Recent Trends in Standards Related to the Internet of Things and Machine-to-Machine Communications
Recent Trends in Standards Related to the Internet of Things and Machine-to-Machine Communications
Journal of Information and Communication Convergence Engineering. 2014. Dec, 12(4): 228-236
Copyright © 2014, The Korean Institute of Information and Commucation Engineering
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License ( which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • Received : April 25, 2014
  • Accepted : July 04, 2014
  • Published : December 31, 2014
Export by style
Cited by
About the Authors
Syed Husain
NTT DOCOMO, Tokyo 100-6150, Japan
Athul Prasad
Nokia Technologies, Espoo 02150, Finland
Andreas Kunz
NEC Laboratories Europe, Heidelberg 69115, Germany
Apostolos Papageorgiou
NEC Laboratories Europe, Heidelberg 69115, Germany
JaeSeung Song
Sejong University, Seoul 143-747, Korea

One of major purposes of these standard technologies is to ensure interoperability between entities from different vendors and enable interworking between various technologies. As interoperability and interworking are essential for machine-to-machine communications (M2M) and Internet of Things (IoT) for them to achieve their ultimate goal, i.e., things to be connected each other, multiple standards organizations are now working on development M2M/IoT related specifications. This paper reviews the current activities of some of the most relevant standardization bodies in the area of M2M and IoT: third-generation partnership project (3GPP) core and radio network aspects, broadband forum, and oneM2M. The major features and issues being focused upon in these standards bodies are summarized. Finally, some key common trends among the different bodies are identified: a common service layer platform, new technologies mitigating an explosive growth of network traffic, and considerations and efforts related to the development of device management technologies.
Huge growth in the machine to machine (M2M) communications market is expected as we move towards a seamlessly connected world. This connectivity is provided via wired (Ethernet) and wireless (cellular, Wi-Fi, ZigBee, M-bus, etc.) accesses. The interworking between these different accesses is essential for the development of a seamlessly connected world.
M2M technologies enable automated remote monitoring and controlling of smart objects or smart devices (also called smart things). In addition, these technologies provide connectivity between smart objects, facilitating communications between them and resulting in the formation and foundation of the Internet of Things (IoT). IoT/M2M devices can exchange information, perform analysis, make decisions, and execute operations without human intervention.
In the domain of IoT/M2M, standardizations for key technologies (e.g., technologies for collecting and managing information, and discovering and managing devices) and horizontal service platforms are essential to achieve the IoT/M2M vision (i.e., interconnecting all smart things and allowing them to communicate with one another). Many leading standards development organizations (SDOs) are now collaboratively developing various standards to address the IoT/M2M technology spectrum.
The IoT/M2M ecosystem consists of many layers—application layer, common services layer, connectivity layer, and device management layer—as shown in Fig. 1 . For each layer, different standards will apply and interwork. The third-generation partnership project (3GPP) system provides standards for the control layer and wireless connectivity layer, with special focus on energy and cost efficiency, and enhanced cellular coverage for machine type communications (MTC) devices. The Broadband Forum (BBF) standards apply for the fixed wireline connectivity, and device management (TR-069). The Open Mobile Alliance (OMA) standards apply to the management of wireless devices. The oneM2M standards apply to the application layer, control layer, and device management layer.
PPT Slide
Lager Image
Internet of Things/machine to machine (IoT/M2M) layered architecture.
Therefore, in this paper, we will review the trends of these notable and active IoT/M2M-related standards organizations. Key features that are actively being discussed and considered will be highlighted. In particular, the work of the following standards organizations will be covered:
  • - MTC enhancements in 3GPP system architecture (SA) technical sub-working group.
  • - MTC enhancements in 3GPP LTE-advanced radio access network (RAN) technical sub-working group.
  • - Horizontal services layer platform in oneM2M.
  • - Works in BBF for fixed line networks.
In addition to the SDOs listed above, there exist a large number of industry-sponsored consortiums and standards organizations in the world, developing other IoT/M2M-related specifications, such as IEEE Standards Association (IEEE-SA), Home Gateway Initiative, and AllSeen Alliance. The standards organizations considered in this paper are those that focus on IoT/M2M standards; these organizations have been chosen because they are considered major standards organizations in their respective areas (e.g., oneM2M for the common services layer) and are actively developing specifications in a timely manner according to our perspective.
