80,99 €
A comprehensive introduction to M2M Standards and systems architecture, from concept to implementation
Focusing on the latest technological developments, M2M Communications: A Systems Approach is an advanced introduction to this important and rapidly evolving topic. It provides a systems perspective on machine-to-machine services and the major telecommunications relevant technologies. It provides a focus on the latest standards currently in progress by ETSI and 3GPP, the leading standards entities in telecommunication networks and solutions. The structure of the book is inspired by ongoing standards developments and uses a systems-based approach for describing the problems which may be encountered when considering M2M, as well as offering proposed solutions from the latest developments in industry and standardization.
The authors provide comprehensive technical information on M2M architecture, protocols and applications, especially examining M2M service architecture, access and core network optimizations, and M2M area networks technologies. It also considers dominant M2M application domains such as Smart Metering, Smart Grid, and eHealth. Aimed as an advanced introduction to this complex technical field, the book will provide an essential end-to-end overview of M2M for professionals working in the industry and advanced students.
Key features:
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 556
Veröffentlichungsjahr: 2012
Table of Contents
Title Page
Copyright
Foreword
List of Contributors
List of Acronyms
Chapter 1: Introduction to M2M
1.1 What is M2M?
1.2 The Business of M2M
1.3 Accelerating M2M Maturity
1.4 M2M Standards
1.5 Roadmap of the Book
References
Part One: M2M Current Landscape
Chapter 2: The Business of M2M
2.1 The M2M Market
2.2 The M2M Market Adoption: Drivers and Barriers
2.3 The M2M Value Chain
2.4 Market Size Projections
2.5 Business Models
2.6 M2M Business Metrics
2.7 Market Evolution
References
Chapter 3: Lessons Learned from Early M2M Deployments
3.1 Introduction
3.2 Early M2M Operational Deployments
3.3 Chapter Conclusion
Reference
Part Two: M2M Architecture and Protocols
Chapter 4: M2M Requirements and High-Level Architectural Principles
4.1 Introduction
4.2 Use-Case-Driven Approach to M2M Requirements
4.3 Smart Metering Approach in ETSI M2M
4.4 eHealth Approach in ETSI M2M
4.5 ETSI M2M Service Requirements: High-Level Summary and Applicability to Different Market Segments
4.6 Traffic Models-/Characteristics-Approach to M2M Requirements and Considerations for Network Architecture Design
4.7 Description of M2M Market Segments/Applications
4.8 M2M Traffic Characterization
4.9 High-Level Architecture Principles for M2M Communications
4.10 Chapter Conclusions
References
Chapter 5: ETSI M2M Services Architecture
5.1 Introduction
5.2 High-Level System Architecture
5.3 ETSI TC M2M Service Capabilities Framework
5.4 ETSI TC M2M Release 1 Scenarios
5.5 ETSI M2M Service Capabilities
5.6 Introducing REST Architectural Style for M2M
5.7 ETSI TC M2M Resource-Based M2M Communication and Procedures
5.8 Chapter Conclusion
References
Chapter 6: M2M Optimizations in Public Mobile Networks
6.1 Chapter Overview
6.2 M2M Over a Telecommunications Network
6.3 Network Optimizations for M2M
References
Chapter 7: The Role of IP in M2M*
7.1 Introduction
7.2 IPv6 for M2M
7.3 6LoWPAN
7.4 Routing Protocol for Low-Power and Lossy Networks (RPL)
7.5 CoRE
References
Chapter 8: M2M Security
8.1 Introduction
8.2 Trust Relationships in the M2M Ecosystem
8.3 Security Requirements
8.4 Which Types of Solutions are Suitable?
8.5 Standardization Efforts on Securing M2M and MTC Communications
References
Chapter 9: M2M Terminals and Modules
9.1 M2M Module Categorization
9.2 Hardware Interfaces
9.3 Temperature and Durability
9.4 Services
9.5 Software Interface
9.6 Cellular Certification
Chapter 10: Smart Cards in M2M Communication
10.1 Introduction
10.2 Security and Privacy Issues in M2M Communication
10.3 The Grounds for Hardware-Based Security Solutions
10.4 Independent Secure Elements and Trusted Environments
10.5 Specific Smart Card Properties for M2M Environments
10.6 Smart Card Future Evolutions in M2M Environments
10.7 Remote Administration of M2M Secure Elements
References
Part Three: Book Conclusions and Future Vision
Chapter 11: Conclusions
Index
This edition first published 2012
© 2012 John Wiley & Sons Ltd
Registered office
John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom
For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com.
