Europe:+32-2-535-7543
Asia: +65-6223-2436
Int'l: +1-860-674-8796
US: +1-866-353-3335
  • Japanese
  • Korean
  • Chinese
Cover Image

End-to-End M2M, Seventh Edition

Machine-to-machine (M2M) communications has historically represented the integration of microprocessors, microcontrollers and sensors with communications, monitoring and control systems to improve efficiencies and effectiveness of business operations. The introduction of the Internet of Things (IoT) is taking M2M to entirely new level as applications are rapidly expanding beyond traditional boundaries. One of the anticipated impacts of IoT will be rapid growth of consumer oriented M2M applications and increased involvement of consumers as a key element of the M2M value chain.

Written by industry experts who have actually designed, implemented and operated M2M applications, the seventh edition of End-to-End M2M provides invaluable information for anyone seeking to better understand the technology, applications, business and regulatory issues. This research distinguishes itself from other publications on this topic by providing the reader with an understanding of M2M, the technologies involved in M2M, reasons to use M2M, key M2M applications, challenges in deploying M2M, and more.

The report includes forecast data for the period 2014 - 2019 with analysis of key drivers, success factors, and industry dynamics. All purchases of Mind Commerce reports includes time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report. Purchasers of this report at the Company-wide License level will receive a complimentary copy of the report "Machine-to-Machine Communications: What Executives and IT Leaders Need to Know about M2M and its Role in Support of IoT"

Target Audience:

  • Mobile network operators
  • M2M/IoT platform providers
  • Wireless infrastructure vendors
  • M2M hardware solution providers
  • M2M system Integrators/consultants
  • M2M enabled application developers
  • M2M platform (CDP, AEP, ADP) providers
  • M2M network security solution providers
  • Cloud & Data as a Service (DaaS) companies
  • VNOs/M2M network connectivity aggregators
  • Embedded module and sub-component vendors
  • Investment firms: private equity and hedge funds

Industry verticals of all types the following segments:

  • Agriculture
  • Automotive
  • Construction
  • Consumer Electronics
  • Healthcare
  • Industrial Automation
  • Intelligent Buildings
  • IT & Networks
  • Logistics
  • Public Safety
  • Retail and Vending
  • Security
  • Smart Cities
  • Transportation
  • Utilities

Report Benefits:

  • M2M forecasts from 2014 - 2019
  • M2M case studies for different industries
  • Understand M2M security issues and challenges
  • Learn leading company strategies and industry impact
  • Understand M2M ecosystem, value chain and platforms
  • Identify factors driving M2M analytics market opportunities
  • Identify challenges and benefits of Big Data from M2M solutions
  • Recognize industry dynamics that are leading towards consolidation
  • Identify leading M2M applications and associated market opportunities

Table of Contents

1: INTRODUCTION TO M2M

  • 1. Overview
  • 2. Introduction to M2M
  • 3. Predictions
    • 3.1. Predictions of M2M in different sectors
      • 3.1.1. Smart Grid
      • 3.1.2. Water Meters
      • 3.1.3. Healthcare
      • 3.1.4. Smart Meters
      • 3.1.5. Smart City
      • 3.1.6. Retail
      • 3.1.7. Connected Building
      • 3.1.8. Connected People
      • 3.1.9. Connected Vehicles
      • 3.1.10. Connected Consumer Gadgets
      • 3.1.11. Connected Infrastructure
      • 3.1.12. Connected Industrial Process
      • 3.1.13. Connected Money
      • 3.1.14. Big Data
  • 4. Importance of M2M
    • 4.1. Mobility
    • 4.2. Flexibility
    • 4.3. Real-time Access to Information
    • 4.4. Profitability
    • 4.5. Deployment
    • 4.6. Speed & Cost
    • 4.7. Replace Existing Processes and Procedures
    • 4.8. Efficiency
    • 4.9. Competitive Advantage
    • 4.10. Integrating IT systems
  • 5. Key Barriers to Scaling M2M Technologies
    • 5.1. Lack of Universal Standards
    • 5.2. Fragmented Value Chain
    • 5.3. Communication and Marketing Challenges
    • 5.4. Lack of Use Cases
    • 5.5. Incompatible Sales Models and Long Sales Cycle
  • 6. Applications
    • 6.1. Fleet Management
    • 6.2. Manufacturing
    • 6.3. Healthcare
    • 6.4. Automotive and Connected Car
    • 6.5. Supply Chain Management
    • 6.6. Retail Management
    • 6.7. Field Service
    • 6.8. Smart Home
    • 6.9. Smart Buildings
    • 6.10. Safety Compliance
    • 6.11. Smart Appliances
    • 6.12. Smart Resources Extraction
    • 6.13. Smart Grids and Utilities
    • 6.14. Security and Surveillance
    • 6.15. Usage-based Insurance
    • 6.16. Agriculture
    • 6.17. Environmental Monitoring
    • 6.18. Military
    • 6.19. Product Monitoring
    • 6.20. Predictive Maintenance
  • 7. M2M Basics
  • 8. Logical Building-blocks of M2M
    • 8.1. Data Acquisition
    • 8.2. Data Transmission
    • 8.3. Data Analysis
  • 9. M2M Ecosystem
    • 9.1. End Device / Equipment
    • 9.2. Consumer/End-user
    • 9.3. Communication Link
    • 9.4. Sensors
    • 9.5. Applications
    • 9.6. Middleware Platform
    • 9.7. Embedded Module
    • 9.8. Subscriber Identity Module (SIM)
  • 10. Overall M2M Ecosystem
  • 11. M2M Value Chain
    • 11.1. Equipment Supplier
    • 11.2. Software Publisher
    • 11.3. Telecom Operator
    • 11.4. Consulting Firm
    • 11.5. Integrator
    • 11.6. Distributor
  • 12. Vertical and Horizontal Platforms
  • 13. Technical Drivers for M2M
  • 14. M2M Technology Drivers
    • 14.1. Versatile Communications Networks
      • 14.1.1. Cellular
      • 14.1.2. Satellite
      • 14.1.3. WiFi
      • 14.1.4. Bluetooth
      • 14.1.5. ZigBee
    • 14.2. Affordable Geolocation
    • 14.3. Lower Cost Specialized Sensors
    • 14.4. Integrated, Special-Purpose Devices Now Affordable
      • 14.4.1. Readymade M2M devices
    • 14.5. Efficiency of Autonomous Software-Driven Decisions
    • 14.6. M2M Platform Advantage
    • 14.7. Big Data Analytics and Actionable Information
  • 15. Internet of Things (IoT)
    • 15.1. Government Internet of Things (GIoT)
    • 15.2. Business Internet of Things (BIoT)
    • 15.3. Industrial Internet of Things (IIoT)
  • 16. Role of Satellite in M2M
    • 16.1. Satellite for Asset Tracking
    • 16.2. Details on Satellite Communication for M2M
    • 16.3. Hybrid or Dual Communication for M2M
    • 16.4. New Market for Satellite Players
    • 16.5. Alliances and Acquisitions in Satellite M2M
      • 16.5.1. Orbcomm Acquires GlobalTrak and MobileNet
      • 16.5.2. Inmarsat and ORBCOMM in M2M Alliance
      • 16.5.3. Inmarsat partners with RacoWireless
      • 16.5.4. Orbcomm Acquires Skywave
  • 17. Choosing a Wireless Service Provider
    • 17.1. SIM Cards
    • 17.2. Activations
    • 17.3. Cost per SMS / Data Block
    • 17.4. SMS / Data Retry Scheme
    • 17.5. SMS Delivery Receipt
    • 17.6. Store and Forward
    • 17.7. Roaming
    • 17.8. SLAs
    • 17.9. SMS with GPRS and 3G
    • 17.10. Billing Services
  • 18. Managing M2M Development Projects
    • 18.1. Project Manager Assignment
    • 18.2. Detailed M2M Development and Launch Plan
    • 18.3. Consider Open Source M2M Frameworks
    • 18.4. Monitor the M2M Project's Business Model
    • 18.5. Budgetary Control throughout Lifecycle
    • 18.6. Network Choice
    • 18.7. Secured Connectivity
    • 18.8. Components Selection
  • 19. Standardization
    • 19.1. oneM2M
    • 19.2. Zigbee
    • 19.3. ETSI
    • 19.4. GSMA
    • 19.5. Global M2M Association (GMA)
    • 19.6. M2M World Alliance
    • 19.7. AllSeen Alliance
    • 19.8. ITU-T
    • 19.9. ESO
    • 19.10. IIC
    • 19.11. Present and Future of M2M Standards
  • 20. Concluding Remarks

