On the Security Threat of Abandoned and Zombie Cellular IoT Devices

G. Soós, P. Varga
{"title":"On the Security Threat of Abandoned and Zombie Cellular IoT Devices","authors":"G. Soós, P. Varga","doi":"10.1109/INDIN41052.2019.8972107","DOIUrl":null,"url":null,"abstract":"The number of network-connected devices increased exponentially at least during the last two decades. Although the robustness and long-term stability of these devices are relatively high, many of them outlast the purpose of their installation, sometimes even the life-cycle of its serving connection technology.The number of long-living, radio-transmitting, abandoned devices keeps increasing, especially with new deployments of Internet of Things (IoT) endpoints. Such equipment occupy radio resources in both licensed and public radio bands; moreover, they seize processing resources in networking equipment. This worrying situation should be taken care of. In the short term we can identify and ban such devices, but in the long term, proper, standardized life-cycle management should be put in place.This paper demonstrates the manifestation of this problem on 3GPP-based cellular networks (3G, 4G, and 5G), although similar issues are threatening for WiFi, Bluetooth, ZigBee and LoRaWAN technologies, as well. Furthermore, the paper presents methods to identify abandoned, non-operated or zombie devices, and proposes methods on refusing their access to the network, or – in the cellular case – forcing them into radio silence.","PeriodicalId":260220,"journal":{"name":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 17th International Conference on Industrial Informatics (INDIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIN41052.2019.8972107","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

The number of network-connected devices increased exponentially at least during the last two decades. Although the robustness and long-term stability of these devices are relatively high, many of them outlast the purpose of their installation, sometimes even the life-cycle of its serving connection technology.The number of long-living, radio-transmitting, abandoned devices keeps increasing, especially with new deployments of Internet of Things (IoT) endpoints. Such equipment occupy radio resources in both licensed and public radio bands; moreover, they seize processing resources in networking equipment. This worrying situation should be taken care of. In the short term we can identify and ban such devices, but in the long term, proper, standardized life-cycle management should be put in place.This paper demonstrates the manifestation of this problem on 3GPP-based cellular networks (3G, 4G, and 5G), although similar issues are threatening for WiFi, Bluetooth, ZigBee and LoRaWAN technologies, as well. Furthermore, the paper presents methods to identify abandoned, non-operated or zombie devices, and proposes methods on refusing their access to the network, or – in the cellular case – forcing them into radio silence.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
关于废弃和僵尸蜂窝物联网设备的安全威胁
至少在过去的二十年里,联网设备的数量呈指数级增长。尽管这些设备的稳健性和长期稳定性相对较高,但其中许多设备的寿命超过了其安装的目的,有时甚至超过了其服务连接技术的生命周期。长期使用的无线电传输废弃设备的数量不断增加,特别是随着物联网(IoT)端点的新部署。此类设备占用持牌和公共无线电频带的无线电资源;此外,它们还会抢占网络设备中的处理资源。这种令人担忧的情况应该加以处理。在短期内,我们可以识别和禁止这些设备,但从长远来看,应该实施适当的、标准化的生命周期管理。本文展示了这一问题在基于3gpp的蜂窝网络(3G、4G和5G)上的表现,尽管类似的问题也威胁着WiFi、蓝牙、ZigBee和LoRaWAN技术。此外,本文还提出了识别废弃、未操作或僵尸设备的方法,并提出了拒绝它们访问网络的方法,或者在蜂窝情况下,迫使它们进入无线电静默状态。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Digital Twin in Industry 4.0: Technologies, Applications and Challenges Using Multi-Agent Systems for Demand Response Aggregators: Analysis and Requirements for the Development Developing a Secure, Smart Microgrid Energy Market using Distributed Ledger Technologies An Intelligent Assistance System for Controlling Wind-Assisted Ship Propulsion Systems OPC UA Information Model and a Wrapper for IEC 61499 Runtimes
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1