International Journal of Reconfigurable and Embedded Systems (IJRES)
Vol. 11, No. 2, July 2022, pp. 126~134
ISSN: 2089-4864, DOI: 10.11591/ijres.v11.i2.pp126-134  126
Journal homepage: http://ijres.iaescore.com
Machine to machine communication enabled internet of things:
a review
Rajagopal Sudarmani1
, Kanagaraj Venusamy2
, Sathish Sivaraman3
, Poongodi Jayaraman3
,
Kannadhasan Suriyan4
, Manjunathan Alagarsamy5
1
School of Engineering, Avinashilingam Institute for Home Science and Higher Education for Women, Tamil Nadu, India
2
Department of Engineering, University of Technology and Applied Sciences-AI Mussanah, AI Muladdha, Oman
3
Department of Computer Science and Engineering, Sri Ranganathar Institute of Engineering and Technology, Tamil Nadu, India
4
Department of Electronics and Communication Engineering, Cheran College of Engineering, Tamil Nadu, India
5
Department of Electronics and Communication Engineering, K. Ramakrishnan College of Technology, Tamil Nadu, India
Article Info ABSTRACT
Article history:
Received Dec 24, 2021
Revised Jan 22, 2022
Accepted Feb 12, 2022
Internet of things (IoT) will be the main part in upcoming generation devices
that would not simply sense and report, also will have the controlling
capability. It may be a connected vehicle, connected devices, robot, a
building automation system, a door lock or a thermostat, these connected
machines or devices will provide greater impact on our daily lives. Control
data and the operating instructions could be protected to ensure control and
autonomy for our safety and security, this could be a critical task. Privacy
and security are important consideration in designing the system. With the
intense growth of devices or devices with facilities such as computing and
communication are carried out using a profound technology known as
machine to machine (M2M) communication, which is specially designed for
cross‐platform integration. In many industries, smart homes, smart cities,
smart agriculture, government, connected devices, security, healthcare,
education, public safety, and supply chain management. Internet of things
(IoT) and machine to machine communication have to be implemented in
near future. Also, this paper gives an in depth view about the different M2M
techniques with interconnected IoT for truly connected, smart, and
sustainable world.
Keywords:
Communication protocols
Internet of things
Machine to machine
communication
Network stack
Security
This is an open access article under the CC BY-SA license.
Corresponding Author:
Rajagopal Sudarmani
School of Engineering, Avinashilingam Institute for Home Science and Higher Education for Women
Mettupalayam Road, Coimbatore, Tamil Nadu 641 043, India
Email: sudarmani_ece@avinuty.ac.in
1. INTRODUCTION
Technological advancement during the recent decade leads to the exponential growth of the
“connected devices” which are connected to the internet, due to the number of devices used by everyone gets
increasing (e.g. smartphones, iPads, Kindles, and digital television) [1]. Also, the mobile devices are already
gets exceeded approximately 6 billion and also users starting to use multiple devices at a time. In connection
with that machine to machine (M2M) connections are needed to establish connections.
The innovative technology which capture a real time event from a device and transfers the captured
event details to another device using a wire line communication or wireless communication, where a
meaningful information is transferred using M2M techniques. More generic entities such as sensors,
actuators, smart devices, human beings, and any other objects will able to communicate with other anytime
and anywhere is possible due to the availability of internet. These M2M devices are connected through an
Int J Reconfigurable & Embedded Syst ISSN: 2089-4864 
Machine to machine communication enabled internet of things: a review (Rajagopal Sudarmani)
127
innovative internet medium based on technical and societal perspectives [2]. Several economy related
business organizations and sectors are expected to disrupt because of the exponential growth in
communications industries and the wider global economy, the connected devices, M2M, and the internet of
things (IoT). Hence, the growths in traffic generated by M2M devices are rapid. The two important growing
technologies M2M and IoT are the trending technology which serve as the base for the future world. This
technology tends to occupy within the physical world of anything that of intrigued are to watch, oversee and
control by individuals, businesses, or organizations will be associated and will offer administrations by
means of the internet. The physical substances could be farmland, common assets like discuss, buildings and
individual real-world concepts over the course will work. Due to the increased adaptation of internet and
internet protocol and also the decreasing cost of semiconductor components the two technologies are
progressing over the last decades in a considerable manner.
Business models with autonomy in different sectors can be created by M2M and IoT, which uses the
embedded technologies, and connecting the multitude of different small devices and things to the internet.
The contributing techniques in future IoT are machine learning based technologies, large amount of data and
cloud and data analytics. Managing big data increases the complexity of information also the automation in
actions and control of real-world assets are required. It requires the technological development swhich should
go beyond the existing big data [2].
2. SYSTEM MODEL
M2M maybe a computing and communication facility with freed from any human intervention
which provides solutions that allow communication between machines or devices. It is almost like an
industrial supervisory control and data acquisition systems (SCADA). SCADA is supposed for isolated
systems using proprietary solutions, whereas machine to machine (M2M) are meant for cross platform
integration. Using machine to machine solutions, end users can obtain data regarding occurrences from
assets, such as temperature or inventory levels [2]. The applications of M2M includes such as: i)
environmental monitoring, ii) public safety and civil protections, iii) healthcare, iv) energy and utility
distribution industry (smart grid), v) intelligent transport systems (ITSs), vi) supply chain management
(SCM), vii) automation of building, viii) home networks, ix) agriculture, and x) military applications [3].
M2M solutions, on the other hand, do not typically allow for the broad exchange of data or the
connection of devices to the internet. Also, the features of M2M includes sizable amount of nodes or devices,
at low cost and low power consumption, traffic is less for small device/machine, huge data collection,
intervention less M2M and human response required for operational stability and sustainability. M2M
contains three kinds of nodes. They are high, mid and low end nodes [2]. The characteristics of each category
of sensor node vary, according that its application environments also differ.
2.1. Architecture of M2M ecosystem
It consists of certain type of providers such as device, internet service, platform, service, and service
users. The M2M ecosystem and its service networking are given in Figures 1 and 2 [4]. A generic system
solution is given in Figure 3.
Figure 1. M2M ecosystem Figure 2. IoT network stack
 ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 11, No. 2, July 2022: 126-134
128
Figure 3. A generic M2M system solution
2.2. M2M device platform
It allows accessing things or devices connected to the web anytime, anywhere. Saved machines or
devices are able to create a database which includes managers, users and other services which can easily
access the stored data. Manage device profiles, like location, sort of device, address and contour. Also, the
authentication and authorization key management functionalities are carried out by this.
2.3. M2M user platform
This platform manages user profiles of the M2M service and provides features such as modification
of user registration, recharging and searching. In addition, it interacts with device's platform and handles the
complete ban on device, object network, and service user access. An administrative advantage could be
provided to Service providers and device managers on their devices or networks as well. The administrators
can manage the devices through controlling and monitoring the devices [5], [6].
2.4. M2M application platform
It allows integrated services stand on device collected datasets. Heterogeneous data can be merged
from various devices which can be used for creating new services. In addition, it collects data from the
control processing logbook for device management by functioning with device platform. Management of the
interrelation to an appropriate network is provided for transparent services [1].
2.5. M2M access platform
It provides services through this platform to M2M devices, also provides app management for smart
device apps. Application management manages application registration by developers and provides the
plotting relationship between applications and the devices. The mapping feature issues a file of applications
for suitable machines.
2.6. Overview of IoT protocols
Internet of things ecosystem can a raise not dissimilar to the present web, where ever as devices,
networks and application levels are inter linked. Machine to machine communicationtechnologiesare sensor
nodes with networks, radio-frequency identification (RFID), mobile internet, wire line and wireless
communication network, Bluetooth LE/Smart, IEEE 802.15.4 ((low-rate wireless personal area networks
(LR-WPAN); e.g. ZigBee, internet engineering task force (IETF), IPv6-enabled low-power wireless personal
area networks (6LoWPAN), routing protocol for low power and lossy networks (RPL), constrained
application protocol (CoAP), ISA100.11a, and WirelessHART), M-BUS, Wireless M-BUS, KNX, power line
communication (PLC), and IPv4/IPv6. In personal area network (PAN)/home area network (HAN)/local area
network (LAN)/field area network (FAN), low power wireless communication technologies such as Wi-Fi,
Bluetooth low energy (BLE), ZigBee, and 6LoWPAN, Z-wave may also be used to connect devices to the
M2M Gate way node. GSM 3G/4G or fixed bandwidth/FTTH could also be used to connect machine to
machine communication gateway node to the main server (See Figure 4).
2.7. IoT protocols
Very small size data are often sent by low-power wide-area network (LPWAN) technologies which
include SigfoxandLoRa. Release of 3GPP, it is possible for a cellular operator to design an LPWAN, which
they would call EC-GSM-IoT, LTE-M, or NBIoT. Enrolling firms, such as telecom and information
technology (ICT) businesses, in IPv6 addressing can present an opportunity to reach billions of devices that
can be internet protocol (IP)-enabled and fully addressable over mobile or wired broadband connections.
Availability of heterogeneous network in IoT, which has devices that have an IP address and others that do
not have an IP address connected through IP gateways. We are getting closer to having the IoT platform
connected to the gateways. Some form of batch-level sensor data is generated as a natural consequence of
using sensors, and this would necessitate large-scale data analytics, which might be applied to framing
intelligence, which could be utilized for several other purposes including planning and operational
optimization [7]–[9].
Asset M2M
Device
Service
Enablement
Enterprise
Processes
Application
Sensing
Actuation
Fig 4. A generic M2M systemsolution
Network
Int J Reconfigurable & Embedded Syst ISSN: 2089-4864 
Machine to machine communication enabled internet of things: a review (Rajagopal Sudarmani)
129
Recently, throughput efficiency was enhanced by the standard IEEE 802.11n. High throughput was
obtained by IEEE 802.11ac, focusing in 5 GHz band. IEEE 802.11ah allows number of network device to
cooperate greater than 1 GHz (ISM) band. The main focus is to increase the efficiency and also to exploit the
collaboration to extend the range. This standard aims in fast development of internet of things and machine to
machine application which exploit burst–such as transmissions. They possess similarity as of traditional
wireless sensor network (WSN) theories, which includes the technologies namely 6LoWPAN, RPL, and
CoAP [10], [11].
Figure 4. M2M network
2.8. CoAP
The basic structure of CoAP which is already available is free and operable for any kind of IoT
device, it stables to be mostly overweight and power consuming for many IoT usage events. CoAPis meant in
such how that it meets the wants of hypertext transfer. The IoT built on protocols such as hypertext transfer
protocol (HTTP) or user datagram protocol (UDP), which utilizes UDP to ensure that communication
between devices is highly secure. Units per transacation UPT, by being open to multi-casting and
broadcasting, enables the use of a smaller amount of bandwidth, helping maintain fast communication speeds
while also using a minimum amount of bandwidth. This makes it an honest fit for use in resource-constrained
M2M applications. On the other hand, CoAP shares similarities with HTTP in that the RESTful framework
for appliance endpoints can also enable an invitation/response communication mechanism. In addition, CoAP
implements HTTP retrieve, post, post, and delete methods, which eliminates the possibility of
misinterpretation in customer communication. It incorporates the datagram transport layer security (DTLS) to
enable the transfer of IoT data as well as safe data exchange via the transport layer. The need for a light
protocol to meet the demands of battery-powered or low-power devices is satisfied by CoAP, which fully
meets these needs. Overall, when it concerns currently utilized web service-based IoT systems, CoAP may be
a good fit [1], [12].
2.9. Bluetooth low energy
Bluetooth low energy (BLE) is designed in such a way that it is cost efficient and energy efficient. It
is integrated in many smartphones due to its high efficiency. Low Power Networks are considered as another
eminent technology which forms the base layer for IoT. IEEE802.15.4 is one of the protocols which is
considered as first used protocol in practical experiments and researches in wireless sensors networks.
Low-rate wireless personal area networks (LR-WPAN) can be used in ISM standard at frequency
around 433 MHz, 868/915 MHz, and 2.5 GHz. Depending on transmission power level and selected band,
the data rates are supported between 20 to 256 kbps. In active modes, the radio transceivers intake power in
tens of milli-Watts range which means that they are still insufficient in providing long battery life for
continuous operation. During transmission and listening, radio duty cycling manages radio frequency
integrated circuit (RFIC)active periods.
2.10. Wireless devices
The more recent derivatives ZigBee IP, ZigBee RF4CE, wirelessHART, ISA 100.a inherit this
technology at very fundamental step asIEEE802.15.4 defines the physical layer where numerous of low-
energy communications specifications have been created [4].
 ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 11, No. 2, July 2022: 126-134
130
2.11. Message queuing telemetry transport
Message queuing telemetry transport (MQTT) is defined as a lightweight publication or subscription
type (pub/sub) messaging protocol. These are mainly framed for battery-powered devices. The configuration
of MQTT is very simple and less weight and also provides very low power consumption for the devices.
MQTT is based on a concept of subscriber, publisher, and broker. The publisher's role in this model is to
gather information and distribute it to subscribers via a brokerage of brokers. On the other side, the
publisher's primary job is to ensure security by cross-checking the credentials of publishers and subscribers.
The MQTT will satisfy the wants like consuming less energy, least bandwidth and working over wireless
networks, best reliability and tiny handling and high memory resources.
2.12. Wi-Fi
Wi-Fi uses radio waves to transfer data at specific frequencies, such as 2.4 GHz or 5 GHz channels.
Multiple channels are found in both frequency ranges, which allow different wireless devices to operate, this
distributes the load in such a way that the individual connections of the devices are not disrupted. This often
protects the wireless networks from overflowing. The 100 m limit is the standard limit for a standard Wi-Fi
connection. However, 10-35 m is the most common range for Wi-Fi [13].
2.13. ZigBee
ZigBee is designed for self-configuration, for use in short-distance radio networks, telemetry
systems, various types of sensors, surveillance devices and also in wireless reading of energy and heat
meters.
2.14. Bluetooth
Bluetooth technology allows the wireless connection of different electronic devices namely
smartphone, headset or speakerphone, keyboard, personal computer, laptop, mouse, palm top, printer, and so
on. If you haven't yet created a wiki page-style definition, it's an open standard protocol defined by the IEEE
802.15.1 specification. Its technical specification contains three classes of transmission power, designated
ERP 1-3, in the 100 and 10 kilowatt levels, respectively. The second (10 m) class is the most common class
as it allows you to connect with the existing devices in various rooms, moreover on the different platforms.
Bluetooth makes use of radio waves within frequency range of 2.4 GHz ISM wave band, therefore
the Bluetooth adapter is the gadget that helps in making use of this protocol. As the Bluetooth protocol was
upgraded from version 1.0 to 1.1, it could transfer data in batches of packets with 79 channels and an upload
speed of 721 Kbps, which is equivalent to the lowest bandwidth and upload speed possible for the oldest
Bluetooth 1.0 standard. Compared to the Bluetooth 4.0 specification, which matches the new standard, there
are 40 channels with a bandwidth of two megahertz, which guarantees transfer of data up to a maximum of 3
megabytes per second. As new Bluetooth standards are also backward-compatible, quicker data transfer and
higher security are ensured.
2.15. Extensible messaging and presence protocol
The availability of real-time organized and extensible data transfer among several network clients is
guaranteed with the use of extensible messaging and presence protocol (XMPP). When XMPP was
developed, it was generally accepted because it was utilized as a communication protocol. Over time and
lightweight XMPP specification: Adding up with the advanced features of XMPP-IoT, it has been used in
internet of things (IoT). As an open social support standard, the strengths of XMPP IoT are scalable
capabilities and address, making it best suited for consumer-oriented IoT rankings.
2.16. Data-distribution service
Distributed transmission system (DTS) is highly trusted when utilized for the release-subscription
model. OMG, in collaboration with DTS, developed DTS-RT for real-time M2M communications,
measurable, high-performance and dynamic data transfer between devices independently connected from
both hardware platform and software platform. This helps the DTS broker-free design and multicasting to
provide high-quality QoS, assuring optimal system performance. Structure of the DTS protocolis predicated
on the info center output-subscription layer (TCPS) and therefore the custom data-local reconstruction layer
(DLRL). The TCPL is largely responsible for resource-aware, ductile, and efficient data delivery to
subscribers, whereas the DLRL provides an interface to the TCPS functions that enable data transmission
between IoT-connected items [4].
Int J Reconfigurable & Embedded Syst ISSN: 2089-4864 
Machine to machine communication enabled internet of things: a review (Rajagopal Sudarmani)
131
2.17. Advanced message queuing protocol
Advanced message queuing protocol (AMQP) specification reveals the specifications like sorting,
orientation of news, routing (both point-to-point and output-to-subscriber), security, and reliability.
Advanced message queuing protocol's primary advantage is its resilient communication mechanism. While
AMQP can provide complete transactions, this is not necessarily necessary for IoT applications. Due to
AMQP's heaviness, it is not added up for sensor devices with limited power, memory, or network bandwidth,
although it are often the sole possible protocol for end-to-end use, including instances of commercial heavy
machinery, for personal IoT application cases, or SCADA systems, devices and network significantly more
efficient [5], [14]–[18].
IEEE802.15.4g extends the with network coverage of up to tens of kilometers, it is possible to cover
enormous areas of terrain with a tiny framework. IPv6 Networking uses internet protocol (IP) to enable the
inter-operability which is irrespective of physical layer and also link layer. It is evident that there is only hard
requirements needed for embedded device can connect with compatible gateway devices. IETF drives the
advances in this technology. 6LoWPAN initially developed by 6LoWPAN working group (WG) of IETF to
transport IPv6 over IEEE 802.15.4. Its primary goal is to provide fragmentation, reassembly, and header
compression. As a result of the maximum packet size of 127 octets, the protocol data unit has a restricted
amount of space. WG developed several ways to handle address auto configuration for network management
and mesh networking.
2.18. IPv6 RPL
These networks have huge rate of data losses, low data rates, and instable. Links consists of PLC,
IEEE 802.15.4 and low power Wi-Fi but no medium access control technology were specified. In such
networks, the traffic flow characteristics were involved in collecting data from many sensing points and from
node towards sink, so for the initial development, directed acyclic graph (DAG) was mainly concentrated to
the destination oriented DAG (DODAG). Specifically, to RPL network, new ICMPv6 message was defined
which consists of DAG information object (DIO), that issues node to find out RPL instance, DAG
information solicitation (DIS) allows request for DIOs from RPL node and destination advertisement object
(DAO) propagates destination information upwards along DODAG [4].
