The new challenge of M2M

December 2007 Information Security

Putting the pieces together for total information convergence.

As the world of device networking evolves and technology advances, users and manufacturers alike are calling for more complete solutions that offer ubiquitous reach. There are several trends shaping the future of machine-to-machine (M2M) technology, including the move toward true autonomous control of networked equipment and a greater level of intelligence built into the machine infrastructure. But, what may have the greatest impact - actively propelling the M2M market toward substantial growth - will be the convergence of technologies that will enable an end-to-end solution for device control.

The future of machine connectivity

For the past few years, analysts have touted M2M as a rapidly-growing market full of promise. Technologies such as Web services, XML data schemas and RFID were expected to impact the market's growth, as is remote device server technology which effectively enables M2M communications and is the foundation for distributed device intelligence. The market for M2M is ripe with possibility due to the convergence of four major trends:

* The omnipotence of the Internet now connects everyone and everything quickly and easily.

* Users now expect continuous access to information.

* Users now recognise the need for and value of realtime information sharing.

* Technological advancements have led to a reduction in both the size and cost of networking hardware and software.

But even with the huge expectations surrounding it, the M2M market has seen slower than expected growth. This is largely due to the fact that companies see the difficulties and risk of designing with disparate technologies needed to make M2M a reality. There is also uncertainty about the results and ROI of implementing these solutions.

There is no doubt that the technologies required to make M2M a reality are readily available, from hardware to software, user interface to server side applications. What has been missing is a single source to unify implementation. By putting all the pieces together, suppliers will inevitably create more advanced systems that make it easier to share information. For suppliers, this would mean finally demonstrating the significance of M2M. For users, it would mean having an 'all-access pass' to access all the benefits of the M2M through connectivity.

The first step to moving toward total information convergence is the adoption of device networking technology within the market. While this has been achieved, the next step is for suppliers to provide the other piece of the puzzle. Once this has been achieved, vendors will be more likely to stick with the same supplier, creating long-term partnerships that will drive the creation of complete solutions and grow confidence in M2M. Beyond that, suppliers can work together to create total solutions that will gain wider acceptance of the M2M promise.

M2M application possibilities

Remote device management via device servers allows users to proactively monitor usage and performance of equipment from anywhere, anytime. The ideal solution is one that is fully-automated, programmable and ubiquitously available to users. It should also be an effective end-to-end system that is capable of managing the complexities and inherent risks of implementing a comprehensive M2M solution based on otherwise incompatible devices.

With autonomous device control, users have the ability to anticipate and even prevent problems before they occur. When a problem does exist, they can remotely identify and diagnose it before deploying technicians, making repairs more efficient. In some cases, problems or actions that would typically be addressed by a technician or require human intervention could actually be handled automatically by networked equipment in realtime.

The ability to utilise existing web tools to automate reporting and centralise device management leads to more efficient processes. Beyond internal operations, the application of remote autonomous device control can result in improved service for customers, thereby enhancing customer relations. Results are generated more quickly due to remote access to controls for problem detection, streamlining of diagnosis and repair and the ability to partner with others to troubleshoot issues more efficiently. Service management can also be improved through reporting tools, dashboards and metrics. Having access to usage and equipment monitoring data enables preventative maintenance, saving organisations from unnecessary downtime.

Real world applications and technologies

As the promise of M2M states, the better technology gets, the more machines will begin to interact directly with each other and the network requiring less human intervention. Virtually everything that has anything to do with information management and control is now becoming Internet or Ethernet connected, meaning that machines are already working together. The efficiency this provides is phenomenal - a huge leap from the way businesses worked even a few years ago. Consider the following example, which illustrates the use of device servers for maintaining security in a facility.

Most large facilities have a number of security cameras placed in critical areas throughout their premises, which are generally connected to the network or Internet via device server technology. With the use of these device servers and networking technology, security guards can monitor all cameras remotely. If an incident occurs, the security guards are notified, at which time they have the opportunity to manually locate the specific camera recording the incident and zoom in for more information. When a programmable device server is connected to the cameras, the security system can incorporate programs that will automatically pan and zoom the camera if a person walks by the camera, and, as defined by the user, not only trigger an alarm but initiate other associated events such as turning on the lights or reporting the identity based on a proximity reader or other identification systems. Users can also program the device server to react to more than one event simultaneously. For example, if a wire is cut, or the door is not shut within the allotted time, the device server can trigger an alarm or notify security.

With convergence comes end-to-end networking and communication. This means that an alarm can trigger other actions unrelated to the door to take place. For example, it can send an e-mail to employees of a high security facility to lock down their workstations. It can also signal security to look for authorised personnel who should be walking through the doors at a given time and those who tend to prop the door open, then send an e-mail to any violator's management to ensure the event does not repeat itself.

