19
STUART BENNETT ITC571 CAPSTONE PROJECT SEMINAR ITC571 - Emerging Technologies and Innovation (201630) Assessment 6 – Project Blog and Seminar Student: Stuart Bennett (ID: 11560606) Subject Mentor: Dr. Mohsin Iftikhar

CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with Wireless M2M utilising Cloud Computing

Embed Size (px)

Citation preview

STUART BENNETTITC571 CAPSTONE

PROJECT SEMINAR

ITC571 - Emerging Technologies and Innovation (201630)

Assessment 6 – Project Blog and SeminarStudent: Stuart Bennett (ID: 11560606)

Subject Mentor: Dr. Mohsin Iftikhar

ITC571 - Emerging Technologies and Innovation (201630)

Assessment 6 – Project Blog and SeminarStudent: Stuart Bennett (ID: 11560606)

Subject Mentor: Dr. Mohsin Iftikhar

SECURITY ISSUES AND CHALLENGES WITH WIRELESS

M2MUTILISING CLOUD INFRASTRUCTURE

A bit of an overview of Wireless M2M

• Wireless Machine-to-Machine (M2M)

communication is viewed as one of the next

frontiers in wireless communications and has

grown dramatically over the past decade.

Source: Telecom Cloud (2012)

A bit of an overview of Wireless M2M

• It is expected that the wireless M2M market to

account for nearly $200 Billion in revenue by the

end of 2022

A bit of an overview of Wireless M2M

• Some IT industry experts expect up to 50 billion

devices will be connected in the coming years.

Wireless M2M

Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as:

Intelligent metering and network management for the Utilities sector

Source: Netcomm Wireless

Wireless M2M

Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as:

Within the agricultural sector allowing the remote management of irrigation and stock control.

Source: Sensor Measurement

Wireless M2M

Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as:

e-Health applications such as remote patient monitoring

Source: oneM2M

Wireless M2M

Implementation of Wireless M2M applications are growing at a rapid pace lead by many new and varied business cases, such as:

Security and surveillance –• monitoring of public

transportation systems (roads, rail, buses)

• security applications (street surveillance and corporate security)

Source: iveda.com

Source: Forbes

Cloud Computing

Cloud computing is a new computing paradigm that has

significantly changed the global IT landscape.

• Cloud computing is flexible and scalable

• Allows the automatic provisioning and de-provisioning of

resources when required

Source: Shape Host Source: Simple Servers

Cloud Computing

Since Wireless M2M networks will generate vast

amount of data and have many resource-constrained

devices, it can be envisaged that cloud computing

will play a key role in Wireless M2M development by

offering desirable features such as:

• data storage

• data processing and

• virtualised infrastructure.

Source: Network World Source: Miami Technologist Source: PBJ Tech Solutions

CURRENT CHALLENGESThere are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing.

Some of the major concerns are: Security Issues

Security is a major concern in today’s internet. Given the number of connected devices in the future, we need to look at totally new and innovative solutions to address security concerns.

We must focus on security at endpoints - device security, cloud security, and network security.

Insufficient authentication and authorisation solutions

Cloud based security concerns, such as multi-tenanted environments

Source: IOT Business News

CURRENT CHALLENGESThere are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing.

Some of the major concerns are: Encryption

Encrypting information also tends to be a processor-intensive task.

A lack of transport encryption between the M2M device and the Cloud host.

There is a need to design a light-weight encryption algorithm/scheme that can be used with Wireless M2M devices

Source: TecTrade

CURRENT CHALLENGESThere are still many things to consider as we look to integrate Wireless M2M devices with Cloud Computing.

Some of the major concerns are: The Integration Challenge

Successful M2M/Cloud implementations will require a focus on how best to integrate these technologies.

We will also need to ensure that we have adequate infrastructure that can move massive amounts of data from heterogeneous sources.

How to do this all securely is a very important question? Source: Mobilize

FUTURE RESEARCH –STANDARDISATION

• One area that need additional research is to develop a global “Standard” for M2M devices, development and deployment.

• One of the biggest challenges within the current M2M ecosystem is the use of proprietary systems that often span across a number of layers, from physical to application.

• We need to ensure that we examine a number of use cases, collected from a number of M2M domains, to derive a set of requirements and functionalities for a common standardisation platform.

FUTURE RESEARCH –SECURITY

• It is vitally important that Wireless M2M developers make privacy and security a priority for continued M2M market growth. Additional research needs to be done in this area.

• Adequately securing Wireless M2M devices can be a complex activity. What is the best way to ensure that these environments are secure?

• Security issues integrating Wireless M2M devices with Cloud infrastructure

• We need to take into account that all Wireless M2M devices require the same security as does the cloud (firewalls, Anti-Virus programs, etc) and that we can use encryption across all devices.

Source: GSMA

CONCLUSIONWireless Machine-to-machine (M2M) technology will become a key enabler of many of the higher-profile platforms that are revolutionising industry. These include Cloud Services and the Industrial Internet of Things (IIoT).

Since wireless M2M networks will generate vast amount of data and have many resource-constrained devices, it can be envisaged that Cloud Computing will play a key role in Wireless M2M development.

Based on current research, is not completely clear how Wireless M2M and Cloud technologies will fit together or how the many concerns around security and privacy will be addressed.

Much more research needs to be done in these area to better understand and address these concerns.

SECURITY ISSUES AND CHALLENGES WITH WIRELESS M2MUTILISING CLOUD INFRASTRUCTURE

MY CAPSTONE PROJECT BLOG SITE

Can be found at -http://thinkspace.csu.edu.au/11560606itc571/