skip to main content
10.1145/3545801.3545815acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicbdcConference Proceedingsconference-collections
research-article

A Practical Incremental Device Scanning Start-up Time Prediction Scheme for IoT

Published:09 September 2022Publication History

ABSTRACT

With the development of IoT, IoT devices are deployed to numerous critical infrastructures, and their security has received wide attention. Using a device fingerprint to identify the device is the key step to improve security. Device fingerprint can be obtained via network scanning, which has a huge cost and may lead to network interference. To improve it, we propose an incremental device scanning start time prediction scheme. We first define the problems of the device scanning and introduce the realization of the scheme in detail. Finally, experimental results show the effectiveness of the scheme.

References

  1. S. Li, L. Da Xu, S. Zhao. ``5G Internet of Things: A survey``[J], Journal of Industrial Information Integration, vol:10, pp. 1-9, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  2. Y. Luo, H. Hu, Y. Wen, ``Transforming device fingerprinting for wireless security via online multitask metric learning``[J], IEEE Internet of Things Journal, 2019, vol:7(1), pp.208–219.Google ScholarGoogle Scholar
  3. P C. Van Oorschot, S W. Smith. ``The Internet of Things: Security Challenges``[C], IEEE Security and Privacy, 2019, vol.17(5), pp.7–9.Google ScholarGoogle ScholarCross RefCross Ref
  4. S Y. Park, S. Lim, D. Jeong, ``PUFSec: Device fingerprint-based security architecture for Internet of Things``[C], IEEE Conference on Computer Communications. IEEE, 2017, pp.1–9.Google ScholarGoogle ScholarCross RefCross Ref
  5. F. Liu, C. Shen, H. Liu, ``A flexible touch-based fingerprint acquisition device and a benchmark database using optical coherence tomography``[J], IEEE Transactions on Instrumentation and Measurement, 2020, vol.69(9), pp.6518–6529.Google ScholarGoogle ScholarCross RefCross Ref
  6. R L. Ren, Y. Gu, J. Cui, ``Web Features-based Recognition Specific-Type IoT Device in Cyberspace``[J], Communications Technology, 2017, vol.50(5), pp.1003–1009.Google ScholarGoogle Scholar
  7. N. Nikiforakis, A. Kapravelos, W. Joosen, ``Cookieless monster: Exploring the ecosystem of web-based device fingerprinting``[C], 2013 IEEE Symposium on Security and Privacy, 2013, pp.541–555.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Hua, H. Sun, Z. Shen, ``Accurate and efficient wireless device fingerprinting using channel state information``[C], IEEE Conference on Computer Communications, 2018, pp.1700–1708.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Y. Cheng, X. Ji, J. Zhang, ``Demicpu: Device fingerprinting with magnetic signals radiated by cpu``[C], Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, pp.1149–1170.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T M. Fernández-Caramés, P. Fraga-Lamas. ``Teaching and learning iot cybersecurity andvulnerability assessment with shodan through practical use cases``[J], Sensors, 2020, vol:20(11), pp.3048–3049.Google ScholarGoogle Scholar
  11. B. Zhao, S. Ji,W H. Lee, ``A Large-scale Empirical Study on theVulnerability of Deployed IoT Devices``[J], IEEE Transactions on Dependable and Secure Computing, 2020, pp.139–146.Google ScholarGoogle Scholar
  12. A L. Buczak,E. Guven. ``A survey of data mining and machine learning methods for cyber security intrusion detection``[J], IEEE Communications surveys and tutorials, 2015, vol. 18(2), pp. 1153–1176.Google ScholarGoogle Scholar
  13. Z. Durumeric, E. Wustrow, J A. Halderman. ``ZMap: fast internet-wide scanning and its security applications``[C], Proceedings of the 22nd USENIX conference on Security, Washington, DC, USA, August 14-16, 2013, pp. 605–620.Google ScholarGoogle Scholar

Index Terms

  1. A Practical Incremental Device Scanning Start-up Time Prediction Scheme for IoT

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICBDC '22: Proceedings of the 7th International Conference on Big Data and Computing
      May 2022
      143 pages
      ISBN:9781450396097
      DOI:10.1145/3545801

      Copyright © 2022 ACM

      © 2022 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 9 September 2022

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)16
      • Downloads (Last 6 weeks)5

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format