Technology for total convergence

Device networking provides the ability to perform realtime diagnostics and repair, automate the capturing of data, and the ability for the end user to be automatically and immediately notified of a problem. This can translate into improved efficiency, reduced operating and maintenance costs, and maximise uptime. In addition, networking can provide new service opportunities that can result in additional revenue streams.

This technology can effectively provide a gateway to a total convergence of information, providing a vehicle to connect nearly any piece of equipment to be managed from the desktop. In fact, device servers are already making convergence a reality today. With advanced technologies, incoming data from an attached device can be gathered and sent via e-mail or RSS feed allowing hundreds of devices to be simultaneously monitored from a single RSS-enabled browser. In order to maximise the potential for device server technology, the following elements must be assured:

Cost-effectiveness - in order to make M2M cost-effective for users, basic embedded Internet/Ethernet connectivity must be achievable at less than $15 per node.

Easy configuration - end users must be able to easily configure a programmable device server to monitor events and respond with pre-determined, user-defined actions. The majority of companies that design and use embedded devices are not networking specialists. Therefore, all hardware and software incorporated into a solution must be as plug-and-play as possible. Quick integration with the enterprise is also essential.

Security - the device server must provide full product connectivity and offer a highly-secure connection via enterprise-grade networking security. This assures complete confidence at all ends of the network, from the end-users to their partners, customers, and anyone else with approved access.

Two-way communication - users must be able to easily establish two-way communication that works without weakening the firewalls.

Scalability - because connected devices will continue to evolve or be added to the network, scalability to support future applications and equipment is crucial. Embedded Internet/Ethernet connectivity should support a wide range of system performance and power consumption needs, and be operational in power hungry machines and portable battery-powered devices alike.

Reliability and stability - access to information is only as good as its connectivity. Reliability, stability and self recovery become as important as data provided.

Intelligence - intelligence at the edge allows for monitoring and initiating complex events and autonomous interaction between nodes or device servers.

Putting it all together

As stated previously, the only way to take M2M to the next level is for suppliers to partner together to create comprehensive end-to-end solutions. For example a patient bedside monitoring system may include the following devices: device server, local appliance for data storage, nurses' station display system, patient room display system, remote server for offsite storage and record keeping, diagnostic application, remote user interface for doctors and tie in with hospital's ILM system. In addition, knowledge of hospital networks, firewalls, software as service, and managing secure remote user are required to complete such a solution.

This demonstrates how quickly a complete solution becomes very complex and beyond a single vendor today (note this is a relatively simple solution example). This can be overcome by collaboration and partnership between different vendors specialising in a subset of technologies required. These include, but are not limited to, connectivity hardware, device server application, graphical user interfaces (GUI), aggregating application, specialised storage devices, local appliances for storage and user interface, and interfaces to local network including routers and firewalls.

When these elements are in place, device server technology becomes the means to connect the user to just about anything he needs access to, and to share these resources with others in his collective but secured 'community'.

Total information convergence is both necessary and technologically possible today if suppliers can partner together to make M2M a common goal. End-users now understand and appreciate the value of sharing information in realtime, thanks to the advancements in networking hardware and software, and the vast ubiquity of the Internet.

Much like the convergence of features and services that catapulted the Smartphone market, M2M total convergence will take on considerable importance as those suppliers who support it provide OEMs with full end-to-end solutions that give users the freedom, flexibility and immediate remote access to the intelligence they need. Once that happens, M2M will go from being a novelty that sets users apart from their competition to becoming a necessity for providing customers with the services they require. And it will not take long. Remember when the now-mandatory cellphone was merely a luxury enjoyed by only a few or only used for phone calls? iM2M anyone?

For more information contact Lantronix, [email protected], www.lantronix.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A strong cybersecurity foundation
Milestone Systems Information Security
The data collected by cameras, connected sensors, and video management software can make a VMS an attractive target for malicious actors; therefore, being aware of the risks of an insecure video surveillance system and how to mitigate these are critical skills.

Read more...
Surveillance and cybersecurity
Cathexis Technologies Information Security
Whether your business runs a security system with a handful of cameras or it is an enterprise company with thousands of cameras monitoring sites across a multinational organisation, you must pay attention to cybersecurity.

Read more...
Cybersecurity and AI
AI & Data Analytics Information Security
Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.

Read more...
What are MFA fatigue attacks, and how can they be prevented?
Information Security
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...
SA's cybersecurity risks to watch
Information Security
The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.

Read more...
Cyber insurance a key component in cyber defence strategies
Information Security
[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...