Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
survey

Device Fingerprinting for Cyber-Physical Systems: A Survey

Published: 17 July 2023 Publication History
  • Get Citation Alerts
  • Abstract

    The continued growth of the cyber-physical system (CPS) and Internet of Things technologies raises device security and monitoring concerns. For device identification, authentication, conditioning, and security, device fingerprint/fingerprinting (DFP) is increasingly used. However, finding the correct DFP features and sources to establish a unique and stable fingerprint is challenging. We present a state-of-the-art survey of DFP techniques for CPS device applications. We investigate the numerous DFP features, their origins, characteristics, and applications. Additionally, we discuss the DFP characteristics and their sources in detail, taking into account the physical contexts of various entities (i.e., machines, sensors, networks, and computational devices), as well as their software and applications for the CPS. We believe that this article will provide researchers and developers with insights into the DFP and its applications, sources, aggregation methods, and factors affecting its use in CPS domains.

    References

    [1]
    Postscapes. 2019. IoT Standards and Protocols (Creative Commons License (CC BY-NC-SA 4.0). Retrieved September 19, 2019 from https://www.postscapes.com/internet-of-things-protocols/.
    [2]
    Robab Abdolkhani, Kathleen Gray, Ann Borda, and Ruth DeSouza. 2019. Patient-generated health data management and quality challenges in remote patient monitoring. JAMIA Open 2, 4 (2019), 471–478.
    [3]
    Chuadhry Mujeeb Ahmed, Aditya Mathur, and Martin Ochoa. 2017. NoiSense: Detecting data integrity attacks on sensor measurements using hardware based fingerprints. arxiv:1712.01598 [cs.CR] (2017).
    [4]
    Chuadhry Mujeeb Ahmed and Aditya P. Mathur. 2017. Hardware identification via sensor fingerprinting in a cyber physical system. In Proceedings of the 2017 IEEE International Conference on Software Quality, Reliability, and Security Companion (QRS-C’17). IEEE, Los Alamitos, CA, 517–524.
    [5]
    Chuadhry Mujeeb Ahmed, Martin Ochoa, Jianying Zhou, Aditya P. Mathur, Rizwan Qadeer, Carlos Murguia, and Justin Ruths. 2018. NoisePrint: Attack detection using sensor and process noise fingerprint in cyber physical systems. In Proceedings of the 2018 on Asia Conference on Computer and Communications Security. ACM, New York, NY, 483–497.
    [6]
    Chuadhry Mujeeb Ahmed, Jianying Zhou, and Aditya P. Mathur. 2018. Noise matters: Using sensor and process noise fingerprint to detect stealthy cyber attacks and authenticate sensors in CPS. In Proceedings of the 34th Annual Computer Security Applications Conference. ACM, New York, NY, 566–581.
    [7]
    A. T. Al Ghazo and R. Kumar. 2019. ICS/SCADA device recognition: A hybrid communication-patterns and passive-fingerprinting approach. In Proceedings of the 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM’19). 19–24.
    [8]
    Nabil El Belghiti Alaoui, Patrick Tounsi, Alexandre Boyer, and Amaud Viard. 2019. Detecting PCB assembly defects using infrared thermal signatures. In Proceedings of the 26th International Conference on Mixed Design of Integrated Circuits and Systems (MIXDES’19). IEEE, Los Alamitos, CA, 345–349.
    [9]
    Ramón Alcarria, Borja Bordel, Diego Martín, and Diego Sánchez De Rivera. 2017. Rule-based monitoring and coordination of resource consumption in smart communities. IEEE Transactions on Consumer Electronics 63, 2 (2017), 191–199.
    [10]
    V. Alcácer and V. Cruz-Machado. 2019. Scanning the Industry 4.0: A literature review on technologies for manufacturing systems. Engineering Science and Technology 22, 3 (2019), 899–919.
    [11]
    A. A. Alkahtani, S. M. Norzeli, and F. H. Nordin. 2019. Condition monitoring through temperature vibration and radio frequency emission. Test Engineering and Management 800 (2019), 5621–5636.
    [12]
    Muhammad N. Aman, Kee Chaing Chua, and Biplab Sikdar. 2016. Position paper: Physical unclonable functions for IoT security. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. ACM, New York, NY, 10–13.
    [13]
    Irene Amerini, Rudy Becarelli, Roberto Caldelli, Alessio Melani, and Moreno Niccolai. 2017. Smartphone fingerprinting combining features of on-board sensors. IEEE Transactions on Information Forensics and Security 12, 10 (2017), 2457–2466.
    [14]
    Vafa Andalibi. 2022. Leveraging Machine Learning for End-User Security and Privacy Protection. Ph. D. Dissertation. Indiana University.
    [15]
    Elbren Antonio, Arnel Fajardo, and Ruji Medina. 2020. Tracking browser fingerprint using rule based algorithm. In Proceedings of the 2020 16th IEEE International Colloquium on Signal Processing and Its Applications (CSPA’20). IEEE, Los Alamitos, CA, 225–229.
    [16]
    Alberico Aramini, Marco Arazzi, Tullio Facchinetti, Laurence S. Q. N. Ngankem, and Antonino Nocera. 2022. An enhanced behavioral fingerprinting approach for the Internet of Things. In Proceedings of the 2022 IEEE 18th International Conference on Factory Communication Systems (WFCS’22). IEEE, Los Alamitos, CA, 1–8.
    [17]
    Maroua Ben Attia, Chamseddine Talhi, Abdelwahab Hamou-Lhadj, Babak Khosravifar, Vincent Turpaud, and Mario Couture. 2015. On-device anomaly detection for resource-limited systems. In Proceedings of the 30th Annual ACM Symposium on Applied Computing. 548–554.
    [18]
    Martin Azizyan and Romit Roy Choudhury. 2009. SurroundSense: Mobile phone localization using ambient sound and light. ACM SIGMOBILE Mobile Computing and Communications Review 13, 1 (2009), 69–72.
    [19]
    Leonardo Babun, Hidayet Aksu, and A. Selcuk Uluagac. 2021. CPS device-class identification via behavioral fingerprinting: From theory to practice. IEEE Transactions on Information Forensics and Security 16 (2021), 2413–2428.
    [20]
    Subramaniam Bagavathiappan, B. B. Lahiri, T. Saravanan, John Philip, and T. Jayakumar. 2013. Infrared thermography for condition monitoring—A review. Infrared Physics & Technology 60 (2013), 35–55.
    [21]
    Bruhadeshwar Bezawada, Indrakshi Ray, and Indrajit Ray. 2021. Behavioral fingerprinting of Internet-of-Things devices. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 11, 1 (2021), e1337.
    [22]
    Laksh Bhatia, Michael Breza, Ramona Marfievici, and Julie A. McCann. 2020. LoED: The LoRaWAN at the edge dataset: Dataset. In Proceedings of the 3rd Workshop on Data: Acquisition to Analysis. 7–8.
    [23]
    Ariel Bogle. 2014. A Cyber Attack May Have Caused a Turkish Oil Pipeline to Catch Fire in 2008. Retrieved January 30, 2021 from https://slate.com/technology/2014/12/bloomberg-reports-a-cyber-attack-may-have-made-a-turkish-oil-pipeline-catch-fire.html.
