Systematic Analysis of Communication Protocols Used by IoT Devices to Identify Vulnerabilities
This paper systematically analyzes the communication protocols used by IoT devices, including TLS, HTTP, DNS, NTP, DHCP, and SSDP, to identify device-specific fingerprints and security vulnerabilities.