2: VERTICAL MARKET SECMENTS AND APPLICATIONS

  • 1. Overview
  • 2. Connected Car
    • 2.1. Introduction
    • 2.2. Safety, Security and other Connected Car Services
      • 2.2.1. Breakdown Call (bCall)
      • 2.2.2. Stolen Vehicle Tracking (SVT)
      • 2.2.3. Remote Diagnostics
      • 2.2.4. Insurance Services
      • 2.2.5. Connected Navigation
    • 2.3. Connected Vehicles
    • 2.4. V2X Communication
    • 2.5. Connected Car Features
    • 2.6. Role of Government in Connected Vehicles
    • 2.7. Environmental Benefits of Connected Car
    • 2.8. Key Challenges of Connected Car
    • 2.9. Downside of Connected Car
    • 2.10. Manufacturer Efforts for Connected Car
    • 2.11. Future of Connected Car
  • 3. Smart City
    • 3.1. Essential Elements of a Smart City
    • 3.2. Creation of Smart Cities
    • 3.3. Smart City Framework
    • 3.4. Smart City Features
    • 3.5. Cities Most Ready for Smart City Concept
    • 3.6. Smart City Progress in China
    • 3.7. Smart City Progress in India
    • 3.8. Smart City Progress in Spain
    • 3.9. EU backs Next Wave of Digital Growth
    • 3.10. Wireless Network in Santander
      • 3.10.1. Transport
      • 3.10.2. Energy
      • 3.10.3. Waste Management
      • 3.10.4. Environment
    • 3.11. Smart City Progress in Brazil
    • 3.12. Implementation of Smart City across the Globe
    • 3.13. Standards for Smart City
    • 3.14. FI-WARE
    • 3.15. Concluding Remarks
  • 4. Smart Home and Building Automation
    • 4.1. Smart Building
    • 4.2. Security
    • 4.3. Facilities Control
    • 4.4. Standardization for Solutions in Smart Home
  • 5. Utilities
    • 5.1. Smart Meters
    • 5.2. Smart Grids
    • 5.3. Commercial Energy Management
    • 5.4. Personal Energy and Home Energy Management
  • 6. Oil and Gas
    • 6.1. Remotely Monitored Oil and Gas Assets
  • 7. Healthcare
    • 7.1. Remote Patient Monitoring
      • 7.1.1. Wearable Device Types
    • 7.2. Mobile Health (m-Health)
      • 7.2.1. mHealth Market Size
      • 7.2.2. m-Health Market in Russia
      • 7.2.3. Market Barriers and Drivers
      • 7.2.4. Trends and Forecasts of m-Health Market Development
      • 7.2.5. Medication Management
      • 7.2.6. Device Monitoring and Management
      • 7.2.7. Assisted living for elderly
      • 7.2.8. M2M Healthcare Applications
      • 7.2.9. M2M in Healthcare Partnerships
  • 8. Manufacturing
    • 8.1. M2M and the Factory Floor
    • 8.2. M2M Driven Changes to Manufacturing
    • 8.3. Future of M2M in Manufacturing
    • 8.4. Internet of Things (IoT) Kit
  • 9. Distribution
    • 9.1. Supply Chain
    • 9.2. Remote Inventory Management
  • 10. Retail
    • 10.1. Challenges faced by Retail Industry
    • 10.2. Digital Signage
      • 10.2.1. Brands in Retail Stores
      • 10.2.2. Healthcare
      • 10.2.3. Transportation
      • 10.2.4. Waiting Rooms and Break Rooms
      • 10.2.5. Advertising
      • 10.2.6. Airline Industry
      • 10.2.7. Important Factors to consider for Deploying Digital Signage
      • 10.2.8. Types of Digital Signage Networks
      • 10.2.9. Media Mapping
      • 10.2.10 Concluding Remarks
    • 10.3. Connected Vending
    • 10.4. Point of Sale (POS)
    • 10.5. M2M Applications in Market for Retail
      • 10.5.1. Revel Systems POS
      • 10.5.2. Square Register
      • 10.5.3. Solution from Verizon
      • 10.5.4. Solution from Sprint
      • 10.5.5. Mobile Shopper
    • 10.6. Tablets and M2M in Retail Inventory Management
    • 10.7. Kiosks and Out of Home Networks
      • 10.7.1. Interactive Kiosks
    • 10.8. Digital Signage
  • 11. Transportation
    • 11.1. Commercial Fleets
    • 11.2. Monitor and Control Cargo Vessels
    • Rules of the sea
    • 11.3. Personal Transportation
    • 11.4. Railways
  • 12. Asset Tracking (including living things)
  • 13. Agriculture
    • 13.1. Basics of M2M Application in Agriculture
    • 13.2. Challenges for M2M in Agriculture
    • 13.3. M2M Benefits to the Agriculture Sector
    • 13.4. Supply Chain Aspects of Agriculture
      • 13.4.1. Smart Logistics
    • 13.5. M2M Application Potential for Agriculture
      • 13.5.1. Ammonia Tank Monitoring
      • 13.5.2. "Precision Agriculture" for Planting, Cultivation, and Harvesting
      • 13.5.3. Remote Monitoring - Environmental and Plant and Livestock
      • 13.5.4. Automatic Irrigation
      • 13.5.5. Farm Monitoring
    • 13.6. M2M Applications in Market for Agriculture
      • 13.6.1. Monitoring of Lactation cycles of Animals
      • 13.6.2. Application using RFMicron
      • 13.6.3. Telematics Solution from CLAAS
      • 13.6.4. Crop Solution
      • 13.6.5. Remotely Control Greenhouse
      • 13.6.6. Solution in Farming
      • 13.6.7. Solution Providers in M2M Agriculture
      • 13.6.8. Urban Agriculture
  • 14. Military
  • 15. Environmental Sciences
    • 15.1. M2M Applications in Environmental Sciences
      • 15.1.1. Collecting Forest Information
      • 15.1.2. Projects and Technologies
      • 15.1.3. Battling Forest Fires
  • 16. Insurance Industry
    • 16.1. UBI in European Market
      • 16.1.1. Onward and Upward with UBI
      • 16.1.2. The Rest of Europe
      • 16.1.3. Italy
      • 16.1.4. United Kingdom
      • 16.1.5. France and Germany
      • 16.1.6. The Value of Value-added Services
      • 16.1.7. The Role or German OEMs
      • 16.1.8. Other UBI Drivers
      • 16.1.9. The Google Wild Card
    • 16.2. Insurance Applications
  • 17. Security and Surveillance
    • 17.1. Safety Features for Aircrafts
    • 17.2. Safety Features for Safe Living based on M2M
    • 17.3. Safety Features for Travel based on M2M
    • 17.4. Safety Features for Workplace based on M2M
  • 18. Wearable M2M
    • 18.1. Basics of Wearable M2M
    • 18.2. Latest Wearable Devices
  • 19. Concluding Remarks

3: M2M RELATED TECHNOLOGIES

  • 1. Overview
  • 2. Introduction
  • 3. Block # 1: The Field-Deployed Hardware and Firmware Technology
    • 3.1. Analog-to-Digital and Digital-to-Analog Converter
    • 3.2. Memory
    • 3.3. Input / Output (I/O)
    • 3.4. Power Module
    • 3.5. Processor and Clock
  • 4. Block # 2: Connectivity - Wireless Service Standards, Technology and Protocols
    • 4.1. Wireless Standards
      • 4.1.1. GSM (Global System Mobile)
      • 4.1.2. CDMA (Code Division Multiple Access)
      • 4.1.3. WiMAX
    • 4.2. The Technologies and Bearers of Choice
      • 4.2.1. GPRS (General Purpose Radio Service)
      • 4.2.2. CDPD (Cellular Digital Packet Data Protocol)
      • 4.2.3. 1xRTT or CDMA200
      • 4.2.4. Control Channel - SMS, Analog Control Channel
      • 4.2.5. 3G Wireless
      • 4.2.6. Circuit Switched
  • 5. Block # 3: Back-end Server Technology
    • 5.1. Gateway to Wireless Carrier or Service Provider
      • 5.1.1. 3G-GPRS, 1xRTT Packet
      • 5.1.2. Delivery of SMS to the Internet
    • 5.2. Server Processes via Out-bound M2M Message
      • 5.2.1. Add a Layer of Security
      • 5.2.2. Provide Billing Services
      • 5.2.3. Enable Customer Care
      • 5.2.4. Log and Manage Traffic
      • 5.2.5. Interpret Inbound and Outbound M2M Messages
    • 5.3. Software to Display, Create and Monitor M2M
      • 5.3.1. Developer's dilemma
      • 5.3.2. Platform Types
  • 6. Wireless Technology Recommendations
    • 6.1. GSM SMS
    • 6.2. CDMA 1xRTT
    • 6.3. WiFi
    • 6.4. WiMAX
    • 6.5. ZigBee
    • 6.6. 6LoWPAN
    • 6.7. iBeacon
  • 7. M2M Application Deployment Challenges
    • 7.1. Privacy and Security Issues
    • 7.2. Fragmentation and Slow Growth
    • 7.3. Deployment of IPV
    • 7.4. Deployment of M2M application
  • 8. Small Cells Technology for M2M
    • 8.1. Picocell
    • 8.2. Femtocell
    • 8.3. MicroCells
    • 8.4. Metrocells
    • 8.5. Advantages and Working Principles
    • 8.6. Comparing Microcells, Picocells, and Metrocells
  • 9. 3G
  • 10. 4G
  • 11. LTE
  • 12. RFID Overview
    • 12.1. Benefits of RFID technology
    • 12.2. RFID Technology and Applications
    • 12.3. RFID Basics
    • 12.4. History of RFID
    • 12.5. RFID Developments
    • 12.6. Active RFID
    • 12.7. UHF RFID History
    • 12.8. RFID Tag Elements
    • 12.9. RFID Tag Types
    • 12.10. RFID Reader elements
    • 12.11. RFID Printers
    • 12.12. Antenna Basics
    • 12.13. RFID Privacy
    • 12.14. RFID Standards Bodies
  • 13. Near Field Communications (NFC)
    • 13.1. NFC Basics
    • 13.2. NFC Applications
    • 13.3. NFC History and NFC Forum
    • 13.4. NFC vs. other Wireless Technologies
    • 13.5. NFC Technology RF Interface
    • 13.6. NFC Data Transfer
    • 13.7. NFC Device Types
    • 13.8. NFC Standards and Capabilities
    • 13.9. NFC Tag Basics
    • 13.10. NFC Tag Type Definitions
    • 13.11. NFC Tag Operation
    • 13.12. NFC Tag Design and Manufacture
    • 13.13. NFC Security Basics
    • 13.14. Eavesdropping
    • 13.15. Data Corruption
    • 13.16. Data Modification
    • 13.17. Man-in-the-middle
    • 13.18. NFC Secure Channel
  • 14. Embedded Systems
  • 15. Sensors
    • 15.1. Sensor Classification
  • 16. M2M Sensors
    • 16.1. M2M Sensor Challenges
    • 16.2. M2M Sensor Requirements
  • 17. Wireless Sensor Networks
    • 17.1. WSN Definition
    • 17.2. WSN Integration Approaches
    • 17.3. Challenges of WSNs in IoT
      • 17.3.1. Security
      • 17.3.2. Quality of Service
      • 17.3.3. Configurations
    • 17.4. Standards
  • 18. Future of Sensors
    • 18.1. Sensors Working in Unison for M2M Applications
  • 19. Concluding Remarks

