• Publications
  • Influence
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
TLDR
We present IoT Sentinel, a system capable of automatically identifying the types of devices being connected to an IoT network and enabling enforcement of rules for constraining the communications of vulnerable devices so as to minimize damage resulting from their compromise. Expand
  • 249
  • 27
  • PDF
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT
TLDR
We present our implementation of IoT Sentinel, which is a system aimed at protecting the user's network from vulnerable IoT devices. Expand
  • 30
  • 4
  • PDF
IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the Edge
TLDR
IoT devices are notoriously vulnerable even to trivial attacks and can be easily compromised. Expand
  • 12
  • 2
Securebox: Toward Safer and Smarter IoT Networks
TLDR
We present Securebox, an affordable and deployable platform for securing and managing IoT networks that is dedicated to budget and resource constrained IoT environments. Expand
  • 21
  • 1
DNA-LCEB: a high-capacity and mutation-resistant DNA data-hiding approach by employing encryption, error correcting codes, and hybrid twofold and fourfold codon-based strategy for synonymous
TLDR
This work presents a high-capacity and mutation-resistant watermarking technique, DNA-LCEB, for hiding secret information in DNA of living organisms. Expand
  • 6
  • 1
Toward Secure Edge Networks: Taming Device-to-Device (D2D) Communication in IoT
TLDR
The growing popularity of Internet-of-Things (IoT) has created the need for network-based traffic anomaly detection systems that could identify misbehaving devices. Expand
  • 11
  • PDF
Demo: Cloud-based Security as a Service for Smart IoT Environments
TLDR
We demonstrate the first cloud-based solution for providing network security as a service in smart home IoT environments. Expand
  • 8
Real-Time IoT Device Activity Detection in Edge Networks
TLDR
The growing popularity of Internet-of-Things (IoT) has created the need for network-based traffic anomaly detection systems that could identify misbehaving devices. Expand
  • 9
  • PDF
IoT-KEEPER: Securing IoT Communications in Edge Networks
TLDR
We present IoT-Keeper, which is a novel system capable of securing the network against any malicious activity, in real time. Expand
  • 6
  • PDF
IOTURVA: Securing Device-to-Device (D2D) Communication in IoT Networks
TLDR
We present IoTurva, a platform dedicated to securing Device-to-Device (D2D) communication in IoT networks. Expand
  • 8