3. COMPARISON OF IoT PROTOCOL
The analysis of different protocols of IoT for machine to machine enabled communication are given
in Tables 1, 2 and 3 with respect to different parameters [2], [19]–[25].
Table 1. Comparison of various protocols
Protocols CoAP MQTT XMPP AMQP DDS REST
Transport layer UDP TCP TCP TCP TCP UDP TCP
Publisher/subscriber Yes Yes Yes Yes Yes
Request/response Yes No Yes No No Yes
Security DTLS SSL SSL SSL SSL DTLS SSL
QoS Yes Yes Yes Yes
Low power and lossy network Exc. Fair Fair Fair Poor Fair
Dynamic discovery Yes No No No Yes No
Binary encoding Yes Yes Yes Yes Yes No
Real time No No No No Yes No
Open source Yes Yes Yes Yes Yes No
Architecture style P2P Broker P2P P2P broker Data space P2P
Sponsor IETF OASIS IETF OASIS OMG IETF
Table 2. Comparison of various protocols
Protocols
Application Layer
Interoperability
among things
Things’ representation
models
Things’ interaction
model
Low power
and Lossy
network
Simplicity Exhaustiveness
and level of
detail
RFID, Wi-Fi
Limited to standard
(stack layer)
No No Fair NA NA
Zigbee
Limited to standard
(stack layer)
Yes, but limited to
specific applications
Yes, but limited to
specific applications
Excellent Good Excellent
CoAP
Full (delegated to
IP protocol)
No No
Good
(UDP)
NA NA
XMPP,
MQTT
Full (delegated to
IP protocol)
No No Fair (TCP) NA NA
 ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 11, No. 2, July 2022: 126-134
132
Table 3. Comparison of various protocols
Protocols Frequency Data Rate Range Power Usage Cost
Bluetooth/BLE 2.4 Ghz 1,2,3 Mbps -300 feet Low Low
802.15.4 Sub-Ghz, 2.4 Ghz 40,250 kbps >100 square miles Low Low
Wi-Fi Sub-Ghz, 2.4 Ghz, 5 Ghz 0.1–54 Mbps <300 feet Medium Low
Zigbee 2.4 Ghz 250 kbps -300 feet Low Medium
4. CONCLUSION
Business models with autonomy in different sectors can be created by M2M and IoT, which uses the
Internet of Things and embedded technologies, by which different kinds of small devices and things get
connected to the internet. Implementing anything in a smart way is an attractive factor now a days. The future
IoT depends on data, cloud, data analytics and knowledge-based technologies. Huge data handling in big data
would increase the complexity and there is a need of automation in handling and managing data. Hence, now
we are in need of a new evolving technology to make connected everything with anything that should beyond
the Big Data. In this paper, the comparative analysis of different protocols and M2M architecture are carried
out which gives an insight knowledge about the importance and technology needed for machine to machine
regarding the future internet of things for the initiative of a truly smart, connected and sustainable world.
REFERENCES
[1] H. Zahmatkesh and F. Al-Turjman, “Fog computing for sustainable smart cities in the IoT era: Caching techniques and enabling
technologies - an overview,” Sustainable Cities and Society, vol. 59, p. 102139, Aug. 2020, doi: 10.1016/j.scs.2020.102139.
[2] J. Holler, V. Tsiatsis, C. Mulligan, S. Karnouskos, S. Avesand, and D. Boyle, From Machine-To-Machine to the Internet of
ThingsI: Introduction to a New Age of Intelligence. Oxford: Elsevier, 2014.
[3] Course Hero, “Make every study hour count. Access 100 million course-specific study materials,” Course Hero.
https://www.coursehero.com/.
[4] J. Kim, J. Lee, J. Kim, and J. Yun, “M2M service platforms: Survey, issues, and enabling technologies,” IEEE Communications
Surveys and Tutorials, vol. 16, no. 1, pp. 61–76, 2014, doi: 10.1109/SURV.2013.100713.00203.
[5] S. Kannadhasan and R. Nagarajan, “Miniaturised multiband e-shaped structure microstrip antenna for satellite communication,”
First International Conference on Advances in Physical Sciences and Materials 13-14 August 2020, vol. 1706, no. 1, pp. 1–9,
Dec. 2020, doi: 10.1088/1742-6596/1706/1/012110.
[6] S. Kannadhasan, G. KarthiKeyan, and V. Sethupathi, “A graph theory based energy efficient clustering techniques in wireless
sensor networks,” in 2013 IEEE Conference on Information & Communication Technologies, Apr. 2013, pp. 151–155, doi:
10.1109/CICT.2013.6558080.
[7] S. Kannadhasan and R. Suresh, “EMD algorithm for robust image watermarking,” Advanced Materials Research, vol. 984–985,
pp. 1255–1260, Jul. 2014, doi: 10.4028/www.scientific.net/AMR.984-985.1255.
[8] K. Jayavel, K. Venusamy, and L. G, “Design and implementation of iot testbed with improved reliability using conditional
probability techniques,” in 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-
SMAC), Oct. 2020, pp. 116–121, doi: 10.1109/I-SMAC49090.2020.9243309.
[9] C. Bhuvaneshwari and A. Manjunathan, “Reimbursement of sensor nodes and path optimization,” in Materials Today:
Proceedings, 2021, vol. 45, pp. 1547–1551, doi: 10.1016/j.matpr.2020.08.193.
[10] M. S. Yousuf and M. El-Shafei, “Power line communications: An overview - Part I,” in 2007 Innovations in Information
Technologies (IIT), Nov. 2007, pp. 218–222, doi: 10.1109/IIT.2007.4430363.
[11] A. Majumder and J. Caffery, “Power line communications: an overview,” IEEE Potentials, vol. 23, no. 4, pp. 4–13, Oct. 2004,
doi: 10.1109/MP.2004.1343222.
[12] S. Kannadhasan and R. Nagarajan, “Development of an H-shaped antenna with FR4 for 1–10 GHz wireless communications,”
Textile Research Journal, vol. 91, no. 15–16, pp. 1687–1697, Aug. 2021, doi: 10.1177/00405175211003167.
[13] M. Dahiya, “Wi-Fi : standards for next generation communications,” International Journal of Engineering Science and
Technology (IJEST), vol. 9, no. 3, pp. 177–182, 2017.
[14] C. Bhuvaneshwari and A. Manjunathan, “Advanced gesture recognition system using long-term recurrent convolution network,”
in Materials Today: Proceedings, 2020, vol. 21, pp. 731–733, doi: 10.1016/j.matpr.2019.06.748.
[15] A. Manjunathan, E. D. Kanmani Ruby, W. E. Santhkumar, A. Vanathi, P. Jenopaul, and S. Kannadhasan, “Wireless HART stack
using multiprocessor technique with laxity algorithm,” Bulletin of Electrical Engineering and Informatics (BEEI), vol. 10, no. 6,
pp. 3297–3302, Dec. 2021, doi: 10.11591/eei.v10i6.3250.
[16] A. Manjunathan, A. S. Kumar, S. Udhayanan, C. T. Selvi, and A. A. Stonier, “Design of autonomous vehicle control using IoT,”
in International Virtual Conference on Robotics, Automation, Intelligent Systems and Energy (IVC RAISE 2020), Feb. 2021, vol.
1055, no. 1, pp. 1–5, doi: 10.1088/1757-899X/1055/1/012008.
[17] S. Kannadhasan and R. Nagarajan, “Design of a low-cost 1–20 GHz E-shaped antenna for wireless applications,” in Lecture Notes
in Mechanical Engineering, N. Kumar, S. Tibor, R. Sindhwani, J. Lee, and P. Srivastava, Eds. Singapore: Springer Singapore,
2021, pp. 137–144.
[18] K. Venusamy and M. Tamilselvi, “Impact of NEMS Technology over the growth of IoT -A Analysis study,” in 2020 4th
International Conference on Electronics, Communication and Aerospace Technology (ICECA), Nov. 2020, pp. 193–198, doi:
10.1109/ICECA49313.2020.9297582.
[19] S. Kannadhasan and R. Nagarajan, “Performance improvement of H-Shaped antenna with Zener diode for textile applications,”
The Journal of The Textile Institute, pp. 1–8, Jun. 2021, doi: 10.1080/00405000.2021.1944523.
[20] A. A. Ali, “Constrained application protocol (CoAP) for the IoT,” in IoT Seminar, High Integrity System, Frankfurt University of
Applied Science, 2018, pp. 1–4, doi: 10.13140/RG.2.2.33265.17766.
[21] J. Song, S. Han, X. Zhu, A. K. Mok, D. Chen, and M. Nixon, “A complete wirelessHART network,” in Proceedings of the 6th
ACM conference on Embedded network sensor systems, 2008, p. 381, doi: 10.1145/1460412.1460462.
Int J Reconfigurable & Embedded Syst ISSN: 2089-4864 
Machine to machine communication enabled internet of things: a review (Rajagopal Sudarmani)
133
[22] G. Xiao, J. Guo, L. Da Xu, and Z. Gong, “User interoperability with heterogeneous IoT devices through transformation,” IEEE
Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1486–1496, May 2014, doi: 10.1109/TII.2014.2306772.
