Security Considerations in M2M Communications