Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks

被引:4
|
作者
Candal-Ventureira, David [1 ]
Fondo-Ferreiro, Pablo [1 ]
Gil-Castineira, Felipe [1 ]
Javier Gonzalez-Castano, Francisco [1 ]
机构
[1] Univ Vigo, AtlanTTic Res Ctr Telecommun Technol, Informat Technol Grp, Vigo 36310, Spain
关键词
internet of things; 5G; network slicing; malware; denial of service; SOFTWARE-DEFINED NETWORKING; 5G MOBILE; ARCHITECTURES; SDN;
D O I
10.3390/s20185054
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The unstoppable adoption of the Internet of Things (IoT) is driven by the deployment of new services that require continuous capture of information from huge populations of sensors, or actuating over a myriad of "smart" objects. Accordingly, next generation networks are being designed to support such massive numbers of devices and connections. For example, the 3rd Generation Partnership Project (3GPP) is designing the different 5G releases specifically with IoT in mind. Nevertheless, from a security perspective this scenario is a potential nightmare: the attack surface becomes wider and many IoT nodes do not have enough resources to support advanced security protocols. In fact, security is rarely a priority in their design. Thus, including network-level mechanisms for preventing attacks from malware-infected IoT devices is mandatory to avert further damage. In this paper, we propose a novel Software-Defined Networking (SDN)-based architecture to identify suspicious nodes in 4G or 5G networks and redirect their traffic to a secondary network slice where traffic is analyzed in depth before allowing it reaching its destination. The architecture can be easily integrated in any existing deployment due to its interoperability. By following this approach, we can detect potential threats at an early stage and limit the damage by Distributed Denial of Service (DDoS) attacks originated in IoT devices.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [1] Malicious replica quarantining protocol for Mobile Wireless Sensor Networks using replica detection and identification
    Alrashed, Ebrahim A.
    Karaata, Mehmet H.
    Hamdan, Ali A.
    [J]. INTERNET OF THINGS, 2024, 27
  • [2] Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System
    Qussai Yaseen
    Yaser Jararweh
    [J]. Journal of Network and Systems Management, 2021, 29
  • [3] Building an Intelligent Global IoT Reputation and Malicious Devices Detecting System
    Yaseen, Qussai
    Jararweh, Yaser
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (04)
  • [4] Evaluating the Security of IoT Networks with Mobile Devices
    Samandari, Amelia
    Ge, Mengmeng
    Hong, Jin B.
    Kim, Dong Seong
    [J]. 2018 IEEE 23RD PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2018, : 171 - 180
  • [5] Secure Localization and Velocity Estimation in Mobile IoT Networks With Malicious Attacks
    Li, Yunfei
    Ma, Shaodan
    Yang, Guanghua
    Wong, Kai-Kit
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08) : 6878 - 6892
  • [6] Intelligent Monitoring of IoT Devices using Neural Networks
    Chawla, Ashima
    Babu, Pradeep
    Gawande, Trushnesh
    Aumayr, Erik
    Jacob, Paul
    Fallon, Sheila
    [J]. 2021 24TH CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN), 2021,
  • [7] Mobile Performance Intelligent Evaluation of IoT Networks Based on DNN
    Tang, Zhen
    Fu, Xiaobin
    Xiao, Pingping
    [J]. INTERNATIONAL JOURNAL OF ANTENNAS AND PROPAGATION, 2022, 2022
  • [8] Intelligent Random Access for Massive-Machine Type Communications in Sliced Mobile Networks
    Yang, Bei
    Wei, Fengsheng
    She, Xiaoming
    Jiang, Zheng
    Zhu, Jianchi
    Chen, Peng
    Wang, Jianxiu
    [J]. ELECTRONICS, 2023, 12 (02)
  • [9] Malicious code moves to mobile devices
    Leavitt, N
    [J]. COMPUTER, 2000, 33 (12) : 16 - 19
  • [10] Dynamic Resource Trading in Sliced Mobile Networks
    Akgul, Ozgur Umut
    Malanchini, Ilaria
    Capone, Antonio
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (01): : 220 - 233