2018
DOI: 10.1007/978-3-030-05345-1_36
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Devices of the Internet of Things Using Machine Learning on Clock Characteristics

Abstract: The number of devices of the so-called Internet of Things (IoT) is heavily increasing. One of the main challenges for operators of large networks is to autonomously and automatically identify any IoT device within the network for the sake of computer security and, subsequently, being able to better protect and secure those. In this paper, we propose a novel approach to identify IoT devices based on the unchangeable IoT hardware setup through device specific clock behavior. One feature we use is the unavoidable… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…Timestamp -The timestamp component in the hash table denotes the specific date and time that the data or message arrived at the device. The timestamp consists of the date and time components that records the actual date and time the message or data arrived at the at the centralized node [27] Whirlpool -The message digest of the data to be communicated is produced using the whirlpool cryptographic hash function. The message digest is then stored in the whirlpool field, for each data.…”
Section: Methodsmentioning
confidence: 99%
“…Timestamp -The timestamp component in the hash table denotes the specific date and time that the data or message arrived at the device. The timestamp consists of the date and time components that records the actual date and time the message or data arrived at the at the centralized node [27] Whirlpool -The message digest of the data to be communicated is produced using the whirlpool cryptographic hash function. The message digest is then stored in the whirlpool field, for each data.…”
Section: Methodsmentioning
confidence: 99%
“…Computer security research progressed in systematically evaluating the security of IoT devices. Recent work demonstrated that IoT devices can be categorized and identified in a network through machine learning algorithms [32]. This is a first crucial step on the way to large-scale, automated risk evaluations.…”
Section: Risk Assessment and Presentationmentioning
confidence: 99%
“…To prevent attackers from tricking SAFER by taking over and mimicking a secure device, the device identification component launches two different scan mechanisms to validate the identified device category, manufacturer, model, and possibly firmware version of queried devices. One identification mechanism we use from Oser et al [32] is based on TCP timestamps [5], which relies on the hardware of embedded devices. The second mechanism uses characteristic web patterns of a device's web-page to identify the device in question.…”
Section: General Architecturementioning
confidence: 99%
See 2 more Smart Citations