The new challenge of M2M

December 2007 Information Security

Putting the pieces together for total information convergence.

As the world of device networking evolves and technology advances, users and manufacturers alike are calling for more complete solutions that offer ubiquitous reach. There are several trends shaping the future of machine-to-machine (M2M) technology, including the move toward true autonomous control of networked equipment and a greater level of intelligence built into the machine infrastructure. But, what may have the greatest impact - actively propelling the M2M market toward substantial growth - will be the convergence of technologies that will enable an end-to-end solution for device control.

The future of machine connectivity

For the past few years, analysts have touted M2M as a rapidly-growing market full of promise. Technologies such as Web services, XML data schemas and RFID were expected to impact the market's growth, as is remote device server technology which effectively enables M2M communications and is the foundation for distributed device intelligence. The market for M2M is ripe with possibility due to the convergence of four major trends:

* The omnipotence of the Internet now connects everyone and everything quickly and easily.

* Users now expect continuous access to information.

* Users now recognise the need for and value of realtime information sharing.

* Technological advancements have led to a reduction in both the size and cost of networking hardware and software.

But even with the huge expectations surrounding it, the M2M market has seen slower than expected growth. This is largely due to the fact that companies see the difficulties and risk of designing with disparate technologies needed to make M2M a reality. There is also uncertainty about the results and ROI of implementing these solutions.

There is no doubt that the technologies required to make M2M a reality are readily available, from hardware to software, user interface to server side applications. What has been missing is a single source to unify implementation. By putting all the pieces together, suppliers will inevitably create more advanced systems that make it easier to share information. For suppliers, this would mean finally demonstrating the significance of M2M. For users, it would mean having an 'all-access pass' to access all the benefits of the M2M through connectivity.

The first step to moving toward total information convergence is the adoption of device networking technology within the market. While this has been achieved, the next step is for suppliers to provide the other piece of the puzzle. Once this has been achieved, vendors will be more likely to stick with the same supplier, creating long-term partnerships that will drive the creation of complete solutions and grow confidence in M2M. Beyond that, suppliers can work together to create total solutions that will gain wider acceptance of the M2M promise.

M2M application possibilities

Remote device management via device servers allows users to proactively monitor usage and performance of equipment from anywhere, anytime. The ideal solution is one that is fully-automated, programmable and ubiquitously available to users. It should also be an effective end-to-end system that is capable of managing the complexities and inherent risks of implementing a comprehensive M2M solution based on otherwise incompatible devices.

With autonomous device control, users have the ability to anticipate and even prevent problems before they occur. When a problem does exist, they can remotely identify and diagnose it before deploying technicians, making repairs more efficient. In some cases, problems or actions that would typically be addressed by a technician or require human intervention could actually be handled automatically by networked equipment in realtime.

The ability to utilise existing web tools to automate reporting and centralise device management leads to more efficient processes. Beyond internal operations, the application of remote autonomous device control can result in improved service for customers, thereby enhancing customer relations. Results are generated more quickly due to remote access to controls for problem detection, streamlining of diagnosis and repair and the ability to partner with others to troubleshoot issues more efficiently. Service management can also be improved through reporting tools, dashboards and metrics. Having access to usage and equipment monitoring data enables preventative maintenance, saving organisations from unnecessary downtime.

Real world applications and technologies

As the promise of M2M states, the better technology gets, the more machines will begin to interact directly with each other and the network requiring less human intervention. Virtually everything that has anything to do with information management and control is now becoming Internet or Ethernet connected, meaning that machines are already working together. The efficiency this provides is phenomenal - a huge leap from the way businesses worked even a few years ago. Consider the following example, which illustrates the use of device servers for maintaining security in a facility.

Most large facilities have a number of security cameras placed in critical areas throughout their premises, which are generally connected to the network or Internet via device server technology. With the use of these device servers and networking technology, security guards can monitor all cameras remotely. If an incident occurs, the security guards are notified, at which time they have the opportunity to manually locate the specific camera recording the incident and zoom in for more information. When a programmable device server is connected to the cameras, the security system can incorporate programs that will automatically pan and zoom the camera if a person walks by the camera, and, as defined by the user, not only trigger an alarm but initiate other associated events such as turning on the lights or reporting the identity based on a proximity reader or other identification systems. Users can also program the device server to react to more than one event simultaneously. For example, if a wire is cut, or the door is not shut within the allotted time, the device server can trigger an alarm or notify security.

With convergence comes end-to-end networking and communication. This means that an alarm can trigger other actions unrelated to the door to take place. For example, it can send an e-mail to employees of a high security facility to lock down their workstations. It can also signal security to look for authorised personnel who should be walking through the doors at a given time and those who tend to prop the door open, then send an e-mail to any violator's management to ensure the event does not repeat itself.

Technology for total convergence

Device networking provides the ability to perform realtime diagnostics and repair, automate the capturing of data, and the ability for the end user to be automatically and immediately notified of a problem. This can translate into improved efficiency, reduced operating and maintenance costs, and maximise uptime. In addition, networking can provide new service opportunities that can result in additional revenue streams.

This technology can effectively provide a gateway to a total convergence of information, providing a vehicle to connect nearly any piece of equipment to be managed from the desktop. In fact, device servers are already making convergence a reality today. With advanced technologies, incoming data from an attached device can be gathered and sent via e-mail or RSS feed allowing hundreds of devices to be simultaneously monitored from a single RSS-enabled browser. In order to maximise the potential for device server technology, the following elements must be assured:

Cost-effectiveness - in order to make M2M cost-effective for users, basic embedded Internet/Ethernet connectivity must be achievable at less than $15 per node.

