ABSTRACT
With the development of IoT, IoT devices are deployed to numerous critical infrastructures, and their security has received wide attention. Using a device fingerprint to identify the device is the key step to improve security. Device fingerprint can be obtained via network scanning, which has a huge cost and may lead to network interference. To improve it, we propose an incremental device scanning start time prediction scheme. We first define the problems of the device scanning and introduce the realization of the scheme in detail. Finally, experimental results show the effectiveness of the scheme.
- S. Li, L. Da Xu, S. Zhao. ``5G Internet of Things: A survey``[J], Journal of Industrial Information Integration, vol:10, pp. 1-9, 2018.Google ScholarCross Ref
- Y. Luo, H. Hu, Y. Wen, ``Transforming device fingerprinting for wireless security via online multitask metric learning``[J], IEEE Internet of Things Journal, 2019, vol:7(1), pp.208–219.Google Scholar
- P C. Van Oorschot, S W. Smith. ``The Internet of Things: Security Challenges``[C], IEEE Security and Privacy, 2019, vol.17(5), pp.7–9.Google ScholarCross Ref
- S Y. Park, S. Lim, D. Jeong, ``PUFSec: Device fingerprint-based security architecture for Internet of Things``[C], IEEE Conference on Computer Communications. IEEE, 2017, pp.1–9.Google ScholarCross Ref
- F. Liu, C. Shen, H. Liu, ``A flexible touch-based fingerprint acquisition device and a benchmark database using optical coherence tomography``[J], IEEE Transactions on Instrumentation and Measurement, 2020, vol.69(9), pp.6518–6529.Google ScholarCross Ref
- R L. Ren, Y. Gu, J. Cui, ``Web Features-based Recognition Specific-Type IoT Device in Cyberspace``[J], Communications Technology, 2017, vol.50(5), pp.1003–1009.Google Scholar
- N. Nikiforakis, A. Kapravelos, W. Joosen, ``Cookieless monster: Exploring the ecosystem of web-based device fingerprinting``[C], 2013 IEEE Symposium on Security and Privacy, 2013, pp.541–555.Google ScholarDigital Library
- J. Hua, H. Sun, Z. Shen, ``Accurate and efficient wireless device fingerprinting using channel state information``[C], IEEE Conference on Computer Communications, 2018, pp.1700–1708.Google ScholarDigital Library
- Y. Cheng, X. Ji, J. Zhang, ``Demicpu: Device fingerprinting with magnetic signals radiated by cpu``[C], Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, pp.1149–1170.Google ScholarDigital Library
- T M. Fernández-Caramés, P. Fraga-Lamas. ``Teaching and learning iot cybersecurity andvulnerability assessment with shodan through practical use cases``[J], Sensors, 2020, vol:20(11), pp.3048–3049.Google Scholar
- B. Zhao, S. Ji,W H. Lee, ``A Large-scale Empirical Study on theVulnerability of Deployed IoT Devices``[J], IEEE Transactions on Dependable and Secure Computing, 2020, pp.139–146.Google Scholar
- A L. Buczak,E. Guven. ``A survey of data mining and machine learning methods for cyber security intrusion detection``[J], IEEE Communications surveys and tutorials, 2015, vol. 18(2), pp. 1153–1176.Google Scholar
- Z. Durumeric, E. Wustrow, J A. Halderman. ``ZMap: fast internet-wide scanning and its security applications``[C], Proceedings of the 22nd USENIX conference on Security, Washington, DC, USA, August 14-16, 2013, pp. 605–620.Google Scholar
Index Terms
- A Practical Incremental Device Scanning Start-up Time Prediction Scheme for IoT
Recommendations
Landscape of IoT security
AbstractThe last two decades have experienced a steady rise in the production and deployment of sensing-and-connectivity-enabled electronic devices, replacing “regular” physical objects. The resulting Internet-of-Things (IoT) will soon become ...
Emerging Security Threats and Countermeasures in IoT
ASIA CCS '15: Proceedings of the 10th ACM Symposium on Information, Computer and Communications SecurityIoT (Internet of Things) diversifies the future Internet, and has drawn much attention. As more and more gadgets (i.e. Things) connected to the Internet, the huge amount of data exchanged has reached an unprecedented level. As sensitive and private ...
Comments