2020
DOI: 10.3390/s20185054
|View full text |Cite
|
Sign up to set email alerts
|

Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks

Abstract: The unstoppable adoption of the Internet of Things (IoT) is driven by the deployment of new services that require continuous capture of information from huge populations of sensors, or actuating over a myriad of “smart” objects. Accordingly, next generation networks are being designed to support such massive numbers of devices and connections. For example, the 3rd Generation Partnership Project (3GPP) is designing the different 5G releases specifically with IoT in mind. Nevertheless, from a security perspectiv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 35 publications
1
1
0
Order By: Relevance
“…This includes both the elapsed time for executing the UPF allocation algorithms and also the times required for deploying the UPFs at the target locations and reconfiguring the underlying SDN network for steering the traffic of each user to the closest UPF. Using our proposed mechanism in [11], the times required for deploying a lightweight UPF and reconfiguring the SDN network are about 900 ms and 40 ms, respectively [51]. This previous result establishes a lower bound of 1 s on the duration of the time slot.…”
Section: Proposed Solutionsupporting
confidence: 61%
“…This includes both the elapsed time for executing the UPF allocation algorithms and also the times required for deploying the UPFs at the target locations and reconfiguring the underlying SDN network for steering the traffic of each user to the closest UPF. Using our proposed mechanism in [11], the times required for deploying a lightweight UPF and reconfiguring the SDN network are about 900 ms and 40 ms, respectively [51]. This previous result establishes a lower bound of 1 s on the duration of the time slot.…”
Section: Proposed Solutionsupporting
confidence: 61%
“…In the article [24] a framework capable of detecting IoT devices susceptible of being infected for 4G and 5G networks is presented. The attack mitigation is performed by placing the traffic of these devices in quarantine on a Network Slice (NS) dedicated to this task, where it will then be analysed in depth to classify it as a malicious attack.…”
Section: Related Workmentioning
confidence: 99%