• 1-800-526-8630U.S. (TOLL FREE)
  • 1-917-300-0470EAST COAST U.S.
  • +353-1-416-8900REST OF WORLD

End-to-End M2M, 7th Edition

  • ID: 3069772
  • December 2014
  • Region: Global
  • 1287 Pages
  • Mind Commerce LLC

Machine-to-machine (M2M) communications has historically represented the integration of microprocessors, microcontrollers and sensors with communications, monitoring and control systems to improve efficiencies and effectiveness of business operations. The introduction of the Internet of Things (IoT) is taking M2M to entirely new level as applications are rapidly expanding beyond traditional boundaries. One of the anticipated impacts of IoT will be rapid growth of consumer oriented M2M applications and increased involvement of consumers as a key element of the M2M value chain.

Written by industry experts who have actually designed, implemented and operated M2M applications, the seventh edition of End-to-End M2M provides invaluable information for anyone seeking to better understand the technology, applications, business and regulatory issues. This research distinguishes itself from other publications on this topic by providing the reader with an understanding of M2M, the technologies involved in M2M, reasons to use M2M, key M2M applications, challenges in deploying M2M, and more.

The report includes forecast data for the period 2014 - 2019 with analysis of key drivers, READ MORE >

Note: Product cover images may vary from those shown

1: INTRODUCTION TO M2M

1 Overview

2 Introduction to M2M

3 Predictions
3.1 Predictions of M2M in different sectors
3.1.1 Smart Grid
3.1.2 Water Meters
3.1.3 Healthcare
3.1.4 Smart Meters
3.1.5 Smart City
3.1.6 Retail
3.1.7 Connected Building
3.1.8 Connected People
3.1.9 Connected Vehicles
3.1.10 Connected Consumer Gadgets
3.1.11 Connected Infrastructure
3.1.12 Connected Industrial Process
3.1.13 Connected Money
3.1.14 Big Data

4 Importance of M2M
4.1 Mobility
4.2 Flexibility
4.3 Real-time Access to Information
4.4 Profitability
4.5 Deployment
4.6 Speed & Cost
4.7 Replace Existing Processes and Procedures
4.8 Efficiency
4.9 Competitive Advantage
4.10 Integrating IT systems

5 Key Barriers to Scaling M2M Technologies
5.1 Lack of Universal Standards
5.2 Fragmented Value Chain
5.3 Communication and Marketing Challenges
5.4 Lack of Use Cases
5.5 Incompatible Sales Models and Long Sales Cycle

6 Applications
6.1 Fleet Management
6.2 Manufacturing
6.3 Healthcare
6.4 Automotive and Connected Car
6.5 Supply Chain Management
6.6 Retail Management
6.7 Field Service
6.8 Smart Home
6.9 Smart Buildings
6.10 Safety Compliance
6.11 Smart Appliances
6.12 Smart Resources Extraction
6.13 Smart Grids and Utilities
6.14 Security and Surveillance
6.15 Usage-based Insurance
6.16 Agriculture
6.17 Environmental Monitoring
6.18 Military
6.19 Product Monitoring
6.20 Predictive Maintenance

7 M2M Basics

8 Logical Building-blocks of M2M
8.1 Data Acquisition
8.2 Data Transmission
8.3 Data Analysis

9 M2M Ecosystem
9.1 End Device / Equipment
9.2 Consumer/End-user
9.3 Communication Link
9.4 Sensors
9.5 Applications
9.6 Middleware Platform
9.7 Embedded Module
9.8 Subscriber Identity Module (SIM)

10 Overall M2M Ecosystem

11 M2M Value Chain
11.1 Equipment Supplier
11.2 Software Publisher
11.3 Telecom Operator
11.4 Consulting Firm
11.5 Integrator
11.6 Distributor

12 Vertical and Horizontal Platforms

13 Technical Drivers for M2M

14 M2M Technology Drivers
14.1 Versatile Communications Networks
14.1.1 Cellular
14.1.2 Satellite
14.1.3 WiFi
14.1.4 Bluetooth
14.1.5 ZigBee
14.2 Affordable Geolocation
14.3 Lower Cost Specialized Sensors
14.4 Integrated, Special-Purpose Devices Now Affordable
14.4.1 Readymade M2M devices
14.5 Efficiency of Autonomous Software-Driven Decisions
14.6 M2M Platform Advantage
14.7 Big Data Analytics and Actionable Information

15 Internet of Things (IoT)
15.1 Government Internet of Things (GIoT)
15.2 Business Internet of Things (BIoT)
15.3 Industrial Internet of Things (IIoT)

16 Role of Satellite in M2M
16.1 Satellite for Asset Tracking
16.2 Details on Satellite Communication for M2M
16.3 Hybrid or Dual Communication for M2M
16.4 New Market for Satellite Players
16.5 Alliances and Acquisitions in Satellite M2M
16.5.1 Orbcomm Acquires GlobalTrak and MobileNet
16.5.2 Inmarsat and ORBCOMM in M2M Alliance
16.5.3 Inmarsat partners with RacoWireless
16.5.4 Orbcomm Acquires Skywave

17 Choosing a Wireless Service Provider
17.1 SIM Cards
17.2 Activations
17.3 Cost per SMS / Data Block
17.4 SMS / Data Retry Scheme
17.5 SMS Delivery Receipt
17.6 Store and Forward
17.7 Roaming
17.8 SLAs
17.9 SMS with GPRS and 3G
17.10 Billing Services

18 Managing M2M Development Projects
18.1 Project Manager Assignment
18.2 Detailed M2M Development and Launch Plan
18.3 Consider Open Source M2M Frameworks
18.4 Monitor the M2M Project's Business Model
18.5 Budgetary Control throughout Lifecycle
18.6 Network Choice
18.7 Secured Connectivity
18.8 Components Selection

