2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International 2019
DOI: 10.1109/trustcom/bigdatase.2019.00023
|View full text |Cite
|
Sign up to set email alerts
|

IoT Device Identification via Network-Flow Based Fingerprinting and Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(31 citation statements)
references
References 12 publications
0
31
0
Order By: Relevance
“…Table 4 provides a comparison of our approach with others. It shows that our brand and model identification accuracy can achieve 90.5% and 92.3% respectively only by top five protocol probes in the optimal multi-protocol probe sequence, superior to the firmware identification [15] and type identification [31,32]. Although our performance is less than the type identification of 95%, our identification fineness is far higher than type identification method.…”
Section: Value Iteration Algorithmmentioning
confidence: 80%
“…Table 4 provides a comparison of our approach with others. It shows that our brand and model identification accuracy can achieve 90.5% and 92.3% respectively only by top five protocol probes in the optimal multi-protocol probe sequence, superior to the firmware identification [15] and type identification [31,32]. Although our performance is less than the type identification of 95%, our identification fineness is far higher than type identification method.…”
Section: Value Iteration Algorithmmentioning
confidence: 80%
“…A multi-stage classification algorithm was developed based on the network activity, demonstrating its ability to identify particular IoT devices [ 24 ]. A device identification approach was proposed where packet sequences from high-level network-flow traffic data were analyzed using supervised ML techniques to extract distinct flow-based features to create device fingerprinting [ 25 ]. The proposed approach was able to automatically identify device types in the white list and the individual device instances in the IoT network.…”
Section: Literature Reviewmentioning
confidence: 99%
“…We employ the One-Vs-Rest classifier also called the One-Vs-All classifier, which is a multi-class classifier training one classifier per class. As a result, N classifiers will be created for N classes [ 25 ]. To achieve this, any (i.e., a sequence of packets) captured on the server will be labeled either as 1 or 0 in n profiles (n = number of devices).…”
Section: Enforcementmentioning
confidence: 99%
“…Also, it uses for solving everyday problems, in industry and agriculture, in VANET networks, and flying sensor networks. Hamad (Hamad et al, 2019) illustrated that the IoT system identifies challenges by processing a series of network packets. the proposed system tracks the network flow data and extracts specific features to establish a fingerprint for each device in the network.…”
Section: Introductionmentioning
confidence: 99%
“…The proposed approach can automatically recognize white-listed device types and unknown devices with abnormal behavior connecting to the network by constraining and enforcing privileges rules for IoT device communications. They achieve 90.3% accuracy, as unknown devices are detected with limited overhead (Hamad et al, 2019). Jo and Kim (Jo and Kim, 2019) adopted an architecture for integrating augmented reality (AR) technology with the Internet of Things for a better shopping experience.…”
Section: Introductionmentioning
confidence: 99%