Securing Internet of Things Devices Using The Network Context
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F20%3A00341176" target="_blank" >RIV/68407700:21230/20:00341176 - isvavai.cz</a>
Výsledek na webu
<a href="https://doi.org/10.1109/TII.2019.2954100" target="_blank" >https://doi.org/10.1109/TII.2019.2954100</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/TII.2019.2954100" target="_blank" >10.1109/TII.2019.2954100</a>
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Securing Internet of Things Devices Using The Network Context
Popis výsledku v původním jazyce
Internet of Things (IoT) devices have been widely adopted in recent years. Unlike conventional information systems, IoT solutions have greater access to real-world contextual data and are typically deployed in an environment that cannot be fully controlled, and these circumstances create new challenges and opportunities. In this article, we leverage the knowledge that an IoT device has about its network context to provide an additional security factor. The device periodically scans a network and reports a list of all devices in the network. The server analyzes movements in the network and subsequently reacts to suspicious events. This article describes how our method can detect network changes, retrieved only from scanning devices in the network. To demonstrate the proposed solution, we perform a multiweek case study on a network with hundreds of active devices and confirm that our method can detect network anomalies or changes.
Název v anglickém jazyce
Securing Internet of Things Devices Using The Network Context
Popis výsledku anglicky
Internet of Things (IoT) devices have been widely adopted in recent years. Unlike conventional information systems, IoT solutions have greater access to real-world contextual data and are typically deployed in an environment that cannot be fully controlled, and these circumstances create new challenges and opportunities. In this article, we leverage the knowledge that an IoT device has about its network context to provide an additional security factor. The device periodically scans a network and reports a list of all devices in the network. The server analyzes movements in the network and subsequently reacts to suspicious events. This article describes how our method can detect network changes, retrieved only from scanning devices in the network. To demonstrate the proposed solution, we perform a multiweek case study on a network with hundreds of active devices and confirm that our method can detect network anomalies or changes.
Klasifikace
Druh
J<sub>imp</sub> - Článek v periodiku v databázi Web of Science
CEP obor
—
OECD FORD obor
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Návaznosti výsledku
Projekt
<a href="/cs/project/EF16_019%2F0000765" target="_blank" >EF16_019/0000765: Výzkumné centrum informatiky</a><br>
Návaznosti
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Ostatní
Rok uplatnění
2020
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
ISSN
1551-3203
e-ISSN
1941-0050
Svazek periodika
16
Číslo periodika v rámci svazku
6
Stát vydavatele periodika
US - Spojené státy americké
Počet stran výsledku
11
Strana od-do
4017-4027
Kód UT WoS článku
000526381800036
EID výsledku v databázi Scopus
2-s2.0-85081616331