2020
DOI: 10.1007/978-3-030-49669-2_3
|View full text |Cite
|
Sign up to set email alerts
|

Proactively Extracting IoT Device Capabilities: An Application to Smart Homes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 18 publications
0
1
0
Order By: Relevance
“…To build knowledge of security standards, we develop a Python script that extracts the security expectations from NIST IR 8228 and the referenced NIST SP 800-53r5 security controls from control catalog (provided by NIST), and store them in a CSV file with attributes such as variables, expectations, controls, sub-controls and their discussions. To build device-specific knowledge, network data such as port numbers and protocols are extracted by leveraging MUDGEE [49], which creates MUD [48] profiles of IoT devices by monitoring network traces and technical specifications of different IoT devices are extracted by leveraging the approach from [8]. For the summarization of security controls, we use BERT-Extractive-Summarizer [51].…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…To build knowledge of security standards, we develop a Python script that extracts the security expectations from NIST IR 8228 and the referenced NIST SP 800-53r5 security controls from control catalog (provided by NIST), and store them in a CSV file with attributes such as variables, expectations, controls, sub-controls and their discussions. To build device-specific knowledge, network data such as port numbers and protocols are extracted by leveraging MUDGEE [49], which creates MUD [48] profiles of IoT devices by monitoring network traces and technical specifications of different IoT devices are extracted by leveraging the approach from [8]. For the summarization of security controls, we use BERT-Extractive-Summarizer [51].…”
Section: Methodsmentioning
confidence: 99%
“…The structural knowledge of an IoT device includes different capabilities of its sensors and actuators, which are derived from the manufacture design specifications of different IoT devices. For this purpose, we leverage the approach proposed by Dolan et al [8] as follows. First, we gather all the technical information that provided on a device's website.…”
Section: Building Device Specific Knowledgementioning
confidence: 99%
See 2 more Smart Citations
“…For example, smart light may come with a microphone that may leave the IoT system vulnerable to security and privacy intrusions. A common household resident may not have knowledge and skills to interpret and safeguard the IoT system [4]. Hence, there is a huge need for an automated mechanism to protect smart homes from security and privacy intrusions.…”
mentioning
confidence: 99%