art-3A10.1007-2Fs12083-013-0237-z

download art-3A10.1007-2Fs12083-013-0237-z

of 2

Transcript of art-3A10.1007-2Fs12083-013-0237-z

  • PPNA special issue on the green, reliability and securityof machine-to-machine communications

    Xu Li & Xiaodong Lin & Wenye Wang & Nathalie Mitton

    Received: 6 September 2013 /Accepted: 10 September 2013 /Published online: 26 September 2013# Springer Science+Business Media New York 2013

    Machine-to-machine communications is an emerging technol-ogy that realizes a system of networks, wireless or wired,possibly distributed across the world, for transmitting eventscaptured by low-end machines such as sensors and smartmeters to high-end applications and/or personal appliances,where the events are translated into meaningful information. Itembraces several major research fields including wirelesssensor networks, vehicular networks, smart grid and RFID,emerging as a promising approach to enabling ubiquitouscomputing environment. Unlike current world-scale human-centric 3G wireless networks, M2M communication networkis characterized by the absence of direct human interventionand the rapid increase in size and is therefore imposed withunique requirements.

    With ever-decreasing cost of deployment of M2M commu-nication devices and access to public wireless data networks,and also thanks to its potential to support a large number ofubiquitous characteristics and achieving better cost efficiency,M2M communications has quickly become a market-changingforce for a wide variety of real-time monitoring applications,such as remote patient monitoring, smart homes, utility man-agement, environmental monitoring and industrial automation.However, the flourishing of M2M communications still hingeson fully understanding and managing the existing GRS

    challenges, i.e., Green (energy efficiency), Reliability and Se-curity. This special issue includes six state-of-the-art contribu-tions on the GRS aspects of M2M communications.

    The first paper entitled An Attack-and-Defence Game forSecurity Assessment in Vehicular Ad Hoc Networks bySuguo Do, Xiaolong Li, Junbo Du, Haojin Zhu points outthat existing risk analysis solutions fail to consider the attackand defense costs and gains in vehicular networks, and thuscannot appropriately model the mutual interaction betweenthe attacker and defender. The authors propose a game theo-retical approach for security assessment in Vehicular Ad HocNetworks (VANETs). They consider both of the rational at-tacker and defender, and adopt the attack-defense tree tomodel the attackers potential attack strategies and the de-fenders corresponding countermeasures. To take the attackand defense costs into consideration, they introduce ReturnOn Attack and Return on Investment to represent the potentialgain from launching an attack or adopting a countermeasure invehicular networks. They investigate the potential strategiesof the defender and the attacker by modeling it as an attack-defense game. A detailed analysis on its Nash Equilibrium isprovided.

    The second paper entitled A Social Network Approach toTrust Management in VANETs by Zhen Huang, SushmitaRuj, Marcos Cavenaghi, Milos Stojmenovic, and AmiyaNayak presents several limitations of current trust manage-ment schemes in VANETs and proposes ways to counterthem. The authors identify that the problem of informationcascading and oversampling, which commonly arise in socialnetworks, adversely affects trust management schemes inVANETs. They show that simple voting for decision-makingleads to oversampling and gives incorrect results in VANETs.To overcome this problem, they propose a new voting scheme,where each vehicle has different votingweight according to itsdistance from the event. The vehicle that is closer to the eventpossesses higher weight.

    X. Li (*)Huawei Technologies Canada, Ottawa, ON K2K 3J1, Canadae-mail: [email protected]

    X. LinUniversity of Ontario Institute of Technology,Oshawa, ON L1H 7K4, Canada

    W. WangNorth Carolina State University, Raleigh, NC 27695, USA

    N. MittonInria Lille - Nord Europe, Villeneuve dAscq 59650, France

    Peer-to-Peer Netw. Appl. (2014) 7:213214DOI 10.1007/s12083-013-0237-z

  • The third paper entitled PaderMAC: Energy-efficient Ma-chine to Machine Communication for Cyber-physical Sys-tems by Marcus Autenrieth and Hannes Frey presents anew MAC protocol, called PaderMAC, for wireless sensornetworks, where the routing decision on the next hop node ismade by the receiver as opposed to the senser naming therecipient explicitly in a state of the art mac protocol X-MAC.This work specifies the PaderMAC protocol, explains theimplementation of the protocol using TinyOS and the MAClayer architecture (MLA), describes a contribution to theMLAwhich is useful also for otherMAC layer implementations, andpresents the results of a testbed and theoretical performancestudy.

    In wireless sensor networks, sensor nodes close to the sinkconsume more energy than others because they are burdenedwith heavier relay traffic destined for the sink and trend to dieearly, forming energy holes. It has a serious impact on networklifetime. The forth paper entitled On Mitigating Hotspots toMaximize Network Lifetime in Multi-hop Wireless SensorNetwork with Guaranteed Transport Delay and Reliabilityby Anfeng Liu, Deyu Zhang, Penghui Zhang, Guohua Cui,and Zhigang Chen proposes three optimization algorithms tomitigate such energy holes and prolong network lifetime foradaptive Mary Phase Shift Keying (MPSK) based wirelesssensor networks, while transport delay and reliability can bestill guaranteed. Extensive simulation studies show that thealgorithms do considerably prolong the network lifetime.

    IEEE 802.15.4 standardwas proposed for low powerwirelesspersonal area networks. The fifth paper entitled UncoordinatedCoexisting IEEE 802.15.4 Networks for Machine to MachineCommunications by Chao Ma, Jianhua He, Hsiao-Hwa Chenand Zuoyin investigates the problem of reliable communicationsin uncoordinated coexisting IEEE 802.15.4 networks. The au-thors address the problem in three typical scenarios and propose

    an analytic model to reveal how performance of coexisting802.15.4 networksmay be affected by uncoordinated operations.The analytic model is validated through simulation. It is ob-served that uncoordinated operations may lead to a significantdegradation of system performance in M2M applications. Withthe analytic model, the authors also study the performance limitsof 802.15.4 networks, and the conditions under which coordi-nated operations may be necessary.

    In VANETs, reliable transmission and privacy of vehiclesare two important issues, which are addressed in the last paperentitled Identity Privacy-based Reliable Routing Method inVANETs by Di Wu, Xiaojing Wang, Limin Sun, Yan Lingand Dongxia Zhang. The paper proposes an Identity Privacy-based Reliable Routing method (IPRR). This method dividesthe message transferring model into an uploading process anda downloading process. The uploading process has fourstages, including connection establishment, gaming, detectingprocess and message sending process. In the four stages, adynamic ID scheme is used to protect identity privacy. Duringcommunications, a game model, based on the reliability andthe frequency of contacts, is engaged to accomplish reliabletransmission. Simulation results show that the proposedrouting method can not only increase message delivery ratio,but also reduce the end-to-end delay and the overhead ratio ofthe network.

    In closing, we would like to thank all the authors who havesubmitted their research work to this special issue. We wouldalso like to acknowledge the contribution of many experts inthe field who have participated in the review process andprovided helpful suggestions to the authors on improvingthe content and presentation of the papers. We would also liketo express our gratitude to the Editor-in-Chief, Dr. XueminShen, for his support and help in bringing forward this specialissue. We hope you will enjoy the papers in the special issue.

    214 Peer-to-Peer Netw. Appl. (2014) 7:213214

    PPNA special issue on the green, reliability and security of machine-to-machine communications