[23] S. Kannadhasan, M. Shanmuganantham, and R. Nagarajan, “System model of VANET using optimization-based efficient routing
algorithm,” IOP Conference Series: Materials Science and Engineering, vol. 1119, no. 1, p. 012021, Mar. 2021, doi:
10.1088/1757-899X/1119/1/012021.
[24] S. Surya and R. Ravi, “MPSO-SHM: Modified PSO based structural health monitoring system for detecting the faulty sensors in
WSN,” Wireless Personal Communications, vol. 108, no. 1, pp. 141–157, Sep. 2019, doi: 10.1007/s11277-019-06392-0.
[25] L. M. Amulu and R. Ramraj, “Combinatorial meta-heuristics approaches for DVFS-enabled green clouds,” The Journal of
Supercomputing, vol. 76, no. 8, pp. 5825–5834, Aug. 2020, doi: 10.1007/s11227-019-02997-1.
BIOGRAPHIES OF AUTHORS
Rajagopal Sudarmani is currently working as Associate Professor in the
Department of Electronics and Communication Engineering, School of Engineering at the
Avinashilingam Institute for Home Science and Higher Education for Women, in Tamil Nadu,
India. She received her B.E. Electronics and Communication Engineering from Bharathiar
University, Tamil Nadu, India and her M.E. (Applied Electronics) and Ph.D. in Information
and Communication Engineering from Anna University, Chennai - India. Dr. R. Sudarmani
published 72 papers in refereed Journals, conferences and chapters in books. She also
presented research papers at several national and international conferences including the
International Conference IEEE TENCON 2011 at Bali, Indonesia. Her research interest
includes wireless sensor networks, wireless communication and signal processing. She can be
contacted at email: sudarmani_ece@avinuty.ac.in.
Kanagaraj Venusamy obtained his MBA degree in Production Management
from ManonmaniumSundaranar University, Tamilnadu, India in 2011 and B.E (Electronics
and Communication Engineering) in 2005 from Anna University, M.E in Mechatronics
Engineering, India in 2019 from Anna university affiliated college. Presently pursuing
Doctorate in Management studies at Bharathidasan university, tamilnadu, India. His main
interests of research are Control systems, Industrial automation, Artificial Intelligence,
Robotics, Drone, IoT, Entrepreneurship and Human Resource management. He had 12 years of
teaching experience in reputed institution in India and Oman and two year of industrial
experience at Saudi Arabia. He has technically assisted various short term course for students,
faculty development program and International Robotics Competition. He has acted as co
principle investigator in sultanate of Oman government funded research projects. Currently
working asa Control Systems Instructor in University of Technology and Applied Sciences -
Al Mussanah. He can be contacted at email: rajkanagaraj1983@gmail.com.
Sathish Sivaraman currently working as an Assistant Professor in the department
of CSE, at Sri Ranganathar Institute of Engineering and Technology, Coimbatore. He is doing
his research work in the field of “Software Defined Wireless Sensor Networks” under Anna
University. He received his Master’s Degree in the field of Software Engineering from Anna
University in the year of 2014. He has total teaching experience of 7 years. He published
papers in reputed international journals and also presented papers at more than 10 National /
International conferences. He can be contacted at email: sathesapcse@gmail.com.
Poongodi Jayaraman currently working as an Assistant Professor in the
department of CSE at Sri Ranganathar Institute of Engineering and Technology, Coimbatore.
She is doing research work in the field of “Internet of Things” under Anna University. She
received her Master’s Degree in the field of Computer Science and Engineering from Anna
University in the year of 2012. She has total teaching experience of 9 years. She published
papers in reputed international journals and also presented papers in National / International
conferences. She can be contacted at email: poongodiapcse@gmail.com.
 ISSN: 2089-4864
Int J Reconfigurable & Embedded Syst, Vol. 11, No. 2, July 2022: 126-134
134
Kannadhasan Suriyan is working as an Assistant Professor in the department of
Electronics and Communication Engineering in Cheran College of Engineering, karur,
Tamilnadu, India. He is currently doing research in the field of Smart Antenna for Anna
University. He is ten years of teaching and research experience. He obtained his B.E in ECE
from Sethu Institute of Technology, Kariapatti in 2009 and M.E in Communication Systems
from Velammal College of Engineering and Technology, Madurai in 2013. He obtained his
M.B.A in Human Resources Management from Tamilnadu Open University, Chennai. He
obtained his PGVLSI in Post Graduate diploma in VLSI design from Annamalai University,
Chidambaram in 2011 and PGDCA in Post Graduate diploma in Computer Applications from
Tamil University in 2014. He obtained his PGDRD in Post Graduate diploma in Rural
Development from Indira Gandhi National Open University in 2016. He has published around
18 papers in the reputed indexed international journals and more than 125 papers
presented/published in national, international journal and conferences. Besides he has
contributed a book chapter also. He also serves as a board member, reviewer, speaker, session
chair, advisory and technical committee of various colleges and conferences. He is also to
attend the various workshop, seminar, conferences, faculty development programme, STTP
and Online courses. His areas of interest are Smart Antennas, Digital Signal Processing,
Wireless Communication, Wireless Networks, Embedded System, Network Security, Optical
Communication, Microwave Antennas, Electromagnetic Compatability and Interference,
Wireless Sensor Networks, Digital Image Processing, Satellite Communication, Cognitive
Radio Design and Soft Computing techniques. He is Member of IEEE, ISTE, IEI, IETE, CSI,
IAENG, SEEE, IEAE, INSC, IARDO, ISRPM, IACSIT, ICSES, SPG, SDIWC, IJSPR and
EAI Community. He can be contacted at email: kannadhasan.ece@gmail.com.
Manjunathan Alagarsamy received the Engineer degree in Electronics and
Comunication Engineering from Dr. Navalar Nedunchezhiyan College of Engineering in
2010.He received the Master degree in Embedded System Technologies from Raja College of
Engineering and Technology, Madurai, Tamilnadu, India in 2013.He is currently working as
an Assistant Professor in the Department of Electronics and Communication Engineering at K.
Ramakrishnan College of Technology, Trichy, India. His area of interests includes Embedded
Systems, Image processing, Sensors and Interfacing networks and Internet of Things. He has
published 13 article in peer reviewed International journals and presented 6 papers in
International conferences. He can be contacted at email: manjunathankrct@gmail.com.

More Related Content

PPTX
IOT_UNIT-1_Presentation which is basic presentation level
PDF
THis is IoT description and other related contents
PPTX
Module 2 M2M, SDN, VNF.pptx...............
PDF
The Internet of Things (IoT): An Overview
PDF
IoT Notes Syllabus .pdf
PPTX
Smart CIties and the Iot systems. The topic discusses about IoT
PDF
Machine 2 Machine - Internet of Things - Real World Internet
PPTX
MODULE 1_PPT in cloud computing in computer.pptx
IOT_UNIT-1_Presentation which is basic presentation level
THis is IoT description and other related contents
Module 2 M2M, SDN, VNF.pptx...............
The Internet of Things (IoT): An Overview
IoT Notes Syllabus .pdf
Smart CIties and the Iot systems. The topic discusses about IoT
Machine 2 Machine - Internet of Things - Real World Internet
MODULE 1_PPT in cloud computing in computer.pptx

Similar to Machine to machine communication enabled internet of things: a review (20)

PPTX
Lecture 16
PDF
White paper openmtc
PDF
Sigfox whitepaper
PDF
Livre blanc iot
PPTX
M2M vs IoT: The Key Differences and Similarities
PDF
Machine to Machine Communication System in ioT
PDF
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
PDF
Consultation paper m2_m _18_october_2016
PPTX
Chapter 4_Final_Module 1.pptx cloud comp
PDF
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
PDF
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
PPTX
M2M technology in IOT
PDF
IoT M2M Connectivity Insights from Patents
PPTX
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
PDF
M2M_IoT_Presentation
PDF
Research Inventy : International Journal of Engineering and Science
PDF
F5 Networks: The Internet of Things - Ready Infrastructure
PDF
Understanding the IoT Connectivity Landscape – A Contemporary M2M Radio Techn...
PPTX
TheInternetofThings
PDF
Designing Internet of things
Lecture 16
White paper openmtc
Sigfox whitepaper
Livre blanc iot
M2M vs IoT: The Key Differences and Similarities
Machine to Machine Communication System in ioT
COMPARATIVE STUDY BETWEEN VARIOUS PROTOCOLS USED IN INTERNET OF THING
Consultation paper m2_m _18_october_2016
Chapter 4_Final_Module 1.pptx cloud comp
IRJET- A Review Paper on Internet of Things(IoT) and its Applications
A Survey of MAC Layer Issues and Application layer Protocols for Machine-to-M...
M2M technology in IOT
IoT M2M Connectivity Insights from Patents
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
M2M_IoT_Presentation
Research Inventy : International Journal of Engineering and Science
F5 Networks: The Internet of Things - Ready Infrastructure
Understanding the IoT Connectivity Landscape – A Contemporary M2M Radio Techn...
