machine to machine
Recently Published Documents





2021 ◽  
Vol 10 (12) ◽  
pp. 148-161
Mauricio Orlando Bermúdez Amaya ◽  
Octavio José Salcedo Parra ◽  
Juan Pablo Rodríguez Miranda

Machine-to-Machine M2M   technology   being a specific discourse universe of the Internet of Things IoT for the connectivity of intelligent devices, the support of said environment requires a basic conceptual scheme; for which the present article, proposes an evaluation about the different ontological models that consider the M2M and the IoT in simultaneous, recognizing the syntactic and semantic capacity of the interoperability of such devices, from the study of the basic schemes in mention, and identifying its most outstanding properties according to the Quality of Service QoS metric, obtaining the oneM2M ontology as the most appropriate.

Rao Raees Alam Khan ◽  
Faizan ur Rehman ◽  
Syed Saeed Jaffer ◽  
Syed Shoaib Hussain Zaidi ◽  
Sajid Ahmed

2021 ◽  
Vol 8 (5) ◽  
pp. 887
Mochammad Hannats Hanafi Ichsan

<p class="Abstrak">Jaringan Sensor Nirkabel (WSN) adalah salah satu teknologi yang muncul untuk proses deploy dari <em>Internet of Things, Smart System, Machine to Machine networks</em> dan lain sebagainya. Dimana setiap node dari WSN tersebut memiliki kemampuan untuk <em>sensing</em>, komputasi hinga proses pengiriman data. Pemrosesan data secara umum dilakukan pada <em>Cloud</em> atau node lain, hal ini menyebabkan beban kerja dari node lain atau <em>Cloud</em> tersebut menjadi cukup berat. Proses <em>sensing</em> dapat dilakukan dengan menggunakan berbagai sensor sesuai kebutuhan, sedangkan teknologi untuk pemrosesan pada node <em>sensing</em> disebut dengan teknologi Edge Computing. Konsep dari <em>Edge Computing</em> adalah bagaimana sebuah node bisa berpikir untuk menyelesaikan masalah atau mengambil keputusan. Kemudian data hasil pengolahan tersebut dikirimkan ke node yang lain untuk diolah lebih lanjut sehingga kinerja dari node lain atau Cloud lebih ringan. Salah satu teknologi dalam pengiriman data yang dapat dipergunakan dengan baik dan kemampuan jarak komunikasinya cukup panjang adalah LoRa. Salah satu topologi untuk WSN yang dinilai sangat baik untuk pengiriman data adalah Mesh, dimana seluruh node dapat berkomunikasi dengan baik. Oleh karena itu pada penelitian ini akan difokuskan untuk melakukan analisis kemampuan LoRa dalam pengiriman data berdasarkan jarak dan besar data. Karena pada implementasinya jarak berdasarkan besar data hasil pengolahan dari Edge Computing cukup bervariasi. Sehingga pada penelitian ini menghasilkan studi kelayakan LoRa sebagai perangkat untuk proses komunikasi pada WSN menggunakan topologi Mesh. Berdasarkan hasil penelitian yang dilakukan secara keseluruhan LoRa cukup baik untuk pengiriman data hingga 256 bytes dan jarak 300 meter berdasarkan <em>delay</em>, <em>throughput</em>, RSSI dan SNR sehingga sangat layak untuk diimplementasikan pada <em>Edge Computing</em>.</p><p class="Abstrak"> </p><p class="Abstrak"><strong><em>Abstract</em></strong></p><p class="Abstract"><em>Wireless Sensor Networks (WSN) is one of the emerging technologies for the deployment of the Internet of Things, Smart Systems, Machine to Machine networks and so on. Where each node of the WSN has the ability to sensing, computation until the process of sending data. Data processing is generally done on the Cloud or other nodes, this causes the workload of other nodes or the Cloud to be quite heavy. The sensing process can be done by using various sensors as needed, while the technology for processing the sensing node is called Edge Computing technology. The concept of Edge Computing is how a node can think to solve a problem or make a decision. Then the processing data is sent to another node for further processing so that the performance of other nodes or the Cloud is lighter. One of the technologies in sending data that can be used properly and the ability of its long communication distance is LoRa. One of the topologies for WSN that is considered very good for sending data is Mesh, where all nodes can communicate well. Therefore this research will focus on analyzing the ability of LoRa in sending data based on distance and data size. Because in the implementation of the distance based on the large data processing results from Edge Computing is quite varied. So that this research resulted in a feasibility study of LoRa as a device for the communication process at WSN using Mesh topology. Based on the results of research conducted overall LoRa is good enough for sending data up to 256 bytes and a distance of 300 meters based on delay, throughput, RSSI and SNR so it is very feasible to be implemented on Edge Computing.</em></p><p class="Abstrak"><strong><em><br /></em></strong></p>

Imane Sahmi ◽  
Abderrahim Abdellaoui ◽  
Tomader Mazri ◽  
Nabil Hmina

The big challenge to raise for deploying the application's domain of the Internet of Things is security. As one of the popular messaging protocols in the IoT world, the message queue telemetry transport (MQTT) is designed for constrained devices and machine-to-machine communications, based on the publish-subscribe model, it offers a basic authentication using username and password. However, this authentication method might have a problem in terms of security and scalability. In this paper, we provide an analysis of the current research in the literature related to the security for the MQTT protocol, before we give a brief description of each algorithm used on our approach, to finally propose a new approach to secure this protocol based on AugPAKE algorithm and PRESENT encryption. This solution provides mutual authentication between the broker and their clients (publishers and subscribers), the confidentiality of the published message is protected twice, the integrity and non-repudiation of MQTT messages which is protected during the process of transmission.

Aparna Pandey

Abstract: Machine to Machine (M2M) communication is used to maintain the connectivity between the various devices in IoT. One of the major issues of Machine to Machine (M2M) communications is to enhance the network lifetime with the help of an efficient MAC protocols. Slotted ALOHA Protocol is simple random access technique used in low power applications like LoRaWAN (Long Range Wireless Area Network). This approach gives an improved result as compared to P-persistence slotted ALOHA. In this paper, we consider an IoT -M2M network comprises of a large no of devices that transmit data packets to a gateway. We have tried to reduce the collision, which directly reduce retransmission of data packets. We propose Adaptive pSlotted ALOHA Protocol using Successive Interference Cancellation (SIC). It offers high throughput and reduces the delay. It is the simplest way of the channel allotment among the users. The proposed p-Slotted ALOHA protocol using SIC is better than the p-persistence slotted ALOHA in term of delay and throughput. Keywords: MAC, M2M, Slotted ALOHA, LoRa-WAN, IoT, SIC

2021 ◽  
Vol 12 (3) ◽  
pp. 233-247
Dong-Sik Yang ◽  
Jae-Min Noh ◽  
Seung-Ryol Maeng ◽  
Dong-Jin Park

Sign in / Sign up

Export Citation Format

Share Document