IEEE INFOCOM 2020 - IEEE Conference on Computer Communications 2020
DOI: 10.1109/infocom41043.2020.9155459
|View full text |Cite
|
Sign up to set email alerts
|

IoTGaze: IoT Security Enforcement via Wireless Context Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4
2

Relationship

2
8

Authors

Journals

citations
Cited by 42 publications
(32 citation statements)
references
References 20 publications
0
32
0
Order By: Relevance
“…HoMonit [44], another work of deterministically detecting IoT device activity, monitors encrypted wireless traffic of some home apps and infers smart app activities based on the deterministic finite automaton (DFA) model of smart app behavior and wireless side-channel analysis. IoTGaze [12] also builds up a system to identify IoT device activities using the sniffed wireless traffic. Inspired and motivated by these studies on identifying IoT device types and/or activities, our proposed IoTAthena system is focused on understanding traffic signatures of IoT device activities and accurately extracting device activities from IoT network traffic.…”
Section: Related Workmentioning
confidence: 99%
“…HoMonit [44], another work of deterministically detecting IoT device activity, monitors encrypted wireless traffic of some home apps and infers smart app activities based on the deterministic finite automaton (DFA) model of smart app behavior and wireless side-channel analysis. IoTGaze [12] also builds up a system to identify IoT device activities using the sniffed wireless traffic. Inspired and motivated by these studies on identifying IoT device types and/or activities, our proposed IoTAthena system is focused on understanding traffic signatures of IoT device activities and accurately extracting device activities from IoT network traffic.…”
Section: Related Workmentioning
confidence: 99%
“…Besides, the attacker can physically access outside, unprotected IoT devices, such as a doorbell or outdoor surveillance cameras. We also assume the attacker is able to extract IoT app semantics because he can install sniffers and infer event type from the sniffed packets [24]. We treat the remote IoT cloud as trustworthy and do not consider the compromise of the cloud itself.…”
Section: Threat Modelmentioning
confidence: 99%
“…Using wireless communications, (Gu et al, 2020) introduced the "wireless context" concept that represented the actual packets workflow of IoT apps. By applying the machine learning model, system anomalies (e.g., App misbehavior, Event spoofing, Over-privilege, Device failure, and Hidden vulnerabilities) can be detected by comparing the user IoT context against the wireless context.…”
Section: Multiple User Iot Apps Conflicts Detectionmentioning
confidence: 99%