Proceedings of the ACM Turing Celebration Conference - China 2019
DOI: 10.1145/3321408.3326671
|View full text |Cite
|
Sign up to set email alerts
|

IoT device fingerprinting for relieving pressure in the access control

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(21 citation statements)
references
References 21 publications
0
21
0
Order By: Relevance
“…For a new data packet from the STA, the framework first extracts the CSI fingerprint C D from the packet and then normalizes it using equation (5). The normalized CSI fingerprint S D is sent to the local authenticator, and the authentication algorithm is shown in Algorithm 2, where v is the input of θ 0 , S ðiÞ D ′ is the output of θ i and w ′ is the output of θ 0 .…”
Section: Packet-level Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…For a new data packet from the STA, the framework first extracts the CSI fingerprint C D from the packet and then normalizes it using equation (5). The normalized CSI fingerprint S D is sent to the local authenticator, and the authentication algorithm is shown in Algorithm 2, where v is the input of θ 0 , S ðiÞ D ′ is the output of θ i and w ′ is the output of θ 0 .…”
Section: Packet-level Authenticationmentioning
confidence: 99%
“…Attackers can obtain the identity information of a valid device through wireless sniffing and then use this information to disguise themselves as legitimate devices [2,3]. Attackers can steal confidential data or attack the internal websites after getting authorization [4,5], or they can control other devices by sending spurious instructions [6]. Due to the widespread use of Wi-Fi networks in a range of critical services such as financial transactions and business management, attackers based on the identity of Wi-Fi networks can cause damage to public and private property and disrupt social order.…”
Section: Introductionmentioning
confidence: 99%
“…Fingerprinting techniques [5], [6], [19], [24]- [26], [30], [31], [33] have been proposed to identify compromised or newly connected IoT devices in a network. In [25], IoT devices are identified using signatures constructed with 23 features (e.g., packet size, source port) extracted from the network traffic flows and vulnerable devices are isolated thanks to a Software-Defined Networking mitigation solution.…”
Section: Related Workmentioning
confidence: 99%
“…In [25], IoT devices are identified using signatures constructed with 23 features (e.g., packet size, source port) extracted from the network traffic flows and vulnerable devices are isolated thanks to a Software-Defined Networking mitigation solution. Similarly in [30], the authors construct signatures from features and statistics (e.g., protocols present, average ip header and payload length) also extracted from the network flows and used a multi-classification algorithm based on a support vector machine. In [5], the authors propose behavioral features which are less impacted by header spoofing by concatenating a feature set over a sequence of packets.…”
Section: Related Workmentioning
confidence: 99%
“…Behavior modeling collects, processes, profiles, and models the patterns of behavior data. Specific behavior modeling methods were applied to various IoT management tasks, including device identification [21] and intrusion detection [22], and access control [23]. Most of the existing work on the analysis of IoT devices' behavior are inadequate to model the complex behavior of heterogeneous IoT devices from the resource demand perspective.…”
Section: Related Workmentioning
confidence: 99%