This HTML5 document contains 29 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n2https://kar.kent.ac.uk/id/eprint/
wdrshttp://www.w3.org/2007/05/powder-s#
dchttp://purl.org/dc/elements/1.1/
n15http://purl.org/ontology/bibo/status/
n17https://kar.kent.ac.uk/id/subject/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n16https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n5http://eprints.org/ontology/
n8https://kar.kent.ac.uk/id/event/
bibohttp://purl.org/ontology/bibo/
n14https://kar.kent.ac.uk/84210/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n6https://kar.kent.ac.uk/id/document/
n12https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n11https://kar.kent.ac.uk/id/eprint/84210#
n10https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n4https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:84210
rdf:type
n5:EPrint n5:ConferenceItemEPrint bibo:AcademicArticle bibo:Article
rdfs:seeAlso
n14:
n5:hasDocument
n6:3221155 n6:3221156 n6:3221157 n6:3221158 n6:3221093 n6:3221094
n5:hasPublished
n6:3221093
dc:hasVersion
n6:3221093
dcterms:title
A systematic framework for categorising IoT device fingerprinting mechanisms
wdrs:describedby
n10:export_kar_RDFN3.n3 n16:export_kar_RDFN3.n3
dcterms:date
2020-10-10
dcterms:creator
n4:ext-4c70721966e4a587bc236df9b1233a35 n4:ext-cf0b5902ab6727482633ce38a7dc9c11 n4:ext-a1092b998c8b6601ff20a7abf70dd308 n4:ext-b.arief@kent.ac.uk n4:ext-cc841706778a1f750dbc8d4fdc5f39ed
bibo:status
n15:forthcoming n15:peerReviewed
bibo:abstract
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to fingerprint them, for example in order to detect if there are misbehaving or even malicious IoT devices in one’s network. However, there are many challenges faced in the task of fingerprinting IoT devices, mainly due to the huge variety of the devices involved. At the same time, the task can potentially be improved by applying machine learning techniques for better accuracy and efficiency. The aim of this paper is to provide a systematic categorisation of machine learning augmented techniques that can be used for fingerprinting IoT devices. This can serve as a baseline for comparing various IoT fingerprinting mechanisms, so that network administrators can choose one or more mechanisms that are appropriate for monitoring and maintaining their network. We carried out an extensive literature review of existing papers on fingerprinting IoT devices – paying close attention to those with machine learning features. This is followed by an extraction of important and comparable features among the mechanisms outlined in those papers. As a result, we came up with a key set of terminologies that are relevant both in the fingerprinting context and in the IoT domain. This enabled us to construct a framework called IDWork, which can be used for categorising existing IoT fingerprinting mechanisms in a way that will facilitate a coherent and fair comparison of these mechanisms. We found that the majority of the IoT fingerprinting mechanisms take a passive approach – mainly through network sniffing – instead of being intrusive and interactive with the device of interest. Additionally, a significant number of the surveyed mechanisms employ both static and dynamic approaches, in order to benefit from complementary features that can be more robust against certain attacks such as spoofing and replay attacks.
dcterms:isPartOf
n12:repository
dcterms:subject
n17:QA76
bibo:authorList
n11:authors
bibo:presentedAt
n8:ext-3c151b361c07405321dbf3272dcc7977