Easy configuration - end users must be able to easily configure a programmable device server to monitor events and respond with pre-determined, user-defined actions. The majority of companies that design and use embedded devices are not networking specialists. Therefore, all hardware and software incorporated into a solution must be as plug-and-play as possible. Quick integration with the enterprise is also essential.

Security - the device server must provide full product connectivity and offer a highly-secure connection via enterprise-grade networking security. This assures complete confidence at all ends of the network, from the end-users to their partners, customers, and anyone else with approved access.

Two-way communication - users must be able to easily establish two-way communication that works without weakening the firewalls.

Scalability - because connected devices will continue to evolve or be added to the network, scalability to support future applications and equipment is crucial. Embedded Internet/Ethernet connectivity should support a wide range of system performance and power consumption needs, and be operational in power hungry machines and portable battery-powered devices alike.

Reliability and stability - access to information is only as good as its connectivity. Reliability, stability and self recovery become as important as data provided.

Intelligence - intelligence at the edge allows for monitoring and initiating complex events and autonomous interaction between nodes or device servers.

Putting it all together

As stated previously, the only way to take M2M to the next level is for suppliers to partner together to create comprehensive end-to-end solutions. For example a patient bedside monitoring system may include the following devices: device server, local appliance for data storage, nurses' station display system, patient room display system, remote server for offsite storage and record keeping, diagnostic application, remote user interface for doctors and tie in with hospital's ILM system. In addition, knowledge of hospital networks, firewalls, software as service, and managing secure remote user are required to complete such a solution.

This demonstrates how quickly a complete solution becomes very complex and beyond a single vendor today (note this is a relatively simple solution example). This can be overcome by collaboration and partnership between different vendors specialising in a subset of technologies required. These include, but are not limited to, connectivity hardware, device server application, graphical user interfaces (GUI), aggregating application, specialised storage devices, local appliances for storage and user interface, and interfaces to local network including routers and firewalls.

When these elements are in place, device server technology becomes the means to connect the user to just about anything he needs access to, and to share these resources with others in his collective but secured 'community'.

Total information convergence is both necessary and technologically possible today if suppliers can partner together to make M2M a common goal. End-users now understand and appreciate the value of sharing information in realtime, thanks to the advancements in networking hardware and software, and the vast ubiquity of the Internet.

Much like the convergence of features and services that catapulted the Smartphone market, M2M total convergence will take on considerable importance as those suppliers who support it provide OEMs with full end-to-end solutions that give users the freedom, flexibility and immediate remote access to the intelligence they need. Once that happens, M2M will go from being a novelty that sets users apart from their competition to becoming a necessity for providing customers with the services they require. And it will not take long. Remember when the now-mandatory cellphone was merely a luxury enjoyed by only a few or only used for phone calls? iM2M anyone?

For more information contact Lantronix, [email protected], www.lantronix.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
There is a SaaS for everything, but at what cost, especially to SMEs?
Editor's Choice Information Security Security Services & Risk Management
Relying on SaaS platforms presents significant cybersecurity risks as the number of providers in your landscape increases, expanding your attack surface. It is important to assess the strength of the SaaS providers in your chain.

Read more...
Addressing today’s mining challenges: cyber risks beyond IT
Editor's Choice Information Security Mining (Industry)
Despite the mining industry’s operational technology systems being vulnerable to cyberattacks, many decision-makers still see these threats as purely an IT issue, even though a breach could potentially disrupt mining operations.

Read more...
Get proactive with cybersecurity
Information Security
The ability to respond effectively to a cybersecurity breach is critical, but the missing piece of the puzzle is a thorough, proactive evaluation to ascertain weaknesses and identify any hidden threats.

Read more...
How to effectively share household devices
Smart Home Automation Information Security
Sharing electronic devices within a household is unavoidable. South African teens spend over eight hours per day online, making device sharing among family members commonplace. Fortunately, there are methods to guarantee safe usage for everyone.

Read more...
How to securely manage your digital footprint
Information Security Training & Education
Managing your online presence is critical to safeguarding your privacy and security. It is imperative to take a proactive approach, including using robust cybersecurity best practices.

Read more...
The state of code security in 2024
Information Security
The 2024 State of Code Security survey reveals that organisations have continued to shore up application security defences over the last year, according to OpenText Premier Partner iOCO Application Management.

Read more...
What is the level of safety and integrity of the software supply chain?
Information Security IoT & Automation
Organisations are embracing AppSec practices and focusing on their software security posture. However, they highlight that insufficient funding and security resources, plus a disconnect between developers and security teams, remain major roadblocks.

Read more...
Cybercriminals target financial service providers to get at sensitive client data
Information Security
According to Ryan van de Coolwijk, Product Head for cyber at iTOO Special Risks, hackers target financial service providers because they hold sensitive client information that unauthorised individuals could use for fraudulent activities.

Read more...
Fortinet establishes new point-of-presence in South Africa
News & Events Information Security
Fortinet has announced the launch of a new dedicated point-of-presence (POP) in Isando, Johannesburg, to expand the reach and availability of Fortinet Unified SASE for customers across South Africa and southern African countries.

Read more...