File(s) not publicly available

Integrity of IoT network flow records in encrypted traffic analytics

chapter
posted on 2023-03-16, 22:24 authored by AK Cherukuri, IS Thaseen, Gang LiGang Li, Xiao LiuXiao Liu, V Das, A Raj
Identifying threats in encrypted network traffic without compromising the integrity of the data is an important issue. Many IoT devices communicate with the cloud to store and process information. Telemetry of this network flow is used to analyze the traffic. This chapter discusses different flow-based approaches for traffic classification and how to ensure integrity of flow records between senders to collector in IoT network. It presents the background of the encrypted traffic analytics. The chapter then outlines flow-based telemetry and threats to telemetry data. An authentication technique using hashing for flow-based data is discussed. A case study is demonstrated with three different cases to simulate the various cases proposed for authenticating the flow-based data using benchmark IoT flow-based dataset. The three different cases include hashed flow record; symmetric with hash flow record and asymmetric with hash flow record.

History

Chapter number

7

Pagination

177-205

ISBN-13

9781119607748

Language

eng

Publication classification

B1 Book chapter

Extent

10

Editor/Contributor(s)

Awad AI, Abawajy J

Publisher

Wiley

Place of publication

London, Eng.

Title of book

Security and Privacy in the Internet of Things: Architectures, Techniques, and Applications

Usage metrics

Categories

Exports