19 Standardization
19.1 oneM2M
19.2 Zigbee
19.3 ETSI
19.4 GSMA
19.5 Global M2M Association (GMA)
19.6 M2M World Alliance
19.7 AllSeen Alliance
19.8 ITU-T
19.9 ESO
19.10 IIC
19.11 Present and Future of M2M Standards

20 Concluding Remarks

2: VERTICAL MARKET SECMENTS AND APPLICATIONS

1 Overview

2 Connected Car
2.1 Introduction
2.2 Safety, Security and other Connected Car Services
2.2.1 Breakdown Call (bCall)
2.2.2 Stolen Vehicle Tracking (SVT)
2.2.3 Remote Diagnostics
2.2.4 Insurance Services
2.2.5 Connected Navigation
2.3 Connected Vehicles
2.4 V2X Communication
2.5 Connected Car Features
2.6 Role of Government in Connected Vehicles
2.7 Environmental Benefits of Connected Car
2.8 Key Challenges of Connected Car
2.9 Downside of Connected Car
2.10 Manufacturer Efforts for Connected Car
2.11 Future of Connected Car

3 Smart City
3.1 Essential Elements of a Smart City
3.2 Creation of Smart Cities
3.3 Smart City Framework
3.4 Smart City Features
3.5 Cities Most Ready for Smart City Concept
3.6 Smart City Progress in China
3.7 Smart City Progress in India
3.8 Smart City Progress in Spain
3.9 EU backs Next Wave of Digital Growth
3.10 Wireless Network in Santander
3.10.1 Transport
3.10.2 Energy
3.10.3 Waste Management
3.10.4 Environment
3.11 Smart City Progress in Brazil
3.12 Implementation of Smart City across the Globe
3.13 Standards for Smart City
3.14 FI-WARE
3.15 Concluding Remarks

4 Smart Home and Building Automation
4.1 Smart Building
4.2 Security
4.3 Facilities Control
4.4 Standardization for Solutions in Smart Home

5 Utilities
5.1 Smart Meters
5.2 Smart Grids
5.3 Commercial Energy Management
5.4 Personal Energy and Home Energy Management

6 Oil and Gas
6.1 Remotely Monitored Oil and Gas Assets

7 Healthcare
7.1 Remote Patient Monitoring
7.1.1 Wearable Device Types
7.2 Mobile Health (m-Health)
7.2.1 mHealth Market Size
7.2.2 m-Health Market in Russia
7.2.3 Market Barriers and Drivers
7.2.4 Trends and Forecasts of m-Health Market Development
7.2.5 Medication Management
7.2.6 Device Monitoring and Management
7.2.7 Assisted living for elderly
7.2.8 M2M Healthcare Applications
7.2.9 M2M in Healthcare Partnerships

8 Manufacturing
8.1 M2M and the Factory Floor
8.2 M2M Driven Changes to Manufacturing
8.3 Future of M2M in Manufacturing
8.4 Internet of Things (IoT) Kit

9 Distribution
9.1 Supply Chain
9.2 Remote Inventory Management

10 Retail
10.1 Challenges faced by Retail Industry
10.2 Digital Signage
10.2.1 Brands in Retail Stores
10.2.2 Healthcare
10.2.3 Transportation
10.2.4 Waiting Rooms and Break Rooms
10.2.5 Advertising
10.2.6 Airline Industry
10.2.7 Important Factors to consider for Deploying Digital Signage
10.2.8 Types of Digital Signage Networks
10.2.9 Media Mapping
10.2.10 Concluding Remarks
10.3 Connected Vending
10.4 Point of Sale (POS)
10.5 M2M Applications in Market for Retail
10.5.1 Revel Systems POS
10.5.2 Square Register
10.5.3 Solution from Verizon
10.5.4 Solution from Sprint
10.5.5 Mobile Shopper
10.6 Tablets and M2M in Retail Inventory Management
10.7 Kiosks and Out of Home Networks
10.7.1 Interactive Kiosks
10.8 Digital Signage

11 Transportation
11.1 Commercial Fleets
11.2 Monitor and Control Cargo Vessels
Rules of the sea
11.3 Personal Transportation
11.4 Railways

12 Asset Tracking (including living things)

13 Agriculture
13.1 Basics of M2M Application in Agriculture
13.2 Challenges for M2M in Agriculture
13.3 M2M Benefits to the Agriculture Sector
13.4 Supply Chain Aspects of Agriculture
13.4.1 Smart Logistics
13.5 M2M Application Potential for Agriculture
13.5.1 Ammonia Tank Monitoring
13.5.2 “Precision Agriculture” for Planting, Cultivation, and Harvesting
13.5.3 Remote Monitoring – Environmental and Plant and Livestock
13.5.4 Automatic Irrigation
13.5.5 Farm Monitoring
13.6 M2M Applications in Market for Agriculture
13.6.1 Monitoring of Lactation cycles of Animals
13.6.2 Application using RFMicron
13.6.3 Telematics Solution from CLAAS
13.6.4 Crop Solution
13.6.5 Remotely Control Greenhouse
13.6.6 Solution in Farming
13.6.7 Solution Providers in M2M Agriculture
13.6.8 Urban Agriculture

14 Military

15 Environmental Sciences
15.1 M2M Applications in Environmental Sciences
15.1.1 Collecting Forest Information
15.1.2 Projects and Technologies
15.1.3 Battling Forest Fires

16 Insurance Industry
16.1 UBI in European Market
16.1.1 Onward and Upward with UBI
16.1.2 The Rest of Europe
16.1.3 Italy
16.1.4 United Kingdom
16.1.5 France and Germany
16.1.6 The Value of Value-added Services
16.1.7 The Role or German OEMs
16.1.8 Other UBI Drivers
16.1.9 The Google Wild Card
16.2 Insurance Applications