4: CASE STUDIES

  • 1. Overview
  • 2. Connected Car
    • 2.1. Case: Connected Electric Vehicle
      • 2.1.1. The Challenge
      • 2.1.2. The Solution
      • 2.1.3. The Result
      • 2.1.4. Author's Note
    • 2.2. Case: Real-time Vehicle Management Information
      • 2.2.1. The Challenge
      • 2.2.2. The Solution
      • 2.2.3. The Result
      • 2.2.4. Author's Note
  • 3. Smart City
    • 3.1. Case: Enhance Safety and Improve Traffic Flow
      • 3.1.1. The Challenge
      • 3.1.2. The Solution
      • 3.1.3. The Result
      • 3.1.4. Author's Note
    • 3.2. Case: Transaction Processing for Parking Meters
      • 3.2.1. The Challenge
      • 3.2.2. The Solution
      • 3.2.3. The Result
      • 3.2.4. Author's Note
    • 3.3. Case: Smart Loo
      • 3.3.1. The Challenge
      • 3.3.2. The Solution
      • 3.3.3. The Result
      • 3.3.4. Author's Note
    • 3.4. Case: Smart Bin
      • 3.4.1. The Challenge
      • 3.4.2. The Solution
      • 3.4.3. The Result
      • 3.4.4. Author's Note
    • 3.5. Case: SmartSantander (City-scale Experimental Research Facility)
      • 3.5.1. The Challenge
      • 3.5.2. The Solution
      • 3.5.3. The Result
      • 3.5.4. Author's Note
      • 4. Smart Home and Buildings
    • 4.1. Case: Solution for Improved Oil Efficiency
      • 4.1.1. The Challenge
      • 4.1.2. The Solution
      • 4.1.3. The Result
      • 4.1.4. Author's Note
    • 4.2. Case: Monitor Structural Moisture Conditions in Real-time
      • 4.2.1. The Challenge
      • 4.2.2. The Solution
      • 4.2.3. The Result
      • 4.2.4. Author's Note
  • 5. Utilities and Energy Management
    • 5.1. Case: Energy Data Management
      • 5.1.1. The Challenge
      • 5.1.2. The Solution
      • 5.1.3. The Result
      • 5.1.4. Author's Note
    • 5.2. Case: Reducing A/C Power Consumption
      • 5.2.1. The Challenge
      • 5.2.2. The Solution
      • 5.2.3. The Result
      • 5.2.4. Author's Note
    • 5.3. Case: Energy Optimization
      • 5.3.1. The Challenge
      • 5.3.2. The Solution
      • 5.3.3. The Result
      • 5.3.4. Author's Note
  • 6. Utilities Oil and Gas Management
    • 6.1. Case: Cost Saving and Safety Benefits for Oil & Gas Industry
      • 6.1.1. The Challenge
      • 6.1.2. The Solution
      • 6.1.3. The Result
      • 6.1.4. Author's Note
    • 6.2. Case: High-Value Asset Monitoring
      • 6.2.1. The Challenge
      • 6.2.2. The Solution
      • 6.2.3. The Result
      • 6.2.4. Author's Note
    • 6.3. Case: Propane Monitoring
      • 6.3.1. The Challenge
      • 6.3.2. Ecosystem
      • 6.3.3. The Solution
      • 6.3.4. The Result
      • 6.3.5. Author's Note
  • 7. Healthcare
    • 7.1. Case: Wearable M2M Empowering the Elderly
      • 7.1.1. The Challenge
      • 7.1.2. The Solution
      • 7.1.3. The Result
      • 7.1.4. Author's Note
    • 7.2. Case: Comprehensive Remote Patient Monitoring Solutions
      • 7.2.1. The Challenge
      • 7.2.2. The Solution
      • 7.2.3. The Result
      • 7.2.4. Author's Note
    • 7.3. Case: Remote Cardiac Monitoring Solution
      • 7.3.1. The Challenge
      • 7.3.2. The Solution
      • 7.3.3. The Result
      • 7.3.4. Author's Note
    • 7.4. Case: Breathing Assistance for sleep Apnea Patients
      • 7.4.1. The Challenge
      • 7.4.2. The Solution
      • 7.4.3. The Result
      • 7.4.4. Author's Note
    • 7.5. Case: Self-monitor Key Vital Signs
      • 7.5.1. The Challenge
      • 7.5.2. The Solution
      • 7.5.3. The Result
      • 7.5.4. Author's Note
    • 7.6. Case: Reduce Need for Re-hospitalization
      • 7.6.1. The Challenge
      • 7.6.2. The Solution
      • 7.6.3. The Result
      • 7.6.4. Author's Note
  • 8. Manufacturing
    • 8.1. Case: Generate Real-time alerts
      • 8.1.1. The Challenge
      • 8.1.2. The Solution
      • 8.1.3. The Result
      • 8.1.4. Author's Note
  • 9. Supply Chain Management (SCM)
    • 9.1. Case: Increase Visibility in Supply Chain
      • 9.1.1. The Challenge
      • 9.1.2. The Solution
      • 9.1.3. The Result
      • 9.1.4. Author's Note
  • 10. Preventive Maintenance
    • 10.1. Case: Preventive Maintenance using Predictive Analysis
      • 10.1.1. The Challenge
      • 10.1.2. The Solution
      • 10.1.3. The Result
      • 10.1.4. Author's Note
  • 11. Retail Management
    • 11.1. Case: ATM Management
      • 11.1.1. The Challenge
      • 11.1.2. The Solution
      • 11.1.3. The Result
      • 11.1.4. Author's Note
    • 11.2. Case: Vending Machine Solution
      • 11.2.1. The Challenge
      • 11.2.2. The Solution
      • 11.2.3. The Result
      • 11.2.4. Author's Note
