Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks

被引:0
|
作者
Broustis, Ioannis [1 ,2 ,3 ,4 ,5 ,6 ]
Sundaram, Ganapathy S.
Viswanathan, Harish [7 ]
机构
[1] Alcatel Lucent, Murray Hill, NJ USA
[2] Univ Calif Riverside, Riverside, CA 92521 USA
[3] Ctr Res & Technol Hellas, Thessaloniki, Greece
[4] Univ Thessaly, Volos, Greece
[5] Intel Res, Cambridge, England
[6] Nokia R&D, Boston, MA USA
[7] Alcatel Lucent Bell Labs CTO Org, CTO Advisory Grp, Murray Hill, NJ USA
关键词
SECURITY;
D O I
10.1002/bltj.21527
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine-to-machine (M2M) communications are increasingly popular over cellular networks, due to their unlimited potential and the low cost of deployment. As a result, M2M infrastructures are attractive targets to attackers. For instance, hackers may use a water meter to browse the web over a mobile network. Given the expected tremendous growth of the M2M market within the next few years, such attacks can have a devastating impact on the economics of mobile broadband. However, prior studies in the area of fraud have not considered the inherent properties of cellular M2M deployments. In this paper, we demonstrate how hijacking attacks apply to contemporary networks, and provide a solution for mitigating them. In particular, we propose a novel framework for detecting and preventing M2M device hijacking. Our solution is novel in two main ways: 1) It is network centric, and 2) it completely avoids the use of overhead-intensive cryptographic functions. (c) 2012 Alcatel-Lucent.
引用
收藏
页码:125 / 140
页数:16
相关论文
共 50 条
  • [21] Cellular-Based Machine-to-Machine: Overload Control
    Ksentini, Adlen
    Hadjadj-Aoul, Yassine
    Taleb, Tarik
    IEEE NETWORK, 2012, 26 (06): : 54 - 60
  • [22] Machine-to-Machine: Possible Applications in Industrial Networks
    Potter, C. H.
    Hancke, G. P.
    Silva, B. J.
    2013 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2013, : 1321 - 1326
  • [23] Machine-to-Machine Communications and Security Solution in Cellular Systems
    Saedy, Mahdy
    Mojtahed, Vahideh
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2011, 3 (02) : 66 - 75
  • [24] Identifying Hybrid DDoS Attacks in Deterministic Machine-to-Machine Networks on a Per-Deterministic-Flow Basis
    Chen, Yen-Hung
    Lai, Yuan-Cheng
    Zhou, Kai-Zhong
    MICROMACHINES, 2021, 12 (09)
  • [25] Machine-to-machine
    Goodman Jr., Glenn W.
    Aviation Week and Space Technology (New York), 2006, 165 (12): : 40 - 44
  • [26] Optimal Routing Control in Disconnected Machine-to-Machine Networks
    Wu, Yahui
    Deng, Su
    Huang, Hongbin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [27] Cache Coherence in Machine-to-Machine Information Centric Networks
    Meddeb, Maroua
    Dhraief, Amine
    Belghith, Abdelfettah
    Monteil, Thierry
    Drira, Khalil
    40TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2015), 2015, : 430 - 433
  • [28] Spectrum Assignment Algorithm for Cognitive Machine-to-Machine Networks
    Rostami, Soheil
    Alabadi, Sajad
    Noori, Soheir
    Shihab, Hayder Ahmed
    Arshad, Kamran
    Rapajic, Predrag
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [29] Data Aggregation in Capillary Networks for Machine-to-Machine Communications
    Shariatmadari, Hamidreza
    Osti, Prajwal
    Iraji, Sassan
    Jantti, Riku
    2015 IEEE 26TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2015, : 2277 - 2282
  • [30] Performance of Overload Control in Machine-to-Machine Wireless Networks
    El Tanab, Manal
    Hamouda, Walaa
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,