This paper introduces the recent standards trends for 3GPP SA (Section II), 3GPP RAN (Section III), oneM2M (Section IV), and BBF (Section V). Each section presents an overview of IoT/M2M-related activities, main features, and future directions. Finally, the paper is concluded with a brief discussion and summary for future standardization work in the domain of IoT/M2M (Section VI).
3GPP is working on the standardization of mobile network technologies related to radio access and the mobile core network. Many technologies have been developed; the latest one in the market is long-term evolution–advanced (LTE-A), which is already in the early deployment stage in some mobile networks around the world. The 3GPP SA technical sub-working group started the work on MTC since Release 10 in the year 2010. MTC is just another name for M2M in 3GPP, concentrating only on the impact of using IoT devices on the 3GPP core network itself. While the MTC service provider may be outside of the 3GPP domain, the optimizations in the network are activated on the basis of the subscription or capabilities of the MTC device. 3GPP does not differentiate between normal 3GPP terminals, called user equipment (UE) and MTC devices, so all the enhancements for MTC could also be applied to normal UE. A detailed overview of the individual features of the different releases can be found in [1 - 3] .
The first set of enhancements specified in Release 10 [4] includes MTC subscription handling and the overload and congestion control resulting from simultaneous transmission of data by a large amount of MTC UE.
The subscription control enables an MTC subscriber to activate/deactivate one or more MTC features in the subscription profile; this can be achieved by means of a web interface, but the process is outside the scope of 3GPP.
The overload and congestion control mechanism targets the prevention of scenarios when MTC UE is triggered or configured to send information to an MTC server simultaneously (synchronized application behavior). In order to prevent a ‘denial of service’ attack to the control nodes in the core network, the MTC UE includes in its service request a low priority indication. If an overload situation occurs, the MTC UE receives an ‘extended waiting timer’ and has to wait until its expiry before sending new requests.
In 3GPP Release 11, the following additional features were agreed to for MTC:
  • 3GPP architecture enhancements for MTC
  • Addressing
  • Identifiers
  • Device triggering
  • PS-only service provision
The MTC architecture enhancements [4] are shown in Fig. 2 , highlighting the addition of new functional entities to the 3GPP architecture.
PPT Slide
Lager Image
3GPP machine type communications (MTC) architecture.
Communication takes place between the application server (AS), hosted by the third-party service provider and the MTC application in the UE. In order to provide value-added services like control plane triggering, a service capability server (SCS) is used, which can reside either in the 3GPP network operator domain or in the trusted third-party service provider domain. The MTC interworking function (MTC-IWF) is the major new node taking care of device triggering via the Tsp and T4 reference points as well as identifier mapping.
With respect to addressing, 3GPP agreed to use IPv6 as a primary addressing mechanism. Furthermore, for solving the identification issue due to the constrained number of available mobile subscriber integrated services digital network numbers (MSISDNs), external identifiers were agreed for usage outside of the 3GPP network operator domain by the third-party service provider, which are mapped to the unique international mobile subscriber identity (IMSI) for all related procedures inside the 3GPP network.
Device triggering was one of the most important topics in the discussions. Since the MTC UE may not be attached to the packet-switched domain of the 3GPP network all the time for battery-saving reasons or other constraints, it needs to be triggered by the third-party application server in order to trigger a specific action, e.g., submitting measurement results. This is achieved by the T4 triggering procedure, which is basically a trigger message from the third-party service provider to the MTC-IWF over Tsp, where the external identifier is mapped to the IMSI and the trigger is sent in form of an SMS to the UE via T4. Once the UE receives the trigger SMS, it can identify it as a special trigger message and route it to the corresponding MTC application based on the used port number.
The enhancement that was specified in Release 11 was the PS-only service provision; i.e., an MTC UE may not have an MSISDN, since these devices can use only packet-switched services. The specified enhancement consists of the SMS delivery and interworking for such MSISDN-less devices.