17 Security and Surveillance
17.1 Safety Features for Aircrafts
17.2 Safety Features for Safe Living based on M2M
17.3 Safety Features for Travel based on M2M
17.4 Safety Features for Workplace based on M2M

18 Wearable M2M
18.1 Basics of Wearable M2M
18.2 Latest Wearable Devices

19 Concluding Remarks

3: M2M RELATED TECHNOLOGIES

1 Overview

2 Introduction

3 Block # 1: The Field-Deployed Hardware and Firmware Technology
3.1 Analog-to-Digital and Digital-to-Analog Converter
3.2 Memory
3.3 Input / Output (I/O)
3.4 Power Module
3.5 Processor and Clock

4 Block # 2: Connectivity - Wireless Service Standards, Technology and Protocols
4.1 Wireless Standards
4.1.1 GSM (Global System Mobile)
4.1.2 CDMA (Code Division Multiple Access)
4.1.3 WiMAX
4.2 The Technologies and Bearers of Choice
4.2.1 GPRS (General Purpose Radio Service)
4.2.2 CDPD (Cellular Digital Packet Data Protocol)
4.2.3 1xRTT or CDMA2000
4.2.4 Control Channel – SMS, Analog Control Channel
4.2.5 3G Wireless
4.2.6 Circuit Switched

5 Block # 3: Back-end Server Technology
5.1 Gateway to Wireless Carrier or Service Provider
5.1.1 3G–GPRS, 1xRTT Packet
5.1.2 Delivery of SMS to the Internet
5.2 Server Processes via Out-bound M2M Message
5.2.1 Add a Layer of Security
5.2.2 Provide Billing Services
5.2.3 Enable Customer Care
5.2.4 Log and Manage Traffic
5.2.5 Interpret Inbound and Outbound M2M Messages
5.3 Software to Display, Create and Monitor M2M
5.3.1 Developer’s dilemma
5.3.2 Platform Types

6 Wireless Technology Recommendations
6.1 GSM SMS
6.2 CDMA 1xRTT
6.3 WiFi
6.4 WiMAX
6.5 ZigBee
6.6 6LoWPAN
6.7 iBeacon

7 M2M Application Deployment Challenges
7.1 Privacy and Security Issues
7.2 Fragmentation and Slow Growth
7.3 Deployment of IPV6
7.4 Deployment of M2M application

8 Small Cells Technology for M2M
8.1 Picocell
8.2 Femtocell
8.3 MicroCells
8.4 Metrocells
8.5 Advantages and Working Principles
8.6 Comparing Microcells, Picocells, and Metrocells

9 3G

11 LTE

12 RFID Overview
12.1 Benefits of RFID technology
12.2 RFID Technology and Applications
12.3 RFID Basics
12.4 History of RFID
12.5 RFID Developments
12.6 Active RFID
12.7 UHF RFID History
12.8 RFID Tag Elements
12.9 RFID Tag Types
12.10 RFID Reader elements
12.11 RFID Printers
12.12 Antenna Basics
12.13 RFID Privacy
12.14 RFID Standards Bodies

13 Near Field Communications (NFC)
13.1 NFC Basics
13.2 NFC Applications
13.3 NFC History and NFC Forum
13.4 NFC vs. other Wireless Technologies
13.5 NFC Technology RF Interface
13.6 NFC Data Transfer
13.7 NFC Device Types
13.8 NFC Standards and Capabilities
13.9 NFC Tag Basics
13.10 NFC Tag Type Definitions
13.11 NFC Tag Operation
13.12 NFC Tag Design and Manufacture
13.13 NFC Security Basics
13.14 Eavesdropping
13.15 Data Corruption
13.16 Data Modification
13.17 Man-in-the-middle
13.18 NFC Secure Channel

14 Embedded Systems

15 Sensors
15.1 Sensor Classification

16 M2M Sensors
16.1 M2M Sensor Challenges
16.2 M2M Sensor Requirements

17 Wireless Sensor Networks
17.1 WSN Definition
17.2 WSN Integration Approaches
17.3 Challenges of WSNs in IoT
17.3.1 Security
17.3.2 Quality of Service
17.3.3 Configurations
17.4 Standards

18 Future of Sensors
18.1 Sensors Working in Unison for M2M Applications

19 Concluding Remarks

4: CASE STUDIES

1 Overview

2 Connected Car
2.1 Case: Connected Electric Vehicle
2.1.1 The Challenge
2.1.2 The Solution
2.1.3 The Result
2.1.4 Author’s Note
2.2 Case: Real-time Vehicle Management Information
2.2.1 The Challenge
2.2.2 The Solution
2.2.3 The Result
2.2.4 Author’s Note

3 Smart City
3.1 Case: Enhance Safety and Improve Traffic Flow
3.1.1 The Challenge
3.1.2 The Solution
3.1.3 The Result
3.1.4 Author’s Note
3.2 Case: Transaction Processing for Parking Meters
3.2.1 The Challenge
3.2.2 The Solution
3.2.3 The Result
3.2.4 Author’s Note
3.3 Case: Smart Loo
3.3.1 The Challenge
3.3.2 The Solution
3.3.3 The Result
3.3.4 Author’s Note
3.4 Case: Smart Bin
3.4.1 The Challenge
3.4.2 The Solution
3.4.3 The Result
3.4.4 Author’s Note
3.5 Case: SmartSantander (City-scale Experimental Research Facility)
3.5.1 The Challenge
3.5.2 The Solution
3.5.3 The Result
3.5.4 Author’s Note

4 Smart Home and Buildings
4.1 Case: Solution for Improved Oil Efficiency
4.1.1 The Challenge
4.1.2 The Solution
4.1.3 The Result
4.1.4 Author’s Note
4.2 Case: Monitor Structural Moisture Conditions in Real-time
4.2.1 The Challenge
4.2.2 The Solution
4.2.3 The Result
4.2.4 Author’s Note

