Trust in M2M communication

Inhyok Cha, Yogendra Shah, Andreas Schmidt, Andreas Leicher, Michael Meyerstein
2009 IEEE Vehicular Technology Magazine  
M achine-to-machine (M2M) communication is viewed as one of the next frontiers in wireless communications. Freed from the traditional constraint of wireless devices that require manning or human intervention, communication using M2M equipment (M2ME) is expected to open up exciting new use cases, services, and applications, with benefits for the general masses and market opportunities for various stakeholders such as manufacturers of M2ME and components, service providers, and communication
more » ... rk operators. Considering the large number of M2MEs expected to be deployed in highly distributed networks and because of the requirements for low-cost devices and implementations, global enforcement of security will not be practical. As the conventional centralized IT network security model, protected by a firewall, becomes challenged by the need for a dispersed model, decentralized methods for establishing security are being explored. The growing trend toward decentralized systems produces numerous situations in which enforcement, by practical necessity, has to be complemented by controlled risk. Principles of enforcement embraced by traditional concepts of access control policies are being supplemented by trust. An entity can be trusted if it predictably and observably behaves in a manner expected for its intended purpose. By delegating parts of the enforcement tasks to trusted elements dispersed in a system, transitive (i.e., multihop) trust relationships can be established. This evolved security model, balancing trust and enforcement, results in a useful, practical, and scalable approach for M2M communication security, which is a critical factor for the overall success of the M2M market.
doi:10.1109/mvt.2009.933478 fatcat:q6qh3zg3x5dirnr5u6wccbw7nu