While access to a variety of Internet of Things (IoT) networks can be achieved through end-user devices such as smartphones or tablets, these devices are susceptible to theft or loss, and their use by illicit users could lead to unauthorized access to IoT networks, thus allowing access to user information. Hence, an effective authentication mechanism that continuously authenticates users in the background is required in order to detect unauthorized access. As most access to IoT devices is achieved through end-user devices, a rich set of information can be extracted and used in the background to continuously authenticate users without requiring further user intervention. Several studies have examined mobile app usage in the broader population but failed to consider network traffic patterns during app access for user authentication. This paper presents a model to authenticate users based on the network traffic patterns of accessed apps, with an average F-measure of 95.5%. Overall, the preliminary results are promising and show the effectiveness and usability of the proposed model.
A User Authentication Model for IoT Networks Based on App Traffic Patterns
Published 2018 in IEEE Annual Information Technology, Electronics and Mobile Communication Conference
ABSTRACT
PUBLICATION RECORD
- Publication year
2018
- Venue
IEEE Annual Information Technology, Electronics and Mobile Communication Conference
- Publication date
2018-11-01
- Fields of study
Computer Science, Engineering
- Identifiers
- External record
- Source metadata
Semantic Scholar
CITATION MAP
EXTRACTION MAP
CLAIMS
- No claims are published for this paper.
CONCEPTS
- No concepts are published for this paper.
REFERENCES
Showing 1-25 of 25 references · Page 1 of 1
CITED BY
Showing 1-18 of 18 citing papers · Page 1 of 1