The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.
ETSI logo reproduced by kind permission of © ETSI, All Rights Reserved.
© European Telecommunications Standards Institute. Further use, modification, copy and/or distribution are strictly prohibited. ETSI standards are available from http://pda.etsi.org/pda/
© 3GPP TSs and TRs are the property of ARIB, ATIS, CCSA, ETSI, TTA and TTC who jointly own the copyright in them. They are subject to further modifications and are therefore provided to you “as is” for information purposes only. Further use is strictly prohibited.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought.
Library of Congress Cataloging-in-Publication Data
M2M communications : a systems approach / edited by David
Boswarthick, Omar Elloumi, Olivier Hersent.
p. cm.
Includes bibliographical references and index.
ISBN 978-1-119-99475-6 (cloth)
1. Machine-to-machine communications. I. Boswarthick, David.
II. Elloumi, Omar. III. Title: Machine-to-machine communications.
TK5105.67.M32 2012
621.39′8–dc23
2011044199
A catalogue record for this book is available from the British Library.
Print ISBN: 9781119994756
Foreword
It was with great pleasure that I accepted the invitation to write the foreword for this first of two books on M2M and Internet of Things, M2M Communications: A Systems Approach.
Although the market for Machine to Machine (M2M) devices and applications is still developing, we can already foresee that this technology will have a profound impact on our lives, as new application fields are explored. Numerous projections have been made for the growth of M2M: for example estimates include an increase from the current 6 billion cellular devices to eventually over 50 billion cellular-connected machines. Other estimates indicate the total market volume from M2M and Internet of Things reaching $11.5bn by 2012. Indeed the M2M market can already be segmented in numerous ways: distinguishing between hardware devices and software, between connection technologies, or according to specific industrial application segment.
Why are M2M markets taking off now, since many of the technologies used have existed for a number of years? A key factor in the growth of M2M today is the widespread availability of ubiquitous, low-cost connectivity. We have become used to cheap, high-speed home and business internet access. Now in many regions 3G and future LTE mobile networks offer similar access speeds at highly competitive prices. Suddenly a host of applications we have dreamt about and which require internet connectivity have become economically viable.
The large-scale deployment of IP-connected sensors, monitors and actuators, in the home and in industry, enables the development of new interconnected, interoperable services which hold the potential to transform our daily lives. M2M technologies offer a vision of mash-up applications founded in reality, utilising multiple new sources of information, in contrast to the virtual world of mash-up web services. This vision is sometimes referred to as ‘The Internet of Things’, but it's not the connected things which are important. Instead, what is important is the information which they provide us, and how we combine and present and use this information, and how we make decisions based upon it. The Internet of Things offers a technical viewpoint. We must look beyond that to see the societal impact, to understand how we will make use of this technology to change our lives for the better.
A key feature of this vision of the future is the variety and range of technologies, functionalities and requirements which we need to take into account. How can we develop a flexible architecture into which we can place today's and tomorrow's technologies? How can we enable interoperability? How can we preserve confidentiality and privacy of information while not restricting potentially beneficial new applications? How can we ensure the reliability of these systems we will build, as we grow increasingly dependent on them? The solutions to these challenges lie not with any one organization or individual. This requires cross-industry thinking, it requires collaboration between the different actors concerned and it requires co-ordination at an international level. Consensus-based international standards are essential to ensure the development of M2M technologies and markets, providing solutions to many of these challenges. ETSI's M2M Technical Committee is currently playing a leading role in driving international standards work in this domain.
