IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT

M. Miettinen, S. Marchal, I. Hafeez, T. Frassetto, N. Asokan, Ahmad-Reza Sadeghi, S. Tarkoma

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

55 Citations (Scopus)

Abstract

The emergence of numerous new manufacturers producing devices for the Internet-of-Things (IoT) has given rise to new security concerns. Many IoT devices exhibit security flaws making them vulnerable for attacks and manufacturers have difficulties in providing appropriate security patches to their products in a timely and user-friendly manner. In this paper, we present our implementation of IoT Sentinel, which is a system aimed at protecting the user's network from vulnerable IoT devices. IoT Sentinel automatically identifies vulnerable devices when they are first introduced to the network and enforces appropriate traffic filtering rules to protect other devices from the threats originating from the vulnerable devices.
Original languageEnglish
Title of host publication2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
EditorsKisung Lee, Ling Liu
PublisherIEEE
Pages2511-2514
Number of pages4
ISBN (Print)978-1-5386-1791-5
DOIs
Publication statusPublished - 1 Jun 2017
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Distributed Computing Systems - Atlanta, United States
Duration: 5 Jun 20178 Jun 2017
Conference number: 37

Publication series

NameInternational Conference on Distributed Computing Systems. Proceedings
PublisherIEEE Computer Society
Volume37
ISSN (Print)1063-6927

Conference

ConferenceInternational Conference on Distributed Computing Systems
Abbreviated titleICDCS
Country/TerritoryUnited States
CityAtlanta
Period05/06/201708/06/2017

Keywords

  • Internet of Things
  • cloud computing
  • computer network security
  • mobile computing
  • Internet-of-Things
  • IoT sentinel demo
  • automated device-type identification
  • cloud-based IoT security service
  • security flaws
  • security patches
  • traffic filtering rules
  • user network protection
  • vulnerable device identification
  • Communication system security
  • Fingerprint recognition
  • Logic gates
  • Object recognition
  • Prototypes
  • Security
  • Wireless communication
  • IoT security
  • SDN-based network isolation
  • device fingerprinting
  • device identification
  • threat mitigation

Fingerprint

Dive into the research topics of 'IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT'. Together they form a unique fingerprint.

Cite this