A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering
Protocol Reverse Engineering (PRE) is crucial for information security of Internet-of-Things (IoT), and message clustering determines the effectiveness of PRE. However, the quality of services still lags behind the strict requirement of IoT applications as the results of message clustering are often...
| Published in: | Sensors |
|---|---|
| Main Authors: | Xin Luo, Dan Chen, Yongjun Wang, Peidai Xie |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2019-02-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/1424-8220/19/3/716 |
Similar Items
A Lightweight Messaging Protocol for Internet of Things Devices
by: Justice Owusu Agyemang, et al.
Published: (2022-01-01)
by: Justice Owusu Agyemang, et al.
Published: (2022-01-01)
Messaging Protocols for IoT Systems—A Pragmatic Comparison
by: Jacek Wytrębowicz, et al.
Published: (2021-10-01)
by: Jacek Wytrębowicz, et al.
Published: (2021-10-01)
CNNPRE: A CNN-Based Protocol Reverse Engineering Method
by: Javad Garshasbi, et al.
Published: (2023-01-01)
by: Javad Garshasbi, et al.
Published: (2023-01-01)
Method for determining the lengths of protocol keywords based on maximum likelihood probability
by: Jian-zhen LUO, et al.
Published: (2016-06-01)
by: Jian-zhen LUO, et al.
Published: (2016-06-01)
Method for determining the lengths of protocol keywords based on maximum likelihood probability
by: Jian-zhen LUO, et al.
Published: (2016-06-01)
by: Jian-zhen LUO, et al.
Published: (2016-06-01)
Communication Technologies and Specialised Communication Protocols for Ensuring Cybersecurity of the Internet of Things
by: P. S. Klimushyn
Published: (2025-06-01)
by: P. S. Klimushyn
Published: (2025-06-01)
Clustering of unknown protocol messages based on format comparison
by: ZHANG Mingyuan, LIU Xiaolei, WU Xiaohu, ZHANG Xiaojian
Published: (2025-06-01)
by: ZHANG Mingyuan, LIU Xiaolei, WU Xiaohu, ZHANG Xiaojian
Published: (2025-06-01)
Key Agreement and Authentication Protocols in the Internet of Things: A Survey
by: Sabina Szymoniak, et al.
Published: (2022-12-01)
by: Sabina Szymoniak, et al.
Published: (2022-12-01)
A Security Analysis Method for Security Protocol Implementations Based on Message Construction
by: Jintian Lu, et al.
Published: (2018-12-01)
by: Jintian Lu, et al.
Published: (2018-12-01)
Black-box Fuzzing Method Based on Reverse-engineering for Proprietary Industrial Control Protocol
by: YANG Yahui, MA Rongkuan, GENG Yangyang, WEI Qiang, JIA Yan
Published: (2023-04-01)
by: YANG Yahui, MA Rongkuan, GENG Yangyang, WEI Qiang, JIA Yan
Published: (2023-04-01)
Trust Aware Multi-Objective Metaheuristic Optimization Based Secure Route Planning Technique for Cluster Based IIoT Environment
by: Krishnaraj Nagappan, et al.
Published: (2022-01-01)
by: Krishnaraj Nagappan, et al.
Published: (2022-01-01)
Vulnerability analysis and method of selection of communication protocols for information transfer in Internet of Things systems
by: Maryna Kolisnyk
Published: (2021-02-01)
by: Maryna Kolisnyk
Published: (2021-02-01)
Effective Feature Engineering Framework for Securing MQTT Protocol in IoT Environments
by: Abdulelah Al Hanif, et al.
Published: (2024-03-01)
by: Abdulelah Al Hanif, et al.
Published: (2024-03-01)
An Optimized Clustering Communication Protocol Based on Intelligent Computing in Information-Centric Internet of Things
by: Zeyu Sun, et al.
Published: (2019-01-01)
by: Zeyu Sun, et al.
Published: (2019-01-01)
Optimal Path Routing Protocol for Warning Messages Dissemination for Highway VANET
by: Mumtaz Ali Shah, et al.
Published: (2022-09-01)
by: Mumtaz Ali Shah, et al.
Published: (2022-09-01)
A Review of IoT Firmware Vulnerabilities and Auditing Techniques
by: Taimur Bakhshi, et al.
Published: (2024-01-01)
by: Taimur Bakhshi, et al.
Published: (2024-01-01)
User Authentication and Authorization Framework in IoT Protocols
by: Ammar Mohammad, et al.
Published: (2022-09-01)
by: Ammar Mohammad, et al.
Published: (2022-09-01)
Multi-Layer Cluster Based Energy Aware Routing Protocol for Internet of Things
by: Sankar S., et al.
Published: (2018-09-01)
by: Sankar S., et al.
Published: (2018-09-01)
Comparative analysis of transfer protocols asynchronous messages on systems queuing
by: Grzegorz Derlatka, et al.
Published: (2023-03-01)
by: Grzegorz Derlatka, et al.
Published: (2023-03-01)
A Comprehensive Framework for Emergency Message Dissemination in Urban VANET Scenarios: A Comparative Analysis of Clustering-Based Routing Protocols
by: Ravneet Kaur, et al.
Published: (2024-01-01)
by: Ravneet Kaur, et al.
