2022
DOI: 10.18494/sam3901
|View full text |Cite
|
Sign up to set email alerts
|

Function-level Access Control System for Home IoT Devices

Abstract: In this paper, we propose a framework called an IoT activity tracker to ensure the safe and secure use of IoT devices around the home. The IoT activity tracker identifies the types of IoT devices and their triggering functions by traffic pattern analysis, and provides information about which IoT devices are running in the home. Also, it allows users to temporarily or permanently block the network of a particular IoT device from their smartphone if the user notices unauthorized activity of the IoT device. Furth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…Hence, as also shown in Figures 11 and 12, we can conclude that two-stage clustering can more appropriately extract features that are important to describe IoT traffic, and the time series representations based on two-stage clustering can express not only whether but also whatever an IoT device communicates. Table 4 shows a comparison of the identification performance outcomes between the proposed method and the conventional methods [6][7][8][9][10][11][12][13][14]. Although it is difficult to strictly compare among them due to the lack of detailed data, the identification accuracy of the proposed method is higher than some of the conventional methods [6][7][8] but slightly lower than the others [9][10][11][12][13][14].…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…Hence, as also shown in Figures 11 and 12, we can conclude that two-stage clustering can more appropriately extract features that are important to describe IoT traffic, and the time series representations based on two-stage clustering can express not only whether but also whatever an IoT device communicates. Table 4 shows a comparison of the identification performance outcomes between the proposed method and the conventional methods [6][7][8][9][10][11][12][13][14]. Although it is difficult to strictly compare among them due to the lack of detailed data, the identification accuracy of the proposed method is higher than some of the conventional methods [6][7][8] but slightly lower than the others [9][10][11][12][13][14].…”
Section: Resultsmentioning
confidence: 99%
“…Table 4 shows a comparison of the identification performance outcomes between the proposed method and the conventional methods [6][7][8][9][10][11][12][13][14]. Although it is difficult to strictly compare among them due to the lack of detailed data, the identification accuracy of the proposed method is higher than some of the conventional methods [6][7][8] but slightly lower than the others [9][10][11][12][13][14]. This could be because some traffic features were lost due to feature extraction by clustering.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations