machine to machine communication
Recently Published Documents


TOTAL DOCUMENTS

178
(FIVE YEARS 58)

H-INDEX

17
(FIVE YEARS 2)

Author(s):  
P. P. Joby

At present, the traditional healthcare system is completely replaced by the revolutionary technique, the Internet of Medical Things (IoMT). Internet of Medical Things is the IoT hub that comprises of medical devices and applications which are interconnected through online computer networks. The basic principle of IoMT is machine-to-machine communication that takes place online. The major goal of IoMT is to reduce frequent or unwanted visits to the hospitals which makes it comfortable and is also highly preferred by the older people. Another advantage of this methodology is that the interpreted or collected data is stored in cloud modules unlike amazon and Mhealth, making it accessible remotely. Although there are countless advantages in IoMT, the critical factor lies in data security or encryption. A surplus number of threat related to devices, connectivity, and cloud might occur under unforeseen or threatening circumstances which makes the person in the situation helpless. Yet, with the help of data security techniques designed especially for Internet of Medical Things, it is possible to address these challenges. In this paper, a review on data securing techniques for the internet of medical things is made along with a discussion on related concepts.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Meghana P. Lokhande ◽  
Dipti Durgesh Patil ◽  
Lalit V. Patil ◽  
Mohammad Shabaz

The capacity of machine objects to communicate autonomously is seen as the future of the Internet of Things (IoT), but machine-to-machine communication (M2M) is also gaining traction. In everyday life, security, transportation, industry, and healthcare all employ this paradigm. Smart devices have the ability to detect, handle, store, and analyze data, resulting in major network issues such as security and reliability. There are numerous vulnerabilities linked with IoT devices, according to security experts. Prior to performing any activities, it is necessary to identify and classify the device. Device identification and classification in M2M for secure telerobotic surgery are presented in this study. Telerobotics is an important aspect of the telemedicine industry. The major purpose is to provide remote medical care, which eliminates the requirement for both doctors and patients to be in the same location. This paper aims to propose a security and energy-efficient protocol for telerobotic surgeries, which is the primary concern at present. For secure telerobotic surgery, the author presents an Efficient Device type Detection and Classification (EDDC) protocol for device identification and classification in M2M communication. The periodic trust score is calculated using three factors from each sensor node. It demonstrates that the EDDC protocol is more effective and secure in detecting and categorizing rogue devices.


Author(s):  
Hoang Thien Van ◽  
Vo Tien Anh ◽  
Danh Hong L. ◽  
Chi Duong Thi Kim ◽  
Hoang-Sy Nguyen

In this paper, we improve the uplink energy efficiency (EE) of the multi-band machine-to-machine (M2M) communications underlaying cellular networks. In particular, based on the theory of stochastic geometry, we derive the closed-form expressions of the outage probability (OP), and the average energy efficiency of cellular and Machine-to-Machine users in two-way cooperative relaying networks with three-time-slot setting. We ensure the quality of service (QoS) by considering the OP and the average energy efficiency of all links. It is concluded that the three-time-slot relay-aided Machine-to-Machine communication can offer considerably high QoS and low transmission power for fairly distant machine-to-machine networks.


Author(s):  
А.Г. ВЛАДЫКО ◽  
А.А. ХАКИМОВ ◽  
А.С. МУТХАННА ◽  
А.Е. КУЧЕРЯВЫЙ

Рассмотрены преимущества использования оркестрации для управления ресурсами автономных транспортных средств, по сравнению с существующим подходом к проектированию сетей с высокой нагрузкой. В качестве архитектуры для построения сети передачи данных использованы такие гибридные технологии, как подключение узла прямого доступа через стационарные точки и обмен данных межмашинного взаимодействия. Разработан стенд-эмулятор радиоканалов для моделирования влияния интерференции от соседних узлов и выгрузки приложений на граничные вычислительные узлы. This article discusses the advantages of using orchestration to manage autonomous vehicle resources compared to the current design approach for high-load networks. As an architecture for building a data transmission network, hybrid technologies such as the connection of a direct access node through fixed points and exchanging machine-to-machine communication data are used. A radio channel emulator stand was developed to simulate the effect of interference from neighboring nodes and offload applications to edge computing nodes.


Sign in / Sign up

Export Citation Format

Share Document