copyright reference: Thomas Ott / TU Darmstadt

Publications

IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT

Author Markus Miettinen, Samuel Marchal, Ibbad Hafeez, N. Asokan, Ahmad-Reza Sadeghi, Sasu Tarkoma
Date June 2017
Kind Inproceedings
Book titleProc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017)
Note(to appear)
DOI10.1109/ICDCS.2017.283
KeyTUD-CS-2017-0056
Research Areas CYSEC, ICRI-SC, System Security Lab
Abstract With the rapid growth of the Internet-of-Things (IoT), concerns about the security of IoT devices have become prominent. Several vendors are producing IP-connected devices for home and small office networks that often suffer from flawed security designs and implementations. They also tend to lack mechanisms for firmware updates or patches that can help eliminate security vulnerabilities. Securing networks where the presence of such vulnerable devices is given, requires a <i>brownfield approach</i>: applying necessary protection measures within the network so that potentially vulnerable devices can coexist without endangering the security of other devices in the same network.<br />In this paper, we present IoT Sentinel, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise. We show that&nbsp;IoT Sentinel&nbsp;is effective in identifying device types and has minimal performance overhead.
Full paper (pdf)
[Export this entry to BibTeX]

Important Copyright Notice:

The documents contained in these directories are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.