{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T03:48:36Z","timestamp":1747194516000,"version":"3.40.5"},"reference-count":28,"publisher":"SAGE Publications","issue":"11","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2018,11]]},"abstract":"<jats:p> Although Internet of Things (IoT) has been recently receiving attention from the research community, undoubtedly, there still exists several privacy concerns about those devices. In particular, IoT devices in the cyberspace are reachable and visible through IP addresses. This article uniquely exploits to qualify the distribution of owner information of IoT devices based on the observation; consumers may write relevant details into the application-layer service on the IoT devices, such as company or usernames. We propose to automatically extract owner annotation by utilizing a set of techniques (network scanning, machine learning, and natural language processing). We use the probing and classifier to determine whether the response data come from an IoT device. The natural language-processing technique is used to extract owner information from IoT devices. We have conducted real-world experiments to evaluate our integrated approach empirically. The results show that the precision is 97% and the coverage is 96%. Furthermore, our approach is running on a more larger unlabeled dataset consisting of 93 million response packets from the whole IPv4 space. Our analysis has drawn upon nearly 4.3 million IoT devices exposed to the public, and it is a typical trail effect of the owner information distribution. <\/jats:p>","DOI":"10.1177\/1550147718811099","type":"journal-article","created":{"date-parts":[[2018,11,7]],"date-time":"2018-11-07T07:17:41Z","timestamp":1541575061000},"page":"155014771881109","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":4,"title":["Who owns Internet of Thing devices?"],"prefix":"10.1177","volume":"14","author":[{"given":"Yuxuan","family":"Jia","sequence":"first","affiliation":[{"name":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"}]},{"given":"Bing","family":"Han","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9833-2836","authenticated-orcid":false,"given":"Qiang","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"}]},{"given":"Hong","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences (CAS), Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]},{"given":"Limin","family":"Sun","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, Chinese Academy of Sciences (CAS), Beijing, China"},{"name":"School of Cyber Security, University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"179","published-online":{"date-parts":[[2018,11,6]]},"reference":[{"volume-title":"Proceedings of the network and distributed system security symposium (NDSS)","author":"Venkataraman S","key":"bibr2-1550147718811099"},{"first-page":"971","volume-title":"Proceedings of the 2017 ACM SIGSAC conference on computer and communications security (CCS)","author":"Shamsi Z","key":"bibr3-1550147718811099"},{"first-page":"1093","volume-title":"Proceedings of the 26th USENIX security symposium","author":"Antonakakis M","key":"bibr4-1550147718811099"},{"key":"bibr5-1550147718811099","first-page":"23149","volume":"17","author":"Fachkha C","year":"2017","journal-title":"Proc Network Distrib Syst"},{"first-page":"542","volume-title":"Proceedings of the 22nd ACM SIGSAC conference on computer and communications security","author":"Durumeric Z","key":"bibr6-1550147718811099"},{"first-page":"605","volume-title":"Proceedings of the 22th USENIX security symposium","author":"Durumeric Z","key":"bibr9-1550147718811099"},{"volume-title":"Pattern recognition and machine learning (information science and statistics)","year":"2007","author":"Bishop CM","key":"bibr13-1550147718811099"},{"key":"bibr15-1550147718811099","first-page":"2825","volume":"12","author":"Pedregosa F","year":"2011","journal-title":"J Mach Learn Res"},{"first-page":"363","volume-title":"Proceedings of the 43rd annual meeting on association for computational linguistics","author":"Finkel JR","key":"bibr17-1550147718811099"},{"key":"bibr18-1550147718811099","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-73003-5_299"},{"key":"bibr19-1550147718811099","doi-asserted-by":"publisher","DOI":"10.1021\/ci034160g"},{"key":"bibr21-1550147718811099","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38652-7_2"},{"key":"bibr22-1550147718811099","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2018.1700349"},{"key":"bibr23-1550147718811099","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2679483"},{"key":"bibr24-1550147718811099","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2830307."},{"issue":"2","key":"bibr25-1550147718811099","first-page":"12","volume":"10","author":"Zheng X","year":"2018","journal-title":"IEEE Commun Mag"},{"volume-title":"Proceedings of the network and distributed system security symposium","author":"Gao X","key":"bibr26-1550147718811099"},{"first-page":"237","volume-title":"Proceedings of the 47th annual IEEE\/IFIP international conference on dependable systems and networks (DSN)","author":"Gao X","key":"bibr27-1550147718811099"},{"first-page":"430","volume-title":"Proceedings of the 48th annual IEEE\/IFIP international conference on dependable systems and networks (DSN)","author":"Cheng K","key":"bibr28-1550147718811099"},{"first-page":"169","volume-title":"Proceedings of the 8th ACM SIGCOMM Internet measurement conference (IMC)","author":"Heidemann JS","key":"bibr29-1550147718811099"},{"first-page":"109","volume-title":"Proceedings of the 10th ACM SIGCOMM Internet measurement conference (IMC)","author":"Leonard D","key":"bibr30-1550147718811099"},{"key":"bibr32-1550147718811099","doi-asserted-by":"publisher","DOI":"10.1145\/2096149.2096154"},{"volume-title":"Proceedings of the symposium on network and distributed system security (NDSS)","author":"Rossow C","key":"bibr33-1550147718811099"},{"first-page":"1129","volume-title":"Proceedings of the 27th USENIX security symposium (USENIX Security 18)","author":"Hao S","key":"bibr34-1550147718811099"},{"first-page":"362","volume-title":"Proceedings of the 48th annual IEEE\/IFIP international conference on dependable systems and networks (DSN)","author":"Jin L","key":"bibr35-1550147718811099"},{"first-page":"1","volume-title":"Proceedings of the IEEE 24th international conference on network protocols (ICNP)","author":"Feng X","key":"bibr38-1550147718811099"},{"volume-title":"Proceedings of the IEEE international conference on computer communications (INFOCOM)","author":"Li Q","key":"bibr39-1550147718811099"},{"first-page":"327","volume-title":"Proceedings of the 27th USENIX security symposium","author":"Feng X","key":"bibr40-1550147718811099"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718811099","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147718811099","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147718811099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T04:29:04Z","timestamp":1607315344000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147718811099"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":28,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["10.1177\/1550147718811099"],"URL":"https:\/\/doi.org\/10.1177\/1550147718811099","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2018,11]]}}}