IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Researchers

Research units

  • Technische Universität Darmstadt
  • University of Helsinki

Abstract

The emergence of numerous new manufacturers producing devices for the Internet-of-Things (IoT) has given rise to new security concerns. Many IoT devices exhibit security flaws making them vulnerable for attacks and manufacturers have difficulties in providing appropriate security patches to their products in a timely and user-friendly manner. In this paper, we present our implementation of IoT Sentinel, which is a system aimed at protecting the user's network from vulnerable IoT devices. IoT Sentinel automatically identifies vulnerable devices when they are first introduced to the network and enforces appropriate traffic filtering rules to protect other devices from the threats originating from the vulnerable devices.

Details

Original languageEnglish
Title of host publication2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
EditorsKisung Lee, Ling Liu
Publication statusPublished - 1 Jun 2017
MoE publication typeA4 Article in a conference publication
EventInternational Conference on Distributed Computing Systems - Atlanta, United States
Duration: 5 Jun 20178 Jun 2017
Conference number: 37

Publication series

NameInternational Conference on Distributed Computing Systems. Proceedings
PublisherIEEE Computer Society
Volume37
ISSN (Print)1063-6927

Conference

ConferenceInternational Conference on Distributed Computing Systems
Abbreviated titleICDCS
CountryUnited States
CityAtlanta
Period05/06/201708/06/2017

    Research areas

  • Internet of Things, cloud computing, computer network security, mobile computing, Internet-of-Things, IoT sentinel demo, automated device-type identification, cloud-based IoT security service, security flaws, security patches, traffic filtering rules, user network protection, vulnerable device identification, Communication system security, Fingerprint recognition, Logic gates, Object recognition, Prototypes, Security, Wireless communication, IoT security, SDN-based network isolation, device fingerprinting, device identification, threat mitigation

ID: 15241384