IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT

M. Miettinen, S. Marchal, I. Hafeez, T. Frassetto, N. Asokan, Ahmad-Reza Sadeghi, S. Tarkoma

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

55 Citations (Scopus)


The emergence of numerous new manufacturers producing devices for the Internet-of-Things (IoT) has given rise to new security concerns. Many IoT devices exhibit security flaws making them vulnerable for attacks and manufacturers have difficulties in providing appropriate security patches to their products in a timely and user-friendly manner. In this paper, we present our implementation of IoT Sentinel, which is a system aimed at protecting the user's network from vulnerable IoT devices. IoT Sentinel automatically identifies vulnerable devices when they are first introduced to the network and enforces appropriate traffic filtering rules to protect other devices from the threats originating from the vulnerable devices.
Original languageEnglish
Title of host publication2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
EditorsKisung Lee, Ling Liu
Number of pages4
ISBN (Print)978-1-5386-1791-5
Publication statusPublished - 1 Jun 2017
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Distributed Computing Systems - Atlanta, United States
Duration: 5 Jun 20178 Jun 2017
Conference number: 37

Publication series

NameInternational Conference on Distributed Computing Systems. Proceedings
PublisherIEEE Computer Society
ISSN (Print)1063-6927


ConferenceInternational Conference on Distributed Computing Systems
Abbreviated titleICDCS
Country/TerritoryUnited States


  • Internet of Things
  • cloud computing
  • computer network security
  • mobile computing
  • Internet-of-Things
  • IoT sentinel demo
  • automated device-type identification
  • cloud-based IoT security service
  • security flaws
  • security patches
  • traffic filtering rules
  • user network protection
  • vulnerable device identification
  • Communication system security
  • Fingerprint recognition
  • Logic gates
  • Object recognition
  • Prototypes
  • Security
  • Wireless communication
  • IoT security
  • SDN-based network isolation
  • device fingerprinting
  • device identification
  • threat mitigation


Dive into the research topics of 'IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT'. Together they form a unique fingerprint.

Cite this