Crowdsensing platforms allow sharing data, collected by devices of individuals, to achieve common objectives based on the analysis of shared information. Despite their benefits, these platforms also bring security threats that must be addressed to provide secure data and reliable services. In this context, device behavior fingerprinting becomes a key technique to detect and mitigate possible cyberattacks affecting resourceconstrained devices. This work presents the most relevant research questions in the field of behavior fingerprinting to identify devices and detect anomalies produced by cyberattacks. In addition, it also introduces the main goals and current status of two research projects dealing with such research questions
International audienceSpoofing attacks are generally difficult to detect and can have potentially ha...
Fingerprinting techniques aim to identify objects such as devices, data, users, or even attacks, bas...
Crowd-powered systems have become a popular way to augment the capabilities of automated systems in ...
In the current network-based computing world, where the number of interconnected devices grows expon...
Data confidentiality protection is a must for IoT and crowdsensing platforms, and a challenge due to...
With the growing diffusion of the Internet of Things (IoT) technology across most of the aspects of ...
Device fingerprinting is commonly used for tracking users. We explore device fingerprinting but in t...
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to...
Addressing compromised device is a problem for virtually all largeorganizations. Compromised devices...
The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attac...
Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration...
Bluetooth Low Energy (BLE) is a pervasive wireless technology all around us today. It is included in...
Increasingly, Internet of Things (IoT) devices are being woven into the fabric of our physical world...
Abstract—Smart devices equipped with powerful sensing, computing and networking capabilities have pr...
[[abstract]]Mobile crowd sensing (MCS) arises as a new sensing paradigm, which leverages citizens fo...
International audienceSpoofing attacks are generally difficult to detect and can have potentially ha...
Fingerprinting techniques aim to identify objects such as devices, data, users, or even attacks, bas...
Crowd-powered systems have become a popular way to augment the capabilities of automated systems in ...
In the current network-based computing world, where the number of interconnected devices grows expon...
Data confidentiality protection is a must for IoT and crowdsensing platforms, and a challenge due to...
With the growing diffusion of the Internet of Things (IoT) technology across most of the aspects of ...
Device fingerprinting is commonly used for tracking users. We explore device fingerprinting but in t...
The popularity of the Internet of Things (IoT) devices makes it increasingly important to be able to...
Addressing compromised device is a problem for virtually all largeorganizations. Compromised devices...
The increase in cybercrime and cyber-warfare has spurred the cat-and-mouse game of finding and attac...
Even in the face of strong encryption, the spectacular Internet of Things (IoT) penetration...
Bluetooth Low Energy (BLE) is a pervasive wireless technology all around us today. It is included in...
Increasingly, Internet of Things (IoT) devices are being woven into the fabric of our physical world...
Abstract—Smart devices equipped with powerful sensing, computing and networking capabilities have pr...
[[abstract]]Mobile crowd sensing (MCS) arises as a new sensing paradigm, which leverages citizens fo...
International audienceSpoofing attacks are generally difficult to detect and can have potentially ha...
Fingerprinting techniques aim to identify objects such as devices, data, users, or even attacks, bas...
Crowd-powered systems have become a popular way to augment the capabilities of automated systems in ...