    • 11.3. Case: M2M to Help Bakers Protect Dough Quality
      • 11.3.1. The Challenge
      • 11.3.2. The Solution
      • 11.3.3. The Result
      • 11.3.4. Author's Note
    • 11.4. Case: Digital Displays for Marketing
      • 11.4.1. The Challenge
      • 11.4.2. The Solution
      • 11.4.3. The Result
      • 11.4.4. Author's Note
    • 11.5. Case: Vending Machine
      • 11.5.1. The Challenge
      • 11.5.2. The Solution
      • 11.5.3. Business Model
      • 11.5.4. The Result
      • 11.5.5. Author's Note
  • 12. Transport
    • 12.1. Case: Monitor EV Charging Stations
      • 12.1.1. The Challenge
      • 12.1.2. The Solution
      • 12.1.3. The Result
      • 12.1.4. Author's Note
    • 12.2. Case: Transportation Safety
      • 12.2.1. The Challenge
      • 12.2.2. The Solution
      • 12.2.3. The Result
      • 12.2.4. Author's Note
    • 12.3. Case: Fleet Scalability using Application Enablement Platform
      • 12.3.1. The Challenge
      • 12.3.2. The Solution
      • 12.3.3. The Result
      • 12.3.4. Author's Note
    • 12.4. Case: Track and Manage Truck Fleet
      • 12.4.1. The Challenge
      • 12.4.2. The Solution
      • 12.4.3. The Result
      • 12.4.4. Author's Note
    • 12.5. Case: Fleet Management
      • 12.5.1. The Challenge
      • 12.5.2. Ecosystem
      • 12.5.3. The Solution
      • 12.5.4. The Result
      • 12.5.5. Author's Note
  • 13. Asset Tracking / Fleet Management
    • 13.1. Case: Global and Secured Fleet Tracking Solution
      • 13.1.1. The Challenge
      • 13.1.2. The Solution
      • 13.1.3. The Result
      • 13.1.4. Author's Note
    • 13.2. Case: Tracking and Monitoring Valuable Assets
      • 13.2.1. The Challenge
      • 13.2.2. The Solution
      • 13.2.3. The Result
      • 13.2.4. Author's Note
    • 13.3. Case: M2M Connectivity for GPS Tracking
      • 13.3.1. The Challenge
      • 13.3.2. The Solution
      • 13.3.3. The Result
      • 13.3.4. Author's Note
  • 14. Agriculture
    • 14.1. Case: Internet of Bees to ensure Adequate Pollination
      • 14.1.1. The Challenge
      • 14.1.2. The Solution
      • 14.1.3. The Result
      • 14.1.4. Author's Note
    • 14.2. Case: Remote Control of Grain Silos
      • 14.2.1. The Challenge
      • 14.2.2. The Solution
      • 14.2.3. The Result
      • 14.2.4. Author's Note
    • 14.3. Case: Bats to Assist in Protecting Crops
      • 14.3.1. The Challenge
      • 14.3.2. The Solution
      • 14.3.3. The Result
      • 14.3.4. Author's Note
    • 14.4. Case: Irrigation Management
      • 14.4.1. The Challenge
      • 14.4.2. The Solution
      • 14.4.3. The Result
      • 14.4.4. Author's Note
    • 14.5. Case: Weather systems
      • 14.5.1. The Challenge
      • 14.5.2. The Solution
      • 14.5.3. The Result
      • 14.5.4. Author's Note
    • 14.6. Case: Monitor Agricultural Produce In-transit
      • 14.6.1. The Challenge
      • 14.6.2. The Solution
      • 14.6.3. Business Model
      • 14.6.4. Connectivity Architecture
      • 14.6.5. The Result
      • 14.6.6. Author's Note
  • 15. Military and Police
    • 15.1. Case: Connecting Police Fleets for Increased Safety
      • 15.1.1. The Challenge
      • 15.1.2. The Solution
      • 15.1.3. The Result
      • 15.1.4. Author's Note
  • 16. Environmental Sciences
    • 16.1. Case: Real-time Water Quality Monitoring Network at the Ganges
      • 16.1.1. The Challenge
      • 16.1.2. The Solution
      • 16.1.3. The Result
      • 16.1.4. Author's Note
    • 16.2. Case: Reduce Waste Water
      • 16.2.1. The Challenge
      • 16.2.2. The Solution
      • 16.2.3. The Result
      • 16.2.4. Author's Note
    • 16.3. Case: Track and Trace Illegally Harvested Timber
      • 16.3.1. The Challenge
      • 16.3.2. The Solution
      • 16.3.3. The Result
      • 16.3.4. Author's Note
      • 17. Safety, Security and Surveillance
    • 17.1. Case: Tracking Device for Child Safety
      • 17.1.1. The Challenge
      • 17.1.2. The Solution
      • 17.1.3. The Result
      • 17.1.4. Author's Note
    • 17.2. Case: Security Monitoring Solution
      • 17.2.1. The Challenge
      • 17.2.2. The Solution
      • 17.2.3. The Result
      • 17.2.4. Author's Note
  • 18. Remote Monitoring
    • 18.1. Case: Remote Monitoring for Hunters and Wildlife Enthusiasts
      • 18.1.1. The Challenge
      • 18.1.2. The Solution
      • 18.1.3. The Result
      • 18.1.4. Author's Note
      • 18.2. Case: Remote Monitoring solution for Wastewater Management
      • 18.2.1. The Challenge
      • 18.2.2. The Solution
      • 18.2.3. The Result
      • 18.2.4. Author's Note
  • 19. Concluding Remarks