Beyond the wider societal challenges, we also face many detailed technical issues. A rapid deployment and adoption of M2M technology will result in new demands being placed on our networks. M2M services often require high efficiency, low overhead, low power consumption and greater flexibility in networks. These requirements will compete with the demand for high speed, low latency and large capacity, which our networks are currently equipped to handle. We may need to re-think how we design and how we manage our networks, if M2M services become as widespread as forecast. We will need to consider new access technologies in order to enable new applications which are not well served by the current radio technologies on the market.
The growth of M2M applications will have a profound impact on the standards which define our telecoms and data networks. ETSI has many years of work ahead of it to develop the specifications and standards which will be needed. I am certain that this book and its accompanying volume will provide us with useful guidance in this task, helping us to better understand the issues we need to tackle in order to create an M2M-enabled world.
Luis Jorge Romero
ETSI Director General
List of Contributors
List of Acronyms
3GPP
Third-Generation Partnership Project
6LoWPAN
IPv6 Over Low Power and Lossy Networks
AAA
Authentication, Authorization and Accounting
ABRO
Authoritative Border Router Option
ADC
Analog-to-Digital Converter
AKA
Authentication and Key Agreement
ALG
Application Level Gateway
AMPS
American Mobile Phone Service
AODV
Ad hoc On-Demand Distance Vector
API
Application Programming Interface
APN
Access Point Name
ARO
Address Registration Option
ARP
Allocation and Retention Priority
ARPU
Average Revenue Per User
ARRA
American Recovery and Reinvestment Act
ATM
Automated Teller Machine
B2B
Business-to-Business
B2C
Business-to-Consumer
BGA
Ball Grid Array
BOM
Bill of Materials
CA
Certificate Authority
CAPEX
CAPital EXpenditure
CAT
Card Application Toolkit
CBC
Cell Broadcast Center
CCF
CDMA Certification Forum
CDMA
Code Division Multiple Access
CDR
Charging Data Record
CEN
Comité Européen de Normalisation
CENELEC
Comité Européen de Normalisation Électrotechnique
CHAP
CHallenge Authentication Protocol
CID
Connection IDentifier
CIDR
Classless Interdomain Routing
CM
Configuration Management
CoAP
Constrained Application Protocol
CRL
Certificate Revocation List
CSD
Circuit-Switched Data
CSP
Communications Service Provider
DA
Device Application
DAD
Duplicate Address Detection
DAO
DODAG Advertisement Object
DAR
Discovery Address Request
DHCP
Dynamic Host Configuration Protocol
DIO
DODAG Information Object
DIS
DODAG Information Solicitation
DLMS
Device Language Message Specification
DM
Device Management
DNS
Domain Name Server
DODAG
Direction Oriented Directed Acyclic Graph
DoE
Department of Energy
DPWS
Devices Profile for Web Services
DSCL
Device Service Capabilities Layer
DSCP
Differentiated Services Control Point
DTLS
Datagram Transport Layer Security
DTMF
Dual Tone Multi-Frequency
EAB
Extended Access Barring
EAL
Evaluation Assurance Level
EAP
Extensible Authentication Protocol
ECC
Elliptic Curve Cryptography
EEPROM
Electrically Erasable Programmable Read-Only Memory
ESO
European Standard Organisation
ETSI
European Telecommunications Standards Institute
EUSD
European Universal Service Directive
EV
Electric Vehicle
EVDO
Evolution-Data Optimized
FCC
Federal Communication Commission
FDMA
Frequency Division Multiple Access
FOTA
Firmware-Over-The-Air
FP8
8th Framework Program
FQDN
Fully Qualified Domain Name
FTP
File Transfer Protocol
FTTH
