Skip to main content
Log in

A lightweight IoT device identification using enhanced behavioral-based features

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

As the Internet of Things (IoT) landscape expands, new devices with various functionalities are continuously being integrated into the IoT ecosystem. When traditional systems, which involve human interaction, are replaced by devices, it becomes crucial to upgrade the conventional authorization and authentication systems. This is essential to establish a new access control system designed to manage accessibility of multiple devices. Traditional device identification approaches often struggle to accommodate the dynamic behaviors exhibited by IoT devices. In response, this paper introduces an innovative approach that leverages enhanced behavioral features to generate a representation of device behavior. This representation is then employed to train machine learning models for classifying devices based on their behaviors. Furthermore, this paper also considers special scenarios where the access management system lacks access to full network traffic data. In such cases, device identification is achieved based on HTTPS features and user agent information. We conducted experimental analyses using real data from state-of-the-art IoT device profiling datasets. The performance results indicate that the extracted behavioral-based features have the capability to identify multiple IoT devices with various functionalities and vendors.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data Availability

No datasets were generated or analysed during the current study.

References

  1. IoT connected devices worldwide 2019-2030 | Statista. https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/. (Accessed on 11/09/2023)

  2. Qiu J, Tian Z, Du C, Zuo Q, Su S, Fang B (2020) A survey on access control in the age of internet of things. IEEE Internet Things J 7(6):4682–4696

    Article  MATH  Google Scholar 

  3. Kolias C, Kambourakis G, Stavrou A, Voas J (2017) Ddos in the iot: Mirai and other botnets. Computer 50(7):80–84

    Article  Google Scholar 

  4. Ragothaman K, Wang Y, Rimal B, Lawrence M (2023) Access control for iot: A survey of existing research, dynamic policies and future directions. Sensors. 23(4):1805

    Article  MATH  Google Scholar 

  5. Meidan Y, Bohadana M, Shabtai A, Guarnizo JD, Ochoa M, Tippenhauer NO, Elovici Y (2017) Profiliot: A machine learning approach for iot device identification based on network traffic analysis. In: Proceedings of the Symposium on Applied Computing, pp. 506–509

  6. Habibi Lashkari A, Draper Gil G, Mamun MSI, Ghorbani AA (2017) Characterization of Tor Traffic Using Time Based Features. In: Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP, pp. 253–262. SciTePress, Porto, Portugal. https://doi.org/10.5220/0006105602530262 . INSTICC

  7. Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of Encrypted and VPN Traffic Using Time-related Features. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy - ICISSP, pp. 407–414. SciTePress, Rome, Italy. https://doi.org/10.5220/0005740704070414 . INSTICC

  8. Kostas K, Just M, Lones MA (2022) Iotdevid: A behavior-