5 Utilities and Energy Management
5.1 Case: Energy Data Management
5.1.1 The Challenge
5.1.2 The Solution
5.1.3 The Result
5.1.4 Author’s Note
5.2 Case: Reducing A/C Power Consumption
5.2.1 The Challenge
5.2.2 The Solution
5.2.3 The Result
5.2.4 Author’s Note
5.3 Case: Energy Optimization
5.3.1 The Challenge
5.3.2 The Solution
5.3.3 The Result
5.3.4 Author’s Note

6 Utilities Oil and Gas Management
6.1 Case: Cost Saving and Safety Benefits for Oil & Gas Industry
6.1.1 The Challenge
6.1.2 The Solution
6.1.3 The Result
6.1.4 Author’s Note
6.2 Case: High-Value Asset Monitoring
6.2.1 The Challenge
6.2.2 The Solution
6.2.3 The Result
6.2.4 Author’s Note
6.3 Case: Propane Monitoring
6.3.1 The Challenge
6.3.2 Ecosystem
6.3.3 The Solution
6.3.4 The Result
6.3.5 Author’s Note

7 Healthcare
7.1 Case: Wearable M2M Empowering the Elderly
7.1.1 The Challenge
7.1.2 The Solution
7.1.3 The Result
7.1.4 Author’s Note
7.2 Case: Comprehensive Remote Patient Monitoring Solutions
7.2.1 The Challenge
7.2.2 The Solution
7.2.3 The Result
7.2.4 Author’s Note
7.3 Case: Remote Cardiac Monitoring Solution
7.3.1 The Challenge
7.3.2 The Solution
7.3.3 The Result
7.3.4 Author’s Note
7.4 Case: Breathing Assistance for sleep Apnea Patients
7.4.1 The Challenge
7.4.2 The Solution
7.4.3 The Result
7.4.4 Author’s Note
7.5 Case: Self-monitor Key Vital Signs
7.5.1 The Challenge
7.5.2 The Solution
7.5.3 The Result
7.5.4 Author’s Note
7.6 Case: Reduce Need for Re-hospitalization
7.6.1 The Challenge
7.6.2 The Solution
7.6.3 The Result
7.6.4 Author’s Note

8 Manufacturing
8.1 Case: Generate Real-time alerts
8.1.1 The Challenge
8.1.2 The Solution
8.1.3 The Result
8.1.4 Author’s Note

9 Supply Chain Management (SCM)
9.1 Case: Increase Visibility in Supply Chain
9.1.1 The Challenge
9.1.2 The Solution
9.1.3 The Result
9.1.4 Author’s Note

10 Preventive Maintenance
10.1 Case: Preventive Maintenance using Predictive Analysis
10.1.1 The Challenge
10.1.2 The Solution
10.1.3 The Result
10.1.4 Author’s Note

11 Retail Management
11.1 Case: ATM Management
11.1.1 The Challenge
11.1.2 The Solution
11.1.3 The Result
11.1.4 Author’s Note
11.2 Case: Vending Machine Solution
11.2.1 The Challenge
11.2.2 The Solution
11.2.3 The Result
11.2.4 Author’s Note
11.3 Case: M2M to Help Bakers Protect Dough Quality
11.3.1 The Challenge
11.3.2 The Solution
11.3.3 The Result
11.3.4 Author’s Note
11.4 Case: Digital Displays for Marketing
11.4.1 The Challenge
11.4.2 The Solution
11.4.3 The Result
11.4.4 Author’s Note
11.5 Case: Vending Machine
11.5.1 The Challenge
11.5.2 The Solution
11.5.3 Business Model
11.5.4 The Result
11.5.5 Author’s Note

12 Transport
12.1 Case: Monitor EV Charging Stations
12.1.1 The Challenge
12.1.2 The Solution
12.1.3 The Result
12.1.4 Author’s Note
12.2 Case: Transportation Safety
12.2.1 The Challenge
12.2.2 The Solution
12.2.3 The Result
12.2.4 Author’s Note
12.3 Case: Fleet Scalability using Application Enablement Platform
12.3.1 The Challenge
12.3.2 The Solution
12.3.3 The Result
12.3.4 Author’s Note
12.4 Case: Track and Manage Truck Fleet
12.4.1 The Challenge
12.4.2 The Solution
12.4.3 The Result
12.4.4 Author’s Note
12.5 Case: Fleet Management
12.5.1 The Challenge
12.5.2 Ecosystem
12.5.3 The Solution
12.5.4 The Result
12.5.5 Author’s Note

13 Asset Tracking / Fleet Management
13.1 Case: Global and Secured Fleet Tracking Solution
13.1.1 The Challenge
13.1.2 The Solution
13.1.3 The Result
13.1.4 Author’s Note
13.2 Case: Tracking and Monitoring Valuable Assets
13.2.1 The Challenge
13.2.2 The Solution
13.2.3 The Result
13.2.4 Author’s Note
13.3 Case: M2M Connectivity for GPS Tracking
13.3.1 The Challenge
13.3.2 The Solution
13.3.3 The Result
13.3.4 Author’s Note

14 Agriculture
14.1 Case: Internet of Bees to ensure Adequate Pollination
14.1.1 The Challenge
14.1.2 The Solution
14.1.3 The Result
14.1.4 Author’s Note
14.2 Case: Remote Control of Grain Silos
14.2.1 The Challenge
14.2.2 The Solution
14.2.3 The Result
14.2.4 Author’s Note
14.3 Case: Bats to Assist in Protecting Crops
14.3.1 The Challenge
14.3.2 The Solution
14.3.3 The Result
14.3.4 Author’s Note
14.4 Case: Irrigation Management
14.4.1 The Challenge
14.4.2 The Solution
14.4.3 The Result
14.4.4 Author’s Note
14.5 Case: Weather systems
14.5.1 The Challenge
14.5.2 The Solution
14.5.3 The Result
14.5.4 Author’s Note
14.6 Case: Monitor Agricultural Produce In-transit
14.6.1 The Challenge
14.6.2 The Solution
14.6.3 Business Model
14.6.4 Connectivity Architecture
14.6.5 The Result
14.6.6 Author’s Note

