Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks

被引:0
|
作者
Broustis, Ioannis [1 ,2 ,3 ,4 ,5 ,6 ]
Sundaram, Ganapathy S.
Viswanathan, Harish [7 ]
机构
[1] Alcatel Lucent, Murray Hill, NJ USA
[2] Univ Calif Riverside, Riverside, CA 92521 USA
[3] Ctr Res & Technol Hellas, Thessaloniki, Greece
[4] Univ Thessaly, Volos, Greece
[5] Intel Res, Cambridge, England
[6] Nokia R&D, Boston, MA USA
[7] Alcatel Lucent Bell Labs CTO Org, CTO Advisory Grp, Murray Hill, NJ USA
关键词
SECURITY;
D O I
10.1002/bltj.21527
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine-to-machine (M2M) communications are increasingly popular over cellular networks, due to their unlimited potential and the low cost of deployment. As a result, M2M infrastructures are attractive targets to attackers. For instance, hackers may use a water meter to browse the web over a mobile network. Given the expected tremendous growth of the M2M market within the next few years, such attacks can have a devastating impact on the economics of mobile broadband. However, prior studies in the area of fraud have not considered the inherent properties of cellular M2M deployments. In this paper, we demonstrate how hijacking attacks apply to contemporary networks, and provide a solution for mitigating them. In particular, we propose a novel framework for detecting and preventing M2M device hijacking. Our solution is novel in two main ways: 1) It is network centric, and 2) it completely avoids the use of overhead-intensive cryptographic functions. (c) 2012 Alcatel-Lucent.
引用
收藏
页码:125 / 140
页数:16
相关论文
共 50 条
  • [1] On detecting and preventing jamming attacks with machine learning in optical networks
    Bensalem, Mounir
    Singh, Sandeep Kumar
    Jukan, Admela
    [J]. arXiv, 2019,
  • [2] On Detecting and Preventing Jamming Attacks with Machine Learning in Optical Networks
    Bensalem, Mounir
    Singh, Sandeep Kumar
    Jukan, Admela
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [3] A Wireless Communication Monitoring for Cellular Machine-to-Machine Networks
    Tong, En
    You, Xiaohu
    Pan, Zhiwen
    Ding, Fei
    Wan, Yu
    Lv, Yan
    Gong, Shulei
    [J]. INTERNATIONAL CONFERENCE ON REMOTE SENSING AND WIRELESS COMMUNICATIONS (RSWC 2014), 2014, : 389 - 394
  • [4] Wireless-Powered Machine-to-Machine Multicasting in Cellular Networks
    Almasoud, Abdullah M.
    Kamal, Ahmed E.
    [J]. IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2020, 4 (02): : 515 - 528
  • [5] Converged Mobile Cellular Networks and Wireless Sensor Networks for Machine-to-Machine Communications
    Shan, Lianhai
    Li, Zhenhong
    Hu, Honglin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (01): : 147 - 161
  • [6] Wireless Machine-to-Machine Networks
    He, Jianhua
    Zhang, Yan
    Fan, Zhong
    Chen, Hsiao-Hwa
    Bai, Lin
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [7] An Adaptive Data Traffic Offloading Model for Cellular Machine-to-Machine Networks
    Lei, Tao
    Wang, Shang-guang
    Yang, Fang-chun
    [J]. INTERNET OF VEHICLES - SAFE AND INTELLIGENT MOBILITY, IOV 2015, 2015, 9502 : 261 - 272
  • [8] Ubiquitous Machine-to-Machine Service Networks
    Johanna Kallio
    Juhani Latvakoski
    [J]. 射频世界, 2010, 5 (01) : 76 - 77
  • [9] Ubiquitous Machine-to-Machine Service Networks
    Kallio, Johanna
    Latvakoski, Juhani
    [J]. ERCIM NEWS, 2009, (76): : 30 - 31
  • [10] Joint Optimization of Clustering and Scheduling for Machine-to-Machine Communications in Cellular Wireless Networks
    Tsai, Yun-Da
    Song, Chang-Yu
    Hsieh, Hung-Yun
    [J]. 2015 IEEE 81ST VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2015,