ComplexIoT: Behavior-based trust for IoT networks

K Haefner, I Ray - 2019 First IEEE International Conference on …, 2019 - ieeexplore.ieee.org
This work takes a novel approach to classifying the behavior of devices by exploiting the
single-purpose nature of IoT devices and analyzing the complexity and variance of their …

IoT behavioral monitoring via network traffic analysis

A Sivanathan - arXiv preprint arXiv:2001.10632, 2020 - arxiv.org
Smart homes, enterprises, and cities are increasingly being equipped with a plethora of
Internet of Things (IoT), ranging from smart-lights to security cameras. While IoT networks …

Revisiting iot device identification

R Kolcun, DA Popescu, V Safronov, P Yadav… - arXiv preprint arXiv …, 2021 - arxiv.org
Internet-of-Things (IoT) devices are known to be the source of many security problems, and
as such, they would greatly benefit from automated management. This requires robustly …

Combining device Behavioral models and building schema for cybersecurity of large-scale IoT infrastructure

A Hamza, HH Gharakheili, T Pering… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
Modern buildings are increasingly getting connected by adopting a range of IoT devices and
applications from video surveillance and lighting to people counting and access control. It …

Behavioural monitoring and security profiling in the internet of things (IoT)

M Safi, B Kaur, S Dadkhah, F Shoeleh… - 2021 IEEE 23rd Int …, 2021 - ieeexplore.ieee.org
In recent years the number of IoT devices in businesses has significantly increased, which
creates an undeniable challenge for network administrators and industries to identify and …

Inferring iot device types from network behavior using unsupervised clustering

A Sivanathan, HH Gharakheili… - 2019 IEEE 44th …, 2019 - ieeexplore.ieee.org
The Internet-of-Things (IoT) is increasingly becoming a major challenge for network
administrators to monitor and manage connected devices and sensors, ranging from smart …

Progressive monitoring of iot networks using sdn and cost-effective traffic signatures

A Pashamokhtari, HH Gharakheili… - 2020 Workshop on …, 2020 - ieeexplore.ieee.org
IoT networks continue to expand in various domains, from smart homes and campuses to
smart cities and critical infrastructures. It has been shown that IoT devices typically lack …

The case for retraining of ML models for IoT device identification at the edge

R Kolcun, DA Popescu, V Safronov, P Yadav… - arXiv preprint arXiv …, 2020 - arxiv.org
Internet-of-Things (IoT) devices are known to be the source of many security problems, and
as such they would greatly benefit from automated management. This requires robustly …

IoT-KEEPER: Securing IoT communications in edge networks

I Hafeez, M Antikainen, AY Ding, S Tarkoma - arXiv preprint arXiv …, 2018 - arxiv.org
The increased popularity of IoT devices have made them lucrative targets for attackers. Due
to insecure product development practices, these devices are often vulnerable even to very …

Machine learning empowered trust evaluation method for IoT devices

W Ma, X Wang, M Hu, Q Zhou - IEEE access, 2021 - ieeexplore.ieee.org
With the rapid development of the Internet of Things (IoT), malicious or affected IoT devices
have imposed enormous threats on the IoT environment. To address this issue, trust has …