Machine to Machine Communication (M2M) is the
automatic exchange of data in a heterogeneous wireless network,
including devices or machines, without human interaction. MTC
applications aim to provide quality to the machine with, in order
to automated every life process. MTC devices are generally
spread in a various area and should communicate with each other
in various networks. LTE cellular networks are decide to support
MTC applications then its offer a large coverage and these are
all heterogeneous networks. The advantage of such method is for
both MTC application and LTE networks. The most necessary of
these problems is the congestion in network which is form
However; the MTC applications over LTE networks occur many
requirements and causes challenges due to congestion in
network. In propose design, long term evolution use
heterogeneous network and according to particular network,
security will be provided. The security of wireless sensor
networks is a challenging problem in the process of data
transmission.
Sapana Nandanwar : Pursuing M.E 4th sem from G.H. Raisoni college
of Engineering and Technology for Women Nagpur, Maharashtra,
India.Her research interests are in the area of the Wireless Sensor
Network.
Machine to Machine Communication
Heterogeneous Network
Wormhole Attack
Security
This paper proposes an approach for data transmission
over Heterogeneous wireless network to send a data in
particular manner for packet transmission. The system
proposed in this paper is able to perform the data
transmission in heterogeneous wireless network especially
reducing, or completely avoiding congestion issue induced
by a considerable number of devices, trying to connect to
the network, or send data. This is precisely emphasized in
this report. In fact, one of the most important and active
research orientations of mobile cellular networks is to get
all possible efficient techniques to meet the requirements
of M2M applications, so as to take advantages of their
benefits, especially the growth market of M2M
communications.
[1] Ping Wang, Dong In Kim, “Performance Modeling and
Analysis of Heterogeneous Machine Type
Communications”, IEEE Transactions on Wireless
Communications., vol .13,no 5,pp. 2836-2849, May
2014
[2] K. Naga Divya, K.Sri Vijaya, “A Routing- Driven
Elliptic Curve Cryptography based key management
scheme for heterogeneous sensor networks” , IEEE
Journal on Computer Science and Software
Engineering, vol.2, no 9,pp.442-449,September 2012
[3] M.-Y. Cheng, G.-Y. Lin, H.-Y. Wei, A. C.-C. Hsu,
“Overload control for machine-type-communications in
LTE-Advanced system,” IEEE Commun. Mag., vol. 50,
no. 6, pp. 38-45, June 2012.
[4] S.-Y. Lien, K.-C. Chen, and Y. Lin, “Toward
ubiquitous massive accesses in 3GPP machine-tomachine
communications,” IEEE Commun. Mag., vol.
49, no. 4, pp. 66-74, Apr. 2011 .
[5] Husain Shahnawaz, Joshi R.C, “Design of Detection
Engine for Wormhole Attack in Adhoc Network
Environment”, Inter-national Journal of Engineering
and Technology (IJET), vol4, no 6,pp. 381-395, Jan
2013.
[6] Dr. Esam A. A. A. Hagras, Doaa El-Saied, Dr. Hazem
H. Aly“A New Forward Secure Elliptic Curve
Signcryption Key Management (FS-ECSKM) Scheme
for Heterogeneous Wire- less Sensor
Networks”,IJSCT,vol 2,issue 2,pp. 19-23,June2011