15 Military and Police
15.1 Case: Connecting Police Fleets for Increased Safety
15.1.1 The Challenge
15.1.2 The Solution
15.1.3 The Result
15.1.4 Author’s Note

16 Environmental Sciences
16.1 Case: Real-time Water Quality Monitoring Network at the Ganges
16.1.1 The Challenge
16.1.2 The Solution
16.1.3 The Result
16.1.4 Author’s Note
16.2 Case: Reduce Waste Water
16.2.1 The Challenge
16.2.2 The Solution
16.2.3 The Result
16.2.4 Author’s Note
16.3 Case: Track and Trace Illegally Harvested Timber
16.3.1 The Challenge
16.3.2 The Solution
16.3.3 The Result
16.3.4 Author’s Note

17 Safety, Security and Surveillance
17.1 Case: Tracking Device for Child Safety
17.1.1 The Challenge
17.1.2 The Solution
17.1.3 The Result
17.1.4 Author’s Note
17.2 Case: Security Monitoring Solution
17.2.1 The Challenge
17.2.2 The Solution
17.2.3 The Result
17.2.4 Author’s Note

18 Remote Monitoring
18.1 Case: Remote Monitoring for Hunters and Wildlife Enthusiasts
18.1.1 The Challenge
18.1.2 The Solution
18.1.3 The Result
18.1.4 Author’s Note
18.2 Case: Remote Monitoring solution for Wastewater Management
18.2.1 The Challenge
18.2.2 The Solution
18.2.3 The Result
18.2.4 Author’s Note

19 Concluding Remarks

5: COMPANY INFORMATION AND M2M STRATEGIES

1 Overview

2 Focus on M2M by Telecom Servicer Providers
2.1 New Avenues
2.2 Regulatory Requirements
2.3 Low Capex Requirement
2.4 Scale of Market and Revenue Increase
2.5 Spread across Value Chain
2.6 Threat from Cloud Service Providers
2.7 Unwilling to be a mere Bystander

3 Go to Market Factors for Mobile Operators
3.1 Business Alignment
3.2 People
3.3 Route to Market
3.4 Collaboration
3.5 Branding
3.6 Result

4 Coexistence of Cellular Communications and M2M
4.1 Challenges and Risks faced by Telecom Service Providers
4.1.1 Optimum Spread in Value Chain
4.1.2 Managing Alliances and Partnerships
4.1.3 Optimistic Predictions
4.1.4 Need for Technology Standardization
4.1.5 Technology Development
4.1.6 New Business Models
4.1.7 Intense Competition
4.1.8 Differing Nature of Services
4.2 Industry Analysis

5 Five Forces Analysis
5.1 Threat of Entry
5.1.1 Customer Switching Costs
5.1.2 Capital Requirements
5.1.3 Incumbency Advantages Independent of Size
5.1.4 Restrictive Government Policy
5.1.5 Expected Retaliation
5.2 Power of Suppliers
5.3 Power of Buyers
5.4 Threat of Substitutes
5.5 Rivalry among Existing Competitors

6 Need for Collaboration in M2M

7 Strategies adopted by Telecom Service Providers
7.1 Establishing M2M platform Capabilities
7.2 Establishing M2M competence centers or Digital divisions
7.3 Establishing an M2M Sales Force
7.4 Engaging Vertical Partners
7.5 Partnering to Extend Reach
7.6 Providing M2M Developer Tools
7.7 Partnering to Share Technology and Knowledge

8 Telecom Carriers
8.1 Introduction
8.2 AT&T
8.2.1 Introduction
8.2.2 M2M related Products and Services
8.2.3 Important Alliances in M2M
8.3 Telekom Austria
8.3.1 Introduction
8.3.2 M2M related Products and Services
8.3.3 Important Alliances in M2M
8.4 China Unicom
8.4.1 Introduction
8.4.2 M2M related Products or services
8.4.3 Important Alliances in M2M
8.5 Deutsche Telekom
8.5.1 Introduction
8.5.2 M2M related Products and Services
8.5.3 Important Alliances in M2M
8.6 Etisalat
8.6.1 Introduction
8.6.2 M2M related Products and Services
8.6.3 Important Alliances in M2M domain
8.7 Everything Everywhere
8.7.1 Introduction
8.7.2 M2M related Products and Services
8.7.3 Important Alliances in M2M
8.8 France Telecom/Orange/Orange Business Services
8.8.1 Introduction
8.8.2 M2M related Products and Services
8.8.3 Important Alliances in M2M
8.9 KPN
8.9.1 Introduction
8.9.2 M2M related Products and Services
8.9.3 Important Alliances in M2M
8.10 Roger Communication
8.10.1 Introduction
8.10.2 M2M related Products and Services
8.10.3 Important Alliances in M2M
8.11 SingTel
8.11.1 Introduction
8.11.2 M2M related Products and Services
8.11.3 Important Alliances in M2M
8.12 Telefónica
8.12.1 Introduction
8.12.2 M2M related Products and Services
8.12.3 Important Alliances in M2M domain
8.13 Telenor
8.13.1 Introduction
8.13.2 M2M related Products and Services
8.13.3 Important Alliances in M2M
8.14 TeliaSonera
8.14.1 Introduction
8.14.2 M2M related Products and Services
8.14.3 Important Alliances in M2M
8.15 Telstra
8.15.1 Introduction
8.15.2 M2M related Products and Services
8.15.3 Important Alliances in M2M
8.16 Turk Telekom
8.16.1 Introduction
8.16.2 Important Alliances in M2M
8.17 Verizon
8.17.1 Introduction
8.17.2 M2M related Products and Services
8.17.3 Important Alliances in M2M
8.18 Vodafone
8.18.1 Introduction
8.18.2 M2M related Products and Services
8.18.3 Important Alliances in M2M

