2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) 2017
DOI: 10.1109/icdcs.2017.283
|View full text |Cite
|
Sign up to set email alerts
|

IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT

Abstract: With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing networks where the presence of such vulnerable devices is given, requires a brownfield approach: applying necessary… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
400
0
3

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
3
1

Relationship

2
8

Authors

Journals

citations
Cited by 393 publications
(403 citation statements)
references
References 25 publications
0
400
0
3
Order By: Relevance
“…The device type for their work is the enumeration of a specific device. Work in [8] is, however, limited to the formulation of a method to identify a given device, and does not provide a metric to determine how vulnerable a device is. Network attacks are modeled using attack graphs in [9].…”
Section: Related Workmentioning
confidence: 99%
“…The device type for their work is the enumeration of a specific device. Work in [8] is, however, limited to the formulation of a method to identify a given device, and does not provide a metric to determine how vulnerable a device is. Network attacks are modeled using attack graphs in [9].…”
Section: Related Workmentioning
confidence: 99%
“…The IoT SENTINEL proposed in [14] is designed to probe the WiFi and Ethernet traffic flows in an IoT network. The connected devices are identified by their MAC address.…”
Section: Related Workmentioning
confidence: 99%
“…intrusion detection [12], the identification of Android applications usage [2], IoT devices [7] or web crawlers [4]. Most proposals focus though on modeling communications made by a single host [5], [6], [13] i.e.…”
Section: Related Workmentioning
confidence: 99%