TheInternetofThings
Designing Internet of things
Ad

More from International Journal of Reconfigurable and Embedded Systems (20)

PDF
Channel reconstruction through improvised deep learning architecture for high...
PDF
Energy-efficient clustering and routing using fuzzy k-medoids and adaptive ra...
PDF
Leveraging the learning focal point algorithm for emotional intelligence
PDF
A novel smart irrigation framework with timing allocation using solenoid valv...
PDF
Improving the performance of IoT devices that use Wi-Fi
PDF
Portable neonatus incubator based on global positioning system
PDF
Precision medicine in hepatology: harnessing IoT and machine learning for per...
PDF
IoT-enabled smart cities towards green energy systems: a review
PDF
Air quality monitoring system based on low power wide area network technology...
PDF
Design of IoT-based monitoring system for temperature and dissolved oxygen le...
PDF
Internet based highly secure data transmission system in health care monitori...
PDF
Internet of things and long range-based bridge slope early detection systems
PDF
Arowana cultivation water quality monitoring and prediction using autoregress...
PDF
Approximate single precision floating point adder for low power applications
PDF
Highly selective filtering power divider using substrate integrated waveguide...
PDF
An active two-stage class-J power amplifier design for smart grid’s 5G wirele...
PDF
Timing issues on power side-channel leakage of advanced encryption standard c...
PDF
Moving objects detection based on histogram of oriented gradient algorithm ch...
PDF
Smart farming based on IoT to predict conditions using machine learning
PDF
Smart farming based on IoT to predict conditions using machine learning
Channel reconstruction through improvised deep learning architecture for high...
Energy-efficient clustering and routing using fuzzy k-medoids and adaptive ra...
Leveraging the learning focal point algorithm for emotional intelligence
A novel smart irrigation framework with timing allocation using solenoid valv...
Improving the performance of IoT devices that use Wi-Fi
Portable neonatus incubator based on global positioning system
Precision medicine in hepatology: harnessing IoT and machine learning for per...
IoT-enabled smart cities towards green energy systems: a review
Air quality monitoring system based on low power wide area network technology...
Design of IoT-based monitoring system for temperature and dissolved oxygen le...
Internet based highly secure data transmission system in health care monitori...
Internet of things and long range-based bridge slope early detection systems
Arowana cultivation water quality monitoring and prediction using autoregress...
Approximate single precision floating point adder for low power applications
Highly selective filtering power divider using substrate integrated waveguide...
An active two-stage class-J power amplifier design for smart grid’s 5G wirele...
Timing issues on power side-channel leakage of advanced encryption standard c...
Moving objects detection based on histogram of oriented gradient algorithm ch...
Smart farming based on IoT to predict conditions using machine learning
Smart farming based on IoT to predict conditions using machine learning
Ad

Recently uploaded (20)

PPT
Total quality management ppt for engineering students
PDF
Design Guidelines and solutions for Plastics parts
PPTX
Software Engineering and software moduleing
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
Improvement effect of pyrolyzed agro-food biochar on the properties of.pdf
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
CyberSecurity Mobile and Wireless Devices
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PPTX
communication and presentation skills 01
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
737-MAX_SRG.pdf student reference guides
PDF
August -2025_Top10 Read_Articles_ijait.pdf
Total quality management ppt for engineering students
Design Guidelines and solutions for Plastics parts
Software Engineering and software moduleing
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Improvement effect of pyrolyzed agro-food biochar on the properties of.pdf
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
III.4.1.2_The_Space_Environment.p pdffdf
CyberSecurity Mobile and Wireless Devices
Information Storage and Retrieval Techniques Unit III
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
communication and presentation skills 01
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
737-MAX_SRG.pdf student reference guides
August -2025_Top10 Read_Articles_ijait.pdf

Machine to machine communication enabled internet of things: a review

  • 1. International Journal of Reconfigurable and Embedded Systems (IJRES) Vol. 11, No. 2, July 2022, pp. 126~134 ISSN: 2089-4864, DOI: 10.11591/ijres.v11.i2.pp126-134  126 Journal homepage: http://ijres.iaescore.com Machine to machine communication enabled internet of things: a review Rajagopal Sudarmani1 , Kanagaraj Venusamy2 , Sathish Sivaraman3 , Poongodi Jayaraman3 , Kannadhasan Suriyan4 , Manjunathan Alagarsamy5 1 School of Engineering, Avinashilingam Institute for Home Science and Higher Education for Women, Tamil Nadu, India 2 Department of Engineering, University of Technology and Applied Sciences-AI Mussanah, AI Muladdha, Oman 3 Department of Computer Science and Engineering, Sri Ranganathar Institute of Engineering and Technology, Tamil Nadu, India 4 Department of Electronics and Communication Engineering, Cheran College of Engineering, Tamil Nadu, India 5 Department of Electronics and Communication Engineering, K. Ramakrishnan College of Technology, Tamil Nadu, India Article Info ABSTRACT Article history: Received Dec 24, 2021 Revised Jan 22, 2022 Accepted Feb 12, 2022 Internet of things (IoT) will be the main part in upcoming generation devices that would not simply sense and report, also will have the controlling capability. It may be a connected vehicle, connected devices, robot, a building automation system, a door lock or a thermostat, these connected machines or devices will provide greater impact on our daily lives. Control data and the operating instructions could be protected to ensure control and autonomy for our safety and security, this could be a critical task. Privacy and security are important consideration in designing the system. With the intense growth of devices or devices with facilities such as computing and communication are carried out using a profound technology known as machine to machine (M2M) communication, which is specially designed for cross‐platform integration. In many industries, smart homes, smart cities, smart agriculture, government, connected devices, security, healthcare, education, public safety, and supply chain management. Internet of things (IoT) and machine to machine communication have to be implemented in near future. Also, this paper gives an in depth view about the different M2M techniques with interconnected IoT for truly connected, smart, and sustainable world. Keywords: Communication protocols Internet of things Machine to machine communication Network stack Security This is an open access article under the CC BY-SA license. Corresponding Author: Rajagopal Sudarmani School of Engineering, Avinashilingam Institute for Home Science and Higher Education for Women Mettupalayam Road, Coimbatore, Tamil Nadu 641 043, India Email: [email protected] 1. INTRODUCTION Technological advancement during the recent decade leads to the exponential growth of the “connected devices” which are connected to the internet, due to the number of devices used by everyone gets increasing (e.g. smartphones, iPads, Kindles, and digital television) [1]. Also, the mobile devices are already gets exceeded approximately 6 billion and also users starting to use multiple devices at a time. In connection with that machine to machine (M2M) connections are needed to establish connections. The innovative technology which capture a real time event from a device and transfers the captured event details to another device using a wire line communication or wireless communication, where a meaningful information is transferred using M2M techniques. More generic entities such as sensors, actuators, smart devices, human beings, and any other objects will able to communicate with other anytime and anywhere is possible due to the availability of internet. These M2M devices are connected through an
  • 2. Int J Reconfigurable & Embedded Syst ISSN: 2089-4864  Machine to machine communication enabled internet of things: a review (Rajagopal Sudarmani) 127 innovative internet medium based on technical and societal perspectives [2]. Several economy related business organizations and sectors are expected to disrupt because of the exponential growth in communications industries and the wider global economy, the connected devices, M2M, and the internet of things (IoT). Hence, the growths in traffic generated by M2M devices are rapid. The two important growing technologies M2M and IoT are the trending technology which serve as the base for the future world. This technology tends to occupy within the physical world of anything that of intrigued are to watch, oversee and control by individuals, businesses, or organizations will be associated and will offer administrations by means of the internet. The physical substances could be farmland, common assets like discuss, buildings and individual real-world concepts over the course will work. Due to the increased adaptation of internet and internet protocol and also the decreasing cost of semiconductor components the two technologies are progressing over the last decades in a considerable manner. Business models with autonomy in different sectors can be created by M2M and IoT, which uses the embedded technologies, and connecting the multitude of different small devices and things to the internet. The contributing techniques in future IoT are machine learning based technologies, large amount of data and cloud and data analytics. Managing big data increases the complexity of information also the automation in actions and control of real-world assets are required. It requires the technological development swhich should go beyond the existing big data [2]. 2. SYSTEM MODEL M2M maybe a computing and communication facility with freed from any human intervention which provides solutions that allow communication between machines or devices. It is almost like an industrial supervisory control and data acquisition systems (SCADA). SCADA is supposed for isolated systems using proprietary solutions, whereas machine to machine (M2M) are meant for cross platform integration. Using machine to machine solutions, end users can obtain data regarding occurrences from assets, such as temperature or inventory levels [2]. The applications of M2M includes such as: i) environmental monitoring, ii) public safety and civil protections, iii) healthcare, iv) energy and utility distribution industry (smart grid), v) intelligent transport systems (ITSs), vi) supply chain management (SCM), vii) automation of building, viii) home networks, ix) agriculture, and x) military applications [3]. M2M solutions, on the other hand, do not typically allow for the broad exchange of data or the connection of devices to the internet. Also, the features of M2M includes sizable amount of nodes or devices, at low cost and low power consumption, traffic is less for small device/machine, huge data collection, intervention less M2M and human response required for operational stability and sustainability. M2M contains three kinds of nodes. They are high, mid and low end nodes [2]. The characteristics of each category of sensor node vary, according that its application environments also differ. 2.1. Architecture of M2M ecosystem It consists of certain type of providers such as device, internet service, platform, service, and service users. The M2M ecosystem and its service networking are given in Figures 1 and 2 [4]. A generic system solution is given in Figure 3. Figure 1. M2M ecosystem Figure 2. IoT network stack