9 Company Information and Major Stakeholders
9.1 Jasper Wireless
9.1.1 Introduction
9.1.2 M2M related Products and Services
9.1.3 Important Alliances in M2M
9.2 Axeda
9.2.1 Introduction
9.2.2 M2M related Products and Services
9.2.3 Important Alliances in M2M domain
9.3 Numerex
9.3.1 Introduction
9.3.2 M2M related Products and Services
9.3.3 Important Alliances in M2M
9.4 Raco Wireless
9.4.1 Introduction
9.4.2 M2M related Products and Services
9.4.3 Important Alliances in M2M
9.5 KORE Telematics
9.5.1 Introduction
9.5.2 M2M related Products and Services
9.5.3 Important Alliances in M2M
9.6 Sierra Wireless
9.6.1 Introduction
9.6.2 M2M related Products and Services
9.6.3 Important Alliances in M2M
9.7 Hitachi Communication Technologies America, Inc.
9.7.1 Introduction
9.7.2 M2M related Products and Services
9.7.3 Important Alliances in M2M
9.8 Digi International
9.8.1 Introduction
9.8.2 M2M related Products and Services
9.8.3 Important Alliances in M2M
9.9 Telit
9.9.1 Introduction
9.9.2 M2M related Products and Services
9.9.3 Important Alliances in M2M

10 Company Information Satellite Players
10.1 Inmarsat
10.1.1 Introduction
10.1.2 M2M related Products and Services
10.1.3 Important Alliances in M2M
10.2 SpaceQuest
10.2.1 Introduction
10.2.2 M2M related Products and Services
10.3 Globalstar
10.3.1 Introduction
10.3.2 M2M related Products and Services
10.3.3 Important Alliances in M2M
10.4 ORBCOMM
10.4.1 Introduction
10.4.2 M2M related Products and Services
10.4.3 Important Alliances in M2M
10.5 SkyBitz
10.5.1 Introduction
10.5.2 M2M related Products and Services
10.5.3 Important Alliances in M2M
10.6 Iridium
10.6.1 Introduction
10.6.2 M2M related Products and Services
10.6.3 Important Alliances in M2M

11 Concluding Remarks

6: SECURITY AND PROVACY ASPECTS OF M2M

1 Overview

2 Security and Privacy for M2M

3 Attacks Observed in Past

4 Complexity in M2M Security
4.1 Promiscuity across Networks
4.2 Connected Devices Lack Intelligence
4.3 Missing Pieces
4.4 Denial of Power Attacks
4.5 Innovative Ways to Combat Risks
4.6 Designing with Security in Mind
4.7 Stealing Bandwidth
4.8 Antivirus Software
4.9 Time-to-market vs. Security Considerations

5 Control and Security Measure for M2M
5.1 Temporary Access
5.2 Different Level of Authority for Users
5.3 Limited Access
5.4 Open-source Software
5.5 Disclosure of Vulnerabilities
5.6 Analyze Attack Surface
5.7 Secure Design
5.8 Code Signing
5.9 Security in all Layers of Value Chain
5.10 All Stakeholders to Work together for Security
5.11 Usual Security Measures

6 Two points of Attack
6.1 Physical Attacks on Device
6.2 Increase Security on Physical Side (Devices)
6.3 Network Attacks
6.4 Increase Security on Network Side

7 M2M Communication over GSM

8 Collaborations and Standards for Safety
8.1 M2M Standardization Task Force
8.2 IETF
8.3 AllSeen Alliance
8.4 Mobile App Security Working Group
8.5 Standards by Verticals

9 Control vs. Monitoring and Tracking

10 Security Goals of Sensor Networks
10.1 Primary Security Goals
10.1.1 Data Confidentiality
10.1.2 Data Authentication
10.1.3 Data Integrity
10.1.4 Data Availability
10.2 Secondary Security Goals
10.2.1 Data Freshness
10.2.2 Self-Organization
10.2.3 Time Synchronization
10.2.4 Secure Localization

11 Types of Attacks in M2M Sensor Networks
11.1 Passive Attack
11.1.1 Attacks against Privacy
11.2 Active Attack
11.2.1 Routing Attacks in Sensor Networks
11.2.2 Denial of Service
11.2.3 Node Subversion
11.2.4 Node Malfunction
11.2.5 Node Outage
11.2.6 Physical Attacks
11.2.7 Message Corruption
11.2.8 False Node
11.2.9 Node Replication Attacks
11.2.10 Passive Information Gathering
11.3 Security Mechanisms to combat Active and Passive Attacks
11.3.1 Low-Level Mechanism
11.3.2 High-Level Mechanism
11.4 Challenges for Sensor Networks
11.4.1 Wireless Medium
11.4.2 Ad-Hoc Deployment
11.4.3 Hostile Environment
11.4.4 Resource Scarcity
11.4.5 Immense Scale
11.4.6 Unreliable Communication
11.4.7 Unattended Operation
11.5 Active and Passive Security Attacks on WSN

12 Security Requirements for M2M
12.1 Confidentiality
12.2 Integrity
12.3 Authentication
12.4 Non-repudiation
12.5 Access control
12.6 Availability
12.7 Privacy

13 Design Security & Privacy into the System

14 Mechanisms for M2M Security
14.1 Early Detecting Node Compromise in M2M Domain
14.2 Bandwidth Efficient Cooperative Authentication

