Dataset for IAT collection from Real-World IoT Devices

Citation Author(s):
Lin
ZhiJun
NWPU
Submitted by:
Lin ZhiJun
Last updated:
Sat, 04/25/2020 - 12:25
DOI:
10.21227/sjby-3w39
License:
408 Views
Categories:
0
0 ratings - Please login to submit your rating.

Abstract 

With the increasing popularity of the Internet of Things (IoT), security issues in the IoTnetwork have become the focus of research. Since the number of IoT devices connected to the networkhas increased, the conventional network framework faces several problems in terms of network latencyand resource overload. Fog computing is intended to construct a new network framework. However, fogcomputing has also caused new security challenges, such as authentication, authorization, and securecommunication. In this paper, we proposed a novel device authentication mechanism based on interarrivaltime (IAT). We utilized IAT to generate device fingerprints and combined these fingerprints withthe digital certificate to verify IoT devices. Moreover, we utilized IAT fingerprinting to propose a simple,secure communication and key management framework. To evaluate the proposed framework, we firstused real-world devices to analyze IAT in device fingerprinting. Second, we simulated our framework onContiki OS. The results show the effectiveness of IAT device fingerprinting, with an accuracy of ninetyninepercent. We utilized the IAT device fingerprinting mechanism in authentication and the overallframework of secure communication. The results shows that the proposed method not only reduces thepower consumption for authentication but also impacts the overall communication time.

Instructions: 

None