A Survey on IoT Profiling, Fingerprinting, and Identification

IF 3.5 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS ACM Transactions on Internet of Things Pub Date : 2022-05-31 DOI:10.1145/3539736
Miraqa Safi, S. Dadkhah, Farzaneh Shoeleh, Hassan Mahdikhani, Heather Molyneaux, A. Ghorbani
{"title":"A Survey on IoT Profiling, Fingerprinting, and Identification","authors":"Miraqa Safi, S. Dadkhah, Farzaneh Shoeleh, Hassan Mahdikhani, Heather Molyneaux, A. Ghorbani","doi":"10.1145/3539736","DOIUrl":null,"url":null,"abstract":"The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet produces several operational and security challenges, such as monitoring, detecting, and recognizing millions of interconnected IoT devices. Network and system administrators must correctly identify which devices are functional, need security updates, or are vulnerable to specific attacks. IoT profiling is an emerging technique to identify and validate the connected devices’ specific behaviour and isolate the suspected and vulnerable devices within the network for further monitoring. This article provides a comprehensive review of various IoT device profiling methods and provides a clear taxonomy for IoT profiling techniques based on different security perspectives. We first investigate several current IoT device profiling techniques and their applications. Next, we analyzed various IoT device vulnerabilities, outlined multiple features, and provided detailed information to implement profiling algorithms’ risk assessment/mitigation stage. By reviewing approaches for profiling IoT devices, we identify various state-of-the-art methods that organizations of different domains can implement to satisfy profiling needs. Furthermore, this article also discusses several machine learning and deep learning algorithms utilized for IoT device profiling. Finally, we discuss challenges and future research possibilities in this domain.","PeriodicalId":29764,"journal":{"name":"ACM Transactions on Internet of Things","volume":"46 1","pages":"1 - 39"},"PeriodicalIF":3.5000,"publicationDate":"2022-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM Transactions on Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3539736","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 11

Abstract

The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet produces several operational and security challenges, such as monitoring, detecting, and recognizing millions of interconnected IoT devices. Network and system administrators must correctly identify which devices are functional, need security updates, or are vulnerable to specific attacks. IoT profiling is an emerging technique to identify and validate the connected devices’ specific behaviour and isolate the suspected and vulnerable devices within the network for further monitoring. This article provides a comprehensive review of various IoT device profiling methods and provides a clear taxonomy for IoT profiling techniques based on different security perspectives. We first investigate several current IoT device profiling techniques and their applications. Next, we analyzed various IoT device vulnerabilities, outlined multiple features, and provided detailed information to implement profiling algorithms’ risk assessment/mitigation stage. By reviewing approaches for profiling IoT devices, we identify various state-of-the-art methods that organizations of different domains can implement to satisfy profiling needs. Furthermore, this article also discusses several machine learning and deep learning algorithms utilized for IoT device profiling. Finally, we discuss challenges and future research possibilities in this domain.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网分析、指纹和身份识别研究综述
连接到互联网的异构物联网(IoT)设备的激增产生了一些操作和安全挑战,例如监控、检测和识别数百万互联的物联网设备。网络和系统管理员必须正确识别哪些设备是正常的,哪些设备需要安全更新,哪些设备容易受到特定攻击。物联网分析是一种新兴技术,用于识别和验证连接设备的特定行为,并在网络中隔离可疑和易受攻击的设备,以进行进一步监控。本文全面回顾了各种物联网设备分析方法,并基于不同的安全角度为物联网分析技术提供了清晰的分类。我们首先研究了几种当前的物联网设备分析技术及其应用。接下来,我们分析了各种物联网设备漏洞,概述了多个特征,并提供了详细信息,以实现分析算法的风险评估/缓解阶段。通过回顾分析物联网设备的方法,我们确定了不同领域的组织可以实施的各种最先进的方法,以满足分析需求。此外,本文还讨论了用于物联网设备分析的几种机器学习和深度学习算法。最后,我们讨论了该领域的挑战和未来研究的可能性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
5.20
自引率
3.70%
发文量
0
期刊最新文献
Introduction to the Special Issue on Wireless Sensing for IoT Special Issue on Wireless Sensing for IoT: A Word from the Editor-in-Chief Resilient Intermediary‐Based Key Exchange Protocol for IoT A Two-Mode, Adaptive Security Framework for Smart Home Security Applications Online learning for dynamic impending collision prediction using FMCW radar
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1