Dataset for IAT collection from Real-World IoT Devices

Citation Author(s):
Lin
ZhiJun
NWPU
Submitted by:
Lin ZhiJun
Last updated:
Sat, 04/25/2020 - 12:25
DOI:
10.21227/sjby-3w39
License:
2013 Views
Categories:
0
0 ratings - Please login to submit your rating.

Abstract 

With the increasing popularity of the Internet of Things (IoT), security issues in the IoT
network have become the focus of research. Since the number of IoT devices connected to the network
has increased, the conventional network framework faces several problems in terms of network latency
and resource overload. Fog computing is intended to construct a new network framework. However, fog
computing has also caused new security challenges, such as authentication, authorization, and secure
communication. In this paper, we proposed a novel device authentication mechanism based on interarrival
time (IAT). We utilized IAT to generate device fingerprints and combined these fingerprints with
the digital certificate to verify IoT devices. Moreover, we utilized IAT fingerprinting to propose a simple,
secure communication and key management framework. To evaluate the proposed framework, we first
used real-world devices to analyze IAT in device fingerprinting. Second, we simulated our framework on
Contiki OS. The results show the effectiveness of IAT device fingerprinting, with an accuracy of ninetynine
percent. We utilized the IAT device fingerprinting mechanism in authentication and the overall
framework of secure communication. The results shows that the proposed method not only reduces the
power consumption for authentication but also impacts the overall communication time.

Instructions: 

None

Comments

thank you

Submitted by boulaziz tarek on Wed, 08/05/2020 - 15:22

Dataset Files

LOGIN TO ACCESS DATASET FILES
Open Access dataset files are accessible to all logged in  users. Don't have a login?  Create a free IEEE account.  IEEE Membership is not required.