An enhanced behavioral fingerprinting approach for the Internet of Things

被引:1
作者
Aramini, Alberico [1 ]
Arazzi, Marco [1 ]
Facchinetti, Tullio [1 ]
Ngankem, Laurence S. Q. N. [1 ]
Nocera, Antonino [1 ]
机构
[1] Univ Pavia, Dept Elect Comp & Biomed Engn, Via A Ferrata 5, I-27100 Pavia, Italy
来源
18TH IEEE INTERNATIONAL WORKSHOP ON FACTORY COMMUNICATION SYSTEMS 2022 (WFCS 2022) | 2022年
关键词
Internet of Things; Security; Behavioral Finger-printing;
D O I
10.1109/WFCS53837.2022.9779182
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the growing diffusion of the Internet of Things (IoT) technology across most of the aspects of people daily lives, security concerns have become critical to ensure the exploitation of advantages introduced by this technology. This is even more true in the context of Industry 4.0, for which the IoT is becoming an important driver for automation. The detection of anomalies in IoT systems to ensure the capability of such systems to tolerate attacks to single devices is a crucial aspect. Behavioral fingerprinting is a recent and promising security solution in this context, which still requires research efforts to embrace new challenges in such a complex environment. Existing solutions focus mostly on modeling the behavior of IoT devices by analyzing the information extracted from the header of exchanged networking packets. However, in many application contexts, also attacks on the content of the packets can lead to disruptive results. Our proposal focus on these approaches by addressing a fully distributed scenario in which computation is directly handled by IoT devices, also through delegation, and describes a novel behavioral fingerprinting approach based on features suitably engineered from packet payloads. The effectiveness of our proposed method is assessed by both simulated and experimental results.
引用
收藏
页码:135 / 142
页数:8
相关论文
共 32 条
[11]   H2O: Secure Interactions in IoT via Behavioral Fingerprinting [J].
Ferretti, Marco ;
Nicolazzo, Serena ;
Nocera, Antonino .
FUTURE INTERNET, 2021, 13 (05)
[12]  
Goeschel K, 2016, IEEE SOUTHEASTCON
[13]   ComplexIoT: Behavior-Based Trust For IoT Networks [J].
Haefner, Kyle ;
Ray, Indrakshi .
2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, :56-65
[14]   IoT Device Identification via Network-Flow Based Fingerprinting and Learning [J].
Hamad, Salma Abdalla ;
Zhang, Wei Emma ;
Sheng, Quan Z. ;
Nepal, Surya .
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, :103-111
[15]   A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures [J].
Hassija, Vikas ;
Chamola, Vinay ;
Saxena, Vikas ;
Jain, Divyansh ;
Goyal, Pranav ;
Sikdar, Biplab .
IEEE ACCESS, 2019, 7 :82721-82743
[16]   Resource Management in Fog/Edge Computing: A Survey on Architectures, Infrastructure, and Algorithms [J].
Hong, Cheol-Ho ;
Varghese, Blesson .
ACM COMPUTING SURVEYS, 2019, 52 (05)
[17]   Industry 4.0 [J].
Lasi, Heiner ;
Kemper, Hans-Georg ;
Fettke, Peter ;
Feld, Thomas ;
Hoffmann, Michael .
BUSINESS & INFORMATION SYSTEMS ENGINEERING, 2014, 6 (04) :239-242
[18]   IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT [J].
Miettinen, Markus ;
Sadeghi, Ahmad-Reza ;
Marchal, Samuel ;
Asokan, N. ;
Hafeez, Ibbad ;
Tarkoma, Sasu .
2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2017), 2017, :2177-2184
[19]   Multimedia Internet of Things: A Comprehensive Survey [J].
Nauman, Ali ;
Qadri, Yazdan Ahmad ;
Amjad, Muhammad ;
Bin Zikria, Yousaf ;
Afzal, Muhammad Khalil ;
Kim, Sung Won .
IEEE ACCESS, 2020, 8 :8202-8250
[20]   HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices [J].
OConnor, T. J. ;
Mohamed, Reham ;
Miettinen, Markus ;
Enck, William ;
Reaves, Bradley ;
Sadeghi, Ahmad-Reza .
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, :128-139