You are on page 1of 13

1246 IEEE INTERNET OF THINGS JOURNAL, VOL. 3, NO.

6, DECEMBER 2016

A Survey of Emerging M2M Systems:


Context, Task, and Objective
Yang Cao, Member, IEEE, Tao Jiang, Senior Member, IEEE, and Zhu Han, Fellow, IEEE

Abstract—Machine-to-machine (M2M) systems enable important role in the realization of the IoT [2]. Communication
machines or devices to collect data, exchange information, and suppliers such as Cisco and Ericsson estimate that 50 billion
act on the environment without direct human intervention. devices will be networked via M2M systems by 2020 [3].
A device in an M2M system not only collects data for its own
usage but also shares the data with other devices automatically Moreover, Forrester Research predicts that the global sales
to achieve certain goals. Therefore, emerging M2M systems volume of M2M systems will be $50 billion by 2020 [4].
for civil transportation, electric power grid, medical treatment, Generally, M2M systems can be heterogeneous, unstruc-
industrial automation, etc., can be set up based on the net- tured, and loosely-knit by using standardized communication
working of devices. In this survey paper, we first introduce the technologies, such as IEEE 802.11 (WiFi), IEEE 801.15.4
general architecture and communication networks for M2M
systems. Then, we categorize emerging M2M systems according (ZigBee, 6LowPAN), long term evolution (LTE), IEEE 802.16
to the types of M2M context, M2M task, and M2M objective. (WiMAX), Ethernet, power line communications, and IEC
We further survey recent solutions for M2M systems from both 61850 [5]. Using standardized technologies allows easier
academia and industry with the insights of the M2M system device interoperation in M2M systems and facilitates using
categorization. Finally, we summarize challenges in developing mass-produced, standards-compliant equipments, which makes
M2M system solutions.
implementation less expensive [2]. The recent trend is that
Index Terms—Categorization, civil transportation, electric wireless technologies can play more and more important role
power grid, Internet of Things (IoT), machine-to-machine (M2M) in M2M systems, and thus most devices or machines can
systems.
be networked via radio chips or modules. Although M2M
I. I NTRODUCTION systems have great potential in the future, it is still in its
NTERNET of Things (IoT) can be defined as a highly infancy since the implementation and management of M2M
I interconnected network of heterogeneous entities such as
tags, sensors, embedded devices, hand-held devices, and back-
systems are facing many challenging issues, and there is still
a long way for M2M systems to enter every corner of the
end servers, which provides new services and applications for society.
civil transportation, electric power grid, medical treatment, and There are some recent surveys about the emerging M2M
industrial and home automation [1]. While the IoT is focused systems. Lu et al. [6] mainly surveyed the communication
on the end-points and on the interconnection of physical requirements of real-time monitoring M2M systems, i.e., the
objects with each other and with humans, the machine-to- energy efficiency, reliability, and security. Some solutions for
machine (M2M) system is connectivity centric and it refers to secure communications in M2M systems were introduced.
automated systems involving devices that automatically col- Taleb and Kunz [7] studied some of the standardization activ-
lect data (temperature, humidity, speed, position, heartbeat, ities by the 3rd Generation Partnership Project (3GPP), and
etc.) from a remote source, exchange information, and act on focused on M2M systems based on wireless cellular networks.
the environment according to control messages, without, or Some solutions for tackling issues like congestion and over-
with only limited, human intervention through a public net- load control based on M2M communication features were
work infrastructure. Therefore, the M2M system will play an discussed. Wu et al. [8] investigated M2M systems from
the view of future embedded mobile Internet. Specifically,
Manuscript received April 26, 2016; accepted June 12, 2016. Date of they discussed the requirements and challenges associated
publication June 20, 2016; date of current version January 10, 2017. with mass-scale M2M systems, and described potential sys-
This work was supported in part by the National Science Foundation of
China (NSFC) under Grant 61428104, Grant 61471177, Grant 61471163, and tem architectures and deployment options that can enable the
Grant 61428101, Joint Specialized Research Fund for the Doctoral Program connectivity of billions of low-cost devices. Moreover, the
of Higher Education and Research Grants Council Earmarked Research progress of standardization efforts for M2M systems was also
Grants under Grant 20130142140002, the Key Project of Hubei Province
in China under Grant 2015BAA074, and in part by the U.S. NSF under summarized. Kim et al. [1] surveyed architectures, issues, and
Grant ECCS-1547201, Grant CCF-1456921, Grant CNS-1443917, and Grant enabling technologies for M2M service platforms, which sup-
ECCS-1405121. (Corresponding author: Tao Jiang.) port M2M systems such as energy M2M system in smart grid,
Y. Cao and T. Jiang are with the Wuhan National Laboratory for
Optoelectronics, School of Electronics Information and Communications, e-health system, environmental monitoring system, supply
Huazhong University of Science and Technology, Wuhan 430074, China chain management system, and so forth. Fan et al. [9] provided
(e-mail: ycao@hust.edu.cn; tao.jiang@ieee.org). an overview of several standardization activities for M2M
Z. Han is with the Department of Electrical and Computer Engineering,
University of Houston, Houston, TX 77004 USA (e-mail: zhan2@uh.edu). communications, and analyzed some of the enabling M2M
Digital Object Identifier 10.1109/JIOT.2016.2582540 technologies and applications from an industry perspective.
2327-4662 c 2016 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: KU Leuven Libraries. Downloaded on December 29,2023 at 11:25:06 UTC from IEEE Xplore. Restrictions apply.
CAO et al.: SURVEY OF EMERGING M2M SYSTEMS: CONTEXT, TASK, AND OBJECTIVE 1247

Chen et al. [10] provided a survey of recent developments


in home M2M system. As an emerging M2M system, home
M2M system requires specific architecture, radio technologies,
and quality-of-service (QoS) provisioning.
The above literatures have provided valuable insights into
the high-level network architectures, communication tech-
nologies, standardization efforts, service platforms, and key
applications supported by M2M systems. To solve challeng-
ing issues in the implementation and management of M2M
systems, we need to properly categorize M2M systems into
different types, which reveals the essential characteristics of Fig. 1. Illustration of ETSI M2M architecture.
enabling M2M systems. In this paper, we fully investigate dif-
ferent types of M2M systems and develop an M2M system
categorization. The contributions of this paper are summarized M2M systems, i.e., how can cellular networks support M2M
as follows. applications and services efficiently. In 2012, multiple M2M
1) To sort highly segmented solutions for different M2M standardization bodies formed into a single organization, i.e.,
systems, we categorize M2M systems according to the “oneM2M,” to attract and actively involve organizations from
type of M2M context, M2M task, and M2M objective, M2M-related business domains [12].
which can be effective to evaluate solutions for M2M According to ETSI M2M standard, the general architec-
systems. ture of M2M system is composed of multiple key elements
2) We survey most recent M2M system solutions from as follows [13].
both academia and industry systematically based on 1) M2M device connects to the network domain via direct
the proposed M2M system categorization. Specifically, connectivity or M2M gateway. In the first case, the M2M
we use a context-task-objective format to represent the device connects to the network domain via the access
sub-categories of M2M systems. network, which performs the procedures such as regis-
3) We track the future directions of M2M systems, tration, authentication, authorization, management, and
especially main challenges including enabling massive provisioning with the network domain. In the second
concurrent data transmissions for M2M systems, config- case, the M2M device connects to the M2M gateway
uration and management of M2M systems, coexistence using the M2M area network.
of M2M systems and legacy systems, and user satisfac- 2) M2M gateway acts as a proxy between M2M devices
tion for M2M systems. and the network domain. As an example, an M2M
The remainder of this paper is organized as follows. gateway can run an application that collects and treats
Preliminary of M2M systems is provided in the following various information (e.g., contextual parameters) from
section. In Section III, we propose the M2M system cate- sensors and meters.
gorization. In Section IV, recent solutions for M2M system 3) M2M server works as a middleware layer to pass data
are surveyed with the proposed M2M system categorization. through various application services.
Section V summarizes the major challenges in the M2M sys- 4) M2M area network provides connectivity between M2M
tems, and tracks future directions. Finally, conclusions are devices and M2M gateways.
drawn in Section VI. 5) M2M communication network provides connection
between the M2M gateways/devices and the M2M
servers. Usually it contains two parts: a) the access
II. P RELIMINARY OF M2M S YSTEMS
network and b) the Internet.
A. General Architecture of M2M Systems As depicted in Fig. 1, these elements constitute the two
The architecture of M2M systems serves as the founda- domains of M2M system specified by ETSI, that is, M2M
tion of supporting M2M applications and services, which device, M2M area network, and M2M gateway constitute the
is one of the key parts in major M2M standardiza- device-and-gateway domain, while communication network
tion activities. Recently, the European Telecommunications and M2M server constitute the network domain.
Standards Institute (ETSI), the 3GPP, the Internet Engineering
Task Force (IETF), the Alliance for Telecommunications
Industry Solutions, the China Communications Standards B. Communication Solutions of M2M Systems
Association (CCSA), and the Open Mobile Alliance (OMA) Communication solutions that support M2M systems play a
have launched standardization activities on M2M [11]. critical role, which are named as the machine type communica-
Specifically, the ETSI focuses on the general M2M archi- tion (MTC) in the 3GPP M2M standard. 3GPP defines features
tecture, especially for its components, and the interactions and requirements for MTC [14]. There are some key elements
between its two domains, i.e., the device-and-gateway domain defined in 3GPP M2M architecture, namely, MTC device,
and the network domain. The 3GPP M2M standard is basi- MTC feature, MTC group, MTC server, MTC user, and MTC
cally consistent with the ETSI M2M standard, but places subscriber. It is worth noting that MTC features are functions
extra emphasis on cellular-based communication solutions for to optimize the communication network for M2M applications,

