Attack Detection and Distributed Forensics in Machine-to-Machine Networks

被引:47
|
作者
Wang, Kun [1 ,2 ]
Du, Miao [3 ]
Sun, Yanfei [3 ]
Vinel, Alexey [4 ]
Zhang, Yan [5 ,6 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Sch Internet Things, Nanjing, Jiangsu, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Nanjing, Jiangsu, Peoples R China
[4] Halmstad Univ, Sch Informat Technol, Comp Commun, Halmstad, Sweden
[5] Univ Oslo, N-0316 Oslo, Norway
[6] Simula Res Lab, Fornebu, Norway
来源
IEEE NETWORK | 2016年 / 30卷 / 06期
关键词
SECURITY;
D O I
10.1109/MNET.2016.1600113NM
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The advanced idea of machine-to-machine technology has attracted a new period of network revolution, evolving into a method to monitor and control global industrial user assets, machines, and the production process. M2M networks are considered to be the intelligent connection and communication between machines. However, the security issues have been further amplified with the development of M2M networks. Consequently, it is essential to pour attention into attack detection and forensics problems in M2M networks. This article puts forward the hybrid attack detection and forensics model in M2M networks. It contains two modules: the attack detection module and the forensics analysis module. In addition, we present a distributed anti-honey-pot-based forensics strategy to cope with DDoS attacks in the forensics analysis module. Finally, we also discuss some challenges in M2M network security and forensics.
引用
收藏
页码:49 / 55
页数:7
相关论文
共 50 条
  • [21] A Wireless Communication Monitoring for Cellular Machine-to-Machine Networks
    Tong, En
    You, Xiaohu
    Pan, Zhiwen
    Ding, Fei
    Wan, Yu
    Lv, Yan
    Gong, Shulei
    INTERNATIONAL CONFERENCE ON REMOTE SENSING AND WIRELESS COMMUNICATIONS (RSWC 2014), 2014, : 389 - 394
  • [22] Spectrum Assignment Algorithm for Cognitive Machine-to-Machine Networks
    Rostami, Soheil
    Alabadi, Sajad
    Noori, Soheir
    Shihab, Hayder Ahmed
    Arshad, Kamran
    Rapajic, Predrag
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [23] Optimal Routing Control in Disconnected Machine-to-Machine Networks
    Wu, Yahui
    Deng, Su
    Huang, Hongbin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [24] Cache Coherence in Machine-to-Machine Information Centric Networks
    Meddeb, Maroua
    Dhraief, Amine
    Belghith, Abdelfettah
    Monteil, Thierry
    Drira, Khalil
    40TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2015), 2015, : 430 - 433
  • [25] Data Aggregation in Capillary Networks for Machine-to-Machine Communications
    Shariatmadari, Hamidreza
    Osti, Prajwal
    Iraji, Sassan
    Jantti, Riku
    2015 IEEE 26TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2015, : 2277 - 2282
  • [26] Distributed Massive Wireless Access for Cellular Machine-to-Machine Communication
    Bayat, Siavash
    Li, Yonghui
    Han, Zhu
    Dohler, Mischa
    Vucetic, Branka
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 2767 - 2772
  • [27] Performance of Overload Control in Machine-to-Machine Wireless Networks
    El Tanab, Manal
    Hamouda, Walaa
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [28] Model for autonomous agents in machine-to-machine navigation networks
    Ali, Anum
    Shah, Ghalib
    Aslam, Muhammad
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (04)
  • [29] Distributed Ledgers for Enhanced Machine-to-Machine Trust in Smart Cities
    Hickert, Cameron
    Tekeoglu, Ali
    Maurio, Joseph
    Watson, Ryan
    Syed, Daniel
    Chavis, Jeffrey
    Brown, Gill
    Sookoor, Tamim
    2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022), 2022,
  • [30] Cooperative Coverage Extension in Heterogeneous Machine-to-Machine Networks
    Cocco, G.
    Ibars, C.
    Alagha, N.
    2012 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2012, : 1693 - 1699