In Release 12, only two other features were specified [5] : one is the small data enhancements feature, which optimizes the network for the low data application needs of the MTC devices. This is done by adjusting the base station (eNodeB) parameters with the assistance of the core network. The other enhancement targets the power consumption and battery saving in the UE by introducing a new power-saving state for the MTC UE.
In Release 13, all the features that were not standardized in Release 12, i.e., monitoring enhancements of MTC UE [6] and group-based handling of MTC devices [7] , are standardized. A new study item is carried out for exposing services from 3GPP [8] to the third-party service provider with application programming interfaces (APIs), e.g., from OMA or GSM Association (GSMA); a good overview can be found in [9] . Another new study item targets improvements of constraint devices that can handle high latency in their communication with the third-party application server [10] .
Currently, the 3GPP RAN working groups have identified MTC as one of the most important topics for further enhancements, due to the diverse set of use cases and consumer demands for such communication, as compared to end-user communication for which such systems were traditionally designed [11] . The main motivation to develop new mechanisms for MTC is the large and diverse set of requirements and deployment use cases as well as scenarios currently envisioned for such modes of communication, which require cost- and energy-efficient solutions, in order to make such network deployments a viable option for network operators.
The focus of the RAN work done as part of Release 12 standardization was to first study whether LTE would be an ideal medium for providing MTC in an efficient manner [12] . Due to the perceived dense deployment of MTC devices or UE, reducing the cost of such devices was important and thus, had to be investigated. Since such devices were expected to be deployed in locations where there could be poor LTE coverage, possible coverage enhancement mechanisms also needed to be studied in detail. Various mechanisms for accomplishing these objectives were studied and compared with enhanced general packet radio service (EGPRS) multi-slot class 2 [12] . Various solutions were analyzed for reductions in the UE cost and power consumption, as well as for improving the coverage of such deployments.
In Release 13 of 3GPP LTE standards, a new work item has been defined, with the aim of specifying the solutions identified as part of the Release 12 work [13] . The key aim is to specify a new, low-complexity UE category for MTC devices, which operates in all the duplex modes supported by LTE. The device would have additional capabilities, such as a reduced UE bandwidth of 1.4 MHz in downlink and uplink, lower maximum transmission power, reduced support of downlink transmission modes, and some further optimizations, such as reduced transport block size, optimized support for reception of multiple transmissions, reduced channel quality, and state information reporting modes.
- A. Release 12 Related Standardization
Some of the key requirements defined for LTE MTC UE include minimum data rate requirements similar to those of the EGPRS multi-class slot 2 devices, improved spectral efficiency as compared to the reference benchmark, similar or better service coverage area as compared to the reference case with 20-dB target coverage enhancement for LTE MTC UE as compared to regular LTE UE, co-existence with legacy LTE UE, use of the same carrier, no impacts on core network architecture, compatibility with frequency and time division duplexing (FDD/TDD), avoidance of LTE base station hardware changes, and limited mobility support [12] . The performance analysis of the proposed solutions was carried out mainly from a UE power consumption and cost perspective, as well as from the perspective of network coverage improvements.
The concepts that were studied to provide cost improvements [12] were as follows: reduced maximum bandwidth, single receiver radio frequency (RF) chain, reduced peak rate, reduced UE transmission power, half-duplex operation, and reduced support of downlink transmission modes. The main idea behind reduced maximum bandwidth was to have MTC UE supporting only lower bandwidth, e.g., 1.4, 3, or 5 MHz, instead of the 20-MHz LTE bandwidth. This could lead to optimizations in RF and baseband units, as well as optimizations in data and control channel bandwidths, in both downlink and uplink. The evaluations conducted for this mechanism revealed that reducing the maximum bandwidth could provide significant cost reductions, mainly due to optimizations in baseband processing. Uplink bandwidth reductions were shown not to impact the UE costs significantly, and minimal savings were observed for the RF components as well.
