{"title":"M2M协议的观点","authors":"Mohamed H. Elgazzar","doi":"10.1109/INTELCIS.2015.7397267","DOIUrl":null,"url":null,"abstract":"In the last years, the Machine-to-Machine (M2M) communications evolved as one of the major trends shaping the development of services in the future Internet. The use of M2M technologies is rapidly increasing in different fields such as Health Care, Automotive, Energy, Consumer Electronics, manufacturing, security and Banking. With that rapid increase different protocols had been developed for M2M communications and device management such as CoAP, MQTT and LwM2M. The objective of the paper is to provide synopsis of the different M2M protocols. The paper discusses the pros and cons of each of the protocols and identify their open problems. Up to our knowledge, it is the first study to provide such comparison between the different M2M protocol. The comparison is based on supported functions, network overhead, network reliability and security beside highlighting the different protocol architectures. The paper works as a start point for producing efficient M2M protocols.","PeriodicalId":6478,"journal":{"name":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Perspectives on M2M protocols\",\"authors\":\"Mohamed H. Elgazzar\",\"doi\":\"10.1109/INTELCIS.2015.7397267\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the last years, the Machine-to-Machine (M2M) communications evolved as one of the major trends shaping the development of services in the future Internet. The use of M2M technologies is rapidly increasing in different fields such as Health Care, Automotive, Energy, Consumer Electronics, manufacturing, security and Banking. With that rapid increase different protocols had been developed for M2M communications and device management such as CoAP, MQTT and LwM2M. The objective of the paper is to provide synopsis of the different M2M protocols. The paper discusses the pros and cons of each of the protocols and identify their open problems. Up to our knowledge, it is the first study to provide such comparison between the different M2M protocol. The comparison is based on supported functions, network overhead, network reliability and security beside highlighting the different protocol architectures. The paper works as a start point for producing efficient M2M protocols.\",\"PeriodicalId\":6478,\"journal\":{\"name\":\"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INTELCIS.2015.7397267\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Seventh International Conference on Intelligent Computing and Information Systems (ICICIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INTELCIS.2015.7397267","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In the last years, the Machine-to-Machine (M2M) communications evolved as one of the major trends shaping the development of services in the future Internet. The use of M2M technologies is rapidly increasing in different fields such as Health Care, Automotive, Energy, Consumer Electronics, manufacturing, security and Banking. With that rapid increase different protocols had been developed for M2M communications and device management such as CoAP, MQTT and LwM2M. The objective of the paper is to provide synopsis of the different M2M protocols. The paper discusses the pros and cons of each of the protocols and identify their open problems. Up to our knowledge, it is the first study to provide such comparison between the different M2M protocol. The comparison is based on supported functions, network overhead, network reliability and security beside highlighting the different protocol architectures. The paper works as a start point for producing efficient M2M protocols.