Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks

被引:0
|
作者
Broustis, Ioannis [1 ,2 ,3 ,4 ,5 ,6 ]
Sundaram, Ganapathy S.
Viswanathan, Harish [7 ]
机构
[1] Alcatel Lucent, Murray Hill, NJ USA
[2] Univ Calif Riverside, Riverside, CA 92521 USA
[3] Ctr Res & Technol Hellas, Thessaloniki, Greece
[4] Univ Thessaly, Volos, Greece
[5] Intel Res, Cambridge, England
[6] Nokia R&D, Boston, MA USA
[7] Alcatel Lucent Bell Labs CTO Org, CTO Advisory Grp, Murray Hill, NJ USA
关键词
SECURITY;
D O I
10.1002/bltj.21527
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Machine-to-machine (M2M) communications are increasingly popular over cellular networks, due to their unlimited potential and the low cost of deployment. As a result, M2M infrastructures are attractive targets to attackers. For instance, hackers may use a water meter to browse the web over a mobile network. Given the expected tremendous growth of the M2M market within the next few years, such attacks can have a devastating impact on the economics of mobile broadband. However, prior studies in the area of fraud have not considered the inherent properties of cellular M2M deployments. In this paper, we demonstrate how hijacking attacks apply to contemporary networks, and provide a solution for mitigating them. In particular, we propose a novel framework for detecting and preventing M2M device hijacking. Our solution is novel in two main ways: 1) It is network centric, and 2) it completely avoids the use of overhead-intensive cryptographic functions. (c) 2012 Alcatel-Lucent.
引用
收藏
页码:125 / 140
页数:16
相关论文
共 50 条
  • [31] Key establishment and management for Secure Cellular Machine-to-Machine Communication
    Doh, Inshil
    Lim, Jiyoung
    Li, Shi
    Chae, Kijoon
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 579 - 584
  • [32] Model for autonomous agents in machine-to-machine navigation networks
    Ali, Anum
    Shah, Ghalib
    Aslam, Muhammad
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (04)
  • [33] Distributed Massive Wireless Access for Cellular Machine-to-Machine Communication
    Bayat, Siavash
    Li, Yonghui
    Han, Zhu
    Dohler, Mischa
    Vucetic, Branka
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 2767 - 2772
  • [34] Cellular machine-to-machine module vendors face a difficult market
    不详
    MICROWAVES & RF, 2007, 46 (06) : 22 - 22
  • [35] FEASIBILITY OF COGNITIVE MACHINE-TO-MACHINE COMMUNICATION USING CELLULAR BANDS
    Lee, Hyun-Kwan
    Kim, Dong Min
    Hwang, Young Ju
    Yu, Seung Min
    Kim, Seong-Lyun
    IEEE WIRELESS COMMUNICATIONS, 2013, 20 (02) : 97 - 103
  • [36] An Efficient Clustering Design for Cellular Based Machine-to-Machine Communications
    El-Feshawy, Somaya A.
    Saad, Waleed
    Shokair, Mona
    Dessouky, Mouad I.
    2018 35TH NATIONAL RADIO SCIENCE CONFERENCE (NRSC), 2018, : 177 - 186
  • [37] Cooperative Coverage Extension in Heterogeneous Machine-to-Machine Networks
    Cocco, G.
    Ibars, C.
    Alagha, N.
    2012 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2012, : 1693 - 1699
  • [38] Attack Detection and Distributed Forensics in Machine-to-Machine Networks
    Wang, Kun
    Du, Miao
    Sun, Yanfei
    Vinel, Alexey
    Zhang, Yan
    IEEE NETWORK, 2016, 30 (06): : 49 - 55
  • [39] Effective Categorization of Machine-To-Machine Services Applied In Cellular Network
    Liu, Rongduo
    Wu, Wei
    Yeng, Dacheng
    MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 1972 - +
  • [40] Random Access and Virtual Resource Allocation in Software-Defined Cellular Networks With Machine-to-Machine Communications
    Li, Meng
    Yu, F. Richard
    Si, Pengbo
    Sun, Enchang
    Zhang, Yanhua
    Yao, Haipeng
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (07) : 6399 - 6414