Having a single RF chain, instead of two antennas and RF chains is proposed to reduce the MTC UE cost, with the added cost of reduced UE receiver performance and corresponding loss of downlink coverage and spectral efficiency. The peak rate is envisioned to be reduced using reductions in maximum transmit block sizes and number of physical resource blocks in an assignment or grant, as well as optimizing the maximum modulation order used. A reduction in the transmit power could be achieved by removing the power amplifier stage of the MTC UE, which is proposed to reduce the UE cost. Such optimizations are expected to lower the uplink coverage and spectral efficiency performance. A half-duplex UE operation is proposed to reduce the costs related to the duplexer, and replacing the duplexer with a switch, thereby reducing the complexity of the RF implementation. Reduction of the transmission mode support of MTC UE is also proposed as a means to reduce cost. Coverage enhancement studies were also conducted with techniques proposed for achieving the 20-dB improvements for various physical channels. A new UE category for MTC devices is also proposed to avoid any impact on legacy devices.
- B. Release 13 Enhancements for MTC
The main objectives and justifications for the MTC-related specification work, proposed for Release 13 can be found in [13] . The key aim of the work is to specify solutions considered in [12] , which could prove advantageous in enabling cost- and power-efficient MTC UE, which could operate in an environment with possible coverage enhancements. The objective of reducing the bandwidth to 1.4 MHz is to enable UE to operate in networks having any system bandwidth, while reducing the cost requirements. Transmit power reductions would be considered with an additional constraint of support for integrated power amplifier implementation. Further relaxations of UE processing requirements will also be investigated as part of this release.
For coverage improvements, some of the mechanisms that would be considered include sub-frame bundling techniques with hybrid automatic repeat request (HARQ) for physical data channels, removing or repetition of certain control channels, new channel formats, and flexible coverage enhancement techniques with new reporting formats. These mechanisms need to be evaluated with minimal impact on the standards and divergence from the currently defined procedures. Further, mechanisms for enabling an ultra-long battery life for such UE are being studied along with optimizations in transmit/receive times, modifications of signals/channels, and reductions in measurements/feedbacks that need to be achieved by the UE.
The IoT/M2M marketplace consists of many market segments, such as smart homes, smart buildings, smart grids, and healthcare that are being deployed using targeted solutions from solution providers. These IoT/M2M solutions are referred to as verticals, because they are proprietary solutions for specific market segments and are not designed to interplay with other verticals. In the future, in a seamlessly connected world, there will be a strong need to allow all IoT/M2M market segments to interplay in a standardized manner to allow application developers to build sophisticated, enriched horizontal M2M services. Therefore, in the last two years, oneM2M-related research has been focused upon the standardization of a distributed/modular horizontal M2M services layer platform that will enable vertical market segments to interplay using standardized interfaces. This would allow off-the-shelf products from different manufactures to easily interwork, thereby providing cost efficiencies for the customers.
The need for the development of a globally applicable access independent M2M services layer platform was recognized by the same seven leading national SDOs (ARIB, ATIS, CCSA, ETSI, TIA, TTA, and TTC) as in the case of 3GPP. Therefore, in July 2012, seven of the world’s leading information and communications technology (ICT) organizations agreed to collaborate in the launch of a oneM2M global partnership to undertake the development of M2M services layer platform specifications. The first set of oneM2M specifications (called Release 1) would be completed by the end of 2014. The formal launch of oneM2M Release 1 took place on December 9, 2014, at the ETSI Headquarters in Sophia Antipolis, France. Further, several leading organizations have been engaged in demonstrating the use of oneM2M specifications via working prototypes [14] .
In the development of the oneM2M services layer platform, the three-stage standards methodology (stages 1, 2, and 3) was used as employed by other standards organizations. Stage 1 identified the service requirements for a horizontal M2M services platform by studying various vertical M2M use case scenarios [15] . This led to the development of the oneM2M services platform architecture [16] that addressed the service requirements (called Stage 2). The protocol work (called Stage 3) was done last to define the detailed message flows carried over the three reference points (Mcc, Mcn, and Mca), as shown in the high-level oneM2M functional architecture ( Fig. 3 ). There are two other working groups in oneM2M for security (SEC), and management, abstraction, and semantics (MAS). The SEC working group defines the security and privacy requirements for secure communication between all the oneM2M system entities and the application layer. The MAS working deals with the technical aspects related to the management of M2M entities and/or functions. It also deals with support for application-specific abstraction and semantics.