Fibre To The Home
GBA
Generic Bootstrapping Architecture
GCF
Global Certification Forum
GGSN
Gateway GPRS Support Node
GMSC
GSM Mobile Services Switching Center
GP
Global Prefix
GPIO
General Purpose Input Output
GPRS
General Packet Radio Service
GPS
Global Positioning System
GPSK
Generalized Pre-Shared Key
GRE
Generic Routing Encapsulation
GSCL
Gateway Service Capabilities Layer
GSM
Global Systems
for
Mobile
Communications
GSMA
GSM Association
GW
GateWay
H2H
Human-to-Human
HCI
Host Controller Interface
HLIM
Hop Limit
HLR
Home Location Register
HSPA
High Speed Packet Access
HSS
Home Subscriber Service
HTTP
HyperText Transfer Protocol
IBAKE
Identity-Based Authenticated Key Exchange
IBE
Identity Based Encryption
IC
Integrated Circuit
ICCID
Integrated Circuit Card Identifier
ICMP
Internet Control Message Protocol
ICS
In-Vehicle System
ICT
Information and Communication Technologies
IDE
Integrated Development Environment
IETF
Internet Engineering Task Force
IID
Interface IDentification
IKE
Internet Key Exchange
IMEI
International Mobile Equipment Identifier
IMEISV
IMEI Software Version
IMS
IP Multimedia Subsystem
IMSI
International Mobile Subscriber Identity
IoT
Internet of Things
IOT
Interoperability Testing
IP
Internet Protocol
IPHC
IP Header Compression
IPSEC
Internet Protocol Security
ISC
IMS Service Control
IS-IS
Intermediate System to Intermediate System
ITU
International Telecommunication Union
J2EE
Java 2 Enterprise Edition
KGF
Key Generation Function
LAN
Local Area Network
LBR
LoWPAN Border Router
LDAP
Lightweight Directory Access Protocol
LGA
Line Grid Array
LLN
Low Power and Lossy Network
LTE
Long Term Evolution
M2M
Machine-to-Machine
M2ME
M2M Equipment
MAC
Medium Access Control
MAS
M2M Authentication Server
M-BUS
Meter BUS
MCM
Multichip Module
MEID
Mobile Equipment Identifier
MIMO
Multiple-Input, Multiple-Output
MME
Mobility Management Entity
MMI
Man-Machine Interface
MNC
Mobile Network Code
MNO
Mobile Network Operator
MO
Management Object
MP2P
Multi-Point To Point
MPLS
Multiprotocol Label Switching
MRHOF
Minimum Rank with Hysteresis Objective Function
MSC
Mobile Switching Center
MSF
M2M Service Bootstrap Function
MSIM
M2M Service Identity Module
MSIN
Mobile Subscriber Identification Number
MSISDN
Mobile Station Integrated Services Digital Network
MTC
Machine Type Communications
MTC-GW
Machine Type Communication Gateway
MTU
Maximum Transfer Unit
MVNO
Mobile Virtual Network Operator
NA
Network Application
NAPT
Network Address and Port Translation
NAS
Non Access Stratum
NAT
Network Address Translator
NBMA
Non-Broadcast Multiple-Access
NC
Node Confirmation
NDIS
Network Driver Interface Specification
NDP
Neighbor Discovery Protocol
NFC
Near Field Communications
NGC
Network Generic Communication
NGN
Next Generation Networks
NIST
National Institute of Standards and Technology
NR
Node Registration
NRPCA
Network-Requested PDP Context Activation
NS
Neigbour Solicitation
NSCL
Network Service Capabilities Layer
NSEC
Network Security Capability
NTACS
Narrowband Total Access Communication System
NUD
Neighbor Unreachability Detection
OC
Option Count
OCS
Online Charging Services
OCSP
Online Certificate Status Protocol
OFDMA
Orthogonal Frequency Division Multiple Access
OLSR
Optimized Link State Routing
OMA
Open Mobile Alliance
OPEX
OPerational EXpenditure
OS
Operating System
OSPF
Open Shortest Path First
OTA
Over-The-Air
OTASP
Over-The-Air Service Provisioning
P2MP
Point to Multi-Point
PAK
Password-Authenticated Key Exchange
PAN
Personal Area Network
PAP
Password Authentication Protocol
PCB
Printed Circuit Board
PCM
Pulse Code Modulation
PCRF
Policy and Charging Rules Function
