M2M, means "Machine to Machine", including
"Machine to Mobile", "Man to Machine", etc., is the most
popular application form of Internet of Things (lOT) in
current stage, whose data transmission is supported by cable,
wireless, mobile and other technology, which may be
significant security vulnerabilities and risks. In addition, in
many use cases, it is likely that M2M will be deployed in very
large quantities, and also be mobile, making it unrealistic or
impossible for operators or subscribers to send personnel to
manage or service it. These requirements introduce a number
of unique security vulnerabilities for the M2M and the wireless
communication networks. So, in this paper, I will represent the
possible security threats and their corresponding analysis from
M2M's structure, which consists of front-end sensors and
equipment, networks, back-end IT systems.