Next Article in Journal
Modified Red Blue Vegetation Index for Chlorophyll Estimation and Yield Prediction of Maize from Visible Images Captured by UAV
Previous Article in Journal
Clothoid: An Integrated Hierarchical Framework for Autonomous Driving in a Dynamic Urban Environment
Previous Article in Special Issue
Security Aspects in Smart Meters: Analysis and Prevention
Article

Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks

Information Technologies Group, atlanTTic Research Center for Telecommunication Technologies, University of Vigo, 36310 Vigo, Spain
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Sensors 2020, 20(18), 5054; https://doi.org/10.3390/s20185054
Received: 8 August 2020 / Revised: 27 August 2020 / Accepted: 30 August 2020 / Published: 5 September 2020
(This article belongs to the Special Issue RFID and NFC in Secure IoT Scenarios and Applications)
The unstoppable adoption of the Internet of Things (IoT) is driven by the deployment of new services that require continuous capture of information from huge populations of sensors, or actuating over a myriad of “smart” objects. Accordingly, next generation networks are being designed to support such massive numbers of devices and connections. For example, the 3rd Generation Partnership Project (3GPP) is designing the different 5G releases specifically with IoT in mind. Nevertheless, from a security perspective this scenario is a potential nightmare: the attack surface becomes wider and many IoT nodes do not have enough resources to support advanced security protocols. In fact, security is rarely a priority in their design. Thus, including network-level mechanisms for preventing attacks from malware-infected IoT devices is mandatory to avert further damage. In this paper, we propose a novel Software-Defined Networking (SDN)-based architecture to identify suspicious nodes in 4G or 5G networks and redirect their traffic to a secondary network slice where traffic is analyzed in depth before allowing it reaching its destination. The architecture can be easily integrated in any existing deployment due to its interoperability. By following this approach, we can detect potential threats at an early stage and limit the damage by Distributed Denial of Service (DDoS) attacks originated in IoT devices. View Full-Text
Keywords: internet of things; 5G; network slicing; malware; denial of service internet of things; 5G; network slicing; malware; denial of service
Show Figures

Figure 1

MDPI and ACS Style

Candal-Ventureira, D.; Fondo-Ferreiro, P.; Gil-Castiñeira, F.; González-Castaño, F.J. Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks. Sensors 2020, 20, 5054. https://doi.org/10.3390/s20185054

AMA Style

Candal-Ventureira D, Fondo-Ferreiro P, Gil-Castiñeira F, González-Castaño FJ. Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks. Sensors. 2020; 20(18):5054. https://doi.org/10.3390/s20185054

Chicago/Turabian Style

Candal-Ventureira, David, Pablo Fondo-Ferreiro, Felipe Gil-Castiñeira, and Francisco J. González-Castaño. 2020. "Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks" Sensors 20, no. 18: 5054. https://doi.org/10.3390/s20185054

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop