Design of M2M Device Reachability Service Capability
نویسنده
چکیده
Machine-to-Machine (M2M) communications allow networked devices to exchange information without human intervention. The large variety of devices with diverse characteristics has already resulted in vertical M2M applications based on very heterogeneous forms of platforms, technology, and data models. Interoperability is limited. In order to develop horizontal platforms across different business domains, networks and devices, it is necessary to outline generic capabilities. Service Capabilities provide data mediation functions that may be shared by different applications through application programming interfaces. REpresentational State Transfer (REST) architectural style is adopted for M2M communications. The paper presents an approach to design RESTful Web Services for access to location and presence status information of M2M devices. The Device Reachability Service Capability provides access to device location and allows device presence information to be registered and obtained. Web Service operations are identified by analysis on typical use cases. M2M device reachability information is modelled as REST resources organized in a tree structure. Web Service performance characteristics are evaluated by simulation. Key-Words: Machine-to-Machine communications, Service Capability, Web Services, Location, Presence status, Service Level Agreements
منابع مشابه
A Survey on M2M Service Networks
The number of industrial applications relying on the Machine to Machine (M2M) services exposed from physical world has been increasing in recent years. Such M2M services enable communication of devices with the core processes of companies. However, there is a big challenge related to complexity and to application-specific M2M systems called ―vertical silos‖. This paper focuses on reviewing the ...
متن کاملHow to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack
In Machine-to-Machine (M2M) communications, authentication of a device is of upmost importance for applications of Internet ofThings. As traditional authentication schemes always assume the presence of a person, most authentication technologies cannot be applied in machine-centric M2M context. In this paper, we make the first attempt to formally model the authentication in M2M. We first model f...
متن کاملAutonomic Management of the HIP-based M2M Overlay Network
In a previous work, we build an M2M overlay network over the Internet in order to ensure private communication between M2M devices, M2M gateway and M2M applications. We propose in this paper to add the autonomic management of this overlay network. We add the self-healing and self-optimization capabilities to the M2M gateway. The M2M gateway is able to detect failures in the overlay path and rec...
متن کاملSemantic Agent-Based Service Middleware and Simulation for Smart Cities
With the development of Machine-to-Machine (M2M) technology, a variety of embedded and mobile devices is integrated to interact via the platform of the Internet of Things, especially in the domain of smart cities. One of the primary challenges is that selecting the appropriate services or service combination for upper layer applications is hard, which is due to the absence of a unified semantic...
متن کاملRandom Multiple Access for M2M Communications with QoS Guarantees
We propose a novel random multiple access (RMA) scheme with quality of service (QoS) guarantees for machine-tomachine (M2M) communications. We consider a slotted uncoordinated data transmission period during which machine type communication (MTC) devices transmit over the same radio channel. Based on the latency requirements, MTC devices are divided into groups of different sizes, and the trans...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017