rapidly evolving topic. It provides a systems perspective on machine-to-machine services and the major telecommunications relevant technologies. It provides a focus on the latest standards currently in progress by ETSI and 3GPP, the leading standards entities in telecommunication networks and solutions. The structure of the book is inspired by ongoing standards developments and uses a systems-based approach for describing the problems which may be encountered when considering M2M, as well as offering proposed solutions from the latest developments in industry and standardization.The authors provide comprehensive technical information on M2M architecture, protocols and applications, especially examining M2M service architecture, access and core network optimizations, and M2M area networks technologies.  It also considers dominant M2Mapplication domains such as Smart Metering, Smart Grid, and eHealth. Aimed as an advanced introduction to this complex technical field, the book will provide an essential end-to-end overview of M2M for professionals working in the industry and advanced students.Key features:First technical book emerging froma standards perspective to respond to this highly specific      technology/business segmentCovers the main challenges facing the M2M industry today, and proposes early roll-out scenarios and potential optimization solutionsExamines the system level architecture and clearly defines the methodology and interfaces to be consideredIncludes important information presented in a logical manner essential for any engineer or business manager involved in the field ofM2M and Internet of ThingsProvides a cross-over between vertical and horizontal M2M concepts and a possible evolution path between the twoWritten by experts involved at the cutting edge of M2M developments INDICE: ForewordList of ContributorsList of Acronyms1 Introduction to M2M1.1 What is M2M?1.2 The Business of M2M1.3 Accelerating M2M Maturity1.3.1 High-Level M2M Frameworks1.3.2 Policy and Government Incentives1.4 M2M Standards1.4.1 Which Standards for M2M?1.5 Roadmap of the BookReferencesPart I M2M CURRENTLANDSCAPE2 The Business of M2M2.1 The M2M Market2.1.1 Healthcare2.1.2 Transportation2.1.3 Energy2.2 The M2M Market Adoption: Drivers and Barriers2.3 The M2M Value Chain2.4 Market Size Projections2.5 Business Models2.5.1 Network Operator- or CSP-Led Model2.5.2 MVNO-Led Model2.5.3 Corporate Customer-Led Model2.6M2M Business Metrics2.7 Market EvolutionReference3 Lessons Learned from EarlyM2M Deployments3.1 Introduction3.2 Early M2M Operational Deployments3.2.1 Introduction3.2.2 Early M2M Operational Deployment Examples3.2.3 Common Questionsin Early M2M Deployments3.2.4 Possible Optimization of M2M Deployments3.3 Chapter ConclusionReferencePart II M2M ARCHITECTURE AND PROTOCOLS4 M2M Requirements and High-Level Architectural Principles4.1 Introduction4.2 Use-Case-Driven Approach to M2M Requirements4.2.1 What is a Use Case?4.2.2 ETSI M2M Work on Use Cases4.2.3 Methodology for Developing Use Cases4.3 Smart Metering Approach in ETSI M2M4.3.1 Introduction4.3.2 Typical Smart Metering Deployment Scenario4.4 eHealth Approach in ETSI M2M4.4.1 Introduction4.5 ETSI M2M Service Requirements: High-Level Summary and Applicability to Different Market Segments4.6 Traffic Models-/Characteristics-Approach to M2M Requirements and Considerations for Network Architecture Design4.6.1 Why Focus on Wireless Networks?4.7 Description of M2M Market Segments/Applications4.7.1 Automotive4.7.2 Smart Telemetry4.7.3 Surveillance and Security4.7.4 Point of Sale (PoS)4.7.5 Vending Machines4.7.6 eHealth4.7.7 Live Video4.7.8 Building Automation4.7.9 M2M Industrial Automation4.8 M2M Traffic Characterization4.8.1 Detailed Traffic Characterization for Smart Metering4.8.2 Global Traffic Characterization4.9 High-Level Architecture Principles for M2M Communications4.10 Chapter ConclusionsReferences5 ETSI M2M Services Architecture5.1 Introduction5.2 High-Level System Architecture5.3ETSI TC M2M Service Capabilities Framework5.4 ETSI TC M2M Release 1 Scenarios5.5 ETSI M2M Service Capabilities5.5.1 Reachability, Addressing, and Repository Capability (xRAR)5.5.2 Remote Entity Management Capability (x REM)5.5.3 Security Capability (xSEC)5.6 Introducing