scispace - formally typeset
A

Arunan Sivanathan

Researcher at University of New South Wales

Publications -  16
Citations -  1179

Arunan Sivanathan is an academic researcher from University of New South Wales. The author has contributed to research in topics: Smart environment & Computer science. The author has an hindex of 9, co-authored 14 publications receiving 618 citations.

Papers
More filters
Journal ArticleDOI

Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics

TL;DR: This study paves the way for operators of smart environments to monitor their IoT assets for presence, functionality, and cyber-security without requiring any specialized devices or protocols.
Proceedings ArticleDOI

Characterizing and classifying IoT traffic in smart cities and campuses

TL;DR: This paper proposes the use of network traffic analytics to characterize IoT devices, including their typical behaviour mode, and develops a classification method that can not only distinguish IoT from non-IoT traffic, but also identify specific IoT devices with over 95% accuracy.
Proceedings ArticleDOI

Systematically Evaluating Security and Privacy for Consumer IoT Devices

TL;DR: This paper develops scripts to automate the security testing along four dimensions, subject twenty market-ready consumer IoT devices to the test suite, and reveals findings that give a fairly comprehensive picture of the security/privacy posture of these devices.
Proceedings ArticleDOI

Quantifying the reflective DDoS attack capability of household IoT devices

TL;DR: This paper quantifies the capability of consumer IoT devices to participate in reflective DDoS attacks and demonstrates reflection attacks in a real-world setting involving three IoT-equipped smart-homes, stressing the imminent need to address this problem before it becomes widespread.
Proceedings ArticleDOI

Low-cost flow-based security solutions for smart-home IoT devices

TL;DR: This paper conducts experiments with real attacks on real IoT devices to validate the flow-based security solution, and uses the collected traces as input to simulations to compare its processing performance against a packet-based solution.