By Topic

Communications Surveys & Tutorials, IEEE

Issue 1 • Date First Quarter 2014

Filter Results

Displaying Results 1 - 7 of 7
  • Editorial: IEEE Communications Surveys & Tutorials — Machine-to-Machine Technologies & Architectures

    Page(s): 1 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (156 KB)  
    Freely Available from IEEE
  • Is the Random Access Channel of LTE and LTE-A Suitable for M2M Communications? A Survey of Alternatives

    Page(s): 4 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2191 KB) |  | HTML iconHTML  

    The 3GPP has raised the need to revisit the design of next generations of cellular networks in order to make them capable and efficient to provide M2M services. One of the key challenges that has been identified is the need to enhance the operation of the random access channel of LTE and LTE-A. The current mechanism to request access to the system is known to suffer from congestion and overloading in the presence of a huge number of devices. For this reason, different research groups around the globe are working towards the design of more efficient ways of managing the access to these networks in such circumstances. This paper aims to provide a survey of the alternatives that have been proposed over the last years to improve the operation of the random access channel of LTE and LTE-A. A comprehensive discussion of the different alternatives is provided, identifying strengths and weaknesses of each one of them, while drawing future trends to steer the efforts over the same shooting line. In addition, while existing literature has been focused on the performance in terms of delay, the energy efficiency of the access mechanism of LTE will play a key role in the deployment of M2M networks. For this reason, a comprehensive performance evaluation of the energy efficiency of the random access mechanism of LTE is provided in this paper. The aim of this computer-based simulation study is to set a baseline performance upon which new and more energy-efficient mechanisms can be designed in the near future. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure Device Pairing: A Survey

    Page(s): 17 - 40
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (6072 KB) |  | HTML iconHTML  

    In this paper, we discuss secure device pairing mechanisms in detail. We explain man-in-the-middle attack problem in unauthenticated Diffie-Hellman key agreement protocols and show how it can be solved by using out-of-band channels in the authentication procedure. We categorize out-of-band channels into three categories of weak, public, and private channels and demonstrate their properties through some familiar scenarios. A wide range of current device pairing mechanisms are studied and their design circumstances, problems, and security issues are explained. We also study group device pairing mechanisms and discuss their application in constructing authenticated group key agreement protocols. We divide the mechanisms into two categories of protocols with and without the trusted leader and show that protocols with trusted leader are more communication and computation efficient. In our study, we considered both insider and outsider adversaries and present protocols that provide secure group device pairing for uncompromised nodes even in presence of corrupted group members. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Service Discovery Protocols for Constrained Machine-to-Machine Communications

    Page(s): 41 - 60
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4105 KB) |  | HTML iconHTML  

    An emerging trend in many applications is to use resource-constrained wireless devices for machine-to-machine (M2M) communications. The observed proliferation of wireless embedded systems is expected to have a significant impact on future M2M applications if the services provided can be automatically discovered and accessed at runtime. In order to realize the decoupling of M2M applications and services, energy efficient service discovery mechanisms must be designed so as to minimize human intervention during configuration and management phases. However, many traditional service discovery protocols cannot be applied to wireless constrained devices because they introduce too much overhead, fail in a duty-cycled environment or require significant memory resources. To address this, either new protocols are being proposed or existing ones are adapted to meet the requirements of constrained networks. In this article, we provide a comprehensive overview of service discovery protocols that have been recently proposed for constrained M2M communications by the Internet Engineering Task Force (IETF). Advantages, disadvantages, performance and challenges of the existing solutions for different M2M scenarios are also analyzed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • M2M Service Platforms: Survey, Issues, and Enabling Technologies

    Page(s): 61 - 76
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3742 KB) |  | HTML iconHTML  

    Machine-to-Machine (M2M) refers to technologies with various applications. In order to provide the vision and goals of M2M, an M2M ecosystem with a service platform must be established by the key players in industrial domains so as to substantially reduce development costs and improve time to market of M2M devices and services. The service platform must be supported by M2M enabling technologies and standardization. In this paper, we present a survey of existing M2M service platforms and explore the various research issues and challenges involved in enabling an M2M service platform. We first classify M2M nodes according to their characteristics and required functions, and we then highlight the features of M2M traffic. With these in mind, we discuss the necessity of M2M platforms. By comparing and analyzing the existing approaches and solutions of M2M platforms, we identify the requirements and functionalities of the ideal M2M service platform. Based on these, we propose an M2M service platform (M2SP) architecture and its functionalities, and present the M2M ecosystem with this platform. Different application scenarios are given to illustrate the interaction between the components of the proposed platform. In addition, we discuss the issues and challenges of enabling technologies and standardization activities, and outline future research directions for the M2M network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Mining for Internet of Things: A Survey

    Page(s): 77 - 97
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (913 KB) |  | HTML iconHTML  

    It sounds like mission impossible to connect everything on the Earth together via Internet, but Internet of Things (IoT) will dramatically change our life in the foreseeable future, by making many "impossibles" possible. To many, the massive data generated or captured by IoT are considered having highly useful and valuable information. Data mining will no doubt play a critical role in making this kind of system smart enough to provide more convenient services and environments. This paper begins with a discussion of the IoT. Then, a brief review of the features of "data from IoT" and "data mining for IoT' is given. Finally, changes, potentials, open issues, and future trends of this field are addressed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Recent Developments in Home M2M Networks

    Page(s): 98 - 114
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1650 KB) |  | HTML iconHTML  

    Recent years have witnessed the emergence of machine-to-machine (M2M) networks as an efficient means for providing automated communications among distributed devices. Automated M2M communications can offset the overhead costs of conventional operations, thus promoting their wider adoption in fixed and mobile platforms equipped with embedded processors and sensors/actuators. In this paper, we survey M2M technologies for applications such as healthcare, energy management and entertainment. In particular, we examine the typical architectures of home M2M networks and discuss the performance tradeoffs in existing designs. Our investigation covers quality of service, energy efficiency and security issues. Moreover, we review existing home networking projects to better understand the real-world applicability of these systems. This survey contributes to better understanding of the challenges in existing M2M networks and further shed new light on future research directions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Communications Surveys & Tutorials is an online journal published by the IEEE Communications Society for tutorials and surveys covering all aspects of the communications field. Telecommunications technology is progressing at a rapid pace, and the IEEE Communications Society is committed to providing researchers and other professionals the information and tools to stay abreast.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ekram Hossain, Ph.D., P.Eng.
Professor
University of Manitoba