REST Architectural Style for M2M5.6.1 Introduction to REST5.6.2 Why REST for M2M?5.6.3 REST Basics5.6.4 Applying REST to M2M5.6.5 Additional Functionalities5.7 ETSI TC M2M Resource-Based M2M Communication and Procedures5.7.1 Introduction5.7.2 Definitions Used in this Section5.7.3 Resource Structure5.7.4 Interface Procedures5.8 Chapter ConclusionReferences6 M2M Optimizations in Public Mobile Networks6.1 Chapter Overview6.2 M2M over a Telecommunications Network6.2.1 Introduction6.2.2 M2M Communication Scenarios6.2.3 Mobile or Fixed Networks6.2.4 Data Connections for M2M Applications6.3 Network Optimizations for M2M6.3.1 Introduction6.3.2 3GPP Standardizationof Network Improvements for Machine Type Communications6.3.3 Cost Reduction6.3.4 M2M Value-Added Services6.3.5 Numbering, Identifiers, and Addressing6.3.6 Triggering Optimizations6.3.7 Overload and Congestion ControlReferences7 The Role of IP in M2M7.1 Introduction7.1.1 IPv6 in Brief7.1.2 Neighbor Discovery Protocol7.2 IPv6 for M2M7.3 6LoWPAN7.3.1 Framework7.3.2 Header Compression7.3.3 Neighbor Discovery7.4 Routing Protocol for Low-Power and Lossy Networks (RPL)7.4.1 RPL Topology7.5 CoRE7.5.1 Message Formats7.5.2 Transport Protocol7.5.3 REST ArchitectureReferences8 M2M Security8.1 Introduction8.1.1 Security Characteristics of Cellular M2M8.2 Trust Relationships in the M2M Ecosystem8.3 Security Requirements8.3.1 Customer/M2M Device User8.3.2 Access Network Provider8.3.3M2M Service Provider8.3.4 Application Provider8.3.5 Bootstrapping Requirements8.4 Which Types of Solutions are Suitable?8.4.1 Approaches Against Hijacking8.4.2 Public Key Solutions8.4.3 Smart Card-Based Solutions8.4.4 Methods Based on Pre-Provisioned Symmetric Keys8.4.5 Protocol for Automated Bootstrapping Based on Identity-Based Encryption8.4.6 Security for Groups of M2M Devices8.5 Standardization Efforts on Securing M2M and MTC Communications8.5.1 ETSI M2M Security8.5.2 3GPP Security Related to Network Improvements for Machine Type CommunicationsReferences9 M2M Terminals and Modules9.1 M2M Module Categorization9.1.1 Access Technology9.1.2 Physical Form Factors9.2 Hardware Interfaces9.2.1 Power Interface9.2.2 USB (Universal Serial Bus) Interface9.2.3 UART (Universal Asynchronous Receiver/ Transmitter) Interface9.2.4 Antenna Interface9.2.5 UICC (Universal Integrated Circuit Card) Interface9.2.6 GPIO (General-Purpose Input/Output Port) Interface9.2.7 SPI (Serial Peripheral Interface) Interface9.2.8 I2C (Inter-Integrated Circuit Bus) Interface9.2.9 ADC (Analog-to-Digital Converter) Interface9.2.10 PCM (Pulse Code Modulation) Interface9.2.11 PWM (Pulse Width Modulation) Interface9.2.12 Analog Audio Interface9.3 Temperature and Durability9.4 Services9.4.1 Application Execution Environment9.4.2 Connectivity Services9.4.3 Management Services9.4.4 Application Services9.5 Software Interface9.5.1 AT Commands9.5.2 SDK Interface9.6 Cellular Certification9.6.1 Telecom Industry Certification9.6.2 MNO Certification10 Smart Cards in M2M Communication10.1 Introduction10.2 Security and Privacy Issues in M2M Communication10.3 The Grounds for Hardware-Based Security Solutions10.4 Independent Secure Elements and Trusted Environments10.4.1 Trusted Environments in M2M Devices10.4.2 Trusting Unknown Devices: The Need for Security Certification10.4.3 Advantages of the Smart Card Model10.5 Specific Smart Card Properties for M2M Environments10.5.1 Removable Smart Cards versus Embedded Secure Elements10.5.2 UICC Resistance to Environmental Constraints10.5.3 Adapting the Card Application Toolkit to Unattended Devices10.5.4 Reaching UICC Peripheral Devices with Toolkit Commands10.5.5 Confidential Remote Management of Third-Party Applications10.6 Smart Card Future Evolutions in M2M Environments10.6.1 UICC-Based M2M Service Identity Module Application10.6.2 Internet Protocol Integration of the UICC10.7 Remote Administration of M2M Secure Elements10.7.1 Overview10.7.2 Late Personalization of Subscription10.7.3 Remote Management of Subscriptions on the FieldReferencesPart III BOOK CONCLUSIONS AND FUTURE VISION11 ConclusionsIndex

  • ISBN: 978-1-119-99475-6
  • Editorial: John Wiley & Sons
  • Encuadernacion: Cartoné
  • Páginas: 336
  • Fecha Publicación: 23/03/2012
  • Nº Volúmenes: 1
  • Idioma: Inglés