4th International ICST Conference on Communication System Software and Middleware

Research Article

Secure M2M Service Space in Residential Home

  • @INPROCEEDINGS{10.1145/1621890.1621903,
        author={Juhani Latvakoski and Tomi Hautakoski and Teemu V\aa{}is\aa{}nen and Jyri Toivonen and Arto Lappalainen and Timo Timo Aarnipuro},
        title={Secure M2M Service Space in Residential Home},
        proceedings={4th International ICST Conference on Communication System Software and Middleware},
        publisher={ACM},
        proceedings_a={COMSWARE},
        year={2010},
        month={5},
        keywords={Machine to machine communication home automation security.},
        doi={10.1145/1621890.1621903}
    }
    
  • Juhani Latvakoski
    Tomi Hautakoski
    Teemu Väisänen
    Jyri Toivonen
    Arto Lappalainen
    Timo Timo Aarnipuro
    Year: 2010
    Secure M2M Service Space in Residential Home
    COMSWARE
    ACM
    DOI: 10.1145/1621890.1621903
Juhani Latvakoski1,*, Tomi Hautakoski2,*, Teemu Väisänen2,*, Jyri Toivonen2,*, Arto Lappalainen2,*, Timo Timo Aarnipuro2,*
  • 1: VTT Technical Research Centre of Finland Kaitoväylä 1, P.O.Box 1100 FIN-90571 Oulu, Finland +358 40 5200 149
  • 2: VTT Technical Research Centre of Finland
*Contact email: Juhani.Latvakoski@vtt.fi, Tomi.Hautakosk@vtt.fii, Teemu.Vaisanen@vtt.fi, Jyri.Toivonen@vtt.fi, Arto.Lappalainen@vtt.fi, Timo.Aarnipuro@vtt.fi

Abstract

The motivation for this research arises from the explosion in the numbers of embedded devices in residential home environments, and their novel capabilities to connect with the Internet. As contributions, an experimental private machine-to-machine (M2M) service space environment for automation in residential home is provided. The novel solutions for the M2M architecture are provided to enable dynamic application of a secure communication overlay, smooth configuration and service discovery. The available M2M services connected with the secure overlay are smoothly visualized in a user interface of the private M2M service space. The achieved results indicate that the provided enablers for the M2M architecture, dynamic service configuration and discovery works quite well in dynamic distributed home environment. The secure network overlay offered high level security with the aid of cryptographic identifiers.