A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets

PMS Sánchez, JMJ Valero, AH Celdrán… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
In the current network-based computing world, where the number of interconnected devices
grows exponentially, their diversity, malfunctions, and cybersecurity threats are increasing at …

Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …

[HTML][HTML] Future wireless communication technology towards 6G IoT: An application-based analysis of IoT in real-time location monitoring of employees inside …

SK Pattnaik, SR Samal, S Bandopadhaya, K Swain… - Sensors, 2022 - mdpi.com
In recent years, the IoT has emerged as the most promising technology in the key evolution
of industry 4.0/industry 5.0, smart home automation (SHA), smart cities, energy savings and …

[HTML][HTML] A novel approach for detecting vulnerable IoT devices connected behind a home NAT

Y Meidan, V Sachidananda, H Peng, R Sagron… - Computers & …, 2020 - Elsevier
Telecommunication service providers (telcos) are exposed to cyber-attacks executed by
compromised IoT devices connected to their customers' networks. Such attacks might have …

A survey on IoT profiling, fingerprinting, and identification

M Safi, S Dadkhah, F Shoeleh, H Mahdikhani… - ACM Transactions on …, 2022 - dl.acm.org
The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet
produces several operational and security challenges, such as monitoring, detecting, and …

A survey of smart home iot device classification using machine learning-based network traffic analysis

H Jmila, G Blanc, MR Shahid, M Lazrag - IEEE Access, 2022 - ieeexplore.ieee.org
Smart home IoT devices lack proper security, raising safety and privacy concerns. One-size-
fits-all network administration is ineffective because of the diverse QoS requirements of IoT …

The 10 research topics in the Internet of Things

WE Zhang, QZ Sheng, A Mahmood… - 2020 IEEE 6th …, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999 by Kevin Ashton, the Internet of Things (IoT) has gained
significant momentum as a technology to connect physical objects to the Internet and to …

[HTML][HTML] A blockchain based secure IoT system using device identity management

F Sabrina, N Li, S Sohail - Sensors, 2022 - mdpi.com
Sharing data securely and efficiently has been identified as an issue in IoT-based smart
systems such as smart cities, smart agriculture, smart health, etc. A large number of IoT …

[HTML][HTML] Automated iot device identification based on full packet information using real-time network traffic

N Yousefnezhad, A Malhi, K Främling - Sensors, 2021 - mdpi.com
In an Internet of Things (IoT) environment, a large volume of potentially confidential data
might be leaked from sensors installed everywhere. To ensure the authenticity of such …

IoT-ID: robust IoT device identification based on feature drift adaptation

Q Chen, Y Song, B Jennings, F Zhang… - 2021 IEEE Global …, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) devices deployed in publicly accessible locations increasingly
encounter security threats from device replacement and impersonation attacks …