  • 3.  ISSN: 2089-4864 Int J Reconfigurable & Embedded Syst, Vol. 11, No. 2, July 2022: 126-134 128 Figure 3. A generic M2M system solution 2.2. M2M device platform It allows accessing things or devices connected to the web anytime, anywhere. Saved machines or devices are able to create a database which includes managers, users and other services which can easily access the stored data. Manage device profiles, like location, sort of device, address and contour. Also, the authentication and authorization key management functionalities are carried out by this. 2.3. M2M user platform This platform manages user profiles of the M2M service and provides features such as modification of user registration, recharging and searching. In addition, it interacts with device's platform and handles the complete ban on device, object network, and service user access. An administrative advantage could be provided to Service providers and device managers on their devices or networks as well. The administrators can manage the devices through controlling and monitoring the devices [5], [6]. 2.4. M2M application platform It allows integrated services stand on device collected datasets. Heterogeneous data can be merged from various devices which can be used for creating new services. In addition, it collects data from the control processing logbook for device management by functioning with device platform. Management of the interrelation to an appropriate network is provided for transparent services [1]. 2.5. M2M access platform It provides services through this platform to M2M devices, also provides app management for smart device apps. Application management manages application registration by developers and provides the plotting relationship between applications and the devices. The mapping feature issues a file of applications for suitable machines. 2.6. Overview of IoT protocols Internet of things ecosystem can a raise not dissimilar to the present web, where ever as devices, networks and application levels are inter linked. Machine to machine communicationtechnologiesare sensor nodes with networks, radio-frequency identification (RFID), mobile internet, wire line and wireless communication network, Bluetooth LE/Smart, IEEE 802.15.4 ((low-rate wireless personal area networks (LR-WPAN); e.g. ZigBee, internet engineering task force (IETF), IPv6-enabled low-power wireless personal area networks (6LoWPAN), routing protocol for low power and lossy networks (RPL), constrained application protocol (CoAP), ISA100.11a, and WirelessHART), M-BUS, Wireless M-BUS, KNX, power line communication (PLC), and IPv4/IPv6. In personal area network (PAN)/home area network (HAN)/local area network (LAN)/field area network (FAN), low power wireless communication technologies such as Wi-Fi, Bluetooth low energy (BLE), ZigBee, and 6LoWPAN, Z-wave may also be used to connect devices to the M2M Gate way node. GSM 3G/4G or fixed bandwidth/FTTH could also be used to connect machine to machine communication gateway node to the main server (See Figure 4). 2.7. IoT protocols Very small size data are often sent by low-power wide-area network (LPWAN) technologies which include SigfoxandLoRa. Release of 3GPP, it is possible for a cellular operator to design an LPWAN, which they would call EC-GSM-IoT, LTE-M, or NBIoT. Enrolling firms, such as telecom and information technology (ICT) businesses, in IPv6 addressing can present an opportunity to reach billions of devices that can be internet protocol (IP)-enabled and fully addressable over mobile or wired broadband connections. Availability of heterogeneous network in IoT, which has devices that have an IP address and others that do not have an IP address connected through IP gateways. We are getting closer to having the IoT platform connected to the gateways. Some form of batch-level sensor data is generated as a natural consequence of using sensors, and this would necessitate large-scale data analytics, which might be applied to framing intelligence, which could be utilized for several other purposes including planning and operational optimization [7]–[9]. Asset M2M Device Service Enablement Enterprise Processes Application Sensing Actuation Fig 4. A generic M2M systemsolution Network
  • 4. Int J Reconfigurable & Embedded Syst ISSN: 2089-4864  Machine to machine communication enabled internet of things: a review (Rajagopal Sudarmani) 129 Recently, throughput efficiency was enhanced by the standard IEEE 802.11n. High throughput was obtained by IEEE 802.11ac, focusing in 5 GHz band. IEEE 802.11ah allows number of network device to cooperate greater than 1 GHz (ISM) band. The main focus is to increase the efficiency and also to exploit the collaboration to extend the range. This standard aims in fast development of internet of things and machine to machine application which exploit burst–such as transmissions. They possess similarity as of traditional wireless sensor network (WSN) theories, which includes the technologies namely 6LoWPAN, RPL, and CoAP [10], [11]. Figure 4. M2M network 2.8. CoAP The basic structure of CoAP which is already available is free and operable for any kind of IoT device, it stables to be mostly overweight and power consuming for many IoT usage events. CoAPis meant in such how that it meets the wants of hypertext transfer. The IoT built on protocols such as hypertext transfer protocol (HTTP) or user datagram protocol (UDP), which utilizes UDP to ensure that communication between devices is highly secure. Units per transacation UPT, by being open to multi-casting and broadcasting, enables the use of a smaller amount of bandwidth, helping maintain fast communication speeds while also using a minimum amount of bandwidth. This makes it an honest fit for use in resource-constrained M2M applications. On the other hand, CoAP shares similarities with HTTP in that the RESTful framework for appliance endpoints can also enable an invitation/response communication mechanism. In addition, CoAP implements HTTP retrieve, post, post, and delete methods, which eliminates the possibility of misinterpretation in customer communication. It incorporates the datagram transport layer security (DTLS) to enable the transfer of IoT data as well as safe data exchange via the transport layer. The need for a light protocol to meet the demands of battery-powered or low-power devices is satisfied by CoAP, which fully meets these needs. Overall, when it concerns currently utilized web service-based IoT systems, CoAP may be a good fit [1], [12]. 2.9. Bluetooth low energy Bluetooth low energy (BLE) is designed in such a way that it is cost efficient and energy efficient. It is integrated in many smartphones due to its high efficiency. Low Power Networks are considered as another eminent technology which forms the base layer for IoT. IEEE802.15.4 is one of the protocols which is considered as first used protocol in practical experiments and researches in wireless sensors networks. Low-rate wireless personal area networks (LR-WPAN) can be used in ISM standard at frequency around 433 MHz, 868/915 MHz, and 2.5 GHz. Depending on transmission power level and selected band, the data rates are supported between 20 to 256 kbps. In active modes, the radio transceivers intake power in tens of milli-Watts range which means that they are still insufficient in providing long battery life for continuous operation. During transmission and listening, radio duty cycling manages radio frequency integrated circuit (RFIC)active periods. 2.10. Wireless devices The more recent derivatives ZigBee IP, ZigBee RF4CE, wirelessHART, ISA 100.a inherit this technology at very fundamental step asIEEE802.15.4 defines the physical layer where numerous of low- energy communications specifications have been created [4].
  • 5.  ISSN: 2089-4864 Int J Reconfigurable & Embedded Syst, Vol. 11, No. 2, July 2022: 126-134 130 2.11. Message queuing telemetry transport Message queuing telemetry transport (MQTT) is defined as a lightweight publication or subscription type (pub/sub) messaging protocol. These are mainly framed for battery-powered devices. The configuration of MQTT is very simple and less weight and also provides very low power consumption for the devices. MQTT is based on a concept of subscriber, publisher, and broker. The publisher's role in this model is to gather information and distribute it to subscribers via a brokerage of brokers. On the other side, the publisher's primary job is to ensure security by cross-checking the credentials of publishers and subscribers. The MQTT will satisfy the wants like consuming less energy, least bandwidth and working over wireless networks, best reliability and tiny handling and high memory resources. 2.12. Wi-Fi Wi-Fi uses radio waves to transfer data at specific frequencies, such as 2.4 GHz or 5 GHz channels. Multiple channels are found in both frequency ranges, which allow different wireless devices to operate, this distributes the load in such a way that the individual connections of the devices are not disrupted. This often protects the wireless networks from overflowing. The 100 m limit is the standard limit for a standard Wi-Fi connection. However, 10-35 m is the most common range for Wi-Fi [13]. 2.13. ZigBee ZigBee is designed for self-configuration, for use in short-distance radio networks, telemetry systems, various types of sensors, surveillance devices and also in wireless reading of energy and heat meters. 2.14. Bluetooth Bluetooth technology allows the wireless connection of different electronic devices namely smartphone, headset or speakerphone, keyboard, personal computer, laptop, mouse, palm top, printer, and so on. If you haven't yet created a wiki page-style definition, it's an open standard protocol defined by the IEEE 802.15.1 specification. Its technical specification contains three classes of transmission power, designated ERP 1-3, in the 100 and 10 kilowatt levels, respectively. The second (10 m) class is the most common class as it allows you to connect with the existing devices in various rooms, moreover on the different platforms. Bluetooth makes use of radio waves within frequency range of 2.4 GHz ISM wave band, therefore the Bluetooth adapter is the gadget that helps in making use of this protocol. As the Bluetooth protocol was upgraded from version 1.0 to 1.1, it could transfer data in batches of packets with 79 channels and an upload speed of 721 Kbps, which is equivalent to the lowest bandwidth and upload speed possible for the oldest Bluetooth 1.0 standard. Compared to the Bluetooth 4.0 specification, which matches the new standard, there are 40 channels with a bandwidth of two megahertz, which guarantees transfer of data up to a maximum of 3 megabytes per second. As new Bluetooth standards are also backward-compatible, quicker data transfer and higher security are ensured. 2.15. Extensible messaging and presence protocol The availability of real-time organized and extensible data transfer among several network clients is guaranteed with the use of extensible messaging and presence protocol (XMPP). When XMPP was developed, it was generally accepted because it was utilized as a communication protocol. Over time and lightweight XMPP specification: Adding up with the advanced features of XMPP-IoT, it has been used in internet of things (IoT). As an open social support standard, the strengths of XMPP IoT are scalable capabilities and address, making it best suited for consumer-oriented IoT rankings. 2.16. Data-distribution service Distributed transmission system (DTS) is highly trusted when utilized for the release-subscription model. OMG, in collaboration with DTS, developed DTS-RT for real-time M2M communications, measurable, high-performance and dynamic data transfer between devices independently connected from both hardware platform and software platform. This helps the DTS broker-free design and multicasting to provide high-quality QoS, assuring optimal system performance. Structure of the DTS protocolis predicated on the info center output-subscription layer (TCPS) and therefore the custom data-local reconstruction layer (DLRL). The TCPL is largely responsible for resource-aware, ductile, and efficient data delivery to subscribers, whereas the DLRL provides an interface to the TCPS functions that enable data transmission between IoT-connected items [4].
