{"title":"IoT Gateways Network Communication Analysis","authors":"Jan Zbořil, Ondřej Hujňák, K. Malinka","doi":"10.1109/ICOIN56518.2023.10049047","DOIUrl":null,"url":null,"abstract":"Modern IoT gateways are mainly developed by corporates. This results in closed systems, where a small amount of information about gateways is available to the public. Thus, we find it important to analyse network traffic of such gateways.This paper’s primary goal is to gain information from network traffic data of commercially available gateways intended for home use. This information can be used, for example, for device profiling. We deploy four gateways in a controlled environment and capture their traffic in two modes. We analyse communication behaviours, point out interesting and unusual patterns in traffic, compare results to other studies, and discuss possible attacks on used gateways based on our data. We also published the gathered dataset.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Information Networking (ICOIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN56518.2023.10049047","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Modern IoT gateways are mainly developed by corporates. This results in closed systems, where a small amount of information about gateways is available to the public. Thus, we find it important to analyse network traffic of such gateways.This paper’s primary goal is to gain information from network traffic data of commercially available gateways intended for home use. This information can be used, for example, for device profiling. We deploy four gateways in a controlled environment and capture their traffic in two modes. We analyse communication behaviours, point out interesting and unusual patterns in traffic, compare results to other studies, and discuss possible attacks on used gateways based on our data. We also published the gathered dataset.