You are previewing Machine-to-Machine (M2M) Communications.
O'Reilly logo
Machine-to-Machine (M2M) Communications

Book Description

Part one of Machine-to-Machine (M2M) Communications covers machine-to-machine systems, architecture and components. Part two assesses performance management techniques for M2M communications. Part three looks at M2M applications, services, and standardization.

Machine-to-machine communications refers to autonomous communication between devices or machines. This book serves as a key resource in M2M, which is set to grow significantly and is expected to generate a huge amount of additional data traffic and new revenue streams, underpinning key areas of the economy such as the smart grid, networked homes, healthcare and transportation.



  • Examines the opportunities in M2M for businesses
  • Analyses the optimisation and development of M2M communications
  • Chapters cover aspects of access, scheduling, mobility and security protocols within M2M communications

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. List of contributors
  6. Woodhead Publishing Series in Electronic and Optical Materials
  7. 1: Introduction to machine-to-machine (M2M) communications
    1. Abstract
    2. Acknowledgment
    3. 1.1 Introducing machine-to-machine
    4. 1.2 The machine-to-machine market opportunity
    5. 1.3 Examples of commercial and experimental M2M network rollouts
    6. 1.4 Machine-to-machine standards and initiatives
    7. 1.5 Book rationale and overview
  8. Part One: Architectures and standards
    1. 2: Overview of ETSI machine-to-machine and oneM2M architectures
      1. Abstract
      2. 2.1 Introduction
      3. 2.2 Need and rationale for M2M standards
      4. 2.3 Standardized M2M architecture
      5. 2.4 Using M2M standards for “vertical” domains, the example of the smart home
      6. 2.5 Conclusions and future trends for M2M standardization
    2. 3: Overview of 3GPP machine-type communication standardization
      1. Abstract
      2. 3.1 Introduction
      3. 3.2 Pros and cons of M2M over cellular
      4. 3.3 MTC standardization in 3GPP
      5. 3.4 Concluding remarks
    3. 4: Lower-power wireless mesh networks for machine-to-machine communications using the IEEE802.15.4 standard
      1. Abstract
      2. Acknowledgments
      3. 4.1 Introduction
      4. 4.2 The origins
      5. 4.3 Challenges of low-power mesh networking
      6. 4.4 The past
      7. 4.5 The present
      8. 4.6 The future
      9. 4.7 Conclusion
    4. 5: M2M interworking technologies and underlying market considerations
      1. Abstract
      2. 5.1 Interworking technologies for M2M communication networks: introduction
      3. 5.2 A panorama of heterogeneous technologies
      4. 5.3 From capillary to IP networks
      5. 5.4 Going up to the M2M cloud
      6. 5.5 M2M market as internetworking enabler
      7. 5.6 Future trends
    5. 6: Weightless machine-to-machine (M2M) wireless technology using TV white space: developing a standard
      1. Abstract
      2. 6.1 Why a new standard is needed
      3. 6.2 The need for spectrum
      4. 6.3 TV white space as a solution
      5. 6.4 Designing a new technology to fit M2M and white space
      6. 6.5 Weightless: the standard designed for M2M in shared spectrum
      7. 6.6 Establishing a standards body
      8. 6.7 Conclusions
    6. 7: Supporting machine-to-machine communications in long-term evolution networks
      1. Abstract
      2. Acknowledgments
      3. 7.1 Introduction to M2M in LTE
      4. 7.2 Main technical challenges and existing solutions
      5. 7.3 Integrating MTC traffic into a human-centric system: a techno-economic perspective
      6. 7.4 Business implications for MTC in LTE
      7. 7.5 Conclusions
  9. Part Two: Access, scheduling, mobility and security protocols
    1. 8: Traffic models for machine-to-machine (M2M) communications: types and applications
      1. Abstract
      2. 8.1 Introduction
      3. 8.2 Generic methodology for traffic modeling
      4. 8.3 M2M traffic modeling
      5. 8.4 Model fitting from recorded traffic
      6. 8.5 Conclusions
    2. 9: Random access procedures and radio access network (RAN) overload control in standard and advanced long-term evolution (LTE and LTE-A) networks
      1. Abstract
      2. Acknowledgments
      3. 9.1 Introduction
      4. 9.2 E-UTRAN access reservation protocol
      5. 9.3 Extended access barring protocol
      6. 9.4 Alternative E-UTRAN load control principles
      7. 9.5 Overview of core network challenges and solutions for load control
      8. 9.6 Ongoing 3GPP work on load control
      9. 9.7 Resilience to overload through protocol re-engineering