PPT Slide
Lager Image
OneM2M high-level architecture.
The following list provides the oneM2M technical specifications for Release 1:
  • Stage 1
  • TS-0002: Requirements
  • Stage 2
  • TS-0001: Functional Architecture
  • Stage 3
  • TS-0004: Service Layer Protocol Core Specification
  • TS-0008: CoAP Protocol Binding
  • TS-0009: HTTP Protocol Binding
  • TS-0010: MQTT Protocol Binding
  • Security
  • TS-0003: Security Solutions
  • Management, Abstraction, and Semantics
  • TS-0005: Management Enablement (OMA)
  • TS-0006: Management Enablement (BBF)
The key functionalities of the oneM2M services platform architecture are as follows:
  • Secure Communication
  • Registration of Services and Applications
  • Management of Resources using RESTful Techniques
  • Subscription and Notification
  • Group Handling
  • Access Control
  • Device Management
  • Re-use of Underlying Network Capabilities such as Location and Device Triggering
The oneM2M functional architecture consists of the following three entities:
  • Application Entity (AE): This resides in the application layer and implements the application service logic.
  • Common Services Entity (CSE): This entity is at the heart of the oneM2M architecture. It is an instantiation of a set of ‘common services functions’ of the M2M environments. It interacts with all other entities over the Mca, Mcc, and Mcn reference points to orchestrate the handling and provision of M2M services.
  • Underlying Network Services Entity (NSE): This provides services from the underlying networks to the CSE.
A combination of AE and CSE can reside in M2M devices or M2M gateways or inside the NSE. This makes the oneM2M architecture distributed and modular, thereby making it possible for different types of M2M configurations to be easily supported via standardized interfaces. The placement of these entities in different physical entities allows them to communicate over standardized interfaces and facilitate the handling of resources. A oneM2M certification process would be needed in the future to allow manufacturers to build products that are oneM2M compliant. The oneM2M certification process is under discussion.
As the work on oneM2M Release 1 specifications gets closer to being completed, work has already started in the Requirements working group (Stage 1) to identify new service requirements for Release 2. The working group is studying new M2M use cases that will help in identifying new service requirements that are not currently supported in Release 1. Further, work has started on a new technical report on home domain enablement with a focus on the management of home devices/appliances. For example, the oneM2M system shall support a semantic relation between two M2M home devices and take appropriate actions. This area has attracted a lot of attention lately, and has come under the umbrella of smart homes.
In addition, a new work item has been created to start studying the interworking aspects between the oneM2M services platform and the AllJoyn open-source system. AllJoyn is a collaborative open-source project of the AllSeen Alliance, providing manufacturers and developers the tools that they need to invent new ways for smart things to work together. The goal of this work item is to study the interworking scenarios between oneM2M and AllJoyn systems, resulting in the identification of gaps in the oneM2M system.
The Broadband Home Working Group (BBHome WG) of the BBF is developing and maintaining a CPE WAN management protocol (CWMP; also widely known as TR-069). CWMP is used for the remote management and configuration of customer devices (mainly Internet gateways and the devices connected to them) from the operator premises. This protocol is used by approximately 250 million devices worldwide [17] .
Provided that CWMP is appropriate for the management of IoT/M2M devices, the BBHome WG continues enhancing this aspect of CWMP by working on various M2M-related aspects of the protocol. Fig. 4 illustrates the traditional scope of CWMP (re-drawn based on [18] ), and Fig. 5 highlights the CWMP enhancements and extensions that have either been completed recently or are officially in progress. Each of the five aspects listed in the figure are explained in the following paragraphs.
PPT Slide
Lager Image
CWMP scope (re-drawn based on [18]).
PPT Slide
Lager Image
Recent and ongoing CWMP works supporting M2M solutions.
Elaborate descriptions of using CWMP in M2M applications: BBHome is working on detailed descriptions of how to manage M2M solutions using CWMP. This is mainly performed in the context of work item SD-278 (cf. [19] ) and can promote IoT/M2M scenarios by providing analyses of, implicit guidelines on, and discussions on the technologies involved in concrete CWMP-supported M2M applications.