Authorized licensed use limited to: KU Leuven Libraries. Downloaded on December 29,2023 at 11:25:06 UTC from IEEE Xplore. Restrictions apply.
1248 IEEE INTERNET OF THINGS JOURNAL, VOL. 3, NO. 6, DECEMBER 2016

Besides, the CCSA focuses on pervasive networks, includ-


ing general requirements, applications, networking, sensing,
and related short range radio frequency connectivity. The
OMA M2M device manageability defines the requirements
for the M2M gateway managed object [8]. The IETF is
working on communication protocols for embedded Web ser-
vices of M2M applications based on constrained application
protocol [16]. Moreover, low power wide area (LPWA) tech-
nologies [17] that can reduce the energy consumption of
wide coverage for M2M systems, are attracting massive atten-
tions. Specifically, narrowband (NB)-IoT and direct sequence
spread spectrum modulation schemes have been proposed for
the physical layer of LPWA M2M systems thanks to their
excellent coverage performance. The NB-IoT is particularly
suitable for the refarming of underutilized resource blocks or
channels from legacy systems like global system for mobile
communications (GSMs) and LTE [18].

III. C ATEGORIZATION OF M2M S YSTEMS


In the previous section, we briefly review the general
architecture and communication solutions of M2M systems,
which serve as the foundations of M2M systems. Referring to
the general architecture and communication solutions, diverse
M2M systems for different purposes and scenarios are inves-
Fig. 2. Illustration of 3GPP M2M architecture, in which solid lines rep-
tigated, and solutions for different M2M systems are highly
resent the user plane communication and dotted lines represent the control segmented due to excessive number of “gray areas” in build-
plane communication. Here, eNB denotes evolved node B (the base station of ing an M2M system. Therefore, we endeavor to categorize
the LTE network). PDN denotes packet data network. MME denotes mobil-
ity management entity. HSS denotes home subscriber server. IWF denotes
M2M systems into different types, as an effort of regulat-
interworking function. ing the emerging M2M systems. With the guidance of the
proposed M2M system categorization, we further evaluate the-
oretical and practical M2M system solutions effectively. As
for example, low mobility, location-specific trigger, infrequent shown in Fig. 3, we categorize M2M systems according to
transmission, and group-based MTC features. the type of the M2M context, M2M task, and M2M objective,
As depicted in Fig. 2, MTC devices communicate with respectively, which is described in detail as follows.
one or more MTC servers, and the network operator pro-
vides network connectivity to MTC servers. The MTC servers A. Categorize M2M Systems by M2M Context
can be controlled by the 3GPP network operator or con-
It is intuitive to design M2M systems for a specific context
trolled by the third-party service provider over the Internet.
(e.g., civil transportation, electric power grid, medical treat-
To support MTC, the 3GPP core network is required to com-
ment, and industrial automation). Solutions can be developed
municate with the MTC Server. An intermediary entity may be
with the consideration of unique characteristics of M2M con-
used for the control plane communication (for signaling and
texts. According to the M2M context, M2M systems can be
control) for topology hiding or protocol translation purposes.
divided into two types, namely, dynamic M2M systems and
Specifically, the interworking function (IWF) is introduced to
static M2M systems. The major difference of these two types
the control plane. An MTC-IWF can be a stand-alone entity
is the topology of the M2M system. In dynamic M2M sys-
or a functional entity of another network element. Moreover,
tems, some nodes (e.g., M2M devices and M2M gateways) are
the MTC-IWF hides the internal public land mobile net-
moving, i.e., the topology is changing over time, which can
work (PLMN) topology and relays or translates signaling
result in the change of wireless link quality, communication
protocols used over MTCsp1 to invoke specific functionality
mode switch, and dynamic resource allocation. In contrast,
in the PLMN. Moreover, 3GPP introduces the key issues and
the topology for static M2M systems keeps unchanged for
solutions for fulfilling the MTC service requirements [15]. The
a relatively long time. For example, vehicular M2M system,
key issues include the lack of Internet protocol (IP) addresses
medical M2M system, and robotic M2M system are dynamic
and congestion of control/data signals for a large number of
M2M systems and energy M2M system, home M2M system,
MTC devices. The solutions attempt to resolve the key issues
and industrial M2M system are static M2M systems.
by: 1) using IPv6 address or dual-stack address and 2) using
1) Dynamic M2M Systems:
group-based management for M2M devices.
a) Vehicular M2M system: Vehicular M2M system is a
1 It is the reference point an entity outside the 3GPP system uses to representative dynamic M2M system with fast changing topol-
communicate with the MTC-IWF related control plane signaling. ogy (vehicles are moving fast) [19]. Most vehicular M2M

Authorized licensed use limited to: KU Leuven Libraries. Downloaded on December 29,2023 at 11:25:06 UTC from IEEE Xplore. Restrictions apply.
CAO et al.: SURVEY OF EMERGING M2M SYSTEMS: CONTEXT, TASK, AND OBJECTIVE 1249

Fig. 3. Categorization of M2M systems.

applications can be categorized into one of the following: faster reporting of changes in the physical condition of a
safety and security, information and navigation, diagnostics, patient. Moreover, automated connectivity of medical devices
and entertainment [20]. For example, information and nav- to the hospital network and remote management of these
igation services provide access for the vehicle occupants devices are enabled with telemedicine [23]. Electronic health
to a variety of location sensitive information and contents. management can be achieved via wearable devices that com-
Diagnostic services enable the occupants and/or vehicle main- municate with smart phones, with the purpose of recording
tenance/repair centers to collect data from a multitude of the physical condition changes and providing health-related
sensors located throughout the vehicles in order to make suggestions to their users. In the case of remote health mon-
maintenance and/or repair recommendations. itoring and care, bio-sensors worn by a patient form a body
As an example shown in Fig. 4, automatic crash notifi- area network to record health and fitness indicators, e.g., blood
cation (ACN) service enables various crash sensors on the pressure, body temperature, heart rate, and number of paces.
vehicles to report the location and extents of damages to the The sensors forward the collected data to an M2M device (e.g.,
vehicles in the event of a crash [21]. ACN also facilitates smart phone) that acts as an information aggregator. Then, the
reports of the crash to the vehicle data management system aggregator forwards the data to the M2M server via commu-
via nearby vehicles [vehicle-to-vehicle (V2V)] or via roadside nication networks. The M2M server responds to the collected
units (vehicle-to-infrastructure). According to the ETSI M2M data by sending alerts and appropriate medical records to med-
standard, the roadside unit can be viewed as the M2M gate- ical providers. In emergency situations, an M2M device can
way, the sensor data aggregator in the vehicle can be viewed directly provide the medical status of a patient and route to the
as the M2M device, and the M2M server is in the vehicle data hospital, allowing physicians, and medical devices to prepare
management system. The roadside unit acts as a proxy for the for treatment in advance of the arrival of the patient [24]. The
access network toward the sensor data aggregators. mobility of medical users results in the change of topology of
Obviously, a vehicular M2M system requires a combina- M2M systems, and how to accurately predict the user behavior
tion of short-range, low-power, low-throughput wireless access is still an open question.
(e.g., WiFi and Bluetooth) for sensing processes and local con- c) Robotic M2M system: Robotic M2M system is an
nectivity (in-vehicle or V2V communications), and long-range, emerging dynamic M2M system, which enables multiple auto-
low-latency, high-throughput wireless access such as LTE for matic robots to complete complex tasks, e.g., proving taxi
status reporting or Internet access [22]. The topology change services in a city, managing goods in a warehouse, and clean-
of the vehicular M2M system is not difficult to be predicted ing guest rooms in a hotel [25]. As an illustrative example,
since vehicles are drove along the road/lane in only two direc- robotic taxis powered by batteries swarm together in an area
tions with the speed data that can be collected by the global to provide taxi service in a timely and efficient manner. The
positioning system. robotic taxis respond to real-time traffic conditions of the city,
b) Medical M2M system: Another example of dynamic and cooperate to reduce congestion at bottlenecks in the city
M2M systems is the medical M2M system for e-health, which and to service pick-up areas that are most frequently used.
aims at improving the quality of health management for all When they are not in use, the taxis head for charging sta-
people and reducing the healthcare costs and risks for patients. tions where actuators set off recharging batteries, perform
Key applications enabled by medical M2M system include simple maintenance tasks, and clean the cars. The charging
telemedicine and electronic health management. Specifically, stations communicate with each other to ensure no over or
telemedicine improves patient care via more accurate and under utilization. Different from vehicles driven by humans

Authorized licensed use limited to: KU Leuven Libraries. Downloaded on December 29,2023 at 11:25:06 UTC from IEEE Xplore. Restrictions apply.
1250 IEEE INTERNET OF THINGS JOURNAL, VOL. 3, NO. 6, DECEMBER 2016

Fig. 4. Illustration of the vehicular M2M system.

and devices carried by e-health users, the mobility of robotic b) Home M2M system: Home M2M system is another
taxis is much easier to be predicted because the M2M system static M2M system that deploys sensors and actuators in
operator knows the purpose of the robotic network and can houses/offices to make the indoor environment more comfort-
directly control it. able [31]. Specifically, room climate control can be adapted
2) Static M2M Systems: to human preferences and to weather, the room lighting can
a) Energy M2M system: Energy M2M system is a repre- change according to the time of the day, domestic incidents
sentative static M2M system, which is an important component can be avoided with appropriate monitoring and alarm sys-
in the smart grid [26]. By integrating communication capabil- tems, and energy can be saved by automatically switching
ities with electric power generation, delivery and distribution off the electrical equipments when not needed. Considering
infrastructures, energy M2M system can achieve automatic the static topology of M2M devices in a home M2M system,
monitoring and control. Significant savings in resource con- low-cost communication methods like WiFi and ZigBee can
sumption is possible when power supply is dynamically be sufficient.
matched with demand. Key smart grid applications are smart c) Industrial M2M system: Industrial M2M systems help
metering, distribution network automation, demand response, in improving the automation in industrial plants (termed
equipment diagnostics, as well as the wide area monitoring “Industrie 4.0” or “Industrial Internet”) with a massive deploy-
and control [27]–[29]. ment of sensors, actuators, and radio frequency identification
As shown in Fig. 5, an illustrative example of the energy (RFID) tags associated to the production parts [32]. Industrial
M2M system is described. First, M2M-enabled smart meters M2M system is a static M2M system because the locations
collect utility usage information from appliances via home area of industrial M2M devices (sensors and actuators) are rarely
networks (HANs) or business area networks (BANs). Then, changed. For example, as production parts reach the process-
smart meters send the information to the M2M server through ing point, the tag is read by the RFID reader. An event is
the access network and the Internet. Finally, the meter data generated by the reader with all the necessary data, such
management system can utilize the information. Because the as the RFID number, and stored on the database of the
devices in the smart grid is usually in fixed locations, the topol- M2M system. The actuators get notified by this event (as
ogy of the energy M2M system is static, and the HAN/BAN it has subscribed to the service) and picks up the produc-
can be wired Ethernet or short-range wireless networks such tion part. By matching data from the database and the RFID
as WiFi and ZigBee, while the access network can be wired tag, it knows how to further process the part. For an indus-
network or LTE. Recently, some M2M system solutions were trial M2M system to prevail, communication technologies
proposed for the smart grid. For example, based on the case will need to efficiently connect machinery over varying dis-
that smart meters communicate with M2M servers via M2M tances in a flexible manner with high security, robustness, and
gateways, a data aggregation scheme for an M2M gateway is availability at a low cost. Industrial M2M system requires reli-
proposed to intelligently collect data from a large number of able communication capabilities among M2M devices and the
smart meters in an area and sends the aggregated information M2M system operator to ensure the quality of the production
to the M2M server [30]. process.

Authorized licensed use limited to: KU Leuven Libraries. Downloaded on December 29,2023 at 11:25:06 UTC from IEEE Xplore. Restrictions apply.
CAO et al.: SURVEY OF EMERGING M2M SYSTEMS: CONTEXT, TASK, AND OBJECTIVE 1251

Fig. 5. Illustration of the energy M2M system.

Remarks: It is intuitive to provide M2M system solutions be a trivial extension from device-centric M2M systems and
according to the requirements and features of the M2M con- system-centric M2M systems.
text. To tailor M2M system solutions to specific context, three In what follows, we will introduce some representative
critical questions should be answered: 1) what are the unique M2M systems categorized by the M2M task. Specifically,
requirements of this context?; 2) what are the unique features monitoring and sensing system and device cooperation sys-
that can be utilized in this context?; and 3) what are the unique tem are device-centric M2M systems, while decision making
challenges to provide M2M system solutions for this context? and control system and data analysis system are system-centric
By categorizing M2M systems into dynamic M2M systems M2M systems.
and static M2M systems, one can focus on the network topol- 1) Device-Centric M2M Systems:
ogy of M2M systems instead of an enormous number of a) Monitoring and sensing system: One common device-
different contexts. However, M2M context only offers one centric M2M system is the monitoring and sensing system,
perspective of categorizing M2M systems, which is not com- where M2M devices including sensors, cameras, and meters
prehensive. To further understand the essential characteristics capture raw data from objectives, and then send the raw data or
of M2M systems, we need to examine and categorize them by processed data to the M2M system operator [33]. For example,
other perspective, i.e., M2M task and M2M objective, which remote patient monitoring system, real-time remote security
will be given in the following part of this section. and surveillance system, and vehicle status monitoring sys-
tem [6] are typical monitoring and sensing M2M systems from
different contexts.
B. Categorize M2M Systems by M2M Task Characteristics of M2M devices in a device-centric M2M
Here, we define an M2M task as an operation supported by system can be exploited to develop applicable solutions. For
an M2M system, which has a specific purpose. For example, a monitoring and sensing system, an M2M device with lim-
fault detection is an M2M task supported by the energy M2M ited computing capability cannot process the raw data, thus
system in smart grid, while vehicle status monitoring is an the raw data is needed to be sent to a stronger M2M device
M2M task supported by a vehicular M2M system. Specifically, (termed “surrogate” or “hub”) or to the M2M system opera-
an M2M task can be device-centric or system-centric accord- tor. When an M2M device has sufficient computing capability,
ing to who provokes or executes the task. For example, a it can process its own raw data or the raw data from other
device-centric task is provoked or executed by an M2M device, devices. Therefore, only a local decision is needed to be sent
while a system-centric task is provoked or executed by an to the M2M system operator, which results in a significant
M2M system operator. Furthermore, a device-centric M2M reduction of the communication bandwidth.
system is defined as an M2M system whose feature task is b) Device cooperation system: In a device cooperation
device-centric, while a system-centric M2M system is defined system, a cluster of M2M devices (vehicles or robots) take
as an M2M system whose feature task is system-centric. actions to achieve the same goal. One example is that robotic
Note that device-centric tasks and system-centric tasks can vehicles patrol an area via a cooperative manner, that is, there
be operated at a single M2M system, however, such case can is a leader vehicle, whose trajectory needs to be copied by

Authorized licensed use limited to: KU Leuven Libraries. Downloaded on December 29,2023 at 11:25:06 UTC from IEEE Xplore. Restrictions apply.
1252 IEEE INTERNET OF THINGS JOURNAL, VOL. 3, NO. 6, DECEMBER 2016

follower vehicles in real time [34]. Another example is the be expected to achieve high performance or low consumption
smart alarm clock, that is, the alarm clock that can communi- for different purposes. Specifically, we divide M2M systems
cate with its owner’s vehicle, refrigerator, and so on, to set the into performance-oriented M2M systems and consumption-
best wake-up time. Clearly, device cooperation system can be oriented M2M systems according to the M2M objective, e.g.,
bandwidth demanding due to frequent real-time interactivities QoS-aware M2M system, secure M2M system, and reliable
among multiple devices, which is more challenging when the M2M system are performance-oriented M2M systems, while
number of cooperative devices is huge and the covering area energy-efficient M2M system and cost-effective M2M system
is large. are consumption-oriented M2M systems.
2) System-Centric M2M Systems: 1) Performance-Oriented M2M Systems:
a) Decision making and control system: Decision mak- a) QoS-aware M2M system: To realize a QoS-aware
ing system is a representative system-centric M2M system. M2M system, one big challenge is that the communication
For example, the operator of an electric power management infrastructure needs to accommodate large volumes of report-
system (a specific M2M system) needs to decide the opti- ing messages simultaneously [37]. We use smart meter data
mal defense plan to reduce security risks with limited costs. collection system (a specific energy M2M system) as an exam-
To make timely decisions, data from an M2M device is ple. As the control center of the utility establishes a contract
periodically collected by an M2M gateway via short-range with the generators periodically (e.g., every hour) to buy
communications, and the retrieved information at the M2M power supply, historical data of power demand collected from
gateway will be sent to the M2M server through wide-area smart meters can be used in this contract [30]. Given the
communication networks [30]. It is worth noting that data estimated aggregated power demand (estimated demand) of
integrity is quite important for the decision making system, all electric appliances in a service area, the power price is
however, it is possible that the collected data is uncompleted determined by the power generator for a periodic contract
or even incorrect due to channel fading or other factors. One (e.g., locational margin price [42]). However, the historical
challenging issue is how to make decisions quickly and prop- data of power demand can be incomplete and outdated due
erly according to a large volume of incomplete or incorrect to the loss and delay of data transmitted from smart meters.
data [35]. Therefore, actual aggregate power demand (actual demand)
Once the decision is made by the M2M system operator, can be different from estimated demand. It is obvious that
actions take effect, that is, the behaviors of M2M devices are the data loss can incur additional costs for the distribution
directly controlled via M2M servers to alarm people, cut off network and consumers. Define a non-negative information
power, and stop the current operation [36]. Such device con- loss rate (ILR) as a QoS metric for reporting data transmis-
trol requires reliable and low-latency downstream connections sions as ILR = max{R − r, 0}, where R denotes the minimum
between M2M servers and M2M devices. Since M2M devices average data rate in order to complete reporting data trans-
are usually automatic, it is critical to protect M2M devices mission of a smart meter during a reporting duration [43].
from malicious control of attackers [37], [38]. For example, a r denotes the average achievable data rate of the reporting
computer hacker can hijack the controller of a self-driving-car data transmission of a smart meter during a reporting dura-
to make a car accident. tion. Clearly, how to minimize the overall ILR (ensuring
b) Data analysis system: Another system-centric M2M QoS) with a large number of reporting smart meters is quite
system is the data analysis system. Generally, data analy- challenging.
sis can help to make predictions based on collected data b) Secure M2M system: Security (authentication and data
from many M2M devices during a specific period of time. integrity) is important for human-life related M2M systems
A wide range of problems such as traffic congestion, power such as energy/industrial M2M systems and life-supporting
distribution anomalies (e.g., voltage level spikes), malicious M2M systems [6]. Since most of the M2M communications
attacks, and so on may fall into the scope of prediction [39]. are wireless, eavesdropping becomes extremely simple [44].
The data mining technologies can be applied to analyze col- Moreover, most of the M2M devices are characterized by low
lected data from M2M devices. When the volume of data, capabilities in terms of both energy and computing resources
the variety of data types, and the velocity of data generated and thus, they cannot implement complex schemes supporting
are massive, it is quite challenging to make analysis for the security.
“big data” [40], [41]. Meanwhile, privacy is more and more important for peo-
Remarks: By categorizing M2M systems into device-centric ple in the information era. For example, the data generated
M2M systems and system-centric M2M systems, one can by a smart meter can reflect the behavior of the residents.
focus on the characteristics of M2M devices or M2M system Once such data is revealed, the risk of pilferage increases. In
operators according to the types of M2M tasks. Moreover, it fact, the methods of data collection, mining, and provision-
is crucial to develop schemes that achieve the goals of M2M ing in the M2M system are completely different from those
tasks while taking into account limited system resources (e.g., in traditional systems and there will be an surprising number
radio resources and computing capabilities). of occasions for personal data to be collected. Therefore, for
human individuals it will be impossible to personally control
C. Categorize M2M Systems by M2M Objective the disclosure of their personal information. To realize secure
Here, we define M2M objective as the design criterion of M2M systems, novel schemes are in urgent need to utilize the
an M2M system solution. For example, an M2M system can features of M2M systems [45], [46].

Authorized licensed use limited to: KU Leuven Libraries. Downloaded on December 29,2023 at 11:25:06 UTC from IEEE Xplore. Restrictions apply.
CAO et al.: SURVEY OF EMERGING M2M SYSTEMS: CONTEXT, TASK, AND OBJECTIVE 1253

c) Reliable M2M system: A reliable M2M system can M2M system categorization. Clearly speaking, M2M con-
operate robustly in occasion of component faults, unreliable text emphasizes the topology of the M2M system (dynamic
transmissions and so on. When a failure occurs, a single M2M or static), M2M task emphasizes the characteristic of M2M
node may not be sufficient to accurately sense and process system (device-centric or system-centric), and the M2M objec-
monitoring data. Therefore, redundancy (increasing the num- tive emphasizes the design criterion of the M2M system
ber of M2M nodes and transmission times) is an effective (performance-oriented or consumption-oriented).
solution to enhance the reliability [6]. Moreover, reliable M2M Note that, an aspect can affect one other aspect and
systems are required to provide ultrastable performance, e.g., vice versa. For example, the solution for a dynamic M2M
fixed transmission rate [47]. To achieve the ultrastable per- system should strike a balance between mobility and perfor-
formance, interference-aware resource scheduling methods are mance if its M2M objective is performance-oriented, since
expected to manage the interference among multiple M2M the M2M device with a high mobility usually has constrained
communication links according to real-time information on resources [49]. Another example is that the solution for a
the wireless environment. consumption-oriented M2M system can utilize the fixed topol-
2) Consumption-Oriented M2M Systems: ogy to lower the cost if its M2M context is static, i.e.,
a) Energy-efficient M2M system: Mass-produced M2M M2M context provides an opportunity (fixed topology) to
devices (e.g., sensors and tags) are usually powered by the M2M objective. In summary, it can be quite beneficial to
battery with limited capacity, thus an energy-efficient M2M propose solutions for M2M systems by jointly considering
system is recommended. Energy saving can be achieved by three aspects and exploiting opportunities brought by different
optimizing the sensing, processing, and transmissions of M2M aspects.
devices to prolong the battery lifetime. Since a mass of M2M
devices can be deployed in the M2M systems, it is benefi- IV. S URVEY OF R ECENT S OLUTIONS FOR M2M S YSTEMS
cial to cut down on the total energy consumption through In Section III, we propose an M2M system categoriza-
improving the energy efficiency for each M2M device. In tion and summarize the three aspects of the categorization.
addition, since the cellular base station is also a power- Based on the proposed M2M system categorization, we not
consuming component in M2M communications, it is valuable only investigate the literature of improving the performance
to improve the energy efficiency of the base station to achieve of M2M systems but also practical M2M platforms from
environmentally friendly, green M2M communications [6]. industrial enterprises in this section. Since an M2M sys-
b) Cost-effective M2M system: To make M2M systems tem can be jointly characterized by the M2M context, M2M
more affordable by the public, it is important to cut down task, and M2M objective, we use a context-task-objective
on the cost [48]. Such cost can be divided into two main format to represent the subcategories. For example, we use
parts: 1) the implementation cost of M2M devices/M2M “static-system-performance” to label a static, system-centric
servers/M2M communication networks and 2) the maintenance and performance-oriented M2M system.
cost of M2M devices/M2M servers/M2M communication Recently, some notable solutions have been proposed by
networks. The implementation cost includes the cost of pur- academia and industry for M2M systems. As summarized
chasing M2M devices and related value-adding services from in Table I, solutions surveyed in this section are categorized
the M2M device vendors, the cost of renting M2M servers according to the proposed M2M system categorization, where
from Internet data centers and the cost of setting up M2M practical solutions are marked with *. In the following part,
communication networks. The maintenance cost includes the the survey of solutions is separated into two parts: the first
electricity cost of powering M2M devices/M2M servers/M2M part is theoretical solutions for M2M systems and the second
communication infrastructures and the cost of using network part is practical solutions for M2M systems.
bandwidth/spectrum. To realize a cost-effective M2M system,
it is important to choose proper communication and computing
A. Theoretical Solutions for M2M Systems
solutions for M2M systems and make the best use of network
bandwidth/spectrum and energy resources. 1) Static-System-Performance M2M Systems: For a static
Remarks: Please note that, by categorizing M2M systems M2M system, e.g., energy M2M system, M2M devices are
into performance-oriented M2M systems and consumption- in fixed locations. Fadlullah et al. [39] studied the energy
oriented M2M systems, one can focus on the design criterion M2M system for smart grid with a system-centric M2M task,
of the M2M system solution. Generally, different types of i.e., fault prediction. Specifically, they modeled the malicious
M2M objectives place different requirements for determining and/or abnormal events, which can compromise the security
communication solutions (e.g., low date rate Bluetooth/ZigBee and privacy of smart grid users, as a Gaussian process. Based
or high data rate WiFi/LTE) and computing solutions (e.g., on this model, a novel early warning scheme was proposed
microcontroller or high-performance multicore processors). for anticipating malicious events. With the warning scheme,
the control center can forecast such malicious events, and thus
enable smart grid to react before hand and mitigate the possible
D. Summary of Three Aspects for M2M impact of malicious activity.
System Categorization 2) Static-Device-Performance M2M Systems: Other M2M
The above three aspects, namely, M2M context, M2M solutions focus on static M2M systems with device-centric
task, and M2M objective, are highlighted in the proposed M2M tasks, e.g., monitoring and sensing. Fouda et al. [37]

Authorized licensed use limited to: KU Leuven Libraries. Downloaded on December 29,2023 at 11:25:06 UTC from IEEE Xplore. Restrictions apply.
1254 IEEE INTERNET OF THINGS JOURNAL, VOL. 3, NO. 6, DECEMBER 2016

TABLE I
S URVEY OF M2M S OLUTIONS BASED ON THE P ROPOSED M2M S YSTEM C ATEGORIZATION

proposed a light-weight message authentication scheme for How to embed low-cost WSN to M2M systems is also
secure communication amongst smart meters in the power dis- important to achieve cost effectiveness. Zhang et al. [35] stated
tribution network. Ko et al. [53] proposed a random access that M2M and WSN are evolving from heterogeneous to con-
scheme for the 3GPP M2M system, which makes use of verged, in order to meet the increasing requirement for M2M
fixed timing alignment information at a large number of fixed- communications with relatively low costs. Considering the
location machine devices to reduce collision probability and fact that traditional cellular spectrum is expensive and over-
lower average access delay, and thus the QoS is ensured. crowded, it is necessary to utilize other spectrum band to
3) Static-Device-Consumption M2M Systems: Clearly, support low-cost M2M communications. Zhang et al. [58] first
above solutions [37], [39], [53] are performance-oriented surveyed the use of cognitive radio technology [74] in M2M
M2M systems. By contrast, the following solutions are for systems from the aspects of applications, industry support, and
consumption-oriented M2M systems with static topology and standardization. Then, the proposed cognitive M2M network
device-centric tasks. When a large share of smart meters trans- architecture and cognitive machine model in television white
mit data via the cellular network at configured points in time, spaces were presented.
e.g., at midnight or every hour, high periodic traffic peaks 4) Dynamic-Device-Performance M2M Systems: For a
can be formed. Paiva et al. [54] proposed a method to reduce dynamic M2M system like vehicular M2M system, M2M
the peak load on the access grant channel, which is based devices are in variable locations. Ma et al. [60] studied V2V
on the property of the M2M traffic that many M2M devices communication problems in the vehicular M2M system for
are stationary and connect at a regular rhythm, and thus the a device-centric M2M task, i.e., cooperative safety message
total cost of using the spectrum can be reduced. Similarly, broadcast (device cooperation). Specifically, a novel protocol
Wang and Wong [55] exploited timing advance information for reliable and fast delivery of safety-related messages using
as well as the access class barring (ACB) to reduce random the control channel of dedicated short range communications
access overload in M2M systems. By optimizing the ACB was proposed to enhance the reliability of delay-sensitive data
parameter, the expected number of served M2M devices in transmissions.
each random access slot can be maximized. For general dynamic M2M systems, cellular networks can
Another method of reducing the cost is to use previ- serve as access networks for long range wireless communi-
ous generations of cellular technologies. Generally, with the cations among a large amount of mobile devices and Internet
progress of LTE/LTE-Advanced networks, previous gener- M2M servers. Clearly, latency problem introduced by schedul-
ations of cellular technologies like GSM, general packet ing overhead is quite challenging. Nikaein and Krea [61]
radio service (GPRS), and wideband code division multiple proposed an M2M system based on LTE/LTE-advanced cel-
access (WCDMA) are less attractive to high end applica- lular network, and the delays associated with each part of the
tions like video streaming. However, previous generations of system were highlighted. Three real-time M2M tasks were
cellular technologies can still be valuable to support cost- analyzed and the main latency bottlenecks were identified.
effective M2M systems, that is, many M2M devices (that Brown and Khan [62] proposed a predictive resource allo-
only require low throughput) can be sufficiently served by cation algorithm for LTE-based M2M systems to exploit the
legacy technologies such as GPRS. Ming et al. [56] investi- correlation of the traffic pattern of M2M devices in a group.
gated the efficiency of three main GSM/GPRS bearers used Therefore, the latency is reduced compared to waiting for each
for MTCs. Krnic and Krco [57] presented the initial results device to request resources.
of a WCDMA radio access network capacity calculation and To reduce the access delay of M2M systems, there are
analysis as affected by a few selected wireless sensor network some solutions focused on M2M random access channels in
(WSN)-based applications in M2M systems. 3GPP cellular networks. A recent report deeply presented the

Authorized licensed use limited to: KU Leuven Libraries. Downloaded on December 29,2023 at 11:25:06 UTC from IEEE Xplore. Restrictions apply.
CAO et al.: SURVEY OF EMERGING M2M SYSTEMS: CONTEXT, TASK, AND OBJECTIVE 1255

fact that trillions of machine devices in 3GPP cellular net- response for street lighting. Networking gives operators remote
works may suffer from severe collisions at the random access access and advanced functionality, including the ability to dim
channels which are used for network entry/reentry, handover, street lights and control their runtime by scheduling them
scheduling request, and uplink timing synchronization [75]. to switch on/off as conditions (such as shorter/longer days)
Lien et al. [63] proposed a cooperative ACB scheme for global warrant. Moreover, networked street lights provide continu-
stabilization and access load sharing to eliminate substantial ous, accurate status information to operators (QoS guarantee),
defects in the ordinary ACB, and thus access delays in random enabling them to identify outages immediately.
access channels are significantly reduced in M2M systems. 2) Static-System-Consumption M2M Systems:
Similarly, Lin and Wei [64] proposed an auction-based scheme a) eyeQ [51]: eyeQ harnesses in-store shopper data to
to balance the traffic load of random access channel. The suc- combine the personalization and product information of online
cess probability can be increased due to lower access delay. shopping with the physical interaction and instant gratification
Kim et al. [65] proposed to reuse the preamble resources based of traditional retail. Gleaning insights from analytics of in-
on a spatial grouping during the random access procedure, so store cameras and touch-screen kiosks, eyeQ helps individual
as to cut down on the access delay while accommodating a shoppers find what they need and want, and helps retailers
significantly large number of M2M devices. sell it to them. Based on IBM’s Open Cloud Architecture and
Some other solutions considered requirement diversity of Cloud Foundry, the M2M system can be efficient and cost-
M2M tasks. Lien and Chen [66] proposed a solution to effective.
the critical issue on the air interface of M2M communica- b) SIEMENS integrated smart parking solution [52]:
tions to effectively perform M2M task for a large amount This M2M system enables users to effortlessly form a clear
of M2M devices with enormously diverse characteristics. picture of where available parking spaces can be found and
Zheng et al. [67] developed scheduling schemes based on how long each space has been occupied for. The Siemens
requirements of different M2M tasks. Integrated Smart Parking Solution is a modular, infrastructure-
5) Dynamic-Device-Consumption M2M Systems: Since based sensor system that goes beyond the possibilities of
battery lifetime is an essential constraint for mobile M2M ground sensors. By obtaining statistical and real-time informa-
devices, energy efficiency is attracting extensive attentions. tion on parking vacancies, intelligent data collection simplifies
Some energy efficient solutions utilize dynamic M2M sys- sensible decisions on parking prices and regulations to meet
tem features such as multihop transmissions, burst traffic, and strategic targets, while allowing for detection of parking
high mobility. Andreev et al. [68] stated that it is not nec- violations in a cost-effective manner.
essary to explicitly schedule the data packet transmissions 3) Dynamic-System-Performance M2M Systems:
when all the data packets from M2M devices are suffi- a) AGT and Cisco traffic incident management
ciently short to be transmitted within their random access solution [59]: This M2M system aims at solving road
requests. Predojev et al. [69] evaluated the achievable energy safety and congestion issues and improving the traffic safety
saving-delay tradeoff in embedded multihop wireless net- and efficiency. It helps traffic departments accurately detect
works with the focus on the channel coding. Fu et al. [70] more incidents before they become more serious, and enables
proposed intelligent reporting mechanisms to deal with the quicker response by monitoring and analyzing traffic flow
energy saving-validity tradeoff of real-time monitoring tasks data. The solution stands out with two important innovations:
for mobile M2M devices. the fusing of data (e.g., average vehicle speed, traffic volume,
Some other solutions have been proposed as energy effi- and lane occupancy) from multiple sensors and cameras to
ciency solutions via access control and grouping schemes for identify real incidents and reduce false alarms (reliability
M2M devices. Rost et al. [71] proposed and evaluated a novel guarantee). Moreover, it analyzes the distribution of traffic
asymmetric user assignment scheme, which enables operators incidents and reports and helps predict traffic flow patterns.
to save network energy, while satisfying the capacity demands. Summary: Obviously, a majority of solutions are about
Tu et al. [72] proposed a scheme to improve the energy effi- static/dynamic-device-consumption and dynamic-device-
ciency by implementing grouping and coordinator selection, performance M2M systems. Device-centric M2M tasks bring
in which grouping limits the amount of access from mobile the challenge of intense data transmissions, and consumption
device to the base station and the coordinator selection guar- reduction is always the most important issue for resource
antees low energy consumption. To minimize the total energy constrained M2M systems. Dynamic topology can result
consumption of the M2M system, Ho and Huang [73] pro- in unstable wireless conditions, thus it is more difficult to
posed joint massive access control and resource allocation ensure QoS and reliable communications. Existing solutions
scheme, which first performs machine grouping, coordinator have not well investigated massive concurrent data transmis-
selection, and resource allocation, and then determines the sions with QoS guarantee, configuration and management
number of groups. overheads/costs, etc.

