Skip to main content

DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification

  • Conference paper
  • First Online:
Wireless Artificial Intelligent Computing Systems and Applications (WASA 2024)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14998))

  • 276 Accesses

Abstract

The rapid proliferation of the Internet of Things (IoT) devices has significantly increased the complexity of IoT device identification and management. Currently, intelligent applications controlling IoT devices employ rapid configuration mechanisms to swiftly configure and authorize devices based on their types. However, they are vulnerable to device ID spoofing, such as MAC address spoofing. Illegitimate devices may impersonate legitimate ones to gain permissions, thereby posing significant security risks. Therefore, we propose a device identification system called DevDet to achieve precise device identification. In this study, we introduce a feature extraction method based on autoencoders and utilize DT algorithm to identify device features. DevDet achieves identification accuracy exceeding 0.98 on three datasets, significantly outperforming other comparative algorithms. Considering the potential exploitation of DevDet by attackers to infer the usage of household devices, we propose a traffic obfuscation scheme to mislead attackers and reduce the accuracy of device inference.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Raguvaran, S.: Spoofing attack: preventing in wireless networks. In: International Conference on Communication and Signal Processing, pp. 117–121. (2014)

    Google Scholar 

  2. Jian, T., et al.: MAC ID spoofing-resistant radio fingerprinting. In: IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 1–5 (2019)

    Google Scholar 

  3. Marabissi, D., Mucchi, L., Stomaci, A.: IoT nodes authentication and ID spoofing detection based on joint use of physical layer security and machine learning. Future Internet 14(2), 61 (2022)

    Article  Google Scholar 

  4. Liu, Y., Wang, J., Li, J., Niu, S., Song, H.: Machine learning for the detection and identification of Internet of Things devices: a survey. IEEE Internet Things J. 9(1), 298–320 (2021)

    Article  Google Scholar 

  5. Cheng, X., Zhang, Z., Chen, F.: Secure identity authentication of community medical internet of things. IEEE Access 7, 115966–115977 (2019)

    Article  Google Scholar 

  6. Kumar, P., Chouhan, L.: A secure authentication scheme for IoT application in smart home. Peer-to-Peer Netw. Appli. 14, 420–438 (2021)

    Article  Google Scholar 

  7. Abbas, S., Nasir, Q., Nouichi, D., Abdelsalam, A., Talib, M.M.: Improving security of the Internet of Things via RF fingerprinting based device identification system. Neural Comput. Appl. 33(21), 14753–14769 (2021)

    Article  Google Scholar 

  8. Mahmod, M.J., Guin, U.: A robust, low-cost and secure authentication scheme for IoT applications. Cryptography 4(1), 8–15 (2020)

    Article  Google Scholar 

  9. Liu, Y., Wang, J., Li, J., Li, J., Song, H., Yang, T.: Zero-bias deep learning for accurate identification of Internet-of-Things (IoT) devices. IEEE Internet Things J. 8(4), 2627–2634 (2020)

    Article  Google Scholar 

  10. Yousefnezhad, N., Malhi, A., Främling, K.: Automated iot device identification based on full packet information using real-time network traffic. Sensors 21(8), 2660–2667 (2021)

    Article  Google Scholar 

  11. Huang, Z., Wang, Q.: A PUF-based unified identity verification framework for secure IoT hardware via device authentication. World Wide Web 23(2), 1057–1088 (2020)

    Article  Google Scholar 

  12. McGinthy, J.M., Wong, L.J., Michaels, A.J.: Groundwork for neural network-based specific emitter identification authentication for IoT. IEEE Internet Things J. 6(4), 6429–6440 (2019)

    Article  Google Scholar 

  13. Aksoy, A., Gunes, M.H.: Automated IoT device identification using network traffic. In: 2019 IEEE International Conference on Communications (ICC), pp. 1–7 (2019)

    Google Scholar 

  14. Qu, J., et al.: An input-agnostic hierarchical deep learning framework for traffic fingerprinting. In: Proceedings of the 32nd USENIX Conference on Security Symposium, pp. 589–606 (2023)

    Google Scholar 

  15. Kostas, K., Just, M., Lones, M.A.: IoTDevID: a behavior-based device identification method for the IoT. IEEE Internet Things J. 9(23), 23741–23749 (2022)

    Article  Google Scholar 

  16. Marchal, S., Miettinen, M., Nguyen, T.D., Sadeghi, A.: AudI: toward autonomous iot device-type identification using periodic communication. IEEE J. Sel. Areas Commun. 37(6), 1402–1412 (2019)

    Article  Google Scholar 

  17. Bezawada,B. et al.: Behavioral fingerprinting of IoT devices. In:Workshop Attacks Solutions Hardw. Sec. pp. 41–50 (2018)

    Google Scholar 

  18. Hamad, S.A., et al.: IoT device identification via network-flow based fingerprinting and learning. In: 2019 18th IEEE TrustCom, pp. 103–111. (2019)

    Google Scholar 

  19. Silva, J.d.C., Rodrigues, J.J.P.C., Al-Muhtadi, J., Rabêlo, R.A.L., Furtado, V.: Management platforms and protocols for Internet Of Things: a survey. Sensors 19(3), 676 (2019)

    Google Scholar 

  20. Swamy, S.N., Kota, S.R.: An empirical study on system level aspects of Internet of Things (IoT). IEEE Access 8, 188082–188134 (2020)

    Article  Google Scholar 

  21. Lin, Y.B., et al.: EasyConnect: a management system for IOT devices and its applications for interactive design and art. IEEE Internet Things J. 2(6), 551–561 (2015)

    Article  Google Scholar 

  22. Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.-R., Tarkoma, S.: IoT SENTINEL: Automated device-type identification for security enforcement in IoT. In: IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2177–2184 (2017)

    Google Scholar 

  23. Sivanathan, A., et al.: Classifying IoT devices in smart environments using network traffic characteristics. IEEE Trans. Mob. Comput. 18(8), 1745–1759 (2019)

    Article  Google Scholar 

Download references

Acknowledgement

This work was supported by the National Natural Science Foundation of China (No. 62132013, 62102254, 62302298), Young Elite Scientists Sponsorship Program by CAST (YESS20230589), and Startup Fund for Young Faculty at SJTU (23X010502192). Guoxing Chen and Haojin Zhu are corresponding authors.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Guoxing Chen or Haojin Zhu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yong, H., Yu, L., Dong, T., Meng, Y., Chen, G., Zhu, H. (2025). DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification. In: Cai, Z., Takabi, D., Guo, S., Zou, Y. (eds) Wireless Artificial Intelligent Computing Systems and Applications. WASA 2024. Lecture Notes in Computer Science, vol 14998. Springer, Cham. https://doi.org/10.1007/978-3-031-71467-2_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-71467-2_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-71466-5

  • Online ISBN: 978-3-031-71467-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics