• DocumentCode
    694499
  • Title

    M2M security threat and security mechanism research

  • Author

    Xiao Nie ; Xiaobing Zhai

  • Author_Institution
    Guangdong Jidian Polytech., Guangzhou, China
  • fYear
    2013
  • fDate
    12-13 Oct. 2013
  • Firstpage
    906
  • Lastpage
    909
  • Abstract
    M2M is the core technology to implement the internet of things, and it is applied to collect, transmit and manage the business information in power industry, mining industry and transportation industry. This article firstly introduces the concept of the M2M and gives the network architecture of the M2M technology. Then it analyzes the security threats of M2M including false trigger indication, stealing the M2M devices, moving the M2M devices to unauthorized location and node compromise attack in the M2M terminal layer, and stealing or tampering the information or DOS attack in the M2M network layer, the threat of system reliability in the M2M application system. On the basis of these, the current security mechanisms are given including node location identifiers, detecting the node compromise attack, Two-Way Authentication and dual system.
  • Keywords
    Internet of Things; authorisation; computer network security; DOS attack; Internet of Things; M2M application system; M2M devices; M2M network layer; M2M technology; M2M terminal layer; business information collection; business information management; business information transmision; dual system; false trigger indication; information stealing; information tampering; mining industry; node compromise attack; node compromise attack detection; power industry; transportation industry; two-way authentication system; unauthorized location; Computer crime; Internet of Things; Monitoring; Reliability; Servers; Internet of Things; M2M; Security Threats;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Science and Network Technology (ICCSNT), 2013 3rd International Conference on
  • Conference_Location
    Dalian
  • Type

    conf

  • DOI
    10.1109/ICCSNT.2013.6967252
  • Filename
    6967252