B. Practical Solutions for M2M Systems V. C HALLENGES IN D EVELOPING


1) Static-System-Performance M2M Systems: M2M S YSTEM S OLUTIONS
a) Silver spring smart street lights [50]: This M2M In the previous section, we review the existing solutions for
system features remote management and real-time outage M2M systems according to the proposed categorization, and

Authorized licensed use limited to: KU Leuven Libraries. Downloaded on December 29,2023 at 11:25:06 UTC from IEEE Xplore. Restrictions apply.
1256 IEEE INTERNET OF THINGS JOURNAL, VOL. 3, NO. 6, DECEMBER 2016

It can be beneficial to develop distributed and low-


complexity scheduling methods for large-scale M2M systems.
Game theory [77] can be one of the useful tools for distributed
scheduling, especially for the M2M systems [81]. However,
reducing the computational complexity of scheduling schemes
while providing a theoretical performance guarantee is quite
challenging. Another trend is to offload configuration and man-
agement tasks of M2M systems to clouds/data centers, thus the
scheduling overhead can be reduced [82].

C. Coexistence of M2M Systems and Legacy Systems


Fig. 6. Underlaying D2D communications for M2M systems. The coexistence of M2M systems and legacy systems [e.g.,
human-to-human (H2H)] has not been fully investigated yet.
It is possible that M2M systems and legacy systems share
summarize the main challenges that are not well investigated the same access network. For example, the operator of an
by existing solutions. In this section, we discuss several main LTE network should handle control signals and data pack-
challenges in developing solutions for M2M systems from the ets from M2M devices and legacy devices at the same time in
following aspects. M2M/H2H coexistence scenarios, which is a key challenging
issue [83].
A. Enabling Massive Concurrent Data Transmissions for The share of communication and networking infrastructures
M2M Systems can greatly reduce the cost of deploying and managing M2M
When a massive number of M2M devices in a dynamic systems. However, effective radio resource allocation schemes
M2M system access the base station simultaneously, it is quite are in an urgent need for M2M/H2H coexistence scenarios
challenging to handle access requests over control channels. to achieve QoS guarantee and energy/cost efficiency. It is
As surveyed in the previous section, some literatures proposed also interesting to study the spectrum sharing and coopera-
schemes to reduce signaling overheads over control channels, tion between M2M devices and legacy devices via cognitive
and some other literatures proposed grouping schemes to form radio technologies to achieve a win-win situation [84].
multiple M2M devices into a group and select a coordinator for
such group, and thus the number of M2M devices that directly D. User Satisfaction for M2M Systems
connect to the base station is reduced. However, how to handle Some design criterions of M2M systems would conflict
massive concurrent data transmissions over data channels is with each other, e.g., QoS guarantee and low cost. Thus, it
still an open problem. is challenging to find a proper tradeoff among multiple con-
Device-to-device (D2D) communication [76], [77] is a pow- flicting design criterions. Studies that jointly consider multiple
erful mechanism of cutting down on the demand for more criterions are attracting more and more attentions [49], [69].
spectrum resources, which enables direct communications One of the possible trends is to consider the user sat-
between two devices in proximity by reusing the cellular isfaction of M2M systems. For example, a proper tradeoff
spectrum, without traversing the base station and the core between the performance and the consumption would improve
network. As depicted in Fig. 6, network-assisted underlay- the user satisfaction of the M2M system, thus more clients
ing D2D communications enable the cooperation between a would accept M2M system services. Generally, considering
number of M2M devices and a standard cellular device (as an user satisfaction means not to pursuit QoS solely. User satis-
M2M gateway) by reusing the data channels of other cellu- faction can characterize the match between user expectations
lar devices, thereby meeting the QoS requirements of M2M and delivered M2M services. Inappropriately high QoS may
communications without affecting the transmissions of cel- waste system resources compared to a lower but adequate QoS.
lular devices [78]. The interference management [79], [80] Thus, given a specific M2M system, higher QoS does not
of underlaying D2D communications for M2M systems is an always make for higher user satisfaction. Moreover, the opti-
interesting aspect, which has not been well investigated yet. mization of the user satisfaction with respect to QoS is still
recognized as NP-complete, i.e., computationally impractical.
B. Configuration and Management of M2M Systems How to improve the user satisfaction of M2M systems is an
The configuration and management of M2M systems can interesting and challenging problem.
be quite challenging due to: 1) enormous overheads of signal-
ing and resource scheduling and 2) extremely heterogeneous VI. C ONCLUSION
M2M devices (e.g., Siemens sensor on a Verizon data plan M2M systems are attracting persistent attention recently
may work with an ABB actuator on an ATT data plan). and many solutions have been proposed for M2M systems. In
Current resource scheduling solutions mostly adopt central- this survey paper, we have categorized M2M systems accord-
ized scheduling methods with high complexity, which may ing to the types of M2M context, M2M task, and M2M
not work well in practical systems with a large number of objective. Based on the proposed M2M system categorization,
devices. recent solutions for M2M systems from both academia and

Authorized licensed use limited to: KU Leuven Libraries. Downloaded on December 29,2023 at 11:25:06 UTC from IEEE Xplore. Restrictions apply.
CAO et al.: SURVEY OF EMERGING M2M SYSTEMS: CONTEXT, TASK, AND OBJECTIVE 1257

