2022
DOI: 10.1145/3539736
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on IoT Profiling, Fingerprinting, and Identification

Abstract: The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet produces several operational and security challenges, such as monitoring, detecting, and recognizing millions of interconnected IoT devices. Network and system administrators must correctly identify which devices are functional, need security updates, or are vulnerable to specific attacks. IoT profiling is an emerging technique to identify and validate the connected devices’ specific behaviour and isolate the suspecte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 27 publications
(6 citation statements)
references
References 77 publications
0
2
0
Order By: Relevance
“…The surveys in [18,19] show that supervised, unsupervised, semi-supervised, and deep-learning approaches could all be used for device identification. Supervised ML is used in [10,11,[20][21][22].…”
Section: Related Workmentioning
confidence: 99%
“…The surveys in [18,19] show that supervised, unsupervised, semi-supervised, and deep-learning approaches could all be used for device identification. Supervised ML is used in [10,11,[20][21][22].…”
Section: Related Workmentioning
confidence: 99%
“…In addition to native security features, four main technical solutions can be employed separately or conjointly to prevent the attacks: cryptography [ 41 , 42 ]; Secure Element (SE) [ 43 ]; Intrusion Detection System (IDS) [ 44 , 45 ]; and multilayer signature [ 46 ].…”
Section: Additional Technical Solutionsmentioning
confidence: 99%
“…The ensuing output, characterized by heightened precision and accuracy, fuels the system's operational functionalities. To culminate this intricate symphony, the processed data is deftly uploaded to a cloud-based platform, rendering it readily accessible through a dedicated mobile application (Sa et al, 2022). The overarching aim is to empower farmers with the tools and insights required to protect their crops from the capricious vicissitudes of unfavorable weather conditions (Mahony & End eld, 2018).…”
Section: Role Of Machine Learning and Deep Learningmentioning
confidence: 99%