WiFi Traffic Inspection for Obscured Devices

  • Maksuda Rabeya
  • , Nisha Panwar

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper proposes a logging scheme to create read-write efficient records for network traffic metadata. Our goal is to integrate user-trust guarantees in IoT-regulated public smart spaces. This logging scheme is based on a dual log system where the auditor can analyze the log and then predict network consistency and security through log verification. The logging scheme uses two separate Authenticated Data Structures (ADS), i.e., Bloom Filters (BF) and Merkle Hash Tree (MHT). The proposed network monitoring logging scheme provides a novel approach to enhance efficiency and reduce verification costs. Network auditing is critical for assessing the security and integrity of an organization’s information systems and network infrastructure. Many devices are connected to the IoT network, and keeping track of them is challenging for system administrators. Logging the information of the devices present in the network, whether registered or non-registered, can assist auditors in easily verifying any non-registered device in the network. Detecting non-registered devices can play a crucial role where the network’s security is the priority. Auditors can audit the IoT network without knowing the device details, which preserves organizational privacy for the third-party auditor. The experiment shows results for verification latency and proof storage size as main parameters. In our experiment, verification of Log 1, which was developed using Bloom Filter, took 0.0435 seconds. Log 2 was produced using MHT and took 0.000969 seconds, while verifying using the linear algorithm took 31.159783 seconds. The linear log size is 292 MB of metadata, whereas the proposed scheme takes 1.63 kb for Log 1 and 66 bytes for Log 2. Therefore, our proposed scheme shows promising results with a novel approach.

Original languageEnglish
Title of host publicationProceedings - 2024 22nd International Symposium on Network Computing and Applications, NCA 2024
PublisherInstitute of Electrical and Electronics Engineers
Pages72-79
Number of pages8
ISBN (Electronic)9798331510183
DOIs
StatePublished - 1 Jan 2024
Externally publishedYes
Event22nd International Symposium on Network Computing and Applications, NCA 2024 - Bertinoro, Italy
Duration: 24 Oct 202426 Oct 2024

Publication series

NameProceedings - 2024 22nd International Symposium on Network Computing and Applications, NCA 2024

Conference

Conference22nd International Symposium on Network Computing and Applications, NCA 2024
Country/TerritoryItaly
CityBertinoro
Period24/10/2426/10/24

Keywords

  • ADS
  • Authentication
  • Bloom filter
  • IoT
  • MHT
  • Network security
  • Verification
  • device localization

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'WiFi Traffic Inspection for Obscured Devices'. Together they form a unique fingerprint.

Cite this