Machine to Machine (M2M) Communications Overview
What is M2M?
Introduction to M2M communications
Telemetry vs. M2M communications
Applications of M2M communications
People & Processes, Devices, Networks and Applications
M2M Business Sectors
Automotive
Consumer Electronics
Emergency Services
Fleet and Asset Management
Healthcare
Manufacturing
Remote Maintenance and Control
Smart Grid
Smart Home
Opportunities for cellular vendors and service providers
Market opportunities and trends for embedded modules
M2M Ecosystem and Technologies behind Smart and Intelligent Devices
Automation, asset Management, telemetry, transportation. telematics, healthcare, retail solutions, pricing, and vending machines
Telemetry and telemetric
Report location, engine management information, logistics tracking and remote assistance
Next Generation kiosks and self-service technology
Entertainment, financial, government, retail, and transportation
M2M for MVNOs and connectivity service providers
Cellular-enabled vehicles, POS Terminals, ATMs, and vending machines
Advanced M2M metering infrastructure
Digital signage market
M2M Applications
M2M verticals
M2M Hosted services
M2M application development
M2M connectivity
Global M2M service providers
M2M component and solution providers
M2M software providers
M2M Hosted services
M2M networks
M2M machine controller
M2M challenges
M2M devices
Wireless communication architectures and solutions
M2M Communications Technologies
Wireless Sensor Networking (WSN)
Cellular machine-to-machine (M2M) applications, networks and air interface standards
Software for M2M applications
M2M communication
Implementing security and encryption
Hardware and RTOS
System-level flexibility
Using communications protocols for Internet connectivity
IP-based cellular networks
M2M Systems and Networks
RF and wireless sensors
Wireless networks
Mobile Broadband Networks
Computer connected to the Internet
Robust processing performance
Networked devices
Device configurations and management
Exchange information in real-time without human intervention
M2M and Networking Technologies
Cellular M2M connectivity services
Overview of cellular networks including GSM, CDMA, EV-DO, UMTS/HSPA/HSPA+, LTE, LTE-Advanced
Overview of SIM (Subscriber Identity Module), mini SIM and embedded SIM cards
Overview of RFID, NFC, Zigbee, Bluetooth, WiFi and WiMAX
Overview of Satellite Communications, VSAT, Microwave and power line communication
M2M Design and Systems Engineering
M2M requirements
Hardware and software
M2M sensors
Tagging and tracking
Embedded Products
M2M Design
M2M SDK
(U)SIM Card Technology
M2M connectivity and management
M2M Security
Open M2M initiatives
RF concepts behind cell planning and coverage
M2M Security
Security and trust for M2M communications
Secure communication in the context of M2M communications
M2M security framework
Securing Data input/output and Internet communication
Secure cryptographic library
RSA 1024- and 2048-bit private key encryption
AES-128/192/256
ARC4, MD5 and SHA-1
SSL
HTTPS
SIPS
Redesigning Hardware for Security
Secure IP communication controller chip
Security threats for M2M
Machine Communication Identity Module (MCIM)
Configuration Attacks
Protocol Attacks on the Device
Attacks on the Core Network
User Data and Identity Privacy Attacks