Abstract

While access to a variety of Internet of Things (IoT) networks can be achieved through end-user devices such as smartphones or tablets, these devices are susceptible to theft or loss, and their use by illicit users could lead to unauthorized access to IoT networks, thus allowing access to user information. Hence, an effective authentication mechanism that continuously authenticates users in the background is required in order to detect unauthorized access. As most access to IoT devices is achieved through end-user devices, a rich set of information can be extracted and used in the background to continuously authenticate users without requiring further user intervention. Several studies have examined mobile app usage in the broader population but failed to consider network traffic patterns during app access for user authentication. This paper presents a model to authenticate users based on the network traffic patterns of accessed apps, with an average F-measure of 95.5%. Overall, the preliminary results are promising and show the effectiveness and usability of the proposed model.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.