IoT-Flock: An Open-source Framework for IoT Traffic Generation
- URL: http://arxiv.org/abs/2004.00844v1
- Date: Thu, 2 Apr 2020 07:08:08 GMT
- Title: IoT-Flock: An Open-source Framework for IoT Traffic Generation
- Authors: Syed Ghazanfar, Faisal Hussain, Atiq Ur Rehman, Ubaid U. Fayyaz,
Farrukh Shahzad, and Ghalib A. Shah
- Abstract summary: Traditional traffic generator tools are unable to generate the IoT specific protocols traffic.
We propose an open-source framework which supports the two widely used IoT application layer protocols, i.e. Network and CoAP.
We set up a real-time IoT smart home use case to manifest the applicability of the proposed framework.
- Score: 1.3299946892361474
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Network traffic generation is one of the primary techniques that is used to
design and analyze the performance of network security systems. However, due to
the diversity of IoT networks in terms of devices, applications and protocols,
the traditional network traffic generator tools are unable to generate the IoT
specific protocols traffic. Hence, the traditional traffic generator tools
cannot be used for designing and testing the performance of IoT-specific
security solutions. In order to design an IoT-based traffic generation
framework, two main challenges include IoT device modelling and generating the
IoT normal and attack traffic simultaneously. Therefore, in this work, we
propose an open-source framework for IoT traffic generation which supports the
two widely used IoT application layer protocols, i.e., MQTT and CoAP. The
proposed framework allows a user to create an IoT use case, add customized IoT
devices into it and generate normal and malicious IoT traffic over a real-time
network. Furthermore, we set up a real-time IoT smart home use case to manifest
the applicability of the proposed framework for developing the security
solutions for IoT smart home by emulating the real world IoT devices. The
experimental results demonstrate that the proposed framework can be effectively
used to develop better security solutions for IoT networks without physically
deploying the real-time use case.
Related papers
- IoT-LM: Large Multisensory Language Models for the Internet of Things [70.74131118309967]
IoT ecosystem provides rich source of real-world modalities such as motion, thermal, geolocation, imaging, depth, sensors, and audio.
Machine learning presents a rich opportunity to automatically process IoT data at scale.
We introduce IoT-LM, an open-source large multisensory language model tailored for the IoT ecosystem.
arXiv Detail & Related papers (2024-07-13T08:20:37Z) - zk-IoT: Securing the Internet of Things with Zero-Knowledge Proofs on Blockchain Platforms [0.0]
This paper introduces the zk-IoT framework, a novel approach to enhancing the security of Internet of Things (IoT) ecosystems.
Our framework ensures the integrity of firmware execution and data processing in potentially compromised IoT devices.
arXiv Detail & Related papers (2024-02-13T09:34:23Z) - IoTScent: Enhancing Forensic Capabilities in Internet of Things Gateways [45.44831696628473]
This paper presents IoTScent, an open-source forensic tool that enables IoT gateways and Home Automation platforms to perform IoT traffic capture and analysis.
IoTScent is specifically designed to operate over IEEE5.4-based traffic, which is the basis for many IoT-specific protocols such as Zigbee, 6LoWPAN and Thread.
This work provides a comprehensive description of the IoTScent tool, including a practical use case that demonstrates the use of the tool to perform device identification from Zigbee traffic.
arXiv Detail & Related papers (2023-10-05T09:10:05Z) - IoT Device Identification Based on Network Communication Analysis Using
Deep Learning [43.0717346071013]
The risk of attacks on an organization's network has increased due to the growing use of less secure IoT devices.
To tackle this threat and protect their networks, organizations generally implement security policies in which only white listed IoT devices are allowed on the network.
In this research, deep learning is applied to network communication for the automated identification of IoT devices permitted on the network.
arXiv Detail & Related papers (2023-03-02T13:44:58Z) - The Internet of Senses: Building on Semantic Communications and Edge
Intelligence [67.75406096878321]
The Internet of Senses (IoS) holds the promise of flawless telepresence-style communication for all human receptors'
We elaborate on how the emerging semantic communications and Artificial Intelligence (AI)/Machine Learning (ML) paradigms may satisfy the requirements of IoS use cases.
arXiv Detail & Related papers (2022-12-21T03:37:38Z) - Technical Report-IoT Devices Proximity Authentication In Ad Hoc Network
Environment [0.0]
Internet of Things (IoT) is a distributed communication technology system that offers the possibility for physical devices to connect and exchange data.
authentication to the IoT devices is essential as it is the first step in preventing any negative impact of possible attackers.
This paper implements an IoT devices authentication scheme based on something that is in the IoT devices environment.
arXiv Detail & Related papers (2022-10-01T03:07:42Z) - Optimizing Resource-Efficiency for Federated Edge Intelligence in IoT
Networks [96.24723959137218]
We study an edge intelligence-based IoT network in which a set of edge servers learn a shared model using federated learning (FL)
We propose a novel framework, called federated edge intelligence (FEI), that allows edge servers to evaluate the required number of data samples according to the energy cost of the IoT network.
We prove that our proposed algorithm does not cause any data leakage nor disclose any topological information of the IoT network.
arXiv Detail & Related papers (2020-11-25T12:51:59Z) - Machine learning and data analytics for the IoT [8.39035688352917]
We review how IoT-generated data are processed for machine learning analysis.
We propose a framework to enable IoT applications to adaptively learn from other IoT applications.
arXiv Detail & Related papers (2020-06-30T07:38:31Z) - IoT Device Identification Using Deep Learning [43.0717346071013]
The growing use of IoT devices in organizations has increased the number of attack vectors available to attackers.
The widely adopted bring your own device (BYOD) policy which allows an employee to bring any IoT device into the workplace and attach it to an organization's network also increases the risk of attacks.
In this study, we applied deep learning on network traffic to automatically identify IoT devices connected to the network.
arXiv Detail & Related papers (2020-02-25T12:24:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.