Internet of Things (IoT) and 4G/5G wireless networks have added huge number of devices and new services, where commercial-of-the-shelf (COTS) IoT devices have been deployed …
T Zheng, Z Sun, K Ren - IEEE INFOCOM 2019-IEEE …, 2019 - ieeexplore.ieee.org
Trusted identification is critical to secure IoT devices. However, the limited memory and computation power of low-end IoT devices prevent the direct usage of conventional …
M Safi, S Dadkhah, F Shoeleh, H Mahdikhani… - ACM Transactions on …, 2022 - dl.acm.org
The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet produces several operational and security challenges, such as monitoring, detecting, and …
RF fingerprinting is a key security mechanism that allows device identification by learning unchanging, hardware-based characteristics of the transmitter. In this article, we …
B Bezawada, M Bachani, J Peterson, H Shirazi… - Proceedings of the …, 2018 - dl.acm.org
The Internet-of-Things (IoT) has brought in new challenges in device identification--what the device is, and authentication--is the device the one it claims to be. Traditionally, the …
J Yu, A Hu, F Zhou, Y Xing, Y Yu, G Li… - … on Wireless and …, 2019 - ieeexplore.ieee.org
Radio Frequency Fingerprinting (RFF) is one of the promising passive authentication approaches for improving the security of the Internet of Things (IoT). However, with the …
L Babun, H Aksu, L Ryan, K Akkaya… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
In addition to traditional networking devices (eg, gateways, firewalls), current corporate and industrial networks integrate resource-limited Internet of Things (IoT) devices like smart …
Identifying IoT devices connected to a network has multiple security benefits, such as deployment of behavior-based anomaly detectors, automated vulnerability patching of …
J Kotak, Y Elovici - … Conference on Computational Intelligence in Security …, 2021 - Springer
The growing use of IoT devices in organizations has increased the number of attack vectors available to attackers due to the less secure nature of the devices. The widely adopted bring …