Affiliation:
1. Canadian Institute for Cybersecurity (CIC), Faculty of Computer Science, University of New Brunswick (UNB), Fredericton, Canada
2. National Research Council Canada, Fredericton, Canada
Abstract
The proliferation of heterogeneous Internet of things (IoT) devices connected to the Internet produces several operational and security challenges, such as monitoring, detecting, and recognizing millions of interconnected IoT devices. Network and system administrators must correctly identify which devices are functional, need security updates, or are vulnerable to specific attacks. IoT profiling is an emerging technique to identify and validate the connected devices’ specific behaviour and isolate the suspected and vulnerable devices within the network for further monitoring. This article provides a comprehensive review of various IoT device profiling methods and provides a clear taxonomy for IoT profiling techniques based on different security perspectives. We first investigate several current IoT device profiling techniques and their applications. Next, we analyzed various IoT device vulnerabilities, outlined multiple features, and provided detailed information to implement profiling algorithms’ risk assessment/mitigation stage. By reviewing approaches for profiling IoT devices, we identify various state-of-the-art methods that organizations of different domains can implement to satisfy profiling needs. Furthermore, this article also discusses several machine learning and deep learning algorithms utilized for IoT device profiling. Finally, we discuss challenges and future research possibilities in this domain.
Publisher
Association for Computing Machinery (ACM)
Subject
Software,Information Systems,Hardware and Architecture,Computer Science Applications,Computer Networks and Communications
Reference148 articles.
1. [n.d.]. APIs sdks Sandbox and Community for Cisco Developers. Retrieved from https://developer.cisco.com/docs/mud/#!what-is-mud/what-is-mud.
2. [n.d.]. Common Vulnerability Scoring System Calculator. Retrieved January 30 2021 from https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator.
3. [n.d.]. TL-WN722N 150Mbps High Gain Wireless USB Adapter. Retrieved January 30 2021 from https://www.tp-link.com/ca/home-networking/high-gain-adapter/tl-wn722n/.
4. A. R. Abdallah and X. S. Shen. 2014. Lightweight lattice-based homomorphic privacy-preserving aggregation scheme for home area networks. In Proceedings of the 6th International Conference on Wireless Communications and Signal Processing (WCSP’14). 1–6.
5. Peek-a-boo
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献