Published: (2024-01-01)
On the Performance Evaluation of Protocol State Machine Reverse Engineering Methods
by: Gergo Ladi, et al.
Published: (2024-03-01)
by: Gergo Ladi, et al.
Published: (2024-03-01)
An Improved Energy-Efficient Clustering Protocol to Prolong the Lifetime of the WSN-Based IoT
by: Ali Abdul-Hussian Hassan, et al.
Published: (2020-01-01)
by: Ali Abdul-Hussian Hassan, et al.
Published: (2020-01-01)
Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols
by: Yair Rivera Julio, et al.
Published: (2025-04-01)
by: Yair Rivera Julio, et al.
Published: (2025-04-01)
Anonymous Asynchronous Ratchet Tree Protocol for Group Messaging
by: Kaiming Chen, et al.
Published: (2021-02-01)
by: Kaiming Chen, et al.
Published: (2021-02-01)
A Lightweight Authenticated Encryption Scheme Based on Chaotic SCML for Railway Cloud Service
by: Qiming Zheng, et al.
Published: (2018-01-01)
by: Qiming Zheng, et al.
Published: (2018-01-01)
A hybrid security protocol based on honey encryption and hyperchaotic systems for improving security in internet of things
by: Weimeng Wang, et al.
Published: (2025-05-01)
by: Weimeng Wang, et al.
Published: (2025-05-01)
A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
by: Mohammad Kamrul Hasan, et al.
Published: (2024-01-01)
by: Mohammad Kamrul Hasan, et al.
Published: (2024-01-01)
CT-RPL: Cluster Tree Based Routing Protocol to Maximize the Lifetime of Internet of Things
by: Sennan Sankar, et al.
Published: (2020-10-01)
by: Sennan Sankar, et al.
Published: (2020-10-01)
Cluster Head Selection Method for Edge Computing WSN Based on Improved Sparrow Search Algorithm
by: Shaoming Qiu, et al.
Published: (2023-08-01)
by: Shaoming Qiu, et al.
Published: (2023-08-01)
An adaptive methodology based on predictive deep learning and context aware clustering for electricity power usage mining and optimization at different granularity levels
by: Pramod D. Patil, et al.
Published: (2024-06-01)
by: Pramod D. Patil, et al.
Published: (2024-06-01)
Reconstructing a lightweight security protocol in the radio‐frequency identification systems
by: Alireza Abdellahi Khorasgani, et al.
Published: (2023-07-01)
by: Alireza Abdellahi Khorasgani, et al.
Published: (2023-07-01)
Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol
by: Raghad Almari, et al.
Published: (2024-07-01)
by: Raghad Almari, et al.
Published: (2024-07-01)
Internet of Things for Earthquake Early Warning Systems: A Performance Comparison Between Communication Protocols
by: Paola Pierleoni, et al.
Published: (2023-01-01)
by: Paola Pierleoni, et al.
Published: (2023-01-01)
Stress-Testing MQTT Brokers: A Comparative Analysis of Performance Measurements
by: Biswajeeban Mishra, et al.
Published: (2021-09-01)
by: Biswajeeban Mishra, et al.
Published: (2021-09-01)
Protocol Reverse Analysis of Ethernet for Control Automation Technology Based on Sequence Alignment and Pearson Correlation Coefficient
by: Xiaopeng Wang, et al.
Published: (2024-12-01)
by: Xiaopeng Wang, et al.
Published: (2024-12-01)
Clustering perception mining of network protocol’s stealth attack behavior
by: Yan-jing HU, et al.
Published: (2017-06-01)
by: Yan-jing HU, et al.
Published: (2017-06-01)
Clustering perception mining of network protocol’s stealth attack behavior
by: Yan-jing HU, et al.
Published: (2017-06-01)
by: Yan-jing HU, et al.
Published: (2017-06-01)
Hash-Chain Fog/Edge: A Mode-Based Hash-Chain for Secured Mutual Authentication Protocol Using Zero-Knowledge Proofs in Fog/Edge
by: Mayuresh Sunil Pardeshi, et al.
Published: (2022-01-01)
by: Mayuresh Sunil Pardeshi, et al.
Published: (2022-01-01)
Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol
by: Muhammad Ayaz Khan, et al.
Published: (2023-06-01)
by: Muhammad Ayaz Khan, et al.
Published: (2023-06-01)
Holistic Approach for Automated Reverse Engineering of Unified Diagnostics Service Data
by: Nico Rosenberger, et al.
Published: (2025-07-01)
by: Nico Rosenberger, et al.
Published: (2025-07-01)
Similar Items
-
A Lightweight Messaging Protocol for Internet of Things Devices
by: Justice Owusu Agyemang, et al.
Published: (2022-01-01) -
Messaging Protocols for IoT Systems—A Pragmatic Comparison
by: Jacek Wytrębowicz, et al.
Published: (2021-10-01) -
CNNPRE: A CNN-Based Protocol Reverse Engineering Method
by: Javad Garshasbi, et al.
Published: (2023-01-01) -
Method for determining the lengths of protocol keywords based on maximum likelihood probability
by: Jian-zhen LUO, et al.
Published: (2016-06-01) -
Method for determining the lengths of protocol keywords based on maximum likelihood probability
by: Jian-zhen LUO, et al.
Published: (2016-06-01)
