Network Traffic Characteristics of IoT Devices in Smart Homes

09/04/2021
by   Md Mainuddin, et al.
0

Understanding network traffic characteristics of IoT devices plays a critical role in improving both the performance and security of IoT devices, including IoT device identification, classification, and anomaly detection. Although a number of existing research efforts have developed machine-learning based algorithms to help address the challenges in improving the security of IoT devices, none of them have provided detailed studies on the network traffic characteristics of IoT devices. In this paper we collect and analyze the network traffic generated in a typical smart homes environment consisting of a set of common IoT (and non-IoT) devices. We analyze the network traffic characteristics of IoT devices from three complementary aspects: remote network servers and port numbers that IoT devices connect to, flow-level traffic characteristics such as flow duration, and packet-level traffic characteristics such as packet inter-arrival time. Our study provides critical insights into the operational and behavioral characteristics of IoT devices, which can help develop more effective security and performance algorithms for IoT devices.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/17/2022

IoT Device Identification Based on Network Traffic Characteristics

IoT device identification plays an important role in monitoring and impr...
research
01/28/2020

IoT Behavioral Monitoring via Network Traffic Analysis

Smart homes, enterprises, and cities are increasingly being equipped wit...
research
05/30/2023

Design and implementation of intelligent packet filtering in IoT microcontroller-based devices

Internet of Things (IoT) devices are increasingly pervasive and essentia...
research
05/30/2020

Multi-Layer Perceptron Artificial Neural Network Based IoT Botnet Traffic Classification

Internet of Things (IoT) is becoming an integral part of our homes today...
research
07/04/2021

A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement

Data provenance collects comprehensive information about the events and ...
research
07/10/2018

Social-Feature Enabled Communications among Devices towards Smart IoT Community

Future IoT is expected to get ubiquitous connection and access in a glob...
research
10/17/2022

Detect and Classify IoT Camera Traffic

Deployment of IoT cameras in an organization threatens security and priv...

Please sign up or login with your details

Forgot password? Click here to reset