PDA
Personal Digital Assistant
PDN
Packet Data Network
PDP
Packet Data Protocol
PDP-C
Packet Data Protocol Context
PDSN
Packet Data Serving Node
PGW
PDN (Public Data Network) Gateway
PIN
Personal Identifiaction Number
PKI
Public Key Infrastructure
PLC
Power Line Communication
PM
Performance Management
PoS
Point of Sale
PS
Packet Switched
PSAP
Public Safety Answering Point
PTCRB
PCS Terminal Certification Review Board
PWM
Pulse Width Modulation
QoS
Quality of Service
RA
Registration Authority
RA
Router Advertisement
RAN
Radio Access Network
RAT
Radio Access Technologies
REST
REpresentation State Transfer
RF
Radio Frequency
RFC
Request For Comment
RFID
Radio Frequency IDentification
RIP
Routing Information Protocol
RNC
Radio Network Controller
RoI
Return on Investment
RPL
Routing Protocol for LLN (Low Power and Lossy Network)s
RRC
Radio Resource Control
RSSI
Received Signal Strength Indicator
SAC
Source Address Compression
SAM
Source Address Mode
SC
Service Capabilities
SCADA
Supervisory Control and Data Acquisition
SCP
Smart Card Platform
S-CSCF
Serving Call Session Control Function
SDK
Software Development Kit
SDO
Standards Development Organization
SGSN
Serving GPRS Support Node
SGW
Serving Gateway
SID
Subnet IDentifier
SIM
Subscriber Identification Module
SLAAC
StateLess Auto Address Configuration
SLLAO
Source Link-Layer Adress Option
SMS SC
SMS Service Center
SMS
Short Message Service
SMS-C
Short Message Service Center
SMT
Survace Mount Technology
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
SNR
Serial NumbeR
SOA
Service Oriented Architecture
SOAP
Simple Object Access Protocol
TACS
Total Access Communications System
TCG
Trusted Computing Group
TCO
Total Cost of Ownership
TCP
Transmission Control Protocol
TDMA
Time Division Multiple Access
TD-SCDMA
Time Division Synchronous Code Division Multiple Access
TIS
Total Isotropic Sensitivity
TLS
Transport Layer Security
TLS-PSK
Transport Layer Security Pre-Shared Key
TLV
Type Length Value
TRP
Total Radiated Power
TTM
Time-to-Market
UART
Universal Asynchronous Receiver/Transmitter
UATI
Unicast Access Terminal Identifier
UDC
Universal Decimal Classification
UDDI
Universal Description Discovery and Integration
UDP
User Datagram Protocol
UE
User Equipment
UICC
Universal Integrated Circuit Card
ULA
Unique Local Address
UMB
Ultra-Mobile Broadband
UMTS
Universal Mobile Telecommunications System
USB
Universal Serial Bus
USIM
Universal Subscriber Identity Module
VLR
Visitor Location Register
VPN
Virtual Private Network
WAN
Wide Area Network
WLAN
Wireless Local-Area Networks
WPAN
Wireless Personal Area Network
WSDL
Web Service Description Language
WSN
Wireless Sensor Network
WWAN
Wireless Wide-Area Networks
xDSL
x Digital Subscriber Line
Chapter 1
Introduction to M2M
Emmanuel Darmois and Omar Elloumi
Alcatel-Lucent, Velizy, France
M2M (Machine-to-Machine) has come of age. It has been almost a decade since the idea of expanding the scope of entities connected to “the network” (wireless, wireline; private, public) beyond mere humans and their preferred communication gadgets has emerged around the notions of the “Internet of Things” (IoT), the “Internet of Objects” or M2M. The initial vision was that of a myriad of new devices, largely unnoticed by humans, working together to expand the footprint of end-user services. This will create new ways to care for safety or comfort, optimizing a variety of goods-delivery mechanisms, enabling efficient tracking of people or vehicles, and at the same time creating new systems and generating new value.
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!