industry have been surveyed. We have summarized that M2M [22] H. Nishiyama, T. Ngo, S. Oiyama, and N. Kato, “Relay by smart device:
systems can be jointly characterized by the types of M2M Innovative communications for efficient information sharing among
vehicles and pedestrians,” IEEE Veh. Technol. Mag., vol. 10, no. 4,
context, M2M task, and M2M objective, and it is crucial to pp. 54–62, Dec. 2015.
propose effective solutions considering the type of an M2M [23] P. Phunchongharn, E. Hossain, D. Niyato, and S. Camorlinga, “A cog-
system. Furthermore, we have summarized main challenges of nitive radio system for e-health applications in a hospital environment,”
IEEE Wireless Commun., vol. 17, no. 1, pp. 20–28, Feb. 2010.
developing M2M system solutions, namely, enabling massive [24] S. Adibi, “Link technologies and BlackBerry mobile health (mHealth)
concurrent data transmissions for M2M systems, configura- solutions: A review,” IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 4,
tion and management of M2M systems, coexistence of M2M pp. 586–597, Jul. 2012.
systems and legacy systems, and user satisfaction for M2M [25] L. Atzori, A. Iera, and G. Morabito, “The Internet of Things: A survey,”
Comput. Netw., vol. 54, no. 15, pp. 2787–2805, 2010.
systems. [26] T. Jiang, Y. Cao, L. Yu, and Z. Wang, “Load shaping strategy based
on energy storage and dynamic pricing in smart grid,” IEEE Trans.
Smart Grid, vol. 5, no. 6, pp. 2868–2876, Nov. 2014.
R EFERENCES [27] A. Q. Huang, M. L. Crow, G. T. Heydt, J. P. Zheng, and S. J. Dale, “The
future renewable electric energy delivery and management (FREEDM)
[1] J. Kim, J. Lee, J. Kim, and J. Yun, “M2M service platforms: Survey, system: The energy Internet,” Proc. IEEE, vol. 99, no. 1, pp. 133–148,
issues, and enabling technologies,” IEEE Commun. Surveys Tuts., Jan. 2011.
vol. 16, no. 1, pp. 61–76, 1st Quart. 2014. [28] Y. Cao, T. Jiang, and Q. Zhang, “Reducing electricity cost of smart appli-
[2] G. Lawton, “Machine-to-machine technology gears up for growth,” ances via energy buffering framework in smart grid,” IEEE Trans.
Computer, vol. 37, no. 9, pp. 12–15, Sep. 2004. Parallel Distrib. Syst., vol. 23, no. 9, pp. 1572–1582, Sep. 2012.
[3] D. Evans, “The Internet of Things: How the next evolution of the Internet [29] Z. M. Fadlullah et al., “Toward intelligent machine-to-machine commu-
is changing everything,” CISCO White Paper, 2011. nications in smart grid,” IEEE Commun. Mag., vol. 49, no. 4, pp. 60–65,
[4] M. Weyrich, J.-P. Schmidt, and C. Ebert, “Machine-to-machine commu- Apr. 2011.
nication,” IEEE Softw., vol. 31, no. 4, pp. 19–23, Jul./Aug. 2014. [30] D. Niyato, L. Xiao, and P. Wang, “Machine-to-machine communications
[5] Y. Yan, Y. Qian, H. Sharif, and D. Tipper, “A survey on smart grid com- for home energy management system in smart grid,” IEEE Commun.
munication infrastructures: Motivations, requirements and challenges,” Mag., vol. 49, no. 4, pp. 53–59, Apr. 2011.
IEEE Commun. Surveys Tuts., vol. 15, no. 1, pp. 5–20, 1st Quart. 2013. [31] R. Fantacci, T. Pecorella, R. Viti, and C. Carlini, “A network archi-
[6] R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, “GRS: The green, reliability, tecture solution for efficient IoT WSN backhauling: Challenges and
and security of emerging machine to machine communications,” IEEE opportunities,” IEEE Wireless Commun., vol. 21, no. 4, pp. 113–119,
Commun. Mag., vol. 49, no. 4, pp. 28–35, Apr. 2011. Aug. 2014.
[7] T. Taleb and A. Kunz, “Machine type communications in 3GPP net- [32] R. Drath and A. Horch, “Industrie 4.0: Hit or hype? [industry forum],”
works: Potential, challenges, and solutions,” IEEE Commun. Mag., IEEE Ind. Electron. Mag., vol. 8, no. 2, pp. 56–58, Jun. 2014.
vol. 50, no. 3, pp. 178–184, Mar. 2012. [33] S. He, D.-H. Shin, J. Zhang, J. Chen, and Y. Sun, “Full-view
[8] G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. D. Johnson, “M2M: area coverage in camera sensor networks: Dimension reduction and
From mobile to embedded Internet,” IEEE Commun. Mag., vol. 49, no. 4, near-optimal solutions,” IEEE Trans. Veh. Technol., to be published,
pp. 36–43, Apr. 2011. doi: 10.1109/TVT.2015.2498281.
[9] Z. Fan, R. J. Haines, and P. Kulkarni, “M2M communications for [34] S. Bosch, M. Marin-Perianu, R. Marin-Perianu, H. Scholten, and
e-health and smart grid: An industry and standard perspective,” IEEE P. Havinga, “Follow me! mobile team coordination in wireless sensor
Wireless Commun., vol. 21, no. 1, pp. 62–69, Feb. 2014. and actuator networks,” in Proc. IEEE Int. Conf. Pervasive Comput.
[10] M. Chen, J. Wan, S. Gonzalez, X. Liao, and V. C. M. Leung, “A sur- Commun. (PerCom), Galveston, TX, USA, Mar. 2009, pp. 1–11.
vey of recent developments in home M2M networks,” IEEE Commun. [35] J. Zhang, L. Shan, H. Hu, and Y. Yang, “Mobile cellular networks and
Surveys Tuts., vol. 16, no. 1, pp. 98–114, 1st Quart. 2014. wireless sensor networks: Toward convergence,” IEEE Commun. Mag.,
[11] K. Chang, A. Soong, M. Tseng, and Z. Xiang, “Global wireless machine- vol. 50, no. 3, pp. 164–169, Mar. 2012.
to-machine standardization,” IEEE Internet Comput., vol. 15, no. 2, [36] W. Luan, D. Sharp, and S. Lancashire, “Smart grid communication net-
pp. 64–69, Mar./Apr. 2011. work capacity planning for power utilities,” in Proc. IEEE PES Transm.
[12] OneM2M. (2015). OneM2M: The Interoperability Enabler for the Distrib. Conf. Expo., New Orleans, LA, USA, Apr. 2010, pp. 1–4.
Entire M2M Ecosystem. [Online]. Available: http://www.onem2m.org/ [37] M. M. Fouda, Z. M. Fadlullah, N. Kato, R. Lu, and X. S. Shen,
images/files/oneM2M-whitepaper-January-2015.pdf “A lightweight message authentication scheme for smart grid com-
[13] ETSI, “Machine-to-machine communications (M2M); functional archi- munications,” IEEE Trans. Smart Grid, vol. 2, no. 4, pp. 675–685,
tecture,” Eur. Telecommun. Standards Inst., Sophia Antipolis, France, Dec. 2011.
TS 102.690 v1.1.1, 2011. [38] H. Zhang, P. Cheng, L. Shi, and J. Chen, “Optimal DoS attack schedul-
[14] 3GPP, “Service requirements for machine-type communications,” TS ing in wireless networked control system,” IEEE Trans. Control Syst.
22.368 v12.0.0, 2012. Technol., vol. 24, no. 3, pp. 843–852, May 2016.
[15] 3GPP, “System improvements for machine-type communications,” TR [39] Z. M. Fadlullah, M. M. Fouda, N. Kato, X. Shen, and Y. Nozaki,
23.888 v11.0.0, 2012. “An early warning system against malicious activities for smart grid
[16] B. C. Villaverde et al., “Service discovery protocols for constrained communications,” IEEE Netw., vol. 25, no. 5, pp. 50–55, Sep./Oct. 2011.
machine-to-machine communications,” IEEE Commun. Surveys Tuts., [40] C.-W. Tsai, C.-F. Lai, M.-C. Chiang, and L. T. Yang, “Data mining for
vol. 16, no. 1, pp. 41–60, 1st Quart. 2014. Internet of Things: A survey,” IEEE Commun. Surveys Tuts., vol. 16,
[17] X. Xiong, K. Zheng, R. Xu, W. Xiang, and P. Chatzimisios, “Low power no. 1, pp. 77–97, 1st Quart. 2014.
wide area machine-to-machine networks: Key techniques and prototype,” [41] X. Wu, X. Zhu, G.-Q. Wu, and W. Ding, “Data mining with big data,”
IEEE Commun. Mag., vol. 53, no. 9, pp. 64–71, Sep. 2015. IEEE Trans. Knowl. Data Eng., vol. 26, no. 1, pp. 97–107, Jan. 2014.
[18] J. Gozalvez, “New 3GPP standard for IoT [mobile radio],” IEEE Veh. [42] R. Bo and F. Li, “Probabilistic LMP forecasting considering load
Technol. Mag., vol. 11, no. 1, pp. 14–20, Mar. 2016. uncertainty,” IEEE Trans. Power Syst., vol. 24, no. 3, pp. 1279–1289,
[19] G. Karagiannis et al., “Vehicular networking: A survey and tutorial on Aug. 2009.
requirements, architectures, challenges, standards and solutions,” IEEE [43] Y. Cao, T. Jiang, M. He, and J. Zhang, “Device-to-device communica-
Commun. Surveys Tuts., vol. 13, no. 4, pp. 584–616, 4th Quart. 2011. tions for energy management: A smart grid case,” IEEE J. Sel. Areas
[20] I. Lequerica, M. G. Longaron, and P. M. Ruiz, “Drive and share: Efficient Commun., vol. 34, no. 1, pp. 190–201, Jan. 2016.
provisioning of social networks in vehicular scenarios,” IEEE Commun. [44] Y. Zou, J. Zhu, X. Wang, and L. Hanzo, “A survey on wireless security:
Mag., vol. 48, no. 11, pp. 90–97, Nov. 2010. Technical challenges, recent advances, and future trends,” Proc. IEEE,
[21] H. T. Cheng, H. Shan, and W. Zhuang, “Infotainment and road safety to be published, doi: 10.1109/JPROC.2016.2558521.
service support in vehicular networking: From a communication per- [45] J. Sun, R. Zhang, and Y. Zhang, “Privacy-preserving spatiotemporal
spective,” Mech. Syst. Signal Process., vol. 25, no. 6, pp. 2020–2038, matching,” in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM),
2011. Turin, Italy, Apr. 2013, pp. 800–808.

Authorized licensed use limited to: KU Leuven Libraries. Downloaded on December 29,2023 at 11:25:06 UTC from IEEE Xplore. Restrictions apply.
1258 IEEE INTERNET OF THINGS JOURNAL, VOL. 3, NO. 6, DECEMBER 2016

