The purpose was to seek out and solve the stated problem by developing a novel security framework that is focused on the study of the “functions” of M2M devices and improves the development life cycle processes in the M2M ecosystem. This effort (a) adequately considers restrictions and constraints; (b) identifies significant shortfalls; and (c) leads to a more thorough and detailed M2M security framework. Other existing methodologies do not provide representation of what or which M2M system components should be secured based on the function they perform. A framework approach that identifies devices, components, and functions that are harmed when left vulnerable helps to direct ecosystem-design principles and generates better security recommendations (Molotsi & Tait, 2013). Weaknesses in any security framework, or the lack of such a framework, threaten the overall protection of the system, because these jeopardize the confidentiality, integrity, and availability of the end-point device; where the system is most …show more content…
For example, Bring Your Own Device (BYOD) and the push to move security responsibility to the end user are exposing new issues for security and privacy (Armando, Costa, & Merlo, 2013). According to Armando et al. (2013), corporations are finding that security policies geared toward traditional desktop protections are antiquated and ineffective. A modernized approach is needed to protect the swiftly moving workforce from the environments offering information anywhere, at any time, and with any device (Lu, Li, Liang, Shen, & Lin, 2011). If the exchange of information or content is unprotected, confidentiality and privacy are lost. Next-generation devices, such as those used in M2M, will help control connected environments and provide a link to mobile systems, smart cities, and various sensor networks; therefore, the people using these platforms must protect all the information thereon (Kriesten, Tünnermann, Mertes, & Hermann, 2010). Enterprise IT policies protect the corporate information only if the users abide by the rules set in place (Harris, 2009). With the increase of attacks on personal mobile devices, companies have experienced an increased loss of protected data and compromise of company networks. These same vulnerabilities threaten the M2M