Attack Detection and Distributed Forensics in Machine-to-Machine Networks

被引:47
|
作者
Wang, Kun [1 ,2 ]
Du, Miao [3 ]
Sun, Yanfei [3 ]
Vinel, Alexey [4 ]
Zhang, Yan [5 ,6 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Internet Things, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Nanjing, Jiangsu, Peoples R China
[4] Halmstad Univ, Sch Informat Technol, Comp Commun, Halmstad, Sweden
[5] Univ Oslo, N-0316 Oslo, Norway
[6] Simula Res Lab, Fornebu, Norway
来源
IEEE NETWORK | 2016年 / 30卷 / 06期
关键词
SECURITY;
D O I
10.1109/MNET.2016.1600113NM
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The advanced idea of machine-to-machine technology has attracted a new period of network revolution, evolving into a method to monitor and control global industrial user assets, machines, and the production process. M2M networks are considered to be the intelligent connection and communication between machines. However, the security issues have been further amplified with the development of M2M networks. Consequently, it is essential to pour attention into attack detection and forensics problems in M2M networks. This article puts forward the hybrid attack detection and forensics model in M2M networks. It contains two modules: the attack detection module and the forensics analysis module. In addition, we present a distributed anti-honey-pot-based forensics strategy to cope with DDoS attacks in the forensics analysis module. Finally, we also discuss some challenges in M2M network security and forensics.
引用
收藏
页码:49 / 55
页数:7
相关论文
共 50 条
  • [11] Energy Harvesting-aware Distributed Queuing Access for Wireless Machine-to-Machine Networks
    Vazquez-Gallego, F.
    Alonso, L.
    Alonso-Zarate, J.
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [12] Machine-to-Machine Content Retrieval in Wireless Networks
    Bosunia, Mahfuzur R.
    Jeong, Seong-Ho
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (03) : 1465 - 1490
  • [13] A Soft Fault Detection Mechanism with High Accuracy on Machine-to-Machine Communication Networks
    Shih, Yuan-Kang
    Wei, Hung-Yu
    2014 IEEE INTERNATIONAL CONFERENCE (ITHINGS) - 2014 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) - 2014 IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL-SOCIAL COMPUTING (CPS), 2014, : 340 - 343
  • [14] Machine-to-Machine Content Retrieval in Wireless Networks
    Mahfuzur R. Bosunia
    Seong-Ho Jeong
    Wireless Personal Communications, 2019, 107 : 1465 - 1490
  • [15] A Reconfigurable NOMA Scheme for Machine-to-Machine Networks
    Shoaei, Atoosa Dalili
    Derakhshani, Mahsa
    Tho Le-Ngoc
    ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2019,
  • [16] Distributed resource directory architecture in Machine-to-Machine communications
    Liu, Meirong
    Leppanen, Teemu
    Harjula, Erkki
    Ou, Zhonghong
    Ramalingam, Archana
    Ylianttila, Mika
    Ojala, Timo
    2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 319 - 324
  • [17] Machine-to-Machine: Possible Applications in Industrial Networks
    Potter, C. H.
    Hancke, G. P.
    Silva, B. J.
    2013 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2013, : 1321 - 1326
  • [18] Anomaly Detection in Cellular Machine-to-Machine Communications
    Murynets, Ilona
    Jover, Roger Piqueras
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
  • [19] Machine-to-machine
    Goodman Jr., Glenn W.
    Aviation Week and Space Technology (New York), 2006, 165 (12): : 40 - 44
  • [20] Energy Performance of Distributed Queuing Access in Machine-to-Machine Networks with Idle-to-Saturation Transitions
    Vazquez-Gallego, F.
    Alonso-Zarate, J.
    Tuset-Peiro, P.
    Alonso, L.
    2013 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2013, : 867 - 872