Smart City Gnosys

Smart city article details

Title Towards The Development Of A Realistic Multidimensional Iot Profiling Dataset
ID_Doc 58410
Authors Dadkhah S.; Mahdikhani H.; Danso P.K.; Zohourian A.; Truong K.A.; Ghorbani A.A.
Year 2022
Published 2022 19th Annual International Conference on Privacy, Security and Trust, PST 2022
DOI http://dx.doi.org/10.1109/PST55820.2022.9851966
Abstract The Internet of Things (IoT) is an emerging technology that enables the development of low-cost and energy-efficient IoT devices across various solutions from smart cities to healthcare domains. With such a complex and heterogeneous instance of IoT devices and their applications, numerous challenges arise in both device management and security concerns. Thus, it is essential to develop intelligent IoT identification/profiling and intrusion detection components that are tailored to IoT applications. Such systems require a realistic and multidimensional reference IoT dataset for training and evaluation. Device identification/profiling ensures the authenticity of the devices attached to the IoT network and environment which can be achieved by fingerprinting a device. Since fingerprinting is mostly examined by device network flows and device local attributes, we have proposed this study to intelligently recognize machine-to-machine communication and identify each device properly. In this paper, we analyzed the behaviour of 60 IoT devices during experiments conducted in our lab setup at the Canadian Institute for Cybersecurity (CIC). Our IoT devices include WiFi, ZigBee, and Z-Wave devices. We collected data from each device in four stages: powered on, idle, active, and interactions. Besides these stages, different scenario experiments were conducted using a microcosm of devices to simulate the network activity of a smart home. Additionally, we have generated two attack datasets, namely flood denial-of-service attack and RTSP brute-force attack. Lastly, we implement an extensive case study on the transferability of the RF classifier and train our model with the dataset from our lab, transfer the model to the dataset from a different lab and test the trained model on their dataset. This paper's dataset materials are available on the CIC dataset page under the CIC IoT dataset 20221. © 2022 IEEE.
Author Keywords


Similar Articles


Id Similarity Authors Title Published
5249 View0.888Chowdhury R.R.; Abas P.E.A Survey On Device Fingerprinting Approach For Resource-Constraint Iot Devices: Comparative Study And Research ChallengesInternet of Things (Netherlands), 20 (2022)
44072 View0.877Abbas S.; Abu Talib M.; Nasir Q.; Idhis S.; Alaboudi M.; Mohamed A.Radio Frequency Fingerprinting Techniques For Device Identification: A SurveyInternational Journal of Information Security, 23, 2 (2024)
47716 View0.876Wang M.; Yang N.; Weng N.Securing A Smart Home With A Transformer-Based Iot Intrusion Detection SystemElectronics (Switzerland), 12, 9 (2023)
32898 View0.872Kaur B.; Dadkhah S.; Shoeleh F.; Neto E.C.P.; Xiong P.; Iqbal S.; Lamontagne P.; Ray S.; Ghorbani A.A.Internet Of Things (Iot) Security Dataset Evolution: Challenges And Future DirectionsInternet of Things (Netherlands), 22 (2023)
6991 View0.872Aljohani R.; Bushnag A.; Alessa A.Ai-Based Intrusion Detection For A Secure Internet Of Things (Iot)Journal of Network and Systems Management, 32, 3 (2024)
19833 View0.87Dong S.; Shu L.; Xia Q.; Kamruzzaman J.; Xia Y.; Peng T.Device Identification Method For Internet Of Things Based On Spatial-Temporal Feature ResidualsIEEE Transactions on Services Computing, 17, 6 (2024)
14994 View0.865El Zegil F.; Nanda P.; Mohanty M.; Alzahrani M.Comparative Analysis Of Intrusion Detection Schemes In Internet Of Things(Iot) Based Applications2024 17th International Conference on Security of Information and Networks, SIN 2024 (2024)
24775 View0.865Kumar A.G.; Rastogi A.; Ranga V.Evaluation Of Different Machine Learning Classifiers On New Iot Dataset Ciciot20232024 International Conference on Intelligent Systems for Cybersecurity, ISCS 2024 (2024)
33346 View0.863Berhili M.; Chaieb O.; Benabdellah M.Intrusion Detection Systems In Iot Based On Machine Learning: A State Of The ArtProcedia Computer Science, 251 (2024)
58001 View0.862Rangelov D.; Lämmel P.; Brunzel L.; Borgert S.; Darius P.; Tcholtchev N.; Boerger M.Towards An Integrated Methodology And Toolchain For Machine Learning-Based Intrusion Detection In Urban Iot Networks And PlatformsFuture Internet, 15, 3 (2023)