{"id":"https://openalex.org/W2888096149","doi":"https://doi.org/10.1109/jiot.2018.2865604","title":"DEFT: A Distributed IoT Fingerprinting Technique","display_name":"DEFT: A Distributed IoT Fingerprinting Technique","publication_year":2018,"publication_date":"2018-08-15","ids":{"openalex":"https://openalex.org/W2888096149","doi":"https://doi.org/10.1109/jiot.2018.2865604","mag":"2888096149"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2865604","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024373196","display_name":"Vijayanand Thangavelu","orcid":"https://orcid.org/0000-0001-6974-3134"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"funder","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Vijayanand Thangavelu","raw_affiliation_strings":["Electrical and Computer Engineering Department, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012540529","display_name":"Dinil Mon Divakaran","orcid":"https://orcid.org/0000-0001-8706-432X"},"institutions":[],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Dinil Mon Divakaran","raw_affiliation_strings":["Cyber Security R&D Division, Singtel, Singapore"],"affiliations":[{"raw_affiliation_string":"Cyber Security R&D Division, Singtel, Singapore","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034683160","display_name":"Rishi Sairam","orcid":"https://orcid.org/0000-0002-9748-0631"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"funder","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Rishi Sairam","raw_affiliation_strings":["Electrical and Computer Engineering Department, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009245882","display_name":"Suman Sankar Bhunia","orcid":"https://orcid.org/0000-0002-8382-0201"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"funder","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Suman Sankar Bhunia","raw_affiliation_strings":["Electrical and Computer Engineering Department, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080394785","display_name":"Mohan Gurusamy","orcid":"https://orcid.org/0000-0001-6764-268X"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"funder","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Mohan Gurusamy","raw_affiliation_strings":["Electrical and Computer Engineering Department, National University of Singapore, Singapore"],"affiliations":[{"raw_affiliation_string":"Electrical and Computer Engineering Department, National University of Singapore, Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":11.88,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":147,"citation_normalized_percentile":{"value":0.999971,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"6","issue":"1","first_page":"940","last_page":"952"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9989,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identification","display_name":"Identification","score":0.573757},{"id":"https://openalex.org/keywords/networking-hardware","display_name":"Networking hardware","score":0.44987574},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.44394317}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.857517},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.69125986},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5748675},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.573757},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.54867184},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.46439818},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.44987574},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.44394317},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.41442597},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36737934},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35626444},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24078697},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.23739824},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10820466},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2018.2865604","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"grants":[{"funder":"https://openalex.org/F4320320709","funder_display_name":"National Research Foundation Singapore","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":26,"referenced_works":["https://openalex.org/W1561850916","https://openalex.org/W1874399837","https://openalex.org/W2000756828","https://openalex.org/W2065955975","https://openalex.org/W2101234009","https://openalex.org/W2101449154","https://openalex.org/W2102524069","https://openalex.org/W2104927807","https://openalex.org/W2122237830","https://openalex.org/W2151043249","https://openalex.org/W2165698076","https://openalex.org/W2345276999","https://openalex.org/W2485005749","https://openalex.org/W2574448563","https://openalex.org/W2620213176","https://openalex.org/W2621148797","https://openalex.org/W2743556905","https://openalex.org/W2748868501","https://openalex.org/W2749429923","https://openalex.org/W2772124517","https://openalex.org/W2774472083","https://openalex.org/W2778392604","https://openalex.org/W2799540830","https://openalex.org/W2962944260","https://openalex.org/W2964281761","https://openalex.org/W4245409806"],"related_works":["https://openalex.org/W4312814274","https://openalex.org/W4200107511","https://openalex.org/W3207760230","https://openalex.org/W2906845177","https://openalex.org/W2891427086","https://openalex.org/W2376666925","https://openalex.org/W1968625315","https://openalex.org/W17155033","https://openalex.org/W1590307681","https://openalex.org/W1496222301"],"abstract_inverted_index":{"Identifying":[0],"IoT":[1,38,128,200],"devices":[2,129,144],"connected":[3],"to":[4,126,141,151,172],"a":[5,55,61,83,89,111],"network":[6,42,66,166],"has":[7],"multiple":[8],"security":[9],"benefits,":[10],"such":[11],"as":[12],"deployment":[13],"of":[14,21,37,53,99,191],"behavior-based":[15],"anomaly":[16],"detectors,":[17],"automated":[18],"vulnerability":[19],"patching":[20],"specific":[22],"device":[23,39,85,133,175],"types,":[24],"dynamic":[25],"attack":[26],"mitigation,":[27],"etc.":[28],"In":[29],"this":[30],"paper,":[31],"we":[32,79],"look":[33],"into":[34],"the":[35,65,97,127,136,146,189],"problem":[36],"identification":[40],"at":[41,60,130],"level,":[43],"in":[44,64,110,145],"particular":[45],"from":[46,198],"an":[47],"ISP's":[48],"perspective.":[49],"The":[50],"simple":[51],"solution":[52,92],"deploying":[54],"supervised":[56],"machine":[57],"learning":[58],"algorithm":[59],"centralized":[62],"location":[63],"neither":[67],"scales":[68],"well":[69],"nor":[70],"can":[71,156],"identify":[72,142,173],"new":[73,103,143,174],"devices.":[74,201],"To":[75],"tackle":[76],"these":[77],"challenges,":[78],"propose":[80],"and":[81,95,108,117,138,154,160,165,182],"develop":[82],"distributed":[84,90],"fingerprinting":[86,91],"technique":[87],"(DEFT),":[88],"that":[93],"addresses":[94],"exploits":[96],"presence":[98],"common":[100],"devices,":[101,104],"including":[102],"across":[105],"smart":[106],"homes":[107,131],"enterprises":[109],"network.":[112,147],"A":[113],"DEFT":[114,148,169,192],"controller":[115,137],"develops":[116],"maintains":[118],"classifiers":[119],"for":[120],"fingerprinting,":[121],"while":[122,178],"gateways":[123,139],"located":[124],"closer":[125],"perform":[132],"classification.":[134],"Importantly,":[135],"coordinate":[140],"is":[149,170],"designed":[150],"be":[152,157],"scalable":[153],"dynamic-it":[155],"deployed,":[158],"orchestrated,":[159],"controlled":[161],"using":[162],"software-defined":[163],"networking":[164],"function":[167],"virtualization.":[168],"able":[171],"types":[176],"automatically,":[177],"achieving":[179],"high":[180],"accuracy":[181],"low":[183],"false":[184],"positive":[185],"rate.":[186],"We":[187],"demonstrate":[188],"effectiveness":[190],"by":[193],"experimenting":[194],"on":[195],"data":[196],"obtained":[197],"real-world":[199]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2888096149","counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":22},{"year":2022,"cited_by_count":36},{"year":2021,"cited_by_count":34},{"year":2020,"cited_by_count":28},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":1}],"updated_date":"2025-04-23T21:25:53.674294","created_date":"2018-08-31"}