15 Evolving Elements of Security

16 Security vs. Price or at any Price?

17 Securing the Internet not the Devices

18 Use of IPV6 for M2M Devices

19 Use of Certificate for Security

20 Security to be Deployed by Skilled Personnel

21 Security Threats on OSI layers for WSN
21.1 Physical Layer of OSI Model
21.1.1 Attacks in Physical Layer
21.1.2 Countermeasures for attack in Physical layer
21.2 MAC Layer of OSI Model
21.2.1 Attacks in MAC Layer
21.2.2 Countermeasures for Attack in MAC Layer
21.3 Network Layer of OSI Model
21.3.1 Attacks in Network Layer
21.3.2 Countermeasures for Attack in Network Layer
21.4 Application Layer of OSI Model
21.4.1 Attacks in Application Layer
21.4.2 Countermeasures for Attack in Application Layer
21.5 Concluding Remarks

22 Sensor Network Standardization

23 Privacy Concerns
23.1 Control Factor
23.2 Data Ownership Factor
23.3 Government Initiatives
23.4 Geography
23.5 New aspects of Privacy

24 Privacy & Security Concerns for Big Data
24.1 Automated Access
24.2 Business Continuity Risk
24.3 Non-standard Access Control
24.4 Best Practices

25 Privacy Issues in Cloud Computing

26 Privacy by Design

27 Industry Security Survey
27.1 Introduction
27.2 Survey Participants
27.3 Geographic Reach
27.4 Role of M2M in Application
27.5 Topmost Concerns Deploying M2M Solution
27.6 Topmost Security Concerns Deploying M2M
27.7 Security Solution
27.8 Concluding Remarks on Industry Survey

28 Concluding Remarks

7: CLOUD, BIG DATA, M2M AND ANALYTICS

1 Overview

2 Introduction

3 Three Elements of M2M Application
3.1 Data Mobility
3.2 Big Data
3.3 The Cloud

4 Big Data
4.1 Industry Perspective of Big Data

5 Making Sense out of Data

6 Big Data Business Implications
6.1 Big Data is Catalyst not the Result
6.2 View on Data Sourcing and Permissions

7 M2M and Big Data Applications
7.1 Wireless Carriers
7.2 Better Energy Management
7.3 Auto Insurance
7.4 Smart Cars
7.5 Smart Homes
7.6 Robotics
7.7 Insurance
7.8 Logistics
7.9 Auto Manufacturers Supply Chain
7.10 Manufacturing
7.11 Healthcare
7.12 Utility
7.13 Security and Surveillance
7.14 Asset Tracking
7.15 Enterprises in any Sector

8 Challenges of M2M and Big Data
8.1 Privacy and Data Ownership
8.2 Authenticity and Security
8.3 Skills Scarcity
8.4 Changing Attitudes

9 The Cloud
9.1 Cloud Computing Model
9.2 Characteristics
9.3 Strategic Fit for Cloud Adoption
9.4 M2M and Cloud Integration
9.5 Application Benefits of M2M using Cloud
9.5.1 IaaS
9.5.2 PaaS
9.5.3 SaaS
9.5.4 MaaS
9.5.5 CaaS
9.5.6 Xaas
9.6 Analysis
9.7 Barriers and Challenges to Cloud Adoption
9.7.1 Enterprises Reluctance to Change
9.7.2 Responsibility of Data Security Externalized
9.7.3 Security Concerns
9.7.4 Cyber Attacks
9.7.5 Unclear Agreements
9.7.6 Complexity is a Deterrent
9.7.7 Cloud Interoperability
9.7.8 Audit of Service Provider
9.7.9 Viability of Third-party Providers
9.7.10 Acceptance Issues
9.7.11 Cost
9.7.12 Lack of Integration Features in the Public Cloud

10 Data Analytics
10.1 Factors Driving M2M Analytics Opportunity
10.1.1 M2M Data Growth
10.1.2 New Analytics Technologies
10.1.3 Business Value through Data Analysis
10.2 M2M Analytics Ecosystem
10.3 Competitive Vendor Analysis
10.3.1 Device manufacturers
10.3.2 SI and Professional Services
10.3.3 Management Platform Providers
10.3.4 Software and Application Developers
10.3.5 Communication Service Providers

11 Concluding Remarks

8: M2M ANALYSIS AND FORECASTING

1 Overview

2 Global M2M Industry Size 2014 - 2019

3 Global M2M Market Revenue 2014 - 2019

4 Global M2M Service Revenue 2014 - 2019

5 Global M2M Connections 2014 - 2019

6 Global M2M Data Traffic 2014 - 2019

7 M2M in Industry Verticals Globally

8 Global M2M Module Pricing

9: FUTURE OF M2M

1 Overview

2 M2M Adoption

3 Market Point-of-View

4 Steps Required for Better M2M Services
4.1 Making it Easier to use M2M Connectivity
4.2 Making it Easier to Develop, Launch and Maintain Applications Flexibly
4.3 Need for Open Platforms

5 Industry Point-of-View on Open Platform

6 Future of M2M Industry

7 Anticipated Trends for Next Few Years
7.1 Ecosystems Evolve
7.2 Big Data Aligned with M2M
7.3 Standards Strengthen
7.4 Open Hardware
7.5 More Innovation by Start-ups
7.6 M2M based Consumer Electronics will Reach Consumers
7.7 Connected cars in Spot-light
7.8 Transport Management Extends
7.9 New Products for Insurance Industry
7.10 More Smart Meter Installations
7.11 Smart Cities Thrive