5: COMPANY INFORMATION AND M2M STRATEGIES

  • 1. Overview
  • 2. Focus on M2M by Telecom Servicer Providers
    • 2.1. New Avenues
    • 2.2. Regulatory Requirements
    • 2.3. Low Capex Requirement
    • 2.4. Scale of Market and Revenue Increase
    • 2.5. Spread across Value Chain
    • 2.6. Threat from Cloud Service Providers
    • 2.7. Unwilling to be a mere Bystander
  • 3. Go to Market Factors for Mobile Operators
    • 3.1. Business Alignment
    • 3.2. People
    • 3.3. Route to Market
    • 3.4. Collaboration
    • 3.5. Branding
    • 3.6. Result
  • 4. Coexistence of Cellular Communications and M2M
    • 4.1. Challenges and Risks faced by Telecom Service Providers
      • 4.1.1. Optimum Spread in Value Chain
      • 4.1.2. Managing Alliances and Partnerships
      • 4.1.3. Optimistic Predictions
      • 4.1.4. Need for Technology Standardization
      • 4.1.5. Technology Development
      • 4.1.6. New Business Models
      • 4.1.7. Intense Competition
      • 4.1.8. Differing Nature of Services
    • 4.2. Industry Analysis
  • 5. Five Forces Analysis
    • 5.1. Threat of Entry
      • 5.1.1. Customer Switching Costs
      • 5.1.2. Capital Requirements
      • 5.1.3. Incumbency Advantages Independent of Size
      • 5.1.4. Restrictive Government Policy
      • 5.1.5. Expected Retaliation
    • 5.2. Power of Suppliers
    • 5.3. Power of Buyers
    • 5.4. Threat of Substitutes
    • 5.5. Rivalry among Existing Competitors
  • 6. Need for Collaboration in M2M
  • 7. Strategies adopted by Telecom Service Providers
    • 7.1. Establishing M2M platform Capabilities
    • 7.2. Establishing M2M competence centers or Digital divisions
    • 7.3. Establishing an M2M Sales Force
    • 7.4. Engaging Vertical Partners
    • 7.5. Partnering to Extend Reach
    • 7.6. Providing M2M Developer Tools
    • 7.7. Partnering to Share Technology and Knowledge
  • 8. Telecom Carriers
    • 8.1. Introduction
    • 8.2. AT&T
      • 8.2.1. Introduction
      • 8.2.2. M2M related Products and Services
      • 8.2.3. Important Alliances in M2M
    • 8.3. Telekom Austria
      • 8.3.1. Introduction
      • 8.3.2. M2M related Products and Services
      • 8.3.3. Important Alliances in M2M
    • 8.4. China Unicom
      • 8.4.1. Introduction
      • 8.4.2. M2M related Products or services
      • 8.4.3. Important Alliances in M2M
    • 8.5. Deutsche Telekom
      • 8.5.1. Introduction
      • 8.5.2. M2M related Products and Services
      • 8.5.3. Important Alliances in M2M
    • 8.6. Etisalat
      • 8.6.1. Introduction
      • 8.6.2. M2M related Products and Services
      • 8.6.3. Important Alliances in M2M domain
    • 8.7. Everything Everywhere
      • 8.7.1. Introduction
      • 8.7.2. M2M related Products and Services
      • 8.7.3. Important Alliances in M2M
    • 8.8. France Telecom/Orange/Orange Business Services
      • 8.8.1. Introduction
      • 8.8.2. M2M related Products and Services
      • 8.8.3. Important Alliances in M2M
    • 8.9. KPN
      • 8.9.1. Introduction
      • 8.9.2. M2M related Products and Services
      • 8.9.3. Important Alliances in M2M
    • 8.10. Roger Communication
      • 8.10.1. Introduction
      • 8.10.2. M2M related Products and Services
      • 8.10.3. Important Alliances in M2M
    • 8.11. SingTel
      • 8.11.1. Introduction
      • 8.11.2. M2M related Products and Services
      • 8.11.3. Important Alliances in M2M
    • 8.12. Telefónica
      • 8.12.1. Introduction
      • 8.12.2. M2M related Products and Services
      • 8.12.3. Important Alliances in M2M domain
    • 8.13. Telenor
      • 8.13.1. Introduction
      • 8.13.2. M2M related Products and Services
      • 8.13.3. Important Alliances in M2M
    • 8.14. TeliaSonera
      • 8.14.1. Introduction
      • 8.14.2. M2M related Products and Services
      • 8.14.3. Important Alliances in M2M
    • 8.15. Telstra
      • 8.15.1. Introduction
      • 8.15.2. M2M related Products and Services
      • 8.15.3. Important Alliances in M2M
    • 8.16. Turk Telekom
      • 8.16.1. Introduction
      • 8.16.2. Important Alliances in M2M
    • 8.17. Verizon
      • 8.17.1. Introduction
      • 8.17.2. M2M related Products and Services
      • 8.17.3. Important Alliances in M2M
    • 8.18. Vodafone
      • 8.18.1. Introduction
      • 8.18.2. M2M related Products and Services
      • 8.18.3. Important Alliances in M2M
  • 9. Company Information and Major Stakeholders
    • 9.1. Jasper Wireless
      • 9.1.1. Introduction
      • 9.1.2. M2M related Products and Services
      • 9.1.3. Important Alliances in M2M
    • 9.2. Axeda
      • 9.2.1. Introduction
      • 9.2.2. M2M related Products and Services
      • 9.2.3. Important Alliances in M2M domain
    • 9.3. Numerex
      • 9.3.1. Introduction
      • 9.3.2. M2M related Products and Services
      • 9.3.3. Important Alliances in M2M
    • 9.4. Raco Wireless
      • 9.4.1. Introduction
      • 9.4.2. M2M related Products and Services
      • 9.4.3. Important Alliances in M2M
    • 9.5. KORE Telematics
      • 9.5.1. Introduction
      • 9.5.2. M2M related Products and Services
      • 9.5.3. Important Alliances in M2M
    • 9.6. Sierra Wireless
      • 9.6.1. Introduction
      • 9.6.2. M2M related Products and Services
      • 9.6.3. Important Alliances in M2M
    • 9.7. Hitachi Communication Technologies America, Inc
      • 9.7.1. Introduction
      • 9.7.2. M2M related Products and Services
      • 9.7.3. Important Alliances in M2M
    • 9.8. Digi International
      • 9.8.1. Introduction
      • 9.8.2. M2M related Products and Services
      • 9.8.3. Important Alliances in M2M
    • 9.9. Telit
      • 9.9.1. Introduction
      • 9.9.2. M2M related Products and Services
      • 9.9.3. Important Alliances in M2M
  • 10. Company Information Satellite Players
    • 10.1. Inmarsat
      • 10.1.1. Introduction
      • 10.1.2. M2M related Products and Services
      • 10.1.3. Important Alliances in M2M
    • 10.2. SpaceQuest
      • 10.2.1. Introduction
      • 10.2.2. M2M related Products and Services
    • 10.3. Globalstar
      • 10.3.1. Introduction
      • 10.3.2. M2M related Products and Services
      • 10.3.3. Important Alliances in M2M
    • 10.4. ORBCOMM
      • 10.4.1. Introduction
      • 10.4.2. M2M related Products and Services
      • 10.4.3. Important Alliances in M2M
    • 10.5. SkyBitz
      • 10.5.1. Introduction
      • 10.5.2. M2M related Products and Services
      • 10.5.3. Important Alliances in M2M
    • 10.6. Iridium
      • 10.6.1. Introduction
      • 10.6.2. M2M related Products and Services
      • 10.6.3. Important Alliances in M2M
  • 11. Concluding Remarks

6: SECURITY AND PROVACY ASPECTS OF M2M

  • 1. Overview
  • 2. Security and Privacy for M2M
  • 3. Attacks Observed in Past
  • 4. Complexity in M2M Security
    • 4.1. Promiscuity across Networks
    • 4.2. Connected Devices Lack Intelligence
    • 4.3. Missing Pieces
    • 4.4. Denial of Power Attacks
    • 4.5. Innovative Ways to Combat Risks
    • 4.6. Designing with Security in Mind
    • 4.7. Stealing Bandwidth
    • 4.8. Antivirus Software
    • 4.9. Time-to-market vs. Security Considerations
  • 5. Control and Security Measure for M2M
    • 5.1. Temporary Access
    • 5.2. Different Level of Authority for Users
    • 5.3. Limited Access
    • 5.4. Open-source Software
    • 5.5. Disclosure of Vulnerabilities
    • 5.6. Analyze Attack Surface
    • 5.7. Secure Design
    • 5.8. Code Signing
    • 5.9. Security in all Layers of Value Chain
    • 5.10. All Stakeholders to Work together for Security
    • 5.11. Usual Security Measures
  • 6. Two points of Attack
    • 6.1. Physical Attacks on Device
    • 6.2. Increase Security on Physical Side (Devices)
    • 6.3. Network Attacks
    • 6.4. Increase Security on Network Side
  • 7. M2M Communication over GSM
  • 8. Collaborations and Standards for Safety
    • 8.1. M2M Standardization Task Force
    • 8.2. IETF
    • 8.3. AllSeen Alliance
    • 8.4. Mobile App Security Working Group
    • 8.5. Standards by Verticals
  • 9. Control vs. Monitoring and Tracking
  • 10. Security Goals of Sensor Networks
    • 10.1. Primary Security Goals
      • 10.1.1. Data Confidentiality
      • 10.1.2. Data Authentication
      • 10.1.3. Data Integrity
      • 10.1.4. Data Availability
    • 10.2. Secondary Security Goals
      • 10.2.1. Data Freshness
      • 10.2.2. Self-Organization
      • 10.2.3. Time Synchronization
      • 10.2.4. Secure Localization
  • 11. Types of Attacks in M2M Sensor Networks
    • 11.1. Passive Attack
      • 11.1.1. Attacks against Privacy
    • 11.2. Active Attack
      • 11.2.1. Routing Attacks in Sensor Networks
      • 11.2.2. Denial of Service
      • 11.2.3. Node Subversion
      • 11.2.4. Node Malfunction
      • 11.2.5. Node Outage
      • 11.2.6. Physical Attacks
      • 11.2.7. Message Corruption
      • 11.2.8. False Node
      • 11.2.9. Node Replication Attacks
      • 11.2.10 Passive Information Gathering
    • 11.3. Security Mechanisms to combat Active and Passive Attacks
      • 11.3.1. Low-Level Mechanism
      • 11.3.2. High-Level Mechanism
    • 11.4. Challenges for Sensor Networks
      • 11.4.1. Wireless Medium
      • 11.4.2. Ad-Hoc Deployment
      • 11.4.3. Hostile Environment
      • 11.4.4. Resource Scarcity
      • 11.4.5. Immense Scale
      • 11.4.6. Unreliable Communication
      • 11.4.7. Unattended Operation
  • 11.5. Active and Passive Security Attacks on WSN
  • 12. Security Requirements for M2M
    • 12.1. Confidentiality
    • 12.2. Integrity
    • 12.3. Authentication
    • 12.4. Non-repudiation
    • 12.5. Access control
    • 12.6. Availability
    • 12.7. Privacy
  • 13. Design Security & Privacy into the System
  • 14. Mechanisms for M2M Security
    • 14.1. Early Detecting Node Compromise in M2M Domain
    • 14.2. Bandwidth Efficient Cooperative Authentication
  • 15. Evolving Elements of Security
  • 16. Security vs. Price or at any Price?
  • 17. Securing the Internet not the Devices
  • 18. Use of IPV6 for M2M Devices
  • 19. Use of Certificate for Security
  • 20. Security to be Deployed by Skilled Personnel
  • 21. Security Threats on OSI layers for WSN
    • 21.1. Physical Layer of OSI Model
      • 21.1.1. Attacks in Physical Layer
      • 21.1.2. Countermeasures for attack in Physical layer
    • 21.2. MAC Layer of OSI Model
      • 21.2.1. Attacks in MAC Layer
      • 21.2.2. Countermeasures for Attack in MAC Layer
    • 21.3. Network Layer of OSI Model
      • 21.3.1. Attacks in Network Layer
      • 21.3.2. Countermeasures for Attack in Network Layer
    • 21.4. Application Layer of OSI Model
      • 21.4.1. Attacks in Application Layer
      • 21.4.2. Countermeasures for Attack in Application Layer
    • 21.5. Concluding Remarks
  • 22. Sensor Network Standardization
  • 23. Privacy Concerns
    • 23.1. Control Factor
    • 23.2. Data Ownership Factor
    • 23.3. Government Initiatives
    • 23.4. Geography
    • 23.5. New aspects of Privacy
  • 24. Privacy & Security Concerns for Big Data
    • 24.1. Automated Access
    • 24.2. Business Continuity Risk
    • 24.3. Non-standard Access Control
    • 24.4. Best Practices
  • 25. Privacy Issues in Cloud Computing
  • 26. Privacy by Design
  • 27. Industry Security Survey
    • 27.1. Introduction
    • 27.2. Survey Participants
    • 27.3. Geographic Reach
    • 27.4. Role of M2M in Application
    • 27.5. Topmost Concerns Deploying M2M Solution
    • 27.6. Topmost Security Concerns Deploying M2M
    • 27.7. Security Solution
    • 27.8. Concluding Remarks on Industry Survey
  • 28. Concluding Remarks

7: CLOUD, BIG DATA, M2M AND ANALYTICS

  • 1. Overview
  • 2. Introduction
  • 3. Three Elements of M2M Application
    • 3.1. Data Mobility
    • 3.2. Big Data
    • 3.3. The Cloud
  • 4. Big Data
    • 4.1. Industry Perspective of Big Data
  • 5. Making Sense out of Data
  • 6. Big Data Business Implications
    • 6.1. Big Data is Catalyst not the Result
    • 6.2. View on Data Sourcing and Permissions
  • 7. M2M and Big Data Applications
    • 7.1. Wireless Carriers
    • 7.2. Better Energy Management
    • 7.3. Auto Insurance
    • 7.4. Smart Cars
    • 7.5. Smart Homes
    • 7.6. Robotics
    • 7.7. Insurance
    • 7.8. Logistics
    • 7.9. Auto Manufacturers Supply Chain
    • 7.10. Manufacturing
    • 7.11. Healthcare
    • 7.12. Utility
    • 7.13. Security and Surveillance
    • 7.14. Asset Tracking
    • 7.15. Enterprises in any Sector
  • 8. Challenges of M2M and Big Data
    • 8.1. Privacy and Data Ownership
    • 8.2. Authenticity and Security
    • 8.3. Skills Scarcity
    • 8.4. Changing Attitudes
  • 9. The Cloud
    • 9.1. Cloud Computing Model
    • 9.2. Characteristics
    • 9.3. Strategic Fit for Cloud Adoption
    • 9.4. M2M and Cloud Integration
    • 9.5. Application Benefits of M2M using Cloud
      • 9.5.1. IaaS
      • 9.5.2. PaaS
      • 9.5.3. SaaS
      • 9.5.4. MaaS
      • 9.5.5. CaaS
      • 9.5.6. Xaas
    • 9.6. Analysis
    • 9.7. Barriers and Challenges to Cloud Adoption
      • 9.7.1. Enterprises Reluctance to Change
      • 9.7.2. Responsibility of Data Security Externalized
      • 9.7.3. Security Concerns
      • 9.7.4. Cyber Attacks
      • 9.7.5. Unclear Agreements
      • 9.7.6. Complexity is a Deterrent
      • 9.7.7. Cloud Interoperability
      • 9.7.8. Audit of Service Provider
      • 9.7.9. Viability of Third-party Providers
      • 9.7.10. Acceptance Issues
      • 9.7.11. Cost
      • 9.7.12. Lack of Integration Features in the Public Cloud
  • 10. Data Analytics
    • 10.1. Factors Driving M2M Analytics Opportunity
      • 10.1.1. M2M Data Growth
      • 10.1.2. New Analytics Technologies
      • 10.1.3. Business Value through Data Analysis
    • 10.2. M2M Analytics Ecosystem
    • 10.3. Competitive Vendor Analysis
      • 10.3.1. Device manufacturers
      • 10.3.2. SI and Professional Services
      • 10.3.3. Management Platform Providers
      • 10.3.4. Software and Application Developers
      • 10.3.5. Communication Service Providers
  • 11. Concluding Remarks

8: M2M ANALYSIS AND FORECASTING

  • 1. Overview
  • 2. Global M2M Industry Size 2014 - 2019
  • 3. Global M2M Market Revenue 2014 - 2019
  • 4. Global M2M Service Revenue 2014 - 2019
  • 5. Global M2M Connections 2014 - 2019
  • 6. Global M2M Data Traffic 2014 - 2019
  • 7. M2M in Industry Verticals Globally
  • 8. Global M2M Module Pricing

9: FUTURE OF M2M

  • 1. Overview
  • 2. M2M Adoption
  • 3. Market Point-of-View
  • 4. Steps Required for Better M2M Services
    • 4.1. Making it Easier to use M2M Connectivity
    • 4.2. Making it Easier to Develop, Launch and Maintain Applications Flexibly
    • 4.3. Need for Open Platforms
  • 5. Industry Point-of-View on Open Platform
  • 6. Future of M2M Industry
  • 7. Anticipated Trends for Next Few Years
    • 7.1. Ecosystems Evolve
    • 7.2. Big Data Aligned with M2M
    • 7.3. Standards Strengthen
    • 7.4. Open Hardware
    • 7.5. More Innovation by Start-ups
    • 7.6. M2M based Consumer Electronics will Reach Consumers
    • 7.7. Connected cars in Spot-light
    • 7.8. Transport Management Extends
    • 7.9. New Products for Insurance Industry
    • 7.10. More Smart Meter Installations
    • 7.11. Smart Cities Thrive
  • 8. Network-agnostic SIM Cards
  • 9. Future Applications
  • 10. Road Ahead for M2M Technology
    • 10.1. Same Customers, New, and Enhanced M2M Apps
    • 10.2. Mature Horizontal and Vertical Platforms
    • 10.3. High Speed Devices and Higher Bandwidth Consumption
    • 10.4. Security
    • 10.5. Better Analytics
    • 10.6. Distributed Analytics will Emerge
    • 10.7. Integrated Cloud and Network
    • 10.8. Giant Companies will join the Race
    • 10.9. Global Growth will Begin to Catch up to Growth in Developed Countries
    • 10.10. Mainstream Developers will Join-in
  • 11. Concluding Remarks

Tables

  • Table 1: Communication Networks
  • Table 2: Difference between Bluetooth and Zigbee
  • Table 3: Smart City Analysis
  • Table 4: Top 15 Companies by Healthcare projects
  • Table 5: Spec Comparison of Microcells, Picocells and Metrocells
  • Table 6: App Comparison of Microcells, Picocells and Metrocells
  • Table 7: Advantages and Disadvantages of Passive RFID Tags
  • Table 8: Advantages and Disadvantages of Active RFID Tags
  • Table 9: Market Forecast for High-Value Asset Monitoring
  • Table 10: Five Year Revenue Forecast for High-Value Asset Monitoring
  • Table 11: Managed Service Revenue for High-Value asset Monitoring
  • Table 12: Propane Statistics
  • Table 13: Propane ROI
  • Table 14: Medical Condition Analysis
  • Table 15: Cost and Cash Flow Analysis
  • Table 16: Market Forecast for Vending Machine
  • Table 17: Five year revenue forecast for Vending Machine
  • Table 18: Cost Benefit Analysis for Vending Machine
  • Table 19: Five Year Revenue forecast for Vending Machine
  • Table 20: Revenue / Savings Opportunity for Vending Machine
  • Table 21: Cost and Savings Analysis for Fleet Management
  • Table 22: Cost Analysis for Irrigation Management
  • Table 23: ROI and NPV Analysis for Agriculture
  • Table 24: Value Creation Mechanisms through M2M Analytics
  • Table 25: Global M2M Module Pricing by Technology 2014 - 2019

Figures

  • Figure 1: Basic Building Blocks of M2M
  • Figure 2: The M2M Ecosystem (A)
  • Figure 3: The M2M Ecosystem (B)
  • Figure 4: The M2M Ecosystem (C)
  • Figure 5: The M2M Ecosystem (D)
  • Figure 6: The M2M Ecosystem
  • Figure 7: M2M Value Chain
  • Figure 8: Cellular and Satellite support of M2M
  • Figure 9: Sensors in an M2M Network
  • Figure 10: Wireless Sensor Communications Module
  • Figure 11: Pre-configured Sensor Board Optimized for Agriculture Applications
  • Figure 12: Conceptual Rendering of M2M Platform
  • Figure 13: Lexus Advanced Active Safety Research Vehicle
  • Figure 14: Smart City Framework
  • Figure 15: Intelligent Building Monitoring and Control
  • Figure 16: Intelligent Building Functionality
  • Figure 17: Proportion of mHealth Solutions
  • Figure 18: M2M Enabled Pill Jar
  • Figure 19: Viking Life Saving Equipment
  • Figure 20: M2M Enabled Vending Machine
  • Figure 21: M2M Enabled Vending Machine
  • Figure 22: Typical Smart Home Monitoring for Elderly
  • Figure 23: Smart Logistics
  • Figure 24: UBI Solution
  • Figure 25: SmartBand SWR1O
  • Figure 26: LG Life Band Touch
  • Figure 27: LG Heart Rate
  • Figure 28: BodyMedia FIT
  • Figure 29: Nike+ Shoes with Embedded Sensors (A)
  • Figure 30: Nike+ Shoes with Embedded sensors (B)
  • Figure 31: Heart-rate Chest Strap
  • Figure 32: MOTOACTV
  • Figure 33: M2M related Technology
  • Figure 34: Measuring Water Level
  • Figure 35: Typical Processor Module Architecture
  • Figure 36: Compact all in one Device
  • Figure 37: GSM Operator Technology Deployments
  • Figure 38: CDMA Operator Technology Deployments
  • Figure 39: Comparison - GSM, CDMA, iDEN, AMPS
  • Figure 40: Back-end Server Integration with Carriers Infrastructure
  • Figure 41: SMS Delivery to Internet
  • Figure 42: Combined Back-End Servers, Processor and Monitoring Client
  • Figure 43: Platforms ease the Way to Production-Level M2M Solutions
  • Figure 44: Man-in-the-middle Attack
  • Figure 45: Independent Network
  • Figure 46: Hybrid Network
  • Figure 47: Access Point Network
  • Figure 48: Protocol Stack for Low-power WSN
  • Figure 49: UHF Architecture
  • Figure 50: Fleet Management Architecture
  • Figure 51: Next Generation M2M in the Cloud
  • Figure 52: Go to Market Factors for Mobile Operators
  • Figure 53: Porters Five Forces Analysis for Telecom Carriers
  • Figure 54: Strategies adopted by Telecom Service Providers
  • Figure 55: Industry View of M2M
  • Figure 56: Geographic Reach of Companies
  • Figure 57: Topmost Concerns for Deploying M2M Solution
  • Figure 58: Topmost Security aspects Deploying M2M Solutions
  • Figure 59: Interest in Big Data vs. Cloud Computing
  • Figure 60: Distinguishing Big Data Companies
  • Figure 61: Evaluating Forest Fire Risk
  • Figure 62: Decreasing Reliability of Data over Time
  • Figure 63: The M2M Cloud
  • Figure 64: Comparison of Cloud Application and Services by Priority
  • Figure 65: Competitive Vendor Analysis
  • Figure 66: Global M2M Industry Size 2014 - 2019
  • Figure 67: Global M2M Market Revenue 2014 - 2019
  • Figure 68: Global M2M Service Revenue 2014 - 2019
  • Figure 69: Global M2M Connections 2014 - 2019
  • Figure 70: Global M2M Data Traffic 2014 - 2019
  • Figure 71: Proportion of M2M by Industry Vertical by Year 2019
Show More
Pricing
Back to Top