Title
Detecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networks
Abstract
Machine-to-machine (M2M) communications are increasingly popular over cellular networks, due to their unlimited potential and the low cost of deployment. As a result, M2M infrastructures are attractive targets to attackers. For instance, hackers may use a water meter to browse the web over a mobile network. Given the expected tremendous growth of the M2M market within the next few years, such attacks can have a devastating impact on the economics of mobile broadband. However, prior studies in the area of fraud have not considered the inherent properties of cellular M2M deployments. In this paper, we demonstrate how hijacking attacks apply to contemporary networks, and provide a solution for mitigating them. In particular, we propose a novel framework for detecting and preventing M2M device hijacking. Our solution is novel in two main ways: 1) It is network centric, and 2) it completely avoids the use of overhead-intensive cryptographic functions. © 2012 Alcatel-Lucent. © 2012 Wiley Periodicals, Inc.
Year
DOI
Venue
2012
10.1002/bltj.21527
Bell Labs Technical Journal
Field
DocType
Volume
Machine to machine,Software deployment,Computer security,Cryptography,Computer network,Hacker,Metre (music),Cellular network,Engineering,Mobile broadband
Journal
17
Issue
ISSN
Citations 
1
1089-7089
0
PageRank 
References 
Authors
0.34
8
3
Name
Order
Citations
PageRank
Ioannis Broustis142529.27
Ganapathy S. Sundaram28910.70
Harish Viswanathan347768.86