8 Network-agnostic SIM Cards

9 Future Applications

10 Road Ahead for M2M Technology
10.1 Same Customers, New, and Enhanced M2M Apps
10.2 Mature Horizontal and Vertical Platforms
10.3 High Speed Devices and Higher Bandwidth Consumption
10.4 Security
10.5 Better Analytics
10.6 Distributed Analytics will Emerge
10.7 Integrated Cloud and Network
10.8 Giant Companies will join the Race
10.9 Global Growth will Begin to Catch up to Growth in Developed Countries
10.10 Mainstream Developers will Join-in

11 Concluding Remarks

List of Tables:
Table 1: Communication Networks
Table 2: Difference between Bluetooth and Zigbee
Table 3: Smart City Analysis
Table 4: Top 15 Companies by Healthcare projects
Table 5: Spec Comparison of Microcells, Picocells and Metrocells
Table 6: App Comparison of Microcells, Picocells and Metrocells
Table 7: Advantages and Disadvantages of Passive RFID Tags
Table 8: Advantages and Disadvantages of Active RFID Tags
Table 9: Market Forecast for High-Value Asset Monitoring
Table 10: Five Year Revenue Forecast for High-Value Asset Monitoring
Table 11: Managed Service Revenue for High-Value asset Monitoring
Table 12: Propane Statistics
Table 13: Propane ROI
Table 14: Medical Condition Analysis
Table 15: Cost and Cash Flow Analysis
Table 16: Market Forecast for Vending Machine
Table 17: Five year revenue forecast for Vending Machine
Table 18: Cost Benefit Analysis for Vending Machine
Table 19: Five Year Revenue forecast for Vending Machine
Table 20: Revenue / Savings Opportunity for Vending Machine
Table 21: Cost and Savings Analysis for Fleet Management
Table 22: Cost Analysis for Irrigation Management
Table 23: ROI and NPV Analysis for Agriculture
Table 24: Value Creation Mechanisms through M2M Analytics
Table 25: Global M2M Module Pricing by Technology 2014 - 2019

List of Figures:
Figure 1: Basic Building Blocks of M2M
Figure 2: The M2M Ecosystem (A)
Figure 3: The M2M Ecosystem (B)
Figure 4: The M2M Ecosystem ©
Figure 5: The M2M Ecosystem (D)
Figure 6: The M2M Ecosystem
Figure 7: M2M Value Chain
Figure 8: Cellular and Satellite support of M2M
Figure 9: Sensors in an M2M Network
Figure 10: Wireless Sensor Communications Module
Figure 11: Pre-configured Sensor Board Optimized for Agriculture Applications
Figure 12: Conceptual Rendering of M2M Platform
Figure 13: Lexus Advanced Active Safety Research Vehicle
Figure 14: Smart City Framework
Figure 15: Intelligent Building Monitoring and Control
Figure 16: Intelligent Building Functionality
Figure 17: Proportion of mHealth Solutions
Figure 18: M2M Enabled Pill Jar
Figure 19: Viking Life Saving Equipment
Figure 20: M2M Enabled Vending Machine
Figure 21: M2M Enabled Vending Machine
Figure 22: Typical Smart Home Monitoring for Elderly
Figure 23: Smart Logistics
Figure 24: UBI Solution
Figure 25: SmartBand SWR1O
Figure 26: LG Life Band Touch
Figure 27: LG Heart Rate
Figure 28: BodyMedia FIT
Figure 29: Nike+ Shoes with Embedded Sensors (A)
Figure 30: Nike+ Shoes with Embedded sensors (B)
Figure 31: Heart-rate Chest Strap
Figure 32: MOTOACTV
Figure 33: M2M related Technology
Figure 34: Measuring Water Level
Figure 35: Typical Processor Module Architecture
Figure 36: Compact all in one Device
Figure 37: GSM Operator Technology Deployments
Figure 38: CDMA Operator Technology Deployments
Figure 39: Comparison - GSM, CDMA, iDEN, AMPS
Figure 40: Back-end Server Integration with Carriers Infrastructure
Figure 41: SMS Delivery to Internet
Figure 42: Combined Back-End Servers, Processor and Monitoring Client
Figure 43: Platforms ease the Way to Production-Level M2M Solutions
Figure 44: Man-in-the-middle Attack
Figure 45: Independent Network
Figure 46: Hybrid Network
Figure 47: Access Point Network
Figure 48: Protocol Stack for Low-power WSN
Figure 49: UHF Architecture
Figure 50: Fleet Management Architecture
Figure 51: Next Generation M2M in the Cloud
Figure 52: Go to Market Factors for Mobile Operators
Figure 53: Porters Five Forces Analysis for Telecom Carriers
Figure 54: Strategies adopted by Telecom Service Providers
Figure 55: Industry View of M2M
Figure 56: Geographic Reach of Companies
Figure 57: Topmost Concerns for Deploying M2M Solution
Figure 58: Topmost Security aspects Deploying M2M Solutions
Figure 59: Interest in Big Data vs. Cloud Computing
Figure 60: Distinguishing Big Data Companies
Figure 61: Evaluating Forest Fire Risk
Figure 62: Decreasing Reliability of Data over Time
Figure 63: The M2M Cloud
Figure 64: Comparison of Cloud Application and Services by Priority
Figure 65: Competitive Vendor Analysis
Figure 66: Global M2M Industry Size 2014 - 2019
Figure 67: Global M2M Market Revenue 2014 - 2019
Figure 68: Global M2M Service Revenue 2014 - 2019
Figure 69: Global M2M Connections 2014 - 2019
Figure 70: Global M2M Data Traffic 2014 - 2019
Figure 71: Proportion of M2M by Industry Vertical by Year 2019

Note: Product cover images may vary from those shown
Note: Product cover images may vary from those shown

RELATED PRODUCTS

Our Clients

Amazon.com, Inc. GAP, Inc. Pitney Bowes, Inc. SONY Corporation PayPal Walt Disney Company