An article by Dr Theodoros Stergiou, CEng, CPMM, Security Solutions Product Manager, Intracom Telecom
Machine to machine (or M2M) is a broad term referring to the underlying technologies, platforms and protocols that allow wireless and wired systems to communicate with each other. According to Gartner, “Machine-to-machine (M2M) communications are used for automated data transmission and measurement between mechanical or electronic devices.”
An integral part of Internet of Things (IoT), M2M finds a wide range of applications across diverse industries, including but not limited to healthcare, automotive, smart cities, smart grids, logistics and traffic management. It is a concept that allows the automated transmission of data, measurement and control of devices, whilst going beyond the one-to-one connectivity paradigm. Essentially, M2M is considered as an enhancement of telemetry combined with wireless sensors, the Internet and personal computers and appliances.
The importance of M2M is such that ITU and the European Telecommunications Standards Institute (ETSI) have formed working groups to address all aspects of this concept. ETSI in particular has issued several standards addressing service requirements, APIs, use cases, management objects and information security threats.
Conceptually, the M2M architecture is comprised of the M2M device (or sensor), the radio, wireless or wired network, the Internet, access router and M2M backend system. As is apparent, M2M is based on existing architectures and technologies that realize the full potential of IoT and ensure interoperability. Finally one importance aspect to note is that IPv6 adoption is one of the most essential factors that will ensure the proliferation of M2M and its use in a widespread manner.
However, as is also the case with current technologies, information security plays a significant role for M2M communications, given their use in supporting critical infrastructure, often at the national level. M2M risks can be summarized as follows (list is not exhaustive):
Intracom Telecom has quickly recognized the benefits of M2M to organizations and governmental agencies, as well as the issues that must be addressed in order to ensure a secure and safe M2M environment.
In this extent, Intracom Telecom’s solutions span across the whole ladder of the M2M environment as is depicted in the following figure.
More specifically, Intracom Telecom can assist organizations in securely realizing the M2M potential though the following portfolio.
M2M device/sensor security solutions
Particularly for M2M device/sensor security, Intracom Telecom is actively monitoring the ETSI and oneM2M consortium to recommend and enhance standards surrounding their specification, as these devices are subjects to threats that cannot be remediated by using common network security controls.
Network security solutions
Data security solutions
Application security solutions
User security solutions
Business security solutions
Cloud Security solutions
Backend M2M systems can be housed in the cloud, further benefiting organizations in deploying their required infrastructure. Intracom Telecom, a global telecommunication systems vendor and a system integrator, with 35 years experience and strong presence in the EMEA region, is the first system integrator to have designed, built and operate an ISO 27001:2013 certified Public Cloud in the South-East Europe. Intracom Telecom’s public cloud can be used to securely house the necessary M2M communications components, whilst assuring privacy preservation, availability, service robustness and business expansion.
In recent years, a number of successful attacks against M2M infrastructures have taken place. Examples include SIMs stolen from South Africa’s traffic lights, fraud in Spain’s smart metering system, exposure of Dutch water pumps, and so on (Source: Gemalto, 3rd ETSI Security workshop, France, 2013).
In reference to the Spain’s smart metering fraud case, the following approach is proposed in order to ascertain that critical data are not tampered with and that confidentiality of transmitted information is preserved. These controls can be applied by a system integrator, such as Intracom Telecom, which has the knowledge of the M2M system end-to-end:
M2M and IoT are important areas of communication, with business growing every day. However, these architectures merit appropriate information security controls to ensure that businesses realize the full potential of M2M communications without endangering their operations as well as customer data. Intracom Telecom, realizing the great potential of M2M is able to assist organizations in securely fulfilling their targets and achieve growth.