Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms

The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to fingerprint them, for example in order to detect if there are misbehaving or even malicious IoT devices in one's network. The aim of this paper is to provide a systematic categorisation of machi...

Full description

Saved in:
Bibliographic Details
Main Authors: Yadav, Poonam, Feraudo, Angelo, Arief, Budi, Shahandashti, Siamak F, Vassilakis, Vassilios G
Format: Journal Article
Language:English
Published: 16-10-2020
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to fingerprint them, for example in order to detect if there are misbehaving or even malicious IoT devices in one's network. The aim of this paper is to provide a systematic categorisation of machine learning augmented techniques that can be used for fingerprinting IoT devices. This can serve as a baseline for comparing various IoT fingerprinting mechanisms, so that network administrators can choose one or more mechanisms that are appropriate for monitoring and maintaining their network. We carried out an extensive literature review of existing papers on fingerprinting IoT devices -- paying close attention to those with machine learning features. This is followed by an extraction of important and comparable features among the mechanisms outlined in those papers. As a result, we came up with a key set of terminologies that are relevant both in the fingerprinting context and in the IoT domain. This enabled us to construct a framework called IDWork, which can be used for categorising existing IoT fingerprinting mechanisms in a way that will facilitate a coherent and fair comparison of these mechanisms. We found that the majority of the IoT fingerprinting mechanisms take a passive approach -- mainly through network sniffing -- instead of being intrusive and interactive with the device of interest. Additionally, a significant number of the surveyed mechanisms employ both static and dynamic approaches, in order to benefit from complementary features that can be more robust against certain attacks such as spoofing and replay attacks.
AbstractList The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to fingerprint them, for example in order to detect if there are misbehaving or even malicious IoT devices in one's network. The aim of this paper is to provide a systematic categorisation of machine learning augmented techniques that can be used for fingerprinting IoT devices. This can serve as a baseline for comparing various IoT fingerprinting mechanisms, so that network administrators can choose one or more mechanisms that are appropriate for monitoring and maintaining their network. We carried out an extensive literature review of existing papers on fingerprinting IoT devices -- paying close attention to those with machine learning features. This is followed by an extraction of important and comparable features among the mechanisms outlined in those papers. As a result, we came up with a key set of terminologies that are relevant both in the fingerprinting context and in the IoT domain. This enabled us to construct a framework called IDWork, which can be used for categorising existing IoT fingerprinting mechanisms in a way that will facilitate a coherent and fair comparison of these mechanisms. We found that the majority of the IoT fingerprinting mechanisms take a passive approach -- mainly through network sniffing -- instead of being intrusive and interactive with the device of interest. Additionally, a significant number of the surveyed mechanisms employ both static and dynamic approaches, in order to benefit from complementary features that can be more robust against certain attacks such as spoofing and replay attacks.
Author Shahandashti, Siamak F
Feraudo, Angelo
Arief, Budi
Vassilakis, Vassilios G
Yadav, Poonam
Author_xml – sequence: 1
  givenname: Poonam
  surname: Yadav
  fullname: Yadav, Poonam
– sequence: 2
  givenname: Angelo
  surname: Feraudo
  fullname: Feraudo, Angelo
– sequence: 3
  givenname: Budi
  surname: Arief
  fullname: Arief, Budi
– sequence: 4
  givenname: Siamak F
  surname: Shahandashti
  fullname: Shahandashti, Siamak F
– sequence: 5
  givenname: Vassilios G
  surname: Vassilakis
  fullname: Vassilakis, Vassilios G
BackLink https://doi.org/10.48550/arXiv.2010.08466$$DView paper in arXiv
BookMark eNotj01OwzAUhL2ABRQOwApfIMWJHduwqyp-KlWCRZZI0Yv9XCyIHdlWobcnLaxGMyON5rskZyEGJOSmZkuh25bdQfrx-2XD5oBpIeUFeX-L2RcfA51gwvRAVzQfcsERijfUJRjxO6ZP6mKiBgruYvLZhx3dxI5a3HuD1M0e05R8KMdmRPMBwecxX5FzB18Zr_91Qbqnx279Um1fnzfr1bYCqWQFMEhnheE41Bp5DWr-CiD5oAahlZNNK2wt750UVoHWiqFx0lrN7KDrtuELcvs3e8Lr5yMjpEN_xOxPmPwXA_tRFQ
ContentType Journal Article
Copyright http://arxiv.org/licenses/nonexclusive-distrib/1.0
Copyright_xml – notice: http://arxiv.org/licenses/nonexclusive-distrib/1.0
DBID AKY
GOX
DOI 10.48550/arxiv.2010.08466
DatabaseName arXiv Computer Science
arXiv.org
DatabaseTitleList
Database_xml – sequence: 1
  dbid: GOX
  name: arXiv.org
  url: http://arxiv.org/find
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
ExternalDocumentID 2010_08466
GroupedDBID AKY
GOX
ID FETCH-LOGICAL-a676-aab6fd4c3eb18e31a7855aa63b7b487f6254d169f64d7a8870ecf6dd80db81523
IEDL.DBID GOX
IngestDate Mon Jan 08 05:38:28 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-a676-aab6fd4c3eb18e31a7855aa63b7b487f6254d169f64d7a8870ecf6dd80db81523
OpenAccessLink https://arxiv.org/abs/2010.08466
ParticipantIDs arxiv_primary_2010_08466
PublicationCentury 2000
PublicationDate 2020-10-16
PublicationDateYYYYMMDD 2020-10-16
PublicationDate_xml – month: 10
  year: 2020
  text: 2020-10-16
  day: 16
PublicationDecade 2020
PublicationYear 2020
Score 1.7859592
SecondaryResourceType preprint
Snippet The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to fingerprint them, for example in order to detect if there...
SourceID arxiv
SourceType Open Access Repository
SubjectTerms Computer Science - Cryptography and Security
Computer Science - Networking and Internet Architecture
Title Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms
URI https://arxiv.org/abs/2010.08466
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwdV09T8MwED3RTiwIBKh86gbWiCZ27YStgpayABIdOiBFdmyjDk2ipkX8fM5OqrKwJpalvOj87ux3zwB3SikdWypyrClkRHxtIs0zHlFYJc5pl7Bwgj_7kK-L9GnibXJw1wuj1j_L79YfWDf3rfKKKFL0oJckXrL1_LZoDyeDFVc3fj-Ocszw6A9JTI_hqMvucNz-jhM4sOUpfL53wiisVW3XDzjGvX8yup06Cil9RK9P-qoo8IhR8KWao7E-lNGF3Te_CedlyriyvmF32ayaM5hPJ_PHWdRdahApIUVE0AhneMFojUwti5Wkz1BKMC011Q6OyhFuYpE5wY1UtAIMbeGEMenQ6JS4lp1Dv6xKOwC0lHnFzI2Ikw3nNPHIDpkTWVbIQiSFuIBBgCKvW9-K3KOUB5Qu_391BYeJLym9aENcQ3-z3tob6DVmexvA_wU6e4TY
link.rule.ids 228,230,782,887
linkProvider Cornell University
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Position+paper%3A+A+systematic+framework+for+categorising+IoT+device+fingerprinting+mechanisms&rft.au=Yadav%2C+Poonam&rft.au=Feraudo%2C+Angelo&rft.au=Arief%2C+Budi&rft.au=Shahandashti%2C+Siamak+F&rft.date=2020-10-16&rft_id=info:doi/10.48550%2Farxiv.2010.08466&rft.externalDocID=2010_08466