期刊文献+

基于中间人的物联网终端探测和识别 被引量:2

Detection and Identification of IOT Terminal Based on Man-in-the-Middle
下载PDF
导出
摘要 物联网的开放性和多样性导致其容易受到各种恶意的攻击。为了有效维护特定区域物联网网络空间安全,针对物联网中典型的窄带物联网(Narrow Band Internet of Things,NB-IOT),提出了一种基于中间人的物联网终端探测和识别技术。通过参数优化配置以及网络伪装,建立物联网终端伪接入点,同时更新跟踪区识别码,使得物联网终端进行位置更新,最终提取出物联网终端的数量以及身份信息,为后续物联网空间大数据采集和非法终端的识别奠定基础。通过实验验证,该技术探测和识别概率较高,具有一定的应用前景。 The openness and diversity of the Internet of Things(IOT)makes it vulnerable to all kinds of malicious attacks.In order to maintain the security of IOT network space in a specific area effectively,aiming at the typical narrow band IOT(NB-IOT)in the IOT,detection and identification technology is proposed for IOT terminals based on man-in-the-middle.Through parameter optimization configuration and network camouflage,the disguised access point of the IOT terminal is established.And at the same time,the tracking area code is updated to make IOT terminals carry out updating their locations.Finally,the number of IOT terminals and their identity information are extracted,laying a foundation for big data collection and identification of illegal terminals subsequently in space of the IOT.Through experimental verification,the technology has a higher probability of detection and identification,and it has a certain application prospect.
作者 郭悦 王红军 GUO Yue;WANG Hongjun(College of Electronic Countermeasure,National University of Defense Technology,Hefei 230037,China)
出处 《电讯技术》 北大核心 2019年第10期1197-1202,共6页 Telecommunication Engineering
基金 国家自然科学基金资助项目(61273302)
关键词 窄带物联网 终端探测与识别 中间人 narrow band Internet of Things(NB-IOT) terminal detection and identification man-in-the-middle
  • 相关文献

参考文献6

二级参考文献46

  • 1朱大立.一种基于诱发技术的移动电话主动探测方案[J].移动通信,2006,30(1):107-109. 被引量:17
  • 2Medaglia C M, Serbanati A. An overview of privacy and security issues in the Internet of things [C]// Proceedings of the 20th Tyrrhenian Workshop on Digital Communications. Sardinia, Italy: Springer, 2010:389-395.
  • 3Leusse P, Periorellis P, Dimitrakos T. Self managed security cell, a security model for the Internet of Things and services [C]// Proceedings of the 1st International Conference on Advances in Future Internet. Athens/Glyfada, Greece: IEEE, 2009: 47-52.
  • 4Hamad F, Smalov L, James A. Energy-aware security in M commerce and the Internet of Things[J].IETE Technical review, 2009, 26(5) : 357 - 362.
  • 5Juels A. RFID security and privacy: A research survey [J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) :381 - 394.
  • 6Weber R H. Internet of Things New security and privacy challenges [J]. Computer Law & Security Reviezo, 2010, 26(1): 23-30.
  • 7CHEN Xiangqian, Makki K, Yen K, et al. Sensor network security: A survey [J]. IEEE communications Surveys Tutorials, 2009, 11(2) : 52 - 73.
  • 8Asrar I. Could sexy space be the birth of the sms botnet? [Z/OL]. (2010-10-16), http: //www. symantec, corn/connect/ blogs/could-sexy-space-be-birth-sms-botnet.
  • 9Karygiannis T, Eydt B, Barber B, et al. Guidance for securing radio frequency identification (RFID) systems [Z/OL]. (2010-10-16), http: //www. google, com. hk/url? sa = t&source- web&cd = 1&ved -- 0CCIQFjAA&url = http%3A%2F%2Fwww, rfidsecurityalliance, org%2Fdocs %2FDraft SP800-98%2520-%2520Guidance%2520for%2520 Securing%2520RFID. pdf&ret = j%q -- XSBlaN5D X 09Guidance% 20for% 20Securing%20Radio% 20Frequency %20Identification%20(RFID) %20Systems. &ei = vxhwTqbYLa 64iAfk2LCtCQ&usg = AFQjCNGoB6IJZ12KcFBUkWh_ 5PWGkOQSpg&cad- rjt.
  • 10Eschenauer L, Gligor V. A key management scheme for distributed sensor networks [C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. New York, USA: Association for Computing Machinery, 2002, 41 - 47.

共引文献142

同被引文献9

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部