A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
Network traffic whitelisting has emerged as a dominant approach for securing consumer IoT devices. ... Through a proof-of-concept implementation of SERENIoT on a small Raspberry Pi IoT network and a large-scale Amazon EC2 simulation, we evaluate the security, scalability, and performance of our system. ... We also thank Xavier de Carné de Carnavalet and Paul van Oorschot for their insightful feedback. ...arXiv:2003.02892v1 fatcat:65ufovpxofgedfgwwuyze5pz6e