    [24]
    Li Cai and Yangyong Zhu. 2015. The challenges of data quality and data quality assessment in the big data era. Data Science Journal 14 (2015), 2.
    [25]
    Yinzhi Cao, Song Li, and Erik Wijmans. 2017. (Cross-)browser fingerprinting via OS and hardware level features. In Proceedings of the 2017 Network and Distributed System Security Symposium (NDSS’17). 1–15.
    [26]
    Metehan Cekic, Soorya Gopalakrishnan, and Upamanyu Madhow. 2020. Wireless fingerprinting via deep learning: The impact of confounding factors. arXiv preprint arXiv:2002.10791 (2020).
    [27]
    Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Gérôme Bovet, Gregorio Martínez Pérez, and Burkhard Stiller. 2022. CyberSpec: Intelligent behavioral fingerprinting to detect attacks on crowdsensing spectrum sensors. arXiv preprint arXiv:2201.05410 (2022).
    [28]
    Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Miguel Azorín Castillo, Gérôme Bovet, Gregorio Martínez Pérez, and Burkhard Stiller. 2022. Intelligent and behavioral-based detection of malware in IoT spectrum sensors. International Journal of Information Security 2022 (2022), 1–21.
    [29]
    Dajiang Chen, Ning Zhang, Zhen Qin, Xufei Mao, Zhiguang Qin, Xuemin Shen, and Xiang-Yang Li. 2016. S2M: A lightweight acoustic fingerprints-based wireless device authentication protocol. IEEE Internet of Things Journal 4, 1 (2016), 88–100.
    [30]
    Long Cheng, Ke Tian, Danfeng Daphne Yao, Lui Sha, and Raheem A. Beyah. 2019. Checking is believing: Event-aware program anomaly detection in cyber-physical systems. IEEE Transactions on Dependable and Secure Computing 18, 2 (2019), 825–842.
    [31]
    Yushi Cheng, Xiaoyu Ji, Juchuan Zhang, Wenyuan Xu, and Yi-Chao Chen. 2019. DeMiCPU: Device fingerprinting with magnetic signals radiated by CPU. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS’19). 1149–1170.
    [32]
    Kyong-Tak Cho and Kang G Shin. 2016. Fingerprinting electronic control units for vehicle intrusion detection. In Proceedings of the 25th USENIX Security Symposium (USENIX Security’16). 911–927.
    [33]
    Rajarshi Roy Chowdhury and Pg Emeroylariffion Abas. 2022. A survey on device fingerprinting approach for resource-constraint IoT devices: Comparative study and research challenges. Internet of Things 20 (2022), 100632.
    [34]
    W. E. Cobb, E. W. Garcia, M. A. Temple, R. O. Baldwin, and Y. C. Kim. 2010. Physical layer identification of embedded devices using RF-DNA fingerprinting. In Proceedings of the 2010 Military Communications Conference (MILCOM’20). 2168–2173.
    [35]
    Javier Criado, José Andrés Asensio, Nicolás Padilla, and Luis Iribarne. 2018. Integrating cyber-physical systems in a component-based approach for smart homes. Sensors 18, 7 (2018), 2156.
    [36]
    Frankie A. Cruz. 2019. Near Real-Time RF-DNA Fingerprinting for ZigBee Devices Using Software Defined Radios. Technical Report. Air Force Institute of Technology, Wright-Patterson AFB, OH.
    [37]
    Ang Cui. 2015. funtenna. Retrieved February 28, 2023 from https://github.com/funtenna.
    [38]
    Yesheng Cui, Sami Kara, and Ka C. Chan. 2020. Manufacturing big data ecosystem: A systematic literature review. Robotics and Computer-Integrated Manufacturing 62 (2020), 101861.
    [39]
    Anupam Das, Nikita Borisov, and Matthew Caesar. 2014. Do you hear what I hear? Fingerprinting smart devices through embedded acoustic components. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, NY, 441–452.
    [40]
    Anupam Das, Nikita Borisov, and Matthew Caesar. 2016. Tracking mobile web users through motion sensors: Attacks and defenses. In Proceedings of the 2016 Network and Distributed System Security Symposium (NDSS’16).
    [41]
    José Paulo G. de Oliveira, Carmelo J. A. Bastos-Filho, and Sergio Campello Oliveira. 2022. Non-invasive embedded system hardware/firmware anomaly detection based on the electric current signature. Advanced Engineering Informatics 51 (2022), 101519.
    [42]
    Jyoti Dhiman. 2021. Is Machine Learning the Future of Data Quality? Retrieved November 9, 2022 from https://towardsdatascience.com/have-you-started-using-machine-learning-for-data-quality-yet-c0136e0957ac.
    [43]
    Kadriye Dogan and Ozlem Durmaz Incel. 2019. Mobile device identification via user behavior analysis. In Proceedings of the International Conference on Big Data Innovations and Applications. 32–46.
    [44]
    Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, and Kehuan Zhang. 2019. Your smart home can’t keep a secret: Towards automated fingerprinting of IoT traffic with neural networks. arXiv preprint arXiv:1909.00104 (2019).
    [45]
    Dwight T. Dumpert. 1994. Infrared techniques for printed circuit board (PCB) evaluation. In Infrared Methodology and Technology. Gordon and Breach Science Publishers, Great Britain, 253–264.
    [46]
    Mohammed El-Hajj, Ahmad Fadlallah, Maroun Chamoun, and Ahmed Serhrouchni. 2019. A survey of Internet of Things (IoT) authentication schemes. Sensors 19, 5 (2019), 1141.
    [47]
    Omar E. Elejla, Bahari Belaton, Mohammed Anbar, and Basem O. Alijla. 2017. IPv6 OS fingerprinting methods: Review. In Advances in Visual Informatics, Halimah Badioze Zaman, Peter Robinson, Alan F. Smeaton, Timothy K. Shih, Sergio Velastin, Tada Terutoshi, Azizah Jaafar, and Nazlena Mohamad Ali (Eds.). Springer International Publishing, Cham, Switzerland, 661–668.
    [48]
    Abdurrahman Elmaghbub and Bechir Hamdaoui. 2021. LoRa device fingerprinting in the wild: Disclosing RF data-driven fingerprint sensitivity to deployment variability. IEEE Access 9 (2021), 142893–142909.
    [49]
    Xinlei Fan, Gaopeng Gou, Cuicui Kang, Junzheng Shi, and Gang Xiong. 2019. Identify OS from encrypted traffic with TCP/IP stack fingerprinting. In Proceedings of the 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC’19). IEEE, Los Alamitos, CA, 1–7.
    [50]
    Xiaotao Feng, Xiaogang Zhu, Qing-Long Han, Wei Zhou, Sheng Wen, and Yang Xiang. 2023. Detecting vulnerability on IoT device firmware: A survey. IEEE/CAA Journal of Automatica Sinica 10, 1 (2023), 25–41.
    [51]
    Roman Ferrando and Paul Stacey. 2017. Classification of device behaviour in Internet of Things infrastructures: Towards distinguishing the abnormal from security threats. In Proceedings of the 1st International Conference on Internet of Things and Machine Learning. 1–7.
    [52]
    Micro Focus. 2019. Device fingerprinting for low friction authentication. White Paper, NETIQ. Retrieved February 28, 2023 from https://www.netiq.com/docrep/documents/x6pyuysuqu/device_fingerprinting_for_low_friction_authentication_wp.pdf.
