DocumentCode :
694499
Title :
M2M security threat and security mechanism research
Author :
Xiao Nie ; Xiaobing Zhai
Author_Institution :
Guangdong Jidian Polytech., Guangzhou, China
fYear :
2013
fDate :
12-13 Oct. 2013
Firstpage :
906
Lastpage :
909
Abstract :
M2M is the core technology to implement the internet of things, and it is applied to collect, transmit and manage the business information in power industry, mining industry and transportation industry. This article firstly introduces the concept of the M2M and gives the network architecture of the M2M technology. Then it analyzes the security threats of M2M including false trigger indication, stealing the M2M devices, moving the M2M devices to unauthorized location and node compromise attack in the M2M terminal layer, and stealing or tampering the information or DOS attack in the M2M network layer, the threat of system reliability in the M2M application system. On the basis of these, the current security mechanisms are given including node location identifiers, detecting the node compromise attack, Two-Way Authentication and dual system.
Keywords :
Internet of Things; authorisation; computer network security; DOS attack; Internet of Things; M2M application system; M2M devices; M2M network layer; M2M technology; M2M terminal layer; business information collection; business information management; business information transmision; dual system; false trigger indication; information stealing; information tampering; mining industry; node compromise attack; node compromise attack detection; power industry; transportation industry; two-way authentication system; unauthorized location; Computer crime; Internet of Things; Monitoring; Reliability; Servers; Internet of Things; M2M; Security Threats;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Network Technology (ICCSNT), 2013 3rd International Conference on
Conference_Location :
Dalian
Type :
conf
DOI :
10.1109/ICCSNT.2013.6967252
Filename :
6967252
Link To Document :
بازگشت