Home > Published Issues > 2024 > Volume 13, No. 1, January 2024 >
IJEETC 2024 Vol.13(1): 17-32
doi: 10.18178/ijeetc.13.1.17-32

Investigations in Security Challenges and Solutions for M2M Communications—A Review

Manikandan A.1,*, , Gayathri Narayanan1, K. S. Reddy Banu Prakash1, Yugandhar Reddy C.1, Mahesh A. D.1, Vavilala Sushanth1, and Ramprasad O. G.2
1. Department of Electronics and Communication Engineering, Amrita School of Engineering, Amrita Vishwa Vidyapeetham, Amritapuri, Kollam, Kerala, India
2. Solutions Architect, Cloudera Inc. 513 Conservatory Ln Aurora Illinois, USA
Email: mani_ac18@yahoo.co.in (M.A.), gayathrin@am.amrita.edu (G.N.), amenu4ece20028@am.students.amrita.edu (K.S.R.B.P.), amenu4ece20017@am.students.amrita.edu (Y.R.C.), amenu4ece20035@am.students.amrita.edu (M.A.D.), amenu4ece20053@am.students.amrita.edu (V.S.), ohnusaavyus@gmail.com (R.O.G.)
*Corresponding author

Manuscript received August 23, 2023; revised November 2, 2023; accepted November 10, 2023; published January 2, 2024.

Abstract—The Internet of Things (IoT) is becoming increasingly popular, and machine-to-machine (M2M) technology is one of its major components. Reducing human interaction and tasks is one of the most important justifications for research in M2M communication. Also, M2M technology decreases network traffic, improving network effectiveness. In contrast, multiple networks are combined into M2M networks, which leads to security-related design concerns. However, a significant barrier to its growth is security. According to statistics, new gadgets may come under attack five minutes after they connect to the Internet. If these issues are resolved, it will be easier for people to trust this worldview. Security issues with possible solutions have gotten little attention despite extensive M2M studies. This article provides a comprehensive security analysis of M2M communication technologies, exploring the risks and solutions to better comprehend M2M communication and its security implications.

Index Terms—M2M communication, security attacks, solutions

Cite: Manikandan A., Gayathri Narayanan, K. S. Reddy Banu Prakash, Yugandhar Reddy C., Mahesh A. D., Vavilala Sushanth, and Ramprasad O. G., "Investigations in Security Challenges and Solutions for M2M Communications—A Review," International Journal of Electrical and Electronic Engineering & Telecommunications, Vol. 13, No. 1, pp. 17-32, 2024. doi: 10.18178/ijeetc.13.1.17-32

Copyright © 2024 by the authors. This is an open access article distributed under the Creative Commons Attribution License (CC BY-NC-ND 4.0), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.