    [53]
    National Security Staff Interagency Policy Coordination Subcommittee for Preparedness, Response to Radiological, and Nuclear Threats. 2021. Planning Guidance for Response to a Nuclear Detonation (3rd ed.). Draft.
    [54]
    David Formby, Preethi Srinivasan, Andrew Leonard, Jonathan Rogers, and Raheem A. Beyah. 2016. Who’s in control of your control system? Device fingerprinting for cyber-physical systems. In Proceedings of the 2016 Network and Distributed System Security Symposium (NDSS’16).
    [55]
    Michele Forzley. 2003. Counterfeit Goods and the Public’s Health and Safety. Technical Report. International Intellectual Property Institute.
    [56]
    Ke Gao, Cherita Corbett, and Raheem Beyah. 2010. A passive approach to wireless device fingerprinting. In Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’10). IEEE, Los Alamitos, CA, 383–392.
    [57]
    Soorya Gopalakrishnan, Metehan Cekic, and Upamanyu Madhow. 2019. Robust wireless fingerprinting via complex-valued neural networks. In Proceedings of the 2019 IEEE Global Communications Conference (GLOBECOM’19). IEEE, Los Alamitos, CA, 1–6.
    [58]
    Richard R. Goulette, Stanilus K. Xavier, and Raymond L. Greenfield. 1991. Method and apparatus for monitoring electromagnetic emission levels. US Patent 5,006,788.
    [59]
    Christopher Greer, Martin Burns, David Wollman, and Edward Griffor. 2019. Cyber-Physical Systems and Internet of Things. NIST.
    [60]
    Qinchen Gu, David Formby, Shouling Ji, Hasan Cam, and Raheem Beyah. 2018. Fingerprinting for cyber-physical system security: Device physics matters too. IEEE Security & Privacy 16, 5 (2018), 49–59.
    [61]
    Anton Gulenko, Marcel Wallschläger, Florian Schmidt, Odej Kao, and Feng Liu. 2016. A system architecture for real-time anomaly detection in large-scale NFV systems. Procedia Computer Science 94 (2016), 491–496.
    [62]
    Mordechai Guri, Dima Bykhovsky, and Yuval Elovici. 2017. aIR-Jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (IR). arxiv:1709.05742 [cs.CR] (2017).
    [63]
    Mordechai Guri, Andrey Daidakulov, and Yuval Elovici. 2018. MAGNETO: Covert channel between air-gapped systems and nearby smartphones via CPU-generated magnetic fields. arxiv:1802.02317 [cs.CR] (2018).
    [64]
    Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, and Yuval Elovici. 2015. GSMem: Data exfiltration from air-gapped computers over GSM frequencies. In Proceedings of the 24th USENIX Security Symposium (USENIX Security’15). 849–864.
    [65]
    Mordechai Guri, Gabi Kedma, Assaf Kachlon, and Yuval Elovici. 2014. AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies. arxiv:1411.0237 [cs.CR] (2014).
    [66]
    Mordechai Guri, Matan Monitz, and Yuval Elovici. 2016. USBee: Air-gap covert-channel via electromagnetic emission from USB. arxiv:1608.08397 [cs.CR] (2016).
    [67]
    Mordechai Guri, Matan Monitz, Yisroel Mirski, and Yuval Elovici. 2015. BitWhisper: Covert signaling channel between air-gapped computers using thermal manipulations. arxiv:1503.07919 [cs.CR] (2015).
    [68]
    Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, and Yuval Elovici. 2016. Fansmitter: Acoustic data exfiltration from (speakerless) air-gapped computers. arxiv:1606.05915 [cs.CR] (2016).
    [69]
    Mordechai Guri, Boris Zadov, Dima Bykhovsky, and Yuval Elovici. 2018. PowerHammer: Exfiltrating data from air-gapped computers through power lines. arxiv:1804.04014 [cs.CR] (2018).
    [70]
    Mordechai Guri, Boris Zadov, Dima Bykhovsky, and Yuval Elovici. 2019. CTRL-ALT-LED: Leaking data from air-gapped computers via keyboard LEDs. In Proceedings of the 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC’19), Vol. 1. IEEE, Los Alamitos, CA, 801–810.
    [71]
    Mordechai Guri, Boris Zadov, Andrey Daidakulov, and Yuval Elovici. 2017. xLED: Covert data exfiltration from air-gapped networks via router LEDs. arxiv:1706.01140 [cs.CR] (2017).
    [72]
    Mordechai Guri, Boris Zadov, Andrey Daidakulov, and Yuval Elovici. 2018. ODINI : Escaping sensitive data from Faraday-caged, air-gapped computers via magnetic fields. arxiv:1802.02700 [cs.CR] (2018).
    [73]
    Jose A. Gutierrez del Arroyo, Brett J. Borghetti, and Michael A. Temple. 2022. Considerations for radio frequency fingerprinting across multiple frequency channels. Sensors 22, 6 (2022), 2111.
    [74]
    Adam Haavik. 2021. Deep Learning-Based Traffic Classification for Network Penetration Testing. Master’s Thesis. Karlstads University.
    [75]
    Muhammad Shadi Hajar, M. Omar Al-Kadri, and Harsha Kumara Kalutarage. 2021. A survey on wireless body area networks: Architecture, security challenges and research opportunities. Computers & Security 104 (2021), 102211.
    [76]
    Jason R. Hamlet, Mitchell T. Martin, and Nathan J. Edwards. 2017. Unique signatures from printed circuit board design patterns and surface mount passives. In Proceedings of the 2017 International Carnahan Conference on Security Technology (ICCST’17). IEEE, Los Alamitos, CA, 1–6.
    [77]
    Ayyoob Hamza, Hassan Habibi Gharakheili, Theophilus A. Benson, and Vijay Sivaraman. 2019. Detecting volumetric attacks on lot devices via SDN-based monitoring of mud activity. In Proceedings of the 2019 ACM Symposium on SDN Research. 36–48.
    [78]
    S. He and S. G. Chan. 2016. Wi-Fi fingerprint-based indoor positioning: Recent advances and comparisons. IEEE Communications Surveys Tutorials 18, 1 (Firstquarter2016), 466–490.
    [79]
    Sheng-Jen Hsieh. 2001. Thermal signature for printed circuit board stress-failure diagnosis. In Thermosense XXIII, Vol. 4360. International Society for Optics and Photonics, 60–70.
    [80]
    Jingyu Hua, Hongyi Sun, Zhenyu Shen, Zhiyun Qian, and Sheng Zhong. 2018. Accurate and efficient wireless device fingerprinting using channel state information. In Proceedings of the 2018 IEEEINFOCOM Conference on Computer Communications (INFOCOM’18). IEEE, Los Alamitos, CA, 1700–1708.
    [81]
    Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, and Bo Luo. 2017. Cyber-physical systems security—A survey. IEEE Internet of Things Journal 4, 6 (2017), 1802–1831.
    [82]
    Mark Hung. 2017. Leading the IoT, Gartner Insights on How to Lead in a Connected World. Gartner Research.
    [83]
    Taswar Iqbal and Kai-Dietrich Wolf. 2017. PCB surface fingerprints based counterfeit detection of electronic devices. Electronic Imaging 2017, 7 (2017), 144–149.
