Abstract
The rapid proliferation of the Internet of Things (IoT) devices has significantly increased the complexity of IoT device identification and management. Currently, intelligent applications controlling IoT devices employ rapid configuration mechanisms to swiftly configure and authorize devices based on their types. However, they are vulnerable to device ID spoofing, such as MAC address spoofing. Illegitimate devices may impersonate legitimate ones to gain permissions, thereby posing significant security risks. Therefore, we propose a device identification system called DevDet to achieve precise device identification. In this study, we introduce a feature extraction method based on autoencoders and utilize DT algorithm to identify device features. DevDet achieves identification accuracy exceeding 0.98 on three datasets, significantly outperforming other comparative algorithms. Considering the potential exploitation of DevDet by attackers to infer the usage of household devices, we propose a traffic obfuscation scheme to mislead attackers and reduce the accuracy of device inference.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Raguvaran, S.: Spoofing attack: preventing in wireless networks. In: International Conference on Communication and Signal Processing, pp. 117–121. (2014)
Jian, T., et al.: MAC ID spoofing-resistant radio fingerprinting. In: IEEE Global Conference on Signal and Information Processing (GlobalSIP), pp. 1–5 (2019)
Marabissi, D., Mucchi, L., Stomaci, A.: IoT nodes authentication and ID spoofing detection based on joint use of physical layer security and machine learning. Future Internet 14(2), 61 (2022)
Liu, Y., Wang, J., Li, J., Niu, S., Song, H.: Machine learning for the detection and identification of Internet of Things devices: a survey. IEEE Internet Things J. 9(1), 298–320 (2021)
Cheng, X., Zhang, Z., Chen, F.: Secure identity authentication of community medical internet of things. IEEE Access 7, 115966–115977 (2019)
Kumar, P., Chouhan, L.: A secure authentication scheme for IoT application in smart home. Peer-to-Peer Netw. Appli. 14, 420–438 (2021)
Abbas, S., Nasir, Q., Nouichi, D., Abdelsalam, A., Talib, M.M.: Improving security of the Internet of Things via RF fingerprinting based device identification system. Neural Comput. Appl. 33(21), 14753–14769 (2021)
Mahmod, M.J., Guin, U.: A robust, low-cost and secure authentication scheme for IoT applications. Cryptography 4(1), 8–15 (2020)
Liu, Y., Wang, J., Li, J., Li, J., Song, H., Yang, T.: Zero-bias deep learning for accurate identification of Internet-of-Things (IoT) devices. IEEE Internet Things J. 8(4), 2627–2634 (2020)
Yousefnezhad, N., Malhi, A., Främling, K.: Automated iot device identification based on full packet information using real-time network traffic. Sensors 21(8), 2660–2667 (2021)
Huang, Z., Wang, Q.: A PUF-based unified identity verification framework for secure IoT hardware via device authentication. World Wide Web 23(2), 1057–1088 (2020)
McGinthy, J.M., Wong, L.J., Michaels, A.J.: Groundwork for neural network-based specific emitter identification authentication for IoT. IEEE Internet Things J. 6(4), 6429–6440 (2019)
Aksoy, A., Gunes, M.H.: Automated IoT device identification using network traffic. In: 2019 IEEE International Conference on Communications (ICC), pp. 1–7 (2019)
Qu, J., et al.: An input-agnostic hierarchical deep learning framework for traffic fingerprinting. In: Proceedings of the 32nd USENIX Conference on Security Symposium, pp. 589–606 (2023)
Kostas, K., Just, M., Lones, M.A.: IoTDevID: a behavior-based device identification method for the IoT. IEEE Internet Things J. 9(23), 23741–23749 (2022)
Marchal, S., Miettinen, M., Nguyen, T.D., Sadeghi, A.: AudI: toward autonomous iot device-type identification using periodic communication. IEEE J. Sel. Areas Commun. 37(6), 1402–1412 (2019)
Bezawada,B. et al.: Behavioral fingerprinting of IoT devices. In:Workshop Attacks Solutions Hardw. Sec. pp. 41–50 (2018)
Hamad, S.A., et al.: IoT device identification via network-flow based fingerprinting and learning. In: 2019 18th IEEE TrustCom, pp. 103–111. (2019)
Silva, J.d.C., Rodrigues, J.J.P.C., Al-Muhtadi, J., Rabêlo, R.A.L., Furtado, V.: Management platforms and protocols for Internet Of Things: a survey. Sensors 19(3), 676 (2019)
Swamy, S.N., Kota, S.R.: An empirical study on system level aspects of Internet of Things (IoT). IEEE Access 8, 188082–188134 (2020)
Lin, Y.B., et al.: EasyConnect: a management system for IOT devices and its applications for interactive design and art. IEEE Internet Things J. 2(6), 551–561 (2015)
Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.-R., Tarkoma, S.: IoT SENTINEL: Automated device-type identification for security enforcement in IoT. In: IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2177–2184 (2017)
Sivanathan, A., et al.: Classifying IoT devices in smart environments using network traffic characteristics. IEEE Trans. Mob. Comput. 18(8), 1745–1759 (2019)
Acknowledgement
This work was supported by the National Natural Science Foundation of China (No. 62132013, 62102254, 62302298), Young Elite Scientists Sponsorship Program by CAST (YESS20230589), and Startup Fund for Young Faculty at SJTU (23X010502192). Guoxing Chen and Haojin Zhu are corresponding authors.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Yong, H., Yu, L., Dong, T., Meng, Y., Chen, G., Zhu, H. (2025). DevDet: Detecting IoT Device Impersonation Attacks via Traffic Based Identification. In: Cai, Z., Takabi, D., Guo, S., Zou, Y. (eds) Wireless Artificial Intelligent Computing Systems and Applications. WASA 2024. Lecture Notes in Computer Science, vol 14998. Springer, Cham. https://doi.org/10.1007/978-3-031-71467-2_35
Download citation
DOI: https://doi.org/10.1007/978-3-031-71467-2_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-71466-5
Online ISBN: 978-3-031-71467-2
eBook Packages: Computer ScienceComputer Science (R0)