Inter-SDO collaboration to support the use of CWMP as management protocol in M2M platforms: Through cooperation between BBHome and oneM2M, CWMP has already been included as one of the two main M2M management protocols in Release 1 (‘aubergine’) of oneM2M. More details about CWMP usage inside oneM2M platforms can be found in the mentioned release, but BBHome is also continuously working on ensuring the compatibility of the two protocols and the involved entities (e.g., the ACS with the oneM2M service platform).
Integration of features for M2M support in CWMPv2: A new version of CWMP, called CWMPv2, has been announced [17] , with the intention to re-build various aspects of CWMP from scratch, in order to evolve towards “incorporating virtualization in broadband services, the M2M environment, and the Internet of Things.” The relevant foundations are being laid in the context of SD-069 [19] .
Extension of the CPE proxy framework: The latest amendments of TR-069 [18] and TR-181, which is the data model for TR-069, include a large number of features for the CWMP proxy mechanism and framework. Proxying is for obvious reasons extremely important for IoT/M2M scenarios, e.g., for enabling the CWMP-based management of UPnP- or ZigBee-based M2M devices.
New data models for the support of M2M protocols: BBHome is constantly adding data models for the support of an increasing number of technologies at the customer premises. Many of the recently added data models are extremely important for M2M applications, e.g., the ZigBee-, UPnP-, and ETSI-M2M data models, and for the cellular interface, proxy-related objects, and various other parts.
In this article, we reviewed the recent trends in some of the most actively engaged standardization bodies in the areas of the IoT and M2M communications: 3GPP for architecture and radio access aspects, oneM2M for service layer platforms, and BBF for IoT/M2M device management in wired line networks. Further, an overview of the major features and issues that have been developed or are under development in these standards bodies was presented.
Looking at the recent activities in these standards organizations, we identified some key common trends: 1) given the request from various stakeholders from the IoT/M2M verticals, standards for a common service layer are actively being developed in order to provide a costefficient platform that can be easily deployed in a multivendor environment, 2) as an explosive growth of network traffic is expected from IoT/M2M, wireless network architectures and technologies are focusing on the optimization of their networks and mitigation of the potential impact, and 3) in managing millions of IoT/M2M smart devices, a concerted effort is underway in SDOs to develop various technologies for managing such devices using standardized methods.
Professor Song is supported by grants from the ICT Standardization program of the Ministry of Science, ICT & Future Planning (MSIP).
Syed Husain
received his B.S. and M.S. in Electrical Engineering from Syracuse University, New York. He is an expert in Industry Standards. He is currently working as a consultant to the NTT DOCOMO Core Network Standards Development organization involved in 3GPP LTE/SAE/IMS and oneM2M machine-to-machine standards development projects. Prior to consulting, he worked at Motorola and AT&T Bell Laboratories. He has more than 28 years of telecommunications experience in the areas of digital switching, intelligent networking, next-generation IP networks, and wireless communication. He is a member of IEEE.
Athul Prasad
received his M.Sc. (Tech) in Communication Engineering (with distinction) from Aalto University, Finland, in 2011. Currently, he is pursuing D.Sc. (Tech) in Communication Engineering from Aalto University. From 2006 to 2009, he was with Huawei Technologies’ R&D center in India, and from 2010 to 2012, he worked for Aalto University and as a consultant with Nokia Research Center. From December 2012 to June 2014, he worked with NEC Europe Ltd. as a 3GPP standardization researcher and delegate. Since June 2014, he has been working at Nokia Technologies, Finland, as a senior researcher in the 5G Research Team. His research interests include dynamic resource allocation, mobility management in heterogeneous networks, RF fingerprint-based localization, and 5G radio access system-related enhancements.
Andreas Kunz
received his diploma and his Ph.D. in Electrical Engineering from the University of Siegen, Germany. He is currently working with NEC Laboratories Europe with a focus on 3GPP standardization, mainly in the system architecture working group, following various topics from machine type communications (MTC) and IP multimedia subsystem (IMS) features to the new public safety work items on proximity services (ProSe) and mission critical push to talk (MCPTT) group communications.
