Advertisement
Top

Machine to machine communication needs better security

December 14, 2016

It is not hard to decode M2M technology, even for the less experienced of us. An abbreviation for machine to machine communication, M2M involves networked devices communicating among themselves. Without any manual assistance from humans, that is.

M2M and IoT

While IoT is all the tech online buzz lately, M2M is less talked about in commercial publications. It takes a humble backstage while IoT gets all the shine. Nevertheless, direct machine to machine communications are critical in modern networks.

To underline the obvious again, that is why M2M is like a backbone for the Internet of Things. In order for maximum, viable, continuous connectivity to function, all the necessary nodes should “talk” to each other. Wired or wireless, the intelligent machines communicate in the background.

Industrial environments are all about M2M in its raw shape. From sensors that read various environment parameters to the bigger machines, an industrial network counts on real-time, functional non-human communication. Of course, not all manufacturers are there yet. Some still supplement advanced M2M-atributed functions with human workforce. It is either a choice, or a financially-motivated move. Meaning that full-automation is yet to come to many of the producers. However, it takes time and considerable investment to shift from partial automation to modern, full-on automation.

Smart cities, the IoT-to come networks and various devices networks count on the same direct connectivity. It implies (of course) compatible hardware, software and protocols. And, this time, exclusively-wireless channels.

M2M and vertical applications – soon to come

To quote TelecomTechNews, “less data-hungry M2M modules, would see significant increases in adoption across an array of key verticals”. This would serve well industries such as agriculture, healthcare or smart home automation processes.

The growth of M2M configured a thriving related market. Many companies are eager to capitalize on this trend. For example, V2V stands for vehicle-to-vehicle technology. It all has to do with autonomous driving systems. Being on the rise, this market segment attracts a lot of tech entrepreneurs. The more energy-saver, tiny and viable the components are, the better. That is why R&D departments are on an ongoing race to discover and develop advanced machine to machine communication systems.

All applications circulate data, vast amounts of it. Being able to support all the necessary traffic is key. The expectancy is of even more data. The ultimate beneficiaries are the businesses. As customers or as M2M enablers, the organizations are directly interested in faster, flawless communications.

Even the non-IT companies will be part of the data revolution due to their customer analytics and marketing needs, if only that. The age of total connection involves the technology branching out in numerous layers of software and interconnected functions. Just think of machine to machine communication as standing at the base of infinite connectivity.

Is machine to machine cyber-secure?

Seems like all IoT-relevant debates end up by touching this edgy subject. No wonder, with the Dyn DDoS events from late 2016. Others less mediatized issues also took place. Perhaps more are to come. It is therefore a legitimate question that many businesses ask “Is this safe?”

Although specialized companies try to come up in advance with improved data protection systems, there are yet no guarantees. A M2M system is set up and configured. It starts performing its job. The system administrators make all the regular cyber-security updates, the machines compute the new warnings, and upgrade themselves as commended. They should supposedly outsmart the cyber-attackers due to this continuous cyber-security preventive maintenance. Monitoring, upgrading, logging network events – protective systems perform their preventive tasks.

Nevertheless, cyber-attacks started to automate, too. This took the fight to another level. Once AI exists, it is bound to reach the enemy camp, too. M2M got in industrial environments, it most probably got into malware. What is even worse is that when an attack is successful, the prisoners are turned into enemy soldiers. Just think of how connected devices serve malicious botnets, once hackers manage to take control of them.

Mapping the M2M and IoT notions

As a comprehensive source puts it, IoT is M2M’s application domain. Machines communicate directly, from tiny to huge systems, and provide the necessary connectivity. Due to the current technological configuration, these networks all depend on wireless communications.

Any point on the network can either represent a vulnerable entry-point, or a strength point. When it comes to cyber-incidents, the entry-points do not have ranks. That is, unless the network segmentation does not exist. When employing network segmentation, detecting an intrusion factor leads to quarantining the affected segment. Nevertheless, this concept is still emerging. Although recommended by specialists, organizations do not employ it yet on a large scale. And unfortunately, inside IoT the reality is one for all and all for one.

The flawless communication requirements may antagonize partial cyber-proofing. Or, in other words, those who try to better protect themselves may find their efforts pointless due to the mass effect. Somehow, when the systems they interact with are not protected, intruders find their way around punctual defense strategies.

Self-defending, intelligent machines (aka endowed with artificial intelligence) could be programmed to detect abnormal activities and protect themselves. Much as humans would do when the flu is going around. A different, upgraded type of M2M should be able to improve the cyber-security status in IoT networks.