The new challenge of M2M

December 2007 Information Security

Putting the pieces together for total information convergence.

As the world of device networking evolves and technology advances, users and manufacturers alike are calling for more complete solutions that offer ubiquitous reach. There are several trends shaping the future of machine-to-machine (M2M) technology, including the move toward true autonomous control of networked equipment and a greater level of intelligence built into the machine infrastructure. But, what may have the greatest impact - actively propelling the M2M market toward substantial growth - will be the convergence of technologies that will enable an end-to-end solution for device control.

The future of machine connectivity

For the past few years, analysts have touted M2M as a rapidly-growing market full of promise. Technologies such as Web services, XML data schemas and RFID were expected to impact the market's growth, as is remote device server technology which effectively enables M2M communications and is the foundation for distributed device intelligence. The market for M2M is ripe with possibility due to the convergence of four major trends:

* The omnipotence of the Internet now connects everyone and everything quickly and easily.

* Users now expect continuous access to information.

* Users now recognise the need for and value of realtime information sharing.

* Technological advancements have led to a reduction in both the size and cost of networking hardware and software.

But even with the huge expectations surrounding it, the M2M market has seen slower than expected growth. This is largely due to the fact that companies see the difficulties and risk of designing with disparate technologies needed to make M2M a reality. There is also uncertainty about the results and ROI of implementing these solutions.

There is no doubt that the technologies required to make M2M a reality are readily available, from hardware to software, user interface to server side applications. What has been missing is a single source to unify implementation. By putting all the pieces together, suppliers will inevitably create more advanced systems that make it easier to share information. For suppliers, this would mean finally demonstrating the significance of M2M. For users, it would mean having an 'all-access pass' to access all the benefits of the M2M through connectivity.

The first step to moving toward total information convergence is the adoption of device networking technology within the market. While this has been achieved, the next step is for suppliers to provide the other piece of the puzzle. Once this has been achieved, vendors will be more likely to stick with the same supplier, creating long-term partnerships that will drive the creation of complete solutions and grow confidence in M2M. Beyond that, suppliers can work together to create total solutions that will gain wider acceptance of the M2M promise.

M2M application possibilities

Remote device management via device servers allows users to proactively monitor usage and performance of equipment from anywhere, anytime. The ideal solution is one that is fully-automated, programmable and ubiquitously available to users. It should also be an effective end-to-end system that is capable of managing the complexities and inherent risks of implementing a comprehensive M2M solution based on otherwise incompatible devices.

With autonomous device control, users have the ability to anticipate and even prevent problems before they occur. When a problem does exist, they can remotely identify and diagnose it before deploying technicians, making repairs more efficient. In some cases, problems or actions that would typically be addressed by a technician or require human intervention could actually be handled automatically by networked equipment in realtime.

The ability to utilise existing web tools to automate reporting and centralise device management leads to more efficient processes. Beyond internal operations, the application of remote autonomous device control can result in improved service for customers, thereby enhancing customer relations. Results are generated more quickly due to remote access to controls for problem detection, streamlining of diagnosis and repair and the ability to partner with others to troubleshoot issues more efficiently. Service management can also be improved through reporting tools, dashboards and metrics. Having access to usage and equipment monitoring data enables preventative maintenance, saving organisations from unnecessary downtime.

Real world applications and technologies

As the promise of M2M states, the better technology gets, the more machines will begin to interact directly with each other and the network requiring less human intervention. Virtually everything that has anything to do with information management and control is now becoming Internet or Ethernet connected, meaning that machines are already working together. The efficiency this provides is phenomenal - a huge leap from the way businesses worked even a few years ago. Consider the following example, which illustrates the use of device servers for maintaining security in a facility.

Most large facilities have a number of security cameras placed in critical areas throughout their premises, which are generally connected to the network or Internet via device server technology. With the use of these device servers and networking technology, security guards can monitor all cameras remotely. If an incident occurs, the security guards are notified, at which time they have the opportunity to manually locate the specific camera recording the incident and zoom in for more information. When a programmable device server is connected to the cameras, the security system can incorporate programs that will automatically pan and zoom the camera if a person walks by the camera, and, as defined by the user, not only trigger an alarm but initiate other associated events such as turning on the lights or reporting the identity based on a proximity reader or other identification systems. Users can also program the device server to react to more than one event simultaneously. For example, if a wire is cut, or the door is not shut within the allotted time, the device server can trigger an alarm or notify security.

With convergence comes end-to-end networking and communication. This means that an alarm can trigger other actions unrelated to the door to take place. For example, it can send an e-mail to employees of a high security facility to lock down their workstations. It can also signal security to look for authorised personnel who should be walking through the doors at a given time and those who tend to prop the door open, then send an e-mail to any violator's management to ensure the event does not repeat itself.

Technology for total convergence

Device networking provides the ability to perform realtime diagnostics and repair, automate the capturing of data, and the ability for the end user to be automatically and immediately notified of a problem. This can translate into improved efficiency, reduced operating and maintenance costs, and maximise uptime. In addition, networking can provide new service opportunities that can result in additional revenue streams.

This technology can effectively provide a gateway to a total convergence of information, providing a vehicle to connect nearly any piece of equipment to be managed from the desktop. In fact, device servers are already making convergence a reality today. With advanced technologies, incoming data from an attached device can be gathered and sent via e-mail or RSS feed allowing hundreds of devices to be simultaneously monitored from a single RSS-enabled browser. In order to maximise the potential for device server technology, the following elements must be assured:

Cost-effectiveness - in order to make M2M cost-effective for users, basic embedded Internet/Ethernet connectivity must be achievable at less than $15 per node.

Easy configuration - end users must be able to easily configure a programmable device server to monitor events and respond with pre-determined, user-defined actions. The majority of companies that design and use embedded devices are not networking specialists. Therefore, all hardware and software incorporated into a solution must be as plug-and-play as possible. Quick integration with the enterprise is also essential.

Security - the device server must provide full product connectivity and offer a highly-secure connection via enterprise-grade networking security. This assures complete confidence at all ends of the network, from the end-users to their partners, customers, and anyone else with approved access.

Two-way communication - users must be able to easily establish two-way communication that works without weakening the firewalls.

Scalability - because connected devices will continue to evolve or be added to the network, scalability to support future applications and equipment is crucial. Embedded Internet/Ethernet connectivity should support a wide range of system performance and power consumption needs, and be operational in power hungry machines and portable battery-powered devices alike.

Reliability and stability - access to information is only as good as its connectivity. Reliability, stability and self recovery become as important as data provided.

Intelligence - intelligence at the edge allows for monitoring and initiating complex events and autonomous interaction between nodes or device servers.

Putting it all together

As stated previously, the only way to take M2M to the next level is for suppliers to partner together to create comprehensive end-to-end solutions. For example a patient bedside monitoring system may include the following devices: device server, local appliance for data storage, nurses' station display system, patient room display system, remote server for offsite storage and record keeping, diagnostic application, remote user interface for doctors and tie in with hospital's ILM system. In addition, knowledge of hospital networks, firewalls, software as service, and managing secure remote user are required to complete such a solution.

This demonstrates how quickly a complete solution becomes very complex and beyond a single vendor today (note this is a relatively simple solution example). This can be overcome by collaboration and partnership between different vendors specialising in a subset of technologies required. These include, but are not limited to, connectivity hardware, device server application, graphical user interfaces (GUI), aggregating application, specialised storage devices, local appliances for storage and user interface, and interfaces to local network including routers and firewalls.

When these elements are in place, device server technology becomes the means to connect the user to just about anything he needs access to, and to share these resources with others in his collective but secured 'community'.

Total information convergence is both necessary and technologically possible today if suppliers can partner together to make M2M a common goal. End-users now understand and appreciate the value of sharing information in realtime, thanks to the advancements in networking hardware and software, and the vast ubiquity of the Internet.

Much like the convergence of features and services that catapulted the Smartphone market, M2M total convergence will take on considerable importance as those suppliers who support it provide OEMs with full end-to-end solutions that give users the freedom, flexibility and immediate remote access to the intelligence they need. Once that happens, M2M will go from being a novelty that sets users apart from their competition to becoming a necessity for providing customers with the services they require. And it will not take long. Remember when the now-mandatory cellphone was merely a luxury enjoyed by only a few or only used for phone calls? iM2M anyone?

For more information contact Lantronix, [email protected], www.lantronix.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Welcome to the new cyber battleground
Information Security
The Iran-Israel conflict is rapidly redefining modern warfare, pushing the boundaries of cyber capabilities and creating a new, borderless digital battlefield. Fortinet’s CISO, Dr Carl Windsor, offers a critical, in-depth analysis of the escalating tactics and global implications in his latest report.

Read more...
African industries may overestimate cyber defences
Information Security
] A significant perception gap exists in security awareness training: 68% of leaders believe training is tailored to roles, yet only a third of employees feel adequately trained. Many organisations only conduct annual or biannual generic training that may not effectively change behaviour.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.