Abstract
This paper explores the convergence of Machine-to-Machine (M2M) networks with Network-Centric Operations (NCO). An overview of the M2M communication paradigm and current standardization efforts regarding architecture are given. It includes an overview of the network-centric networking and analyses the idea of implementing NCO approach to achieve situational awareness and self-synchronization of autonomous and intelligent M2M devices in networked M2M environments. Case study involving M2M e-Health scenario is given and discussed as a proof of concept for the proposed convergence.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Lawton, G.: Machine-to-Machine Technology Gears Up for Growth. IEEE Computer 37(9), 12–15 (2004)
Smart Devices and Services Connected by CDMA 2000, Harbor Research, Inc. (2010)
M2M: Growth Opportunities for MNOs in developed Markets (Sample Pages), Mobile Market Development Ltd. (2010)
Alendal, M.: Operators need an ecosystem to support 50 billion connections. Ericsson Review (3) (2010)
Cox, A.: M2M: Connecting the devices. M2M & Embedded Strategies, Telematics, CE, mHealth, Metering & Smart Buildings 2011-2016, Juniper Research (2011)
ETSI M2M Technical Committee, http://www.etsi.org/Website/Technologies/M2M.aspx
3GPP Technical Specification 22.368, v11.3.0 (2011), http://www.3gpp.org/ftp/Specs/html-info/22368.htm
Lien, S.-Y., Chen, K.-W., Lin, Y.: Towards Ubiquitous Massive Accesses in 3GPP Machine-to-Machine Communications. IEEE Communications Magazine 49(4), 66–74 (2011)
Chang, K., Soong, A., Tseng, M., Xiang, Z.: Global Wireless Machine-to-Machine Standardization. IEEE Internet Computing 15(2), 64–69 (2011)
Dressler, F.: Network-centric Actuation Control in Sensor/Actuator Networks based on Bio-inspired Technologies. In: Mobile Adhoc and Sensor Systems (MASS), pp. 680–684 (2006)
Cebrowski, A.K., Garstka, J.J.: Network-centric warfare: Its origin and future. U.S. Naval Institute Proceedings Magazine, 28–35 (1998)
NIS23, Net-Centric Information & Integration Services for Security System (2009)
Alberts, D.S., Garstka, J.J., Stein, F.P.: Network centric warfare: Developing and leveraging information superiority, 2nd edn. CCRP (2001)
Networked Field Services, ClickSoftware (2010)
Network Centric Warfare, Department of Defense Report to Congress (2001)
Wang. N., Schmidt, D.C., van’t Hag, H., Corsaro, A.: Toward an adaptive Data Distribution Service for Dynamic Large-Scale Network-Centric Operation and Warfare. PrismTech Corporation (2008)
Wesensten, N.J., Belenky, G., Balkin, T.J.: Cognitive Readiness in Network-Centric Operations. Parameters 35(1), 94–105 (2005)
Bay, J.S.: Disruptive Effects of Net-Centricity on Command and Control. In: 13th ICCRTS “C2 for Complex Endeavors” (2008)
Groh, J.L.: Network-Centric Warfare: Leveraging the Power of Information. In: USAWC Guide to National Security Issues. Theory of War and Strategy, vol. 1, pp. 323–338 (2008)
von Lubitz, D., Wickramasinghe, N.: Healthcare Network Centric Operations: The Confluence of E-Health and E-Government. In: Global E-Government: Theory, Applications and Benchmarking, pp. 127–147 (2007)
ETSI Technical Report 102.742: Use cases of M2M applications for eHealth, v0.4.1 (2011), http://docbox.etsi.org/M2M/Open/Latest_Drafts/00005v041.pdf
Schmidt, D.C., Corsaro, A., van’t Hag, H.: Addressing the Challenges of Tactical Information Management in Net-Centric Systems with DDS. PrismTech Corporation (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Katusic, D., Jezic, G. (2012). Network-Centric Operations in Machine-to-Machine Networks. In: Jezic, G., Kusek, M., Nguyen, NT., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems. Technologies and Applications. KES-AMSTA 2012. Lecture Notes in Computer Science(), vol 7327. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30947-2_52
Download citation
DOI: https://doi.org/10.1007/978-3-642-30947-2_52
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30946-5
Online ISBN: 978-3-642-30947-2
eBook Packages: Computer ScienceComputer Science (R0)