{"title":"On the Security Threat of Abandoned and Zombie Cellular IoT Devices","authors":"G. Soós, P. Varga","doi":"10.1109/INDIN41052.2019.8972107","DOIUrl":null,"url":null,"abstract":"The number of network-connected devices increased exponentially at least during the last two decades. Although the robustness and long-term stability of these devices are relatively high, many of them outlast the purpose of their installation, sometimes even the life-cycle of its serving connection technology.The number of long-living, radio-transmitting, abandoned devices keeps increasing, especially with new deployments of Internet of Things (IoT) endpoints. Such equipment occupy radio resources in both licensed and public radio bands; moreover, they seize processing resources in networking equipment. This worrying situation should be taken care of. In the short term we can identify and ban such devices, but in the long term, proper, standardized life-cycle management should be put in place.This paper demonstrates the manifestation of this problem on 3GPP-based cellular networks (3G, 4G, and 5G), although similar issues are threatening for WiFi, Bluetooth, ZigBee and LoRaWAN technologies, as well. Furthermore, the paper presents methods to identify abandoned, non-operated or zombie devices, and proposes methods on refusing their access to the network, or – in the cellular case – forcing them into radio silence.","PeriodicalId":260220,"journal":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIN41052.2019.8972107","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
The number of network-connected devices increased exponentially at least during the last two decades. Although the robustness and long-term stability of these devices are relatively high, many of them outlast the purpose of their installation, sometimes even the life-cycle of its serving connection technology.The number of long-living, radio-transmitting, abandoned devices keeps increasing, especially with new deployments of Internet of Things (IoT) endpoints. Such equipment occupy radio resources in both licensed and public radio bands; moreover, they seize processing resources in networking equipment. This worrying situation should be taken care of. In the short term we can identify and ban such devices, but in the long term, proper, standardized life-cycle management should be put in place.This paper demonstrates the manifestation of this problem on 3GPP-based cellular networks (3G, 4G, and 5G), although similar issues are threatening for WiFi, Bluetooth, ZigBee and LoRaWAN technologies, as well. Furthermore, the paper presents methods to identify abandoned, non-operated or zombie devices, and proposes methods on refusing their access to the network, or – in the cellular case – forcing them into radio silence.