Apostolos Papageorgiou
received his Diploma in Computer Engineering from the University of Patras (Greece) and his Ph.D. from the Technische Universitaet Darmstadt (Germany). Currently, he is a research scientist with the Cloud Systems and Smart Things group at NEC Laboratories Europe. His research focuses on efficient data handling and configuration in machine-to-machine systems; he also has active interest in standardization, representing NEC at The Broadband Forum.
JaeSeung Song
received his Ph.D. from the Department of Computing, Imperial College London, United Kingdom. He received his B.S. and M.S. in Computer Science from Sogang University. Currently, he is an assistant professor, leading the Software Engineering and Security group (SESlab), at the Computer and Information Security Department, Sejong University. He holds the position of oneM2M Test WG Convenor and TTA IoT/M2M Convergence Special Project Group Vice-Chair. Prior to his current position, he worked for NEC Europe Ltd. between 2012 and 2013 as a leading standards senior researcher. From 2002 to 2008, he worked for LG Electronics as a senior researcher leading a 3GPP SA standards team. He occupied leadership positions in 3GPP and oneM2M standard groups as a rapporteur and active contributor.
Song J. , Kunz A. , Schmidt M. , Szczytowski P. 2014 “Connecting and managing M2M devices in the future Internet” Mobile Networks and Applications 19 (1) 4 - 17    DOI : 10.1007/s11036-013-0480-9
Kuns A. , Kim L. , Kim H. , Husain S. S. “Machine type communications in 3GPP: from release 10 to release 12” in Proceedings of 2012 IEEE GLOBECOM Workshops Anaheim, CA 2012 1747 - 1752
Taleb T. , Kunz A. 2012 “Machine type communications in 3GPP networks: potential, challenges, and solutions” IEEE Communications Magazine 50 (3) 178 - 184    DOI : 10.1109/MCOM.2012.6163599
Available: .
3GPP TS 23.682, Architecture enhancements to facilitate communications with packet data networks and applications (v12.2.0) [Internet] Available: .
3GPP TR 23.789, Monitoring enhancements (v.0.3.0) [Internet] Available: .
3GPP TR 23.769, Group based enhancements (v.0.3.1) [Internet] Available: .
3GPP TR 23.708, Architecture enhancements for service exposure (v.0.3.0) [Internet] Available: .
Husain S. , Kunz A. , Song J. , Koshimizu T. “Interworking architecture between one M2M service layer and underlying networks” in Proceedings of the 3rd IEE Workshop on Telecommunication Standards: From Research to Standards (Part of IEEE Globecom 2014) Austin, TX 2014
3GPP TR 23.709, Study on optimizations to support high latency communications (v.0.1.0) [Internet] Available: .
Astely D. , Dahlman E. , Fodor G. , Parkvall S. , Sachs J. 2013 “LTE release 12 and beyond” IEEE Communications Magazine 51 (7) 154 - 160    DOI : 10.1109/MCOM.2013.6553692
3GPP TR 36.888, Study on provision of low-cost Machine-Type Communications (MTC) User Equipments (UEs) based on LTE (v12.0.0) [Internet] Available: .
3GPP TDocs-RP-141660, New WI proposal: Further LTE Physical Layer Enhancements for MTC [Internet] Available: .
Swetina J. , Lu G. , Jacobs P. , Ennesser F. , Song J. 2014 “Toward a standardized common m2m service layer platform: Introduction to onem2m” IEEE Wireless Communications 21 (3) 20 - 26    DOI : 10.1109/MWC.2014.6845045
oneM2M-TR-0001, oneM2M Use Cases Collection (v0.0.5) [Internet] Available: .
oneM2M-TS-0001, oneM2M Functional Architecture Technical Specification [Internet] Available: .
BBF Q2 2014 press release for the ten years of CWMP [Internet] Available:
Broadband Forum, TR-069 Amendment 5: CPE WAN management protocol [Internet] Available: .
Broadband Forum, Technical work in progress [Internet] Available: .