  • 6. Int J Reconfigurable & Embedded Syst ISSN: 2089-4864  Machine to machine communication enabled internet of things: a review (Rajagopal Sudarmani) 131 2.17. Advanced message queuing protocol Advanced message queuing protocol (AMQP) specification reveals the specifications like sorting, orientation of news, routing (both point-to-point and output-to-subscriber), security, and reliability. Advanced message queuing protocol's primary advantage is its resilient communication mechanism. While AMQP can provide complete transactions, this is not necessarily necessary for IoT applications. Due to AMQP's heaviness, it is not added up for sensor devices with limited power, memory, or network bandwidth, although it are often the sole possible protocol for end-to-end use, including instances of commercial heavy machinery, for personal IoT application cases, or SCADA systems, devices and network significantly more efficient [5], [14]–[18]. IEEE802.15.4g extends the with network coverage of up to tens of kilometers, it is possible to cover enormous areas of terrain with a tiny framework. IPv6 Networking uses internet protocol (IP) to enable the inter-operability which is irrespective of physical layer and also link layer. It is evident that there is only hard requirements needed for embedded device can connect with compatible gateway devices. IETF drives the advances in this technology. 6LoWPAN initially developed by 6LoWPAN working group (WG) of IETF to transport IPv6 over IEEE 802.15.4. Its primary goal is to provide fragmentation, reassembly, and header compression. As a result of the maximum packet size of 127 octets, the protocol data unit has a restricted amount of space. WG developed several ways to handle address auto configuration for network management and mesh networking. 2.18. IPv6 RPL These networks have huge rate of data losses, low data rates, and instable. Links consists of PLC, IEEE 802.15.4 and low power Wi-Fi but no medium access control technology were specified. In such networks, the traffic flow characteristics were involved in collecting data from many sensing points and from node towards sink, so for the initial development, directed acyclic graph (DAG) was mainly concentrated to the destination oriented DAG (DODAG). Specifically, to RPL network, new ICMPv6 message was defined which consists of DAG information object (DIO), that issues node to find out RPL instance, DAG information solicitation (DIS) allows request for DIOs from RPL node and destination advertisement object (DAO) propagates destination information upwards along DODAG [4]. 3. COMPARISON OF IoT PROTOCOL The analysis of different protocols of IoT for machine to machine enabled communication are given in Tables 1, 2 and 3 with respect to different parameters [2], [19]–[25]. Table 1. Comparison of various protocols Protocols CoAP MQTT XMPP AMQP DDS REST Transport layer UDP TCP TCP TCP TCP UDP TCP Publisher/subscriber Yes Yes Yes Yes Yes Request/response Yes No Yes No No Yes Security DTLS SSL SSL SSL SSL DTLS SSL QoS Yes Yes Yes Yes Low power and lossy network Exc. Fair Fair Fair Poor Fair Dynamic discovery Yes No No No Yes No Binary encoding Yes Yes Yes Yes Yes No Real time No No No No Yes No Open source Yes Yes Yes Yes Yes No Architecture style P2P Broker P2P P2P broker Data space P2P Sponsor IETF OASIS IETF OASIS OMG IETF Table 2. Comparison of various protocols Protocols Application Layer Interoperability among things Things’ representation models Things’ interaction model Low power and Lossy network Simplicity Exhaustiveness and level of detail RFID, Wi-Fi Limited to standard (stack layer) No No Fair NA NA Zigbee Limited to standard (stack layer) Yes, but limited to specific applications Yes, but limited to specific applications Excellent Good Excellent CoAP Full (delegated to IP protocol) No No Good (UDP) NA NA XMPP, MQTT Full (delegated to IP protocol) No No Fair (TCP) NA NA
  • 7.  ISSN: 2089-4864 Int J Reconfigurable & Embedded Syst, Vol. 11, No. 2, July 2022: 126-134 132 Table 3. Comparison of various protocols Protocols Frequency Data Rate Range Power Usage Cost Bluetooth/BLE 2.4 Ghz 1,2,3 Mbps -300 feet Low Low 802.15.4 Sub-Ghz, 2.4 Ghz 40,250 kbps >100 square miles Low Low Wi-Fi Sub-Ghz, 2.4 Ghz, 5 Ghz 0.1–54 Mbps <300 feet Medium Low Zigbee 2.4 Ghz 250 kbps -300 feet Low Medium 4. CONCLUSION Business models with autonomy in different sectors can be created by M2M and IoT, which uses the Internet of Things and embedded technologies, by which different kinds of small devices and things get connected to the internet. Implementing anything in a smart way is an attractive factor now a days. The future IoT depends on data, cloud, data analytics and knowledge-based technologies. Huge data handling in big data would increase the complexity and there is a need of automation in handling and managing data. Hence, now we are in need of a new evolving technology to make connected everything with anything that should beyond the Big Data. In this paper, the comparative analysis of different protocols and M2M architecture are carried out which gives an insight knowledge about the importance and technology needed for machine to machine regarding the future internet of things for the initiative of a truly smart, connected and sustainable world. REFERENCES [1] H. Zahmatkesh and F. Al-Turjman, “Fog computing for sustainable smart cities in the IoT era: Caching techniques and enabling technologies - an overview,” Sustainable Cities and Society, vol. 59, p. 102139, Aug. 2020, doi: 10.1016/j.scs.2020.102139. [2] J. Holler, V. Tsiatsis, C. Mulligan, S. Karnouskos, S. Avesand, and D. Boyle, From Machine-To-Machine to the Internet of ThingsI: Introduction to a New Age of Intelligence. Oxford: Elsevier, 2014. [3] Course Hero, “Make every study hour count. Access 100 million course-specific study materials,” Course Hero. https://www.coursehero.com/. [4] J. Kim, J. Lee, J. Kim, and J. Yun, “M2M service platforms: Survey, issues, and enabling technologies,” IEEE Communications Surveys and Tutorials, vol. 16, no. 1, pp. 61–76, 2014, doi: 10.1109/SURV.2013.100713.00203. [5] S. Kannadhasan and R. Nagarajan, “Miniaturised multiband e-shaped structure microstrip antenna for satellite communication,” First International Conference on Advances in Physical Sciences and Materials 13-14 August 2020, vol. 1706, no. 1, pp. 1–9, Dec. 2020, doi: 10.1088/1742-6596/1706/1/012110. [6] S. Kannadhasan, G. KarthiKeyan, and V. Sethupathi, “A graph theory based energy efficient clustering techniques in wireless sensor networks,” in 2013 IEEE Conference on Information & Communication Technologies, Apr. 2013, pp. 151–155, doi: 10.1109/CICT.2013.6558080. [7] S. Kannadhasan and R. Suresh, “EMD algorithm for robust image watermarking,” Advanced Materials Research, vol. 984–985, pp. 1255–1260, Jul. 2014, doi: 10.4028/www.scientific.net/AMR.984-985.1255. [8] K. Jayavel, K. Venusamy, and L. G, “Design and implementation of iot testbed with improved reliability using conditional probability techniques,” in 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I- SMAC), Oct. 2020, pp. 116–121, doi: 10.1109/I-SMAC49090.2020.9243309. [9] C. Bhuvaneshwari and A. Manjunathan, “Reimbursement of sensor nodes and path optimization,” in Materials Today: Proceedings, 2021, vol. 45, pp. 1547–1551, doi: 10.1016/j.matpr.2020.08.193. [10] M. S. Yousuf and M. El-Shafei, “Power line communications: An overview - Part I,” in 2007 Innovations in Information Technologies (IIT), Nov. 2007, pp. 218–222, doi: 10.1109/IIT.2007.4430363. [11] A. Majumder and J. Caffery, “Power line communications: an overview,” IEEE Potentials, vol. 23, no. 4, pp. 4–13, Oct. 2004, doi: 10.1109/MP.2004.1343222. [12] S. Kannadhasan and R. Nagarajan, “Development of an H-shaped antenna with FR4 for 1–10 GHz wireless communications,” Textile Research Journal, vol. 91, no. 15–16, pp. 1687–1697, Aug. 2021, doi: 10.1177/00405175211003167. [13] M. Dahiya, “Wi-Fi : standards for next generation communications,” International Journal of Engineering Science and Technology (IJEST), vol. 9, no. 3, pp. 177–182, 2017. [14] C. Bhuvaneshwari and A. Manjunathan, “Advanced gesture recognition system using long-term recurrent convolution network,” in Materials Today: Proceedings, 2020, vol. 21, pp. 731–733, doi: 10.1016/j.matpr.2019.06.748. [15] A. Manjunathan, E. D. Kanmani Ruby, W. E. Santhkumar, A. Vanathi, P. Jenopaul, and S. Kannadhasan, “Wireless HART stack using multiprocessor technique with laxity algorithm,” Bulletin of Electrical Engineering and Informatics (BEEI), vol. 10, no. 6, pp. 3297–3302, Dec. 2021, doi: 10.11591/eei.v10i6.3250. [16] A. Manjunathan, A. S. Kumar, S. Udhayanan, C. T. Selvi, and A. A. Stonier, “Design of autonomous vehicle control using IoT,” in International Virtual Conference on Robotics, Automation, Intelligent Systems and Energy (IVC RAISE 2020), Feb. 2021, vol. 1055, no. 1, pp. 1–5, doi: 10.1088/1757-899X/1055/1/012008. [17] S. Kannadhasan and R. Nagarajan, “Design of a low-cost 1–20 GHz E-shaped antenna for wireless applications,” in Lecture Notes in Mechanical Engineering, N. Kumar, S. Tibor, R. Sindhwani, J. Lee, and P. Srivastava, Eds. Singapore: Springer Singapore, 2021, pp. 137–144. [18] K. Venusamy and M. Tamilselvi, “Impact of NEMS Technology over the growth of IoT -A Analysis study,” in 2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA), Nov. 2020, pp. 193–198, doi: 10.1109/ICECA49313.2020.9297582. [19] S. Kannadhasan and R. Nagarajan, “Performance improvement of H-Shaped antenna with Zener diode for textile applications,” The Journal of The Textile Institute, pp. 1–8, Jun. 2021, doi: 10.1080/00405000.2021.1944523. [20] A. A. Ali, “Constrained application protocol (CoAP) for the IoT,” in IoT Seminar, High Integrity System, Frankfurt University of Applied Science, 2018, pp. 1–4, doi: 10.13140/RG.2.2.33265.17766. [21] J. Song, S. Han, X. Zhu, A. K. Mok, D. Chen, and M. Nixon, “A complete wirelessHART network,” in Proceedings of the 6th ACM conference on Embedded network sensor systems, 2008, p. 381, doi: 10.1145/1460412.1460462.
  • 8. Int J Reconfigurable & Embedded Syst ISSN: 2089-4864  Machine to machine communication enabled internet of things: a review (Rajagopal Sudarmani) 133 [22] G. Xiao, J. Guo, L. Da Xu, and Z. Gong, “User interoperability with heterogeneous IoT devices through transformation,” IEEE Transactions on Industrial Informatics, vol. 10, no. 2, pp. 1486–1496, May 2014, doi: 10.1109/TII.2014.2306772. [23] S. Kannadhasan, M. Shanmuganantham, and R. Nagarajan, “System model of VANET using optimization-based efficient routing algorithm,” IOP Conference Series: Materials Science and Engineering, vol. 1119, no. 1, p. 012021, Mar. 2021, doi: 10.1088/1757-899X/1119/1/012021. [24] S. Surya and R. Ravi, “MPSO-SHM: Modified PSO based structural health monitoring system for detecting the faulty sensors in WSN,” Wireless Personal Communications, vol. 108, no. 1, pp. 141–157, Sep. 2019, doi: 10.1007/s11277-019-06392-0. [25] L. M. Amulu and R. Ramraj, “Combinatorial meta-heuristics approaches for DVFS-enabled green clouds,” The Journal of Supercomputing, vol. 76, no. 8, pp. 5825–5834, Aug. 2020, doi: 10.1007/s11227-019-02997-1. BIOGRAPHIES OF AUTHORS Rajagopal Sudarmani is currently working as Associate Professor in the Department of Electronics and Communication Engineering, School of Engineering at the Avinashilingam Institute for Home Science and Higher Education for Women, in Tamil Nadu, India. She received her B.E. Electronics and Communication Engineering from Bharathiar University, Tamil Nadu, India and her M.E. (Applied Electronics) and Ph.D. in Information and Communication Engineering from Anna University, Chennai - India. Dr. R. Sudarmani published 72 papers in refereed Journals, conferences and chapters in books. She also presented research papers at several national and international conferences including the International Conference IEEE TENCON 2011 at Bali, Indonesia. Her research interest includes wireless sensor networks, wireless communication and signal processing. She can be contacted at email: [email protected]. Kanagaraj Venusamy obtained his MBA degree in Production Management from ManonmaniumSundaranar University, Tamilnadu, India in 2011 and B.E (Electronics and Communication Engineering) in 2005 from Anna University, M.E in Mechatronics Engineering, India in 2019 from Anna university affiliated college. Presently pursuing Doctorate in Management studies at Bharathidasan university, tamilnadu, India. His main interests of research are Control systems, Industrial automation, Artificial Intelligence, Robotics, Drone, IoT, Entrepreneurship and Human Resource management. He had 12 years of teaching experience in reputed institution in India and Oman and two year of industrial experience at Saudi Arabia. He has technically assisted various short term course for students, faculty development program and International Robotics Competition. He has acted as co principle investigator in sultanate of Oman government funded research projects. Currently working asa Control Systems Instructor in University of Technology and Applied Sciences - Al Mussanah. He can be contacted at email: [email protected]. Sathish Sivaraman currently working as an Assistant Professor in the department of CSE, at Sri Ranganathar Institute of Engineering and Technology, Coimbatore. He is doing his research work in the field of “Software Defined Wireless Sensor Networks” under Anna University. He received his Master’s Degree in the field of Software Engineering from Anna University in the year of 2014. He has total teaching experience of 7 years. He published papers in reputed international journals and also presented papers at more than 10 National / International conferences. He can be contacted at email: [email protected]. Poongodi Jayaraman currently working as an Assistant Professor in the department of CSE at Sri Ranganathar Institute of Engineering and Technology, Coimbatore. She is doing research work in the field of “Internet of Things” under Anna University. She received her Master’s Degree in the field of Computer Science and Engineering from Anna University in the year of 2012. She has total teaching experience of 9 years. She published papers in reputed international journals and also presented papers in National / International conferences. She can be contacted at email: [email protected].
  • 9.  ISSN: 2089-4864 Int J Reconfigurable & Embedded Syst, Vol. 11, No. 2, July 2022: 126-134 134 Kannadhasan Suriyan is working as an Assistant Professor in the department of Electronics and Communication Engineering in Cheran College of Engineering, karur, Tamilnadu, India. He is currently doing research in the field of Smart Antenna for Anna University. He is ten years of teaching and research experience. He obtained his B.E in ECE from Sethu Institute of Technology, Kariapatti in 2009 and M.E in Communication Systems from Velammal College of Engineering and Technology, Madurai in 2013. He obtained his M.B.A in Human Resources Management from Tamilnadu Open University, Chennai. He obtained his PGVLSI in Post Graduate diploma in VLSI design from Annamalai University, Chidambaram in 2011 and PGDCA in Post Graduate diploma in Computer Applications from Tamil University in 2014. He obtained his PGDRD in Post Graduate diploma in Rural Development from Indira Gandhi National Open University in 2016. He has published around 18 papers in the reputed indexed international journals and more than 125 papers presented/published in national, international journal and conferences. Besides he has contributed a book chapter also. He also serves as a board member, reviewer, speaker, session chair, advisory and technical committee of various colleges and conferences. He is also to attend the various workshop, seminar, conferences, faculty development programme, STTP and Online courses. His areas of interest are Smart Antennas, Digital Signal Processing, Wireless Communication, Wireless Networks, Embedded System, Network Security, Optical Communication, Microwave Antennas, Electromagnetic Compatability and Interference, Wireless Sensor Networks, Digital Image Processing, Satellite Communication, Cognitive Radio Design and Soft Computing techniques. He is Member of IEEE, ISTE, IEI, IETE, CSI, IAENG, SEEE, IEAE, INSC, IARDO, ISRPM, IACSIT, ICSES, SPG, SDIWC, IJSPR and EAI Community. He can be contacted at email: [email protected]. Manjunathan Alagarsamy received the Engineer degree in Electronics and Comunication Engineering from Dr. Navalar Nedunchezhiyan College of Engineering in 2010.He received the Master degree in Embedded System Technologies from Raja College of Engineering and Technology, Madurai, Tamilnadu, India in 2013.He is currently working as an Assistant Professor in the Department of Electronics and Communication Engineering at K. Ramakrishnan College of Technology, Trichy, India. His area of interests includes Embedded Systems, Image processing, Sensors and Interfacing networks and Internet of Things. He has published 13 article in peer reviewed International journals and presented 6 papers in International conferences. He can be contacted at email: [email protected].