      10. 9.8 Conclusion
    3. 10: Packet scheduling strategies for machine-to-machine (M2M) communications over long-term evolution (LTE) cellular networks
      1. Abstract
      2. 10.1 State of the art in M2M multiple access in legacy cellular systems
      3. 10.2 Signaling and scheduling limitations for M2M over LTE
      4. 10.3 Existing approaches for M2M scheduling over LTE
      5. 10.4 Novel approaches for M2M scheduling over LTE
      6. 10.5 Technology innovations and challenges for M2M scheduling over wireless networks beyond 2020
      7. 10.6 Conclusions
    4. 11: Mobility management for machine-to-machine (M2M) communications
      1. Abstract
      2. Acknowledgments
      3. 11.1 Introduction
      4. 11.2 Use cases for M2M mobility
      5. 11.3 Challenges of M2M mobility
      6. 11.4 Infrastructure considerations for mobility in M2M
      7. 11.5 State-of-the-art solutions
      8. 11.6 Summary and conclusions
    5. 12: Advanced security taxonomy for machine-to-machine (M2M) communications in 5G capillary networks
      1. Abstract
      2. 12.1 Introduction
      3. 12.2 System architecture
      4. 12.3 System assets
      5. 12.4 Security threats
      6. 12.5 Types of attacks
      7. 12.6 Layers under attack
      8. 12.7 Security services
      9. 12.8 Security protocols and algorithms
      10. 12.9 Concluding remarks
    6. 13: Establishing security in machine-to-machine (M2M) communication devices and services
      1. Abstract
      2. 13.1 Introduction
      3. 13.2 Requirements and constraints for establishing security in M2M communications
      4. 13.3 Trust models in M2M ecosystems
      5. 13.4 Protecting credentials through their lifetime in M2M systems
      6. 13.5 Security bootstrap in the M2M system
      7. 13.6 Bridging M2M security to the last mile: from WAN to LAN
      8. 13.7 Conclusion
  10. Part Three: Network optimization for M2M communications
    1. 14: Group-based optimization of large groups of devices in machine-to-machine (M2M) communications networks
      1. Abstract
      2. 14.1 Introduction
      3. 14.2 Mobile network optimizations for groups of M2M devices
      4. 14.3 Managing large groups of M2M subscriptions
      5. 14.4 Group-based messaging
      6. 14.5 Policy control for groups of M2M devices
      7. 14.6 Groups and group identifiers
      8. 14.7 Conclusions
    2. 15: Optimizing power saving in cellular networks for machine-to-machine (M2M) communications
      1. Abstract
      2. 15.1 Introduction
      3. 15.2 Extended idle mode for M2M devices
      4. 15.3 Paging idle-mode M2M device in a power-efficient manner
      5. 15.4 Power saving for uplink data transmission
      6. 15.5 Conclusions
    3. 16: Increasing power efficiency in long-term evolution (LTE) networks for machine-to-machine (M2M) communications
      1. Abstract
      2. 16.1 Introduction
      3. 16.2 M2M scenarios
      4. 16.3 3GPP status and work
      5. 16.4 Introduction to basic LTE procedures
      6. 16.5 UE power consumption in LTE
      7. 16.6 Discussion and conclusion
    4. 17: Energy and delay performance of machine-type communications (MTC) in long-term evolution-advanced (LTE-A)
      1. Abstract
      2. 17.1 Introduction
      3. 17.2 Technology background
      4. 17.3 Analytic performance assessment
      5. 17.4 Performance assessment via simulation
      6. 17.5 Numerical results
      7. 17.6 Conclusion and further research directions
      8. Appendix
  11. Part Four: Business models and applications
    1. 18: Business models for machine-to-machine (M2M) communications
      1. Abstract
      2. 18.1 Introduction
      3. 18.2 An overview of M2M from a commercial perspective
      4. 18.3 A brief history of M2M
      5. 18.4 The potential for M2M
      6. 18.5 The benefits of M2M
      7. 18.6 Business models for M2M
      8. 18.7 The return on investment
    2. 19: Machine-to-machine (M2M) communications for smart cities
      1. Abstract
      2. 19.1 Introduction
      3. 19.2 Smart city technologies
      4. 19.3 M2M smart city platform
      5. 19.4 Financing M2M deployments in smart cities
      6. 19.5 The ten smart city challenges
      7. 19.6 Conclusions
    3. 20: Machine-to-machine (M2M) communications for e-health applications
      1. Abstract
      2. Acknowledgments
      3. 20.1 Introduction
      4. 20.2 M2M network architecture
      5. 20.3 Enabling wireless technologies: standards and proprietary solutions
      6. 20.4 End-to-end solutions for M2M communication: connectivity and security
      7. 20.5 Existing projects
      8. 20.6 Concluding remarks
  12. Index