[46] J. Sun, R. Zhang, and Y. Zhang, “Privacy-preserving spatiotemporal [69] T. Predojev, J. Alonso-Zarate, and M. Dohler, “Energy-delay trade-
matching for secure device-to-device communications,” IEEE Internet off analysis in embedded M2M networks with channel coding,” in
Things J., to be published, doi: 10.1109/JIOT.2016.2549046. Proc. IEEE Int. Symp. Pers. Indoor Mobile Radio Commun. (PIMRC),
[47] N. K. Pratas and P. Popovski, “Underlay of low-rate machine-type Istanbul, Turkey, 2010, pp. 2733–2738.
D2D links on downlink cellular links,” in Proc. IEEE Int. Conf. [70] H.-L. Fu, H.-C. Chen, P. Lin, and Y. Fang, “Energy-efficient report-
Commun. (ICC) Workshops, Sydney, NSW, Australia, Jun. 2014, ing mechanisms for multi-type real-time monitoring in machine-to-
pp. 423–428. machine communications networks,” in Proc. IEEE Int. Conf. Comput.
[48] S. He, J. Chen, X. Li, X. Shen, and Y. Sun, “Mobility and intruder prior Commun. (INFOCOM), Orlando, FL, USA, Mar. 2012, pp. 136–144.
information improving the barrier coverage of sparse sensor networks,” [71] P. Rost, A. Maeder, and X. Perez-Costa, “Asymmetric uplink-downlink
IEEE Trans. Mobile Comput., vol. 13, no. 6, pp. 1268–1282, Jun. 2014. assignment for energy-efficient mobile communication systems,” in
[49] J. Sun, R. Zhang, X. Jin, and Y. Zhang, “SecureFind: Secure and Proc. IEEE VTC Spring, Yokohama, Japan, May 2012, pp. 1–5.
privacy-preserving object finding via mobile crowdsourcing,” IEEE [72] C.-Y. Tu, C.-Y. Ho, and C.-Y. Huang, “Energy-efficient algorithms
Trans. Wireless Commun., vol. 15, no. 3, pp. 1716–1728, Mar. 2016. and evaluations for massive access management in cellular based
[50] S. Spring. (2016). Smart Street Lighting Providing machine to machine communications,” in Proc. IEEE Veh. Technol.
Maximum Value for Utilities and Cities. [Online]. Available: Conf. (VTC Fall), San Francisco, CA, USA, Sep. 2011, pp. 1–5.
http://www.silverspringnet.com/solutions-technology/street-lights [73] C. Y. Ho and C.-Y. Huang, “Energy-saving massive access con-
[51] EyeQ. (2016). The New Power of Personalization. [Online]. Available: trol and resource allocation schemes for M2M communications in
https://www.eyeqinsights.com OFDMA cellular networks,” IEEE Wireless Commun. Lett., vol. 1, no. 3,
[52] SIEMENS. (2016). Smart City Vision: Movement Through Innovation. pp. 209–212, Jun. 2012.
[Online]. Available: http://www.mobility.siemens.com/mobility/global/ [74] Y. Cao, D. Qu, and T. Jiang, “Throughput maximization in cognitive
en/urban-mobility/road-solutions/integrated-smart-parking-solution radio system with transmission probability scheduling and traffic pattern
[53] K. S. Ko et al., “A novel random access for fixed-location machine-to- prediction,” Mobile Netw. Appl., vol. 17, no. 5, pp. 604–617, 2012.
machine communications in OFDMA based systems,” IEEE Commun. [75] ZTE, “R2-104662: MTC simulation results with specific solutions,”
Lett., vol. 16, no. 9, pp. 1428–1431, Sep. 2012. 3GPP TSG RAN WG2 Meeting 71, 2011.
[54] R. C. D. Paiva, H. Wilhelm, M. Saily, D. Navratil, and M. Taponen, [76] P. Phunchongharn, E. Hossain, and D. I. Kim, “Resource allocation
“Overload control method for synchronized MTC traffic in GERAN,” for device-to-device communications underlaying LTE-Advanced net-
in Proc. IEEE Veh. Technol. Conf. (VTC Fall), San Francisco, CA, USA, works,” IEEE Wireless Commun., vol. 20, no. 4, pp. 91–100, Aug. 2013.
Sep. 2011, pp. 1–5. [77] Y. Cao, T. Jiang, X. Chen, and J. Zhang, “Social-aware video
[55] Z. Wang and V. W. S. Wong, “Optimal access class barring for stationary multicast based on device-to-device communications,” IEEE Trans.
machine type communication devices with timing advance informa- Mobile Comput., vol. 15, no. 6, pp. 1528–1539, Jun. 2016.
tion,” IEEE Trans. Wireless Commun., vol. 14, no. 10, pp. 5374–5387, [78] Y. Cao, T. Jiang, and C. Wang, “Cooperative device-to-device commu-
Oct. 2015. nications in cellular networks,” IEEE Wireless Commun., vol. 22, no. 3,
[56] F. Ming, X. Zhu, M. Torres, L. Anaya, and L. Patanapongpibul, pp. 124–129, Jun. 2015.
“GSM/GPRS bearers efficiency analysis for machine type communi- [79] N. Saquib, E. Hossain, and D. I. Kim, “Fractional frequency reuse
cations,” in Proc. IEEE Veh. Technol. Conf. (VTC Spring), Yokohama, for interference management in LTE-Advanced hetnets,” IEEE Wireless
Japan, May 2012, pp. 1–5. Commun., vol. 20, no. 2, pp. 113–122, Apr. 2013.
[57] J. Krnic and S. Krco, “Impact of WSN applications’ generated traffic [80] N. Saquib, E. Hossain, L. B. Le, and D. I. Kim, “Interference man-
on WCDMA access networks,” in Proc. IEEE Int. Symp. Pers. Indoor agement in OFDMA femtocell networks: Issues and approaches,” IEEE
Mobile Radio Commun. (PIMRC), Cannes, France, Sep. 2008, pp. 1–5. Wireless Commun., vol. 19, no. 3, pp. 86–95, Jun. 2012.
[58] Y. Zhang et al., “Cognitive machine-to-machine communications: [81] S. Bayat, Y. Li, Z. Han, M. Dohler, and B. Vucetic, “Distributed
Visions and potentials for the smart grid,” IEEE Netw., vol. 26, no. 3, data aggregation in machine-to-machine communication networks
pp. 6–13, May/Jun. 2012. based on coalitional game,” in Proc. IEEE Wireless Commun. Netw.
[59] Cisco. (2014). AGT and Cisco Traffic Incident Management Conf. (WCNC), Istanbul, Turkey, Apr. 2014, pp. 2026–2031.
Solution: Improving Traffic Safety and Efficiency. [Online]. Available: [82] Y. Cao, T. Jiang, and C. Wang, “Optimal radio resource allocation for
http://www.cisco.com/web/strategy/docs/agt-s-cc-city-tim-aag.pdf mobile task offloading in cellular networks,” IEEE Netw., vol. 28, no. 5,
[60] X. Ma, J. Zhang, X. Yin, and K. S. Trivedi, “Design and analysis of pp. 68–73, Sep./Oct. 2014.
a robust broadcast scheme for VANET safety-related services,” IEEE [83] A. Aijaz, M. Tshangini, M. R. Nakhai, X. Chu, and A.-H. Aghvami,
Trans. Veh. Technol., vol. 61, no. 1, pp. 46–61, Jan. 2012. “Energy-efficient uplink resource allocation in LTE networks with
[61] N. Nikaein and S. Krea, “Latency for real-time machine-to-machine M2M/H2H co-existence under statistical QoS guarantees,” IEEE Trans.
communication in LTE-based system architecture,” in Proc. Eur. Commun., vol. 62, no. 7, pp. 2353–2365, Jul. 2014.
Wireless, Vienna, Austria, Apr. 2011, pp. 1–6. [84] Y. Cao, T. Jiang, C. Wang, and L. Zhang, “CRAC: Cognitive radio
[62] J. Brown and J. Y. Khan, “A predictive resource allocation algorithm in assisted cooperation for downlink transmissions in OFDMA-based
the LTE uplink for event based M2M applications,” IEEE Trans. Mobile cellular networks,” IEEE J. Sel. Areas Commun., vol. 30, no. 9,
Comput., vol. 14, no. 12, pp. 2433–2446, Dec. 2015. pp. 1614–1622, Oct. 2012.
[63] S.-Y. Lien, T.-H. Liau, C.-Y. Kao, and K.-C. Chen, “Cooperative access
class barring for machine-to-machine communications,” IEEE Trans.
Wireless Commun., vol. 11, no. 1, pp. 27–32, Jan. 2012.
[64] G.-Y. Lin and H.-Y. Wei, “Auction-based random access load control for
time-dependent machine-to-machine communications,” IEEE Internet
Things J., to be published, doi: 10.1109/JIOT.2015.2480070. Yang Cao (S’09–M’14), photograph and biography not available at the time
[65] T. Kim, H. S. Jang, and D. K. Sung, “An enhanced random access of publication.
scheme with spatial group based reusable preamble allocation in cellular
M2M networks,” IEEE Commun. Lett., vol. 19, no. 10, pp. 1714–1717,
Oct. 2015.
[66] S.-Y. Lien and K.-C. Chen, “Massive access management for QoS guar-
antees in 3GPP machine-to-machine communications,” IEEE Commun.
Lett., vol. 15, no. 3, pp. 311–313, Mar. 2011. Tao Jiang (M’06–SM’10), photograph and biography not available at the time
[67] K. Zheng, F. Hu, W. Wang, W. Xiang, and M. Dohler, “Radio of publication.
resource allocation in LTE-advanced cellular networks with M2M
communications,” IEEE Commun. Mag., vol. 50, no. 7, pp. 184–192,
Jul. 2012.
[68] S. Andreev, O. Galinina, and Y. Koucheryavy, “Energy-efficient client
relay scheme for machine-to-machine communication,” in Proc. IEEE
Glob. Telecommun. Conf. (GLOBECOM), Houston, TX, USA, 2011, Zhu Han (S’01–M’03–SM’09–F’14), photograph and biography not available
pp. 1–5. at the time of publication.

Authorized licensed use limited to: KU Leuven Libraries. Downloaded on December 29,2023 at 11:25:06 UTC from IEEE Xplore. Restrictions apply.

You might also like