
Overview
Machine-to-Machine (M2M) refers to direct automated communication between networked mechanical or electronic devices.
Course Outline
Machine to Machine (M2M) Communications Overview
- What is M2M?
- Introduction to M2M communications
- Telemetry vs. M2M communications
- Applications of M2M communications
- People & Processes, Devices, Networks and Applications
M2M Business Sectors
- Automotive
- Consumer Electronics
- Emergency Services
- Fleet and Asset Management
- Healthcare
- Manufacturing
- Remote Maintenance and Control
- Smart Grid
- Smart Home
- Opportunities for cellular vendors and service providers
- Market opportunities and trends for embedded modules
M2M Ecosystem and Technologies behind Smart and Intelligent Devices
- Automation, asset Management, telemetry, transportation. telematics, healthcare, retail solutions, pricing, and vending machines
- Telemetry and telemetric
- Report location, engine management information, logistics tracking and remote assistance
- Next Generation kiosks and self-service technology
- Entertainment, financial, government, retail, and transportation
- M2M for MVNOs and connectivity service providers
- Cellular-enabled vehicles, POS Terminals, ATMs, and vending machines
- Advanced M2M metering infrastructure
- Digital signage market
M2M Applications
- M2M verticals
- M2M Hosted services
- M2M application development
- M2M connectivity
- Global M2M service providers
- M2M component and solution providers
- M2M software providers
- M2M Hosted services
- M2M networks
- M2M machine controller
- M2M challenges
- M2M devices
- Wireless communication architectures and solutions
M2M Communications Technologies
- Wireless Sensor Networking (WSN)
- Cellular machine-to-machine (M2M) applications, networks and air interface standards
- Software for M2M applications
- M2M communication
- Implementing security and encryption
- Hardware and RTOS
- System-level flexibility
- Using communications protocols for Internet connectivity
- IP-based cellular networks
M2M Systems and Networks
- RF and wireless sensors
- Wireless networks
- Mobile Broadband Networks
- Computer connected to the Internet
- Robust processing performance
- Networked devices
- Device configurations and management
- Exchange information in real-time without human intervention
M2M and Networking Technologies
- Cellular M2M connectivity services
- Overview of cellular networks including GSM, CDMA, EV-DO, UMTS/HSPA/HSPA+, LTE, LTE-Advanced
- Overview of SIM (Subscriber Identity Module), mini SIM and embedded SIM cards
- Overview of RFID, NFC, Zigbee, Bluetooth, WiFi and WiMAX
- Overview of Satellite Communications, VSAT, Microwave and power line communication
M2M Design and Systems Engineering
- M2M requirements
- Hardware and software
- M2M sensors
- Tagging and tracking
- Embedded Products
- M2M Design
- M2M SDK
- (U)SIM Card Technology
- M2M connectivity and management
- M2M Security
- Open M2M initiatives
- RF concepts behind cell planning and coverage
M2M Security
- Security and trust for M2M communications
- Secure communication in the context of M2M communications
- M2M security framework
- Securing Data input/output and Internet communication
- Secure cryptographic library
- RSA 1024- and 2048-bit private key encryption
- AES-128/192/256
- ARC4, MD5 and SHA-1
- SSL
- HTTPS
- SIPS
- Redesigning Hardware for Security
- Secure IP communication controller chip
- Security threats for M2M
- Machine Communication Identity Module (MCIM)
- Configuration Attacks
- Protocol Attacks on the Device
- Attacks on the Core Network
- User Data and Identity Privacy Attacks