Εμφάνιση απλής εγγραφής

dc.creatorBroustis, I.en
dc.creatorSundaram, G. S.en
dc.creatorViswanathan, H.en
dc.date.accessioned2015-11-23T10:24:14Z
dc.date.available2015-11-23T10:24:14Z
dc.date.issued2012
dc.identifier10.1002/bltj.21527
dc.identifier.issn1089-7089
dc.identifier.urihttp://hdl.handle.net/11615/26468
dc.description.abstractMachine-to-machine (M2M) communications are increasingly popular over cellular networks, due to their unlimited potential and the low cost of deployment. As a result, M2M infrastructures are attractive targets to attackers. For instance, hackers may use a water meter to browse the web over a mobile network. Given the expected tremendous growth of the M2M market within the next few years, such attacks can have a devastating impact on the economics of mobile broadband. However, prior studies in the area of fraud have not considered the inherent properties of cellular M2M deployments. In this paper, we demonstrate how hijacking attacks apply to contemporary networks, and provide a solution for mitigating them. In particular, we propose a novel framework for detecting and preventing M2M device hijacking. Our solution is novel in two main ways: 1) It is network centric, and 2) it completely avoids the use of overhead-intensive cryptographic functions. (c) 2012 Alcatel-Lucent.en
dc.sourceBell Labs Technical Journalen
dc.source.uri<Go to ISI>://WOS:000304988600010
dc.subjectSECURITYen
dc.subjectComputer Science, Information Systemsen
dc.subjectEngineering, Electrical &en
dc.subjectElectronicen
dc.subjectTelecommunicationsen
dc.titleDetecting and Preventing Machine-to-Machine Hijacking Attacks in Cellular Networksen
dc.typejournalArticleen


Αρχεία σε αυτό το τεκμήριο

ΑρχείαΜέγεθοςΤύποςΠροβολή

Δεν υπάρχουν αρχεία που να σχετίζονται με αυτό το τεκμήριο.

Αυτό το τεκμήριο εμφανίζεται στις ακόλουθες συλλογές

Εμφάνιση απλής εγγραφής