SUBSCRIBE NOW
IN THIS ISSUE
PIPELINE RESOURCES

Mole in the Machine? Unique Security Challenges of M2M Connectivity

By: Jesse Cryderman

Anyone with a finger on the pulse of telecommunications will tell you that a seismic shift is occurring, and it’s bigger than 4G or VoLTE. This change will predominantly occur over 2G, WiMAX and Wi-Fi, and it has very little to do with customer experience management (CEM). That’s because the connected future belongs to machines, and machine-to-machine communications (M2M) will eventually outnumber human connections by a substantial margin. The applications for M2M are limitless: from vending machines to healthcare devices to home appliances and public safety systems, nearly everything that can benefit from connectivity will. That much is certain.

What is less certain is what will transpire between today and the Jetsons-like future that awaits us. Will user configuration errors turn a "make more ice" command intended for a "smart" refrigerator into a poison pill for a home network? Will hackers infiltrate public safety networks or use SIM cards from unattended devices to perpetrate fraud? M2M is still a nascent technology, and security concerns are one major piece in the puzzle that must be addressed before the technology moves forward into a secure and profitable automation and virtualization solution.

Welcome to the machine

When industry leaders like John Horn, president of Raco Wireless, say, "Machines are going to rule the world," they are hardly joking. Current M2M use cases like telematics and fleet management, security, smart grids, and dynamic advertising are just the beginning of a trend that will generate billions of dollars for mobile network operators (MNOs). The latest white paper from Machina Research forecasts the following developments by 2020:

  • 2.1 billion cellular M2M connections;
  • 3.6 billion additional M2M connections where cellular connectivity can add value;
  • an addressable market for mobile operators totaling $373 billion.
The market is certainly ripe, but it won’t blossom without advanced security, and it isn’t as easy as just porting security solutions that worked in the cellular domain. In an academic white paper entitled "Security and Trust for M2M Communications," the authors noted that M2M “threats may not be fully addressed by use of security technology and methods adopted in existing wireless devices, cellular networks, or WLANs."


FEATURED SPONSOR:

Latest Updates





Subscribe to our YouTube Channel