    [84]
    Fehmi Jaafar. 2017. An integrated architecture for IoT fingerprinting. In Proceedings of the 2017 IEEE International Conference on Software Quality, Reliability, and Security Companion (QRS-C’17). IEEE, Los Alamitos, CA, 601–602.
    [85]
    Hossein Jafari, Oluwaseyi Omotere, Damilola Adesina, Hsiang-Huang Wu, and Lijun Qian. 2018. IoT devices fingerprinting using deep learning. In Proceedings of the 2018 IEEE Military Communications Conference (MILCOM’18). IEEE, Los Alamitos, CA, 1–9.
    [86]
    Anu Jagannath, Jithin Jagannath, and Prem Sagar Pattanshetty Vasanth Kumar. 2022. A comprehensive survey on radio frequency (RF) fingerprinting: Traditional approaches, deep learning, and open challenges. Computer Networks 219 (2022), 109455.
    [87]
    Zhongfeng Jin, Nan Li, Chao Liu, Meimei Li, Shaohua An, and Weiqing Huang. 2021. A contextual and content features-based device behavioral fingerprinting method in smart grid. In Proceedings of the 2021 IEEE 23rd International Conference on High Performance Computing and Communications, the 7th International Conference on Data Science and Systems, the 19th International Conference on Smart City, and the 7th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Application (HPCC/DSS/SmartCity/DependSys’21). IEEE, Los Alamitos, CA, 415–422.
    [88]
    Arun Cyril Jose, Reza Malekian, and Ning Ye. 2016. Improving home automation security; integrating device fingerprinting into smart home. IEEE Access 4 (2016), 5776–5787.
    [89]
    Khurum Nazir Junejo and David Yau. 2016. Data driven physical modelling for intrusion detection in cyber physical systems. In Proceedings of the Singapore Cyber-Security Conference (SG-CRC’16).43–57.
    [90]
    Farzana Kabir, Brandon Foggo, and Nanpeng Yu. 2018. Data driven predictive maintenance of distribution transformers. In Proceedings of the 2018 China International Conference on Electricity Distribution (CICED’18). IEEE, Los Alamitos, CA, 312–316.
    [91]
    Anastasis Keliris and Michail Maniatakos. 2016. Remote field device fingerprinting using device-specific modbus information. In Proceedings of the 2016 IEEE 59th International Midwest Symposium on Circuits and Systems (MWSCAS’16). IEEE, Los Alamitos, CA, 1–4.
    [92]
    Sye Loong Keoh. 2016. Cyber-physical systems are at risk. Infosecurity Magazine. Retrieved July 25, 2020 from https://www.infosecurity-magazine.com/next-gen-infosec/cyberphysical-systems-risk-1/.
    [93]
    Qasim Khan, Asfar A. Khan, and Furkan Ahmad. 2016. Condition monitoring tool for electrical equipment–Thermography. In Proceedings of the 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT’16). IEEE, Los Alamitos, CA, 2802–2806.
    [94]
    Raghbir Singh Khandpur. 2005. Printed Circuit Boards: Design, Fabrication, Assembly and Testing. McGraw-Hill Education.
    [95]
    Sangjun Kim, Kyung-Joon Park, and Chenyang Lu. 2022. A survey on network security for cyber-physical systems: From threats to resilient design. IEEE Communications Surveys & Tutorials 24, 3 (2022), 1534–1573.
    [96]
    Eric D. Knapp and Joel Thomas Langill. 2014. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems. Syngress.
    [97]
    Anna Kobusinska, Jerzy Brzezinski, and Kamil Pawulczuk. 2017. Device fingerprinting: Analysis of chosen fingerprinting methods. In Proceedings of the 2nd International Conference on Internet of Things, Big Data, and Security (IoTBDS’17). 167–177.
    [98]
    Andrzej Kochański. 2010. Data preparation. Computer Methods in Materials Science 10, 1 (2010), 25–29.
    [99]
    Tadayoshi Kohno, Andre Broido, and Kimberly C. Claffy. 2005. Remote physical device fingerprinting. IEEE Transactions on Dependable and Secure Computing 2, 2 (2005), 93–108.
    [100]
    Sven Kosub. 2019. A note on the triangle inequality for the Jaccard distance. Pattern Recognition Letters 120 (2019), 36–38.
    [101]
    Vijav Kumar and Kolin Paul. 2021. DevFing: Robust LCR based device fingerprinting. In Proceedings of the 2021 10th Mediterranean Conference on Embedded Computing (MECO’21). IEEE, Los Alamitos, CA, 1–6.
    [102]
    Andreas Kurtz, Hugo Gascon, Tobias Becker, Konrad Rieck, and Felix Freiling. 2016. Fingerprinting mobile devices using personalized configurations. Proceedings on Privacy Enhancing Technologies 2016, 1 (2016), 4–19.
    [103]
    Abraham Peedikayil Kuruvila, Ioannis Zografopoulos, Kanad Basu, and Charalambos Konstantinou. 2021. Hardware-assisted detection of firmware attacks in inverter-based cyberphysical microgrids. International Journal of Electrical Power & Energy Systems 132 (2021), 107150.
    [104]
    Pierre Laperdrix, Nataliia Bielova, Benoit Baudry, and Gildas Avoine. 2019. Browser fingerprinting: A survey. arXiv preprint arXiv:1905.01051 (2019).
    [105]
    Sam Leroux, Steven Bohez, Pieter-Jan Maenhaut, Nathan Meheus, Pieter Simoens, and Bart Dhoedt. 2018. Fingerprinting encrypted network traffic types using machine learning. In Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium (NOMS’18). IEEE, Los Alamitos, CA, 1–5.
    [106]
    Daoliang Li, Ying Wang, Jinxing Wang, Cong Wang, and Yanqing Duan. 2020. Recent advances in sensor fault diagnosis: A review. Sensors and Actuators A: Physical 309 (2020), 111990.
    [107]
    Fudong Li, Nathan Clarke, Maria Papadaki, and Paul Dowland. 2014. Active authentication for mobile devices utilising behaviour profiling. International Journal of Information Security 13, 3 (2014), 229–244.
    [108]
    Chia-Te Liao, Wen-Hao Lee, and Shang-Hong Lai. 2012. A flexible PCB inspection system based on statistical learning. Journal of Signal Processing Systems 67, 3 (2012), 279–290.
    [109]
    Libelium. 2019. 50 Sensor Applications for a Smarter World. Retrieved September 25, 2020 from http://www.libelium.com/resources/top_50_iot_sensor_applications_ranking/.
    [110]
    Weisong Liu, Xueqiong Li, Zhitao Huang, and Xiang Wang. 2021. Transmitter fingerprinting for VLC systems via deep feature separation network. IEEE Photonics Journal 13, 6 (2021), 1–7.
    [111]
    Xindan Liu, Ying Zhang, Menghua Wu, Zhiguo Ma, and Hui Cao. 2020. Color discrimination and gas chromatography-mass spectrometry fingerprint based on chemometrics analysis for the quality evaluation of Schizonepetae Spica. PLOS One 15, 1 (2020), e0227235.
    [112]
    Zengrui Liu, Prakash Shrestha, and Nitesh Saxena. 2021. Gummy browsers: Targeted browser spoofing against state-of-the-art fingerprinting techniques. arXiv preprint arXiv:2110.10129 (2021).
    [113]
    Amine Mahami, Chemseddine Rahmoune, Toufik Bettahar, and Djamel Benazzouz. 2021. Induction motor condition monitoring using infrared thermography imaging and ensemble learning techniques. Advances in Mechanical Engineering 13, 11 (2021), 16878140211060956.
    [114]
    C. Mak, M. A. Hon, W. Lau, and W. Cheung. 2014. Refined Wi-Fi fingerprinting with tag-less proximity-based positioning technique. In Proceedings of the 2014 International Conference on Indoor Positioning and Indoor Navigation (IPIN’14). 758–761.
    [115]
    Georgios Michail Makrakis, Constantinos Kolias, Georgios Kambourakis, Craig Rieger, and Jacob Benjamin. 2021. Industrial and critical infrastructure security: Technical analysis of real-life security incidents. IEEE Access 9 (2021), 165295–165325.
    [116]
    Giuseppe Manco, Ettore Ritacco, Pasquale Rullo, Lorenzo Gallucci, Will Astill, Dianne Kimber, and Marco Antonelli. 2017. Fault detection and explanation through big data analysis on sensor streams. Expert Systems with Applications 87 (2017), 141–156.
    [117]
    Noman Mazhar, Rosli Salleh, Muhammad Zeeshan, and M. Muzaffar Hameed. 2021. Role of device identification and manufacturer usage description in IoT security: A survey. IEEE Access 9 (2021), 41757–41786.
    [118]
    K. Merchant, S. Revay, G. Stantchev, and B. Nousain. 2018. Deep learning for RF device fingerprinting in cognitive communication networks. IEEE Journal of Selected Topics in Signal Processing 12, 1 (Feb.2018), 160–167.
    [119]
    Yan Michalevsky, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh, and Gabi Nakibly. 2015. Powerspy: Location tracking using mobile device power analysis. In Proceedings of the 24th USENIX Security Symposium (USENIX Security’15). 785–800.
    [120]
    M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A. Sadeghi, and S. Tarkoma. 2017. IoT SENTINEL: Automated device-type identification for security enforcement in IoT. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS’17). 2177–2184.
    [121]
    Georgy Minaev, Ari Visa, and Robert Piché. 2017. Comprehensive survey of similarity measures for ranked based location fingerprinting algorithm. In Proceedings of the 2017 International Conference on Indoor Positioning and Indoor Navigation (IPIN’17). IEEE, Los Alamitos, CA, 1–4.
    [122]
    Yisroel Mirsky, Mordechai Guri, and Yuval Elovici. 2017. HVACKer: Bridging the air-gap by attacking the air conditioning system. arxiv:1703.10454 [cs.CR] (2017).
    [123]
    R. Keith Mobley. 2002. An Introduction to Predictive Maintenance. Elsevier.
    [124]
    John V. Monaco. 2022. Device fingerprinting with peripheral timestamps. In Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP’22). IEEE, Los Alamitos, CA, 1018–1033.
    [125]
    László Monostori, Botond Kádár, Thomas Bauernhansl, Shinsuke Kondoh, Soundar Kumara, Gunther Reinhart, Olaf Sauer, Gunther Schuh, Wilfried Sihn, and Kenichi Ueda. 2016. Cyber-physical systems in manufacturing. CIRP Annals 65, 2 (2016), 621–641.
    [126]
    Chuadhry Mujeeb Ahmed and Jianying Zhou. 2020. Challenges and opportunities in CPS security: A physics-based perspective. arXiv e-prints arXiv:2004.03178 (2020).
    [127]
    Ehtasham Mustafa, Ramy S. A. Afia, and Zoltán Ádám Tamus. 2020. Condition monitoring uncertainties and thermal-radiation multistress accelerated aging tests for nuclear power plant cables: A review. Periodica Polytechnica Electrical Engineering and Computer Science 64, 1 (2020), 20–32.
    [128]
    Jithendra P. R. Nayak, K. Anitha, and P. Rashmi. 2017. PCB fault detection using image processing. In IOP Conference Series: Materials Science and Engineering, Vol. 225. IOP Publishing, 012244.
    [129]
    James Newsome, Elaine Shi, Dawn Song, and Adrian Perrig. 2004. The Sybil attack in sensor networks: Analysis & defenses. In Proceedings of the 2004 3rd International Symposium on Information Processing in Sensor Networks (IPSN’04). IEEE, Los Alamitos, CA, 259–268.
    [130]
    Oliver Niggemann, Gautam Biswas, John S. Kinnebrew, Hamed Khorasgani, Sören Volgmann, and Andreas Bunte. 2015. Data-driven monitoring of cyber-physical systems leveraging on big data and the Internet-of-Things for diagnosis and control. In Proceedings of the International Workshop on the Principles of Diagnosis (DX@ Safeprocess’15). 185–192.
    [131]
    Nick Nikiforakis, Alexandros Kapravelos, Wouter Joosen, Christopher Kruegel, Frank Piessens, and Giovanni Vigna. 2013. Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In Proceedings of the 2013 IEEE Symposium on Security and Privacy(SP’13). IEEE, Los Alamitos, CA, 541–555.
    [132]
    Nitesh Nitesh Varma Rudraraju and Varun Varun Boyanapally. 2019. Data Quality Model for Machine Learning. Master’s Thesis. Blekinge Institute of Technology.
    [133]
    NortonLifeLock. 2021. What is antivirus software? Norton. Retrieved August 9, 2021 from https://us.norton.com/internetsecurity-malware-what-is-antivirus.html.
    [134]
    Elena Nyemkova. 2017. Invariants of noise in cyber-physical systems components. Advances in Cyber-Physical Systems 2, 2 (2017), 63–70.
    [135]
    Roque Alfredo Osornio-Rios, Jose Alfonso Antonino-Daviu, and Rene de Jesus Romero-Troncoso. 2018. Recent industrial applications of infrared thermography: A review. IEEE Transactions on Industrial Informatics 15, 2 (2018), 615–625.
    [136]
    Karl Ott and Rabi Mahapatra. 2019. Continuous authentication of embedded software. In Proceedings of the 2019 18th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications and the 13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE’19). IEEE, Los Alamitos, CA, 128–135.
    [137]
    Volker Paelke and Carsten Röcker. 2015. User interfaces for cyber-physical systems: Challenges and possible approaches. In Design, User Experience, and Usability: Design Discourse. Springer, 75–85.
    [138]
    P. Paganini. 2016. 150,000 IoT Devices Behind the 1Tbps DDoS Attack on OVH. Retrieved February 28, 2023 from http://securityaffairs.co/wordpress/51726/cyber-crime/ovh-hit-botnet-iot.html.
    [139]
    Arpan Pal, Hemant Kumar Rath, Samar Shailendra, and Abhijan Bhattacharyya. 2018. IoT standardization: The road ahead. In Internet of Things: Technology, Applications and Standardization, Jaydip Sen (Ed.). IntechOpen, 53.
    [140]
    Steven Paley, Tamzidul Hoque, and Swarup Bhunia. 2016. Active protection against PCB physical tampering. In Proceedings of the 2016 17th International Symposium on Quality Electronic Design (ISQED’16). IEEE, Los Alamitos, CA, 356–361.
    [141]
    Jonathan Pan. 2021. IoT network behavioral fingerprint inference with limited network traces for cyber investigation. In Proceedings of the 2021 International Conference on Artificial Intelligence in Information and Communication (ICAIIC’21). IEEE, Los Alamitos, CA, 263–268.
    [142]
    Michael G. Pecht and Myeongsu Kang. 2019. Predictive maintenance in the IoT era. In Proceedings of the Cortana Analytics Workshop.
    [143]
    Emmanuel S. Pilli, R. C. Joshi, and Rajdeep Niyogi. 2010. Network forensic frameworks: Survey and research challenges. Digital Investigation 7, 1 (2010), 14–27.
    [144]
    Ivan Miguel Pires, Rui Santos, Nuno Pombo, Nuno M. Garcia, Francisco Flórez-Revuelta, Susanna Spinsante, Rossitza Goleva, and Eftim Zdravevski. 2018. Recognition of activities of daily living based on environmental analyses using audio fingerprinting techniques: A systematic review. Sensors 18, 1 (2018), 160.
    [145]
    Peter Popaleny and Nicolas Péton. 2019. Cryogenic pumps monitoring, diagnostics and expert systems using motor current signature analyses and vibration analyses. In Fluids Engineering Division Summer Meeting, Vol. 59056. American Society of Mechanical Engineers.
    [146]
    PROTRONIX. 2016. Operating Principles of Air Quality Sensors. Retrieved February 28, 2023 from https://www.careforair.eu/en/on-what-principles-do-air-quality-sensors-work/.
    [147]
    Quan Qian, Jing Cai, Mengbo Xie, and Rui Zhang. 2016. Malicious behavior analysis for Android applications. International Journal of Network Security 18, 1 (2016), 182–192.
    [148]
    Soundarya Ramesh, Thomas Pathier, and Jun Han. 2019. SoundUAV: Towards delivery drone authentication via acoustic noise fingerprinting. In Proceedings of the 5th Workshop on Micro Aerial Vehicle Networks, Systems, and Applications. 27–32.
    [149]
    V. P. Rasheeda. 2020. Improving home automation security integrating device fingerprinting into smart home. International Journal of Research and Analytical Reviews 7, 1 (2020), 858–863.
    [150]
    M. Raspopoulos, C. Laoudias, L. Kanaris, A. Kokkinis, C. G. Panayiotou, and S. Stavrou. 2012. 3D ray tracing for device-independent fingerprint-based positioning in WLANs. In Proceedings of the 2012 9th Workshop on Positioning, Navigation, and Communication. 109–113.
    [151]
    Michael Rausch, Andrew Bakke, Suzanne Patt, Beth Wegner, and David Scott. 2014. Demonstrating a simple device fingerprinting system. In Proceedings of the Midwest Instruction and Computing Symposium.
    [152]
    Partha Pratim Ray. 2018. A survey on Internet of Things architectures. Journal of King Saud University—Computer and Information Sciences 30, 3 (2018), 291–319.
    [153]
    Jeffrey H. Reed and Carlos R. Aguayo Gonzalez. 2012. Enhancing smart grid cyber security using power fingerprinting: Integrity assessment and intrusion detection. In Proceedings of the 2012 Future of Instrumentation International Workshop (FIIW’12).IEEE, Los Alamitos, CA, 1–3.
    [154]
    Fatemeh Rezaei. 2021. Design and Implementation of Algorithms for Traffic Classification. Ph.D. Dissertation. University of Massachusetts Amherst.
    [155]
    M. Rezaei and M. Gholami. 2014. The recognition chemicals in fingerprints by gas chromatography/mass spectrometry. Scientific Quarterly of Research on Addiction 8, 30 (2014), 69–80.
    [156]
    Shamnaz Riyaz, Kunal Sankhe, Stratis Ioannidis, and Kaushik Chowdhury. 2018. Deep learning convolutional neural networks for radio identification. IEEE Communications Magazine 56, 9 (2018), 146–152.
    [157]
    Florentin Rochet and Tariq Elahi. 2022. Towards flexible anonymous networks. arXiv preprint arXiv:2203.03764 (2022).
    [158]
    Miguel A. Rodríguez-López, Luis M. López-González, Luis M. López-Ochoa, and Jesús Las-Heras-Casas. 2018. Methodology for detecting malfunctions and evaluating the maintenance effectiveness in wind turbine generator bearings using generic versus specific models from SCADA data. Energies 11, 4 (2018), 746.
    [159]
    Srikanth R. P. 2018. How device fingerprinting can help industrial control systems ward off cyber attacks from hackers. ExpressComputer. Retrieved February 28, 2023 from https://www.expresscomputer.in/news/how-device-fingerprinting-can-help-industrial-control-systems-ward-off-cyber-attacks-from-hackers/16237/.
    [160]
    Miraqa Safi, Sajjad Dadkhah, Farzaneh Shoeleh, Hassan Mahdikhani, Heather Molyneaux, and Ali A. Ghorbani. 2022. A survey on IoT profiling, fingerprinting, and identification. ACM Transactions on Internet of Things 3, 4 (2022), Article 26, 39 pages.
    [161]
    Tara Salman and Raj Jain. 2015. Networking protocols and standards for Internet of Things. In Internet of Things and Data AnalyticsHandbook. Wiley Telecom, 215–238.
    [162]
    Areeg Samir and Claus Pahl. 2020. Detecting and localizing anomalies in container clusters using Markov models. Electronics 9, 1 (2020), 64.
    [163]
    Hadi Sanati, David Wood, and Qiao Sun. 2018. Condition monitoring of wind turbine blades using active and passive thermography. Applied Sciences 8, 10 (2018), 2004.
    [164]
    Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, and Gregorio Martínez Pérez. 2021. A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets. IEEE Communications Surveys & Tutorials 23, 2 (2021), 1048–1077.
    [165]
    Iskander Sanchez-Rola, Igor Santos, and Davide Balzarotti. 2018. Clock around the clock: Time-based device fingerprinting. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, NY, 1502–1514.
    [166]
    Akshay A. Sarawade and Nadir N. Charniya. 2018. Infrared thermography and its applications: A review. In Proceedings of the 2018 3rd International Conference on Communication and Electronics Systems (ICCES’18). IEEE, Los Alamitos, CA, 280–285.
    [167]
    Akshay A. Sarawade and Nadir N. Charniya. 2019. Detection of faulty integrated circuits in PCB with thermal image processing. In Proceedings of the 2019 International Conference on Nascent Technologies in Engineering (ICNTE’19). IEEE, Los Alamitos, CA, 1–6.
    [168]
    Mohamed Seliem, Khalid Elgazzar, and Kasem Khalil. 2018. Towards privacy preserving IoT environments: A survey. Wireless Communications and Mobile Computing 2018, 2 (2018), 15.
    [169]
    Yaman Sharaf-Dabbagh and Walid Saad. 2016. On the authentication of devices in the Internet of Things. In Proceedings of the 2016 IEEE 17th International Symposium on a World of Wireless, Mobile, and Multimedia Networks (WoWMoM’16). IEEE, Los Alamitos, CA, 1–3.
    [170]
    Yaman Sharaf-Dabbagh and Walid Saad. 2017. Demo abstract: Cyber-physical fingerprinting for Internet of Things authentication. In Proceedings of the 2017 IEEE/ACM 2nd International Conference on Internet-of-Things Design and Implementation (IoTDI’17). IEEE, Los Alamitos, CA, 301–302.
    [171]
    Pawan Kumar Sharma, Jaspreet Singh, Yogita, and Vipin Pal. 2021. Low power communication in wireless sensor networks and IoT. In Smart Sensor Networks Using AI for Industry 4.0, Soumya Ranjan Nayak, Biswa Mohan Sahoo, Muthukumaran Malarvel, and Jibitesh Mishra. CRC Press, Boca Raton, FL, 221–233.
    [172]
    Shivani Sharma and Sateesh Kumar Awasthi. 2022. Introduction to intelligent transportation system: Overview, classification based on physical architecture, and challenges. International Journal of Sensor Networks 38, 4 (2022), 215–240.
    [173]
    Timothy W. Sheen, Jiann-Neng Chen, Stephen A. Cohen, Michael A. Baglino, and Joseph F. Wrinn. 1997. Printed circuit board tester using magnetic induction. US Patent 5,631,572.
    [174]
    Tanvir Alam Shifat and Jang Wook Hur. 2020. An effective stator fault diagnosis framework of BLDC motor based on vibration and current signals. IEEE Access 8 (2020), 106968–106981.
    [175]
    Hyeok-Ki Shin, Woomyo Lee, Jeong-Han Yun, and Hyoung-Chun Kim. 2019. Implementation of programmable CPS testbed for anomaly detection. In Proceedings of the 12th USENIX Workshop on Cyber Security Experimentation and Test (CSET’19).
    [176]
    Bhagya Nathali Silva, Murad Khan, and Kijun Han. 2018. Towards sustainable smart cities: A review of trends, architectures, components, and open challenges in smart cities. Sustainable Cities and Society 38 (2018), 697–713.
    [177]
    M. L. Sin, W. L. Soong, and Nesimi Ertugrul. 2003. Induction machine on-line condition monitoring and fault diagnosis—A survey. In Proceedings of the Australasian Universities Power Engineering Conference, Vol. 28. 1–6.
    [178]
    Ishwar Singh, Dan Centea, and Mo Elbestawi. 2019. IoT, IIoT and cyber-physical systems integration in the SEPT learning factory. Procedia Manufacturing 31 (2019), 116–122.
    [179]
    Matthew Smart, G. Robert Malan, and Farnam Jahanian. 2000. Defeating TCP/IP stack fingerprinting. In Proceedings of the 9th USENIX Security Symposium (USENIX Security’00).
    [180]
    Saleh Soltan, Prateek Mittal, and H. Vincent Poor. 2018. BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. In Proceedings of the 27th USENIX Security Symposium (USENIX Security’18). 15–32.
    [181]
    Pietro Spadaccino, Domenico Garlisi, Francesca Cuomo, Giorgio Pillon, and Patrizio Pisani. 2022. Discovery privacy threats via device de-anonymization in LoRaWAN. Computer Communications 189 (2022), 1–10.
    [182]
    Georgios Spanos, Konstantinos M. Giannoutakis, Konstantinos Votis, and Dimitrios Tzovaras. 2019. Combining statistical and machine learning techniques in IoT anomaly detection for smart homes. In Proceedings of the 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD’19). IEEE, Los Alamitos, CA, 1–6.
    [183]
    Hugh F. Spence. 1994. Printed circuit board diagnosis using artificial neural networks and circuit magnetic fields. IEEE Aerospace and Electronic Systems Magazine 9, 2 (1994), 20–24.
    [184]
    Hugh F. Spence, Daniel P. Burris, and Robert A. Houston. 1995. Fault detection and diagnosis for printed circuit boards. US Patent 5,440,566.
    [185]
    Anna Vladova Stoynova and Borislav Borisov Bonev. 2017. Infrared survey in electrical preventive maintenance. In Proceedings of the 2017 XXVI International Scientific Conference Electronics (ET’17). IEEE, Los Alamitos, CA, 1–4.
    [186]
    Krzysztof Stypułkowski, Paweł Gołda, Konrad Lewczuk, and Justyna Tomaszewska. 2021. Monitoring system for railway infrastructure elements based on thermal imaging analysis. Sensors 21, 11 (2021), 3819.
    [187]
    Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, and Gregorio Martínez Pérez. 2020. A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets. arxiv:2008.03343 [cs.CR] (2020).
    [188]
    Ko Takasu, Takamichi Saito, Tomotaka Yamada, and Takayuki Ishikawa. 2015. A survey of hardware features in modern browsers: 2015 edition. In Proceedings of the 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. IEEE, Los Alamitos, CA, 520–524.
    [189]
    Vincent F. Taylor, Riccardo Spolaor, Mauro Conti, and Ivan Martinovic. 2017. Robust smartphone app identification via encrypted network traffic analysis. IEEE Transactions on Information Forensics and Security 13, 1 (2017), 63–78.
    [190]
    Vijayanand Thangavelu, Dinil Mon Divakaran, Rishi Sairam, Suman Sankar Bhunia, and Mohan Gurusamy. 2018. DEFT: A distributed IoT fingerprinting technique. IEEE Internet of Things Journal 6, 1 (2018), 940–952.
    [191]
    Joaquín Torres-Sospedra, Michiel Aernouts, Adriano Moreira, and Rafael Berkvens. 2022. LoRaWAN fingerprinting with k-means: The relevance of clusters visual inspection. In Proceedings of the 2022 International Conference on Localization and GNSS (ICL-GNSS’22).
    [192]
    Igor Ushakov, Alexey Bogomolov, Sergey Dragan, and Sergey Soldatov. 2021. Technology for predictive monitoring of the performance of cyber-physical system operators under noise conditions. In Society 5.0: Cyberspace for Advanced Human-Centered Society. Springer, 269–280.
    [193]
    M. K. Vijaymeena and K. Kavitha. 2016. A survey on similarity measures in text mining. Machine Learning and Applications 3, 2 (2016), 19–28.
    [194]
    Chaitali R. Wagh and Vijay B. Baru. 2013. Detection of faulty region on printed circuit board with IR thermography. International Journal of Scientific & Engineering Research 4, 11 (2013), 1–4.
    [195]
    Geoff Walker. 2022. Benefits of Model-Based Voltage and Current (MBVI) Systems. Accessed May 16, 2022 from https://www.maintenanceandengineering.com/2022/02/24/benefits-of-model-based-voltage-and-current-mbvi-systems/.
    [196]
    Boyuan Wang, Xuelin Liu, Baoguo Yu, Ruicai Jia, and Xingli Gan. 2019. An improved WiFi positioning method based on fingerprint clustering and signal weighted Euclidean distance. Sensors 19, 10 (2019), 2300.
    [197]
    Xuyu Wang, Zhitao Yu, and Shiwen Mao. 2018. DeepML: Deep LSTM for indoor localization with smartphone magnetic and light sensors. In Proceedings of the 2018 IEEE International Conference on Communications (ICC’18). IEEE, Los Alamitos, CA, 1–6.
    [198]
    Zihao Wang, Kar Wai Fok, and Vrizlynn L. L. Thing. 2022. Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study. Computers & Security 113 (2022), 102542.
    [199]
    Lingxiao Wei, Chaosheng Song, Yannan Liu, Jie Zhang, Feng Yuan, and Qiang Xu. 2015. BoardPUF: Physical unclonable functions for printed circuit board authentication. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design. IEEE, Los Alamitos, CA, 152–158.
    [200]
    Kazimierz Wilk, Michał Błaszczak, and IBCH PSNC. 2020. CPS communication. DiH4CPS. Retrieved May 15, 2022 from https://dih4cps.eu/2020/11/30/cps-communication/.
    [201]
    Christian Wressnegger, Guido Schwenk, Daniel Arp, and Konrad Rieck. 2013. A close look on n-grams in intrusion detection: Anomaly detection vs. classification. In Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security. 67–76.
    [202]
    Lars Wüstrich, Lukas Schröder, and Marc-Oliver Pahl. 2021. Cyber-physical anomaly detection for ICS. In Proceedings of the 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM’21). IEEE, Los Alamitos, CA, 950–955.
    [203]
    Wei Xie, Yikun Jiang, Yong Tang, Ning Ding, and Yuanming Gao. 2017. Vulnerability detection in IoT firmware: A survey. In Proceedings of the 2017 IEEE 23rd International Conference on Parallel and Distributed Systems (ICPADS’17). IEEE, Los Alamitos, CA, 769–772.
    [204]
    Hansong Xu, Wei Yu, David Griffith, and Nada Golmie. 2018. A survey on Industrial Internet of Things: A cyber-physical systems perspective. IEEE Access 6 (2018), 78238–78259.
    [205]
    Kuai Xu. 2022. Research frontiers of network behavior analysis. In Network Behavior Analysis. Springer, 119–163.
    [206]
    Q. Xu, R. Zheng, W. Saad, and Z. Han. 2016. Device fingerprinting in wireless networks: Challenges and opportunities. IEEE Communications Surveys Tutorials 18, 1 (Firstquarter2016), 94–104.
    [207]
    Geeta Yadav, Alaa Allakany, Vijay Kumar, Kolin Paul, and Koji Okamura. 2019. Penetration testing framework for IoT. In Proceedings of the 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI’19). 477–482.
    [208]
    Geeta Yadav and Kolin Paul. 2021. Global monitor using spatiotemporally correlated local monitors. In Proceedings of the 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA’21). IEEE, Los Alamitos, CA, 1–10.
    [209]
    Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, and Vassilios G. Vassilakis. 2020. Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms. In Proceedings of the 2nd International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things. 62–68.
    [210]
    Zhuting Yao and Hongxia Pan. 2012. Fault diagnosis using magnetic image of PCB. In Proceedings of the 2012 UKACC International Conference on Control. IEEE, Los Alamitos, CA, 702–707.
    [211]
    Siamak Yousefi, Hirokazu Narui, Sankalp Dayal, Stefano Ermon, and Shahrokh Valaee. 2017. A survey of human activity recognition using WiFi CSI. arxiv:1708.07129 [cs.AI] (2017).
    [212]
    A. Yves and P. Hao. 2015. RSSI-based indoor localization using RSSI-with-angle-based localization estimation algorithm. Sensor Networks and Data Communications 4, 122 (2015), 2.
    [213]
    Chenbin Zhang, Ningning Qin, Yanbo Xue, and Le Yang. 2020. Received signal strength-based indoor localization using hierarchical classification. Sensors 20, 4 (2020), 1067.
    [214]
    Fengchao Zhang, Andrew Hennessy, and Swarup Bhunia. 2015. Robust counterfeit PCB detection exploiting intrinsic trace impedance variations. In Proceedings of the 2015 IEEE 33rd VLSI Test Symposium (VTS’15). IEEE, Los Alamitos, CA, 1–6.
    [215]
    Jiexin Zhang, Alastair R. Beresford, and Ian Sheret. 2019. SENSORID: Sensor calibration fingerprinting for smartphones. In Proceedings of the 40th IEEE Symposium on Security and Privacy (SP’19). IEEE, Los Alamitos, CA.
    [216]
    Zhe Zhou, Wenrui Diao, Xiangyu Liu, and Kehuan Zhang. 2014. Acoustic fingerprinting revisited: Generate stable device ID stealthily with inaudible sound. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, NY, 429–440.
    [217]
    Hank Zumbahlen (Ed.). 2011. Linear Circuit Design Handbook. Newnes.

    Cited By

    View all
    • (2024)SoK: A Taxonomy for Hardware-Based Fingerprinting in the Internet of ThingsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670872(1-12)Online publication date: 30-Jul-2024
    • (2024)Survey and Experimentation to Compare IoT Device Model Identification Methods2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)10.1109/WoWMoM60985.2024.00014(13-17)Online publication date: 4-Jun-2024
    • (2024)ANDVI: Automated Network Device and Vulnerability Identification in SCADA/ICS by Passive MonitoringIEEE Transactions on Systems, Man, and Cybernetics: Systems10.1109/TSMC.2023.334525454:4(2539-2550)Online publication date: Apr-2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Computing Surveys
    ACM Computing Surveys  Volume 55, Issue 14s
    December 2023
    1355 pages
    ISSN:0360-0300
    EISSN:1557-7341
    DOI:10.1145/3606253
    Issue’s Table of Contents

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 17 July 2023
    Online AM: 21 February 2023
    Accepted: 14 February 2023
    Revised: 31 January 2023
    Received: 27 September 2021
    Published in CSUR Volume 55, Issue 14s

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Device Fingerprint/Fingerprinting (DFP)
    2. device characteristic
    3. identification and authentication
    4. Internet of Things (IoT)
    5. security and privacy
    6. distributed systems
    7. condition monitoring
    8. Cyber Physical System (CPS)

    Qualifiers

    • Survey

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1,178
    • Downloads (Last 6 weeks)116
    Reflects downloads up to 09 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)SoK: A Taxonomy for Hardware-Based Fingerprinting in the Internet of ThingsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670872(1-12)Online publication date: 30-Jul-2024
    • (2024)Survey and Experimentation to Compare IoT Device Model Identification Methods2024 IEEE 25th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)10.1109/WoWMoM60985.2024.00014(13-17)Online publication date: 4-Jun-2024
    • (2024)ANDVI: Automated Network Device and Vulnerability Identification in SCADA/ICS by Passive MonitoringIEEE Transactions on Systems, Man, and Cybernetics: Systems10.1109/TSMC.2023.334525454:4(2539-2550)Online publication date: Apr-2024
    • (2024)False Data Injection Detection in Nuclear Systems Using Dynamic Noise AnalysisIEEE Access10.1109/ACCESS.2024.342527012(94936-94949)Online publication date: 2024
    • (2023)Security Analysis of DNP3 Protocol in SCADA System2023 IEEE 13th International Conference on Control System, Computing and Engineering (ICCSCE)10.1109/ICCSCE58721.2023.10237142(314-319)Online publication date: 25-Aug-2023
    • (2023)The Current State of Fingerprinting in Operational Technology Environments2023 Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE)10.1109/CSCE60160.2023.00403(2509-2514)Online publication date: 24-Jul-2023
    • (2023)Radio frequency fingerprinting techniques for device identification: a surveyInternational Journal of Information Security10.1007/s10207-023-00801-z23:2(1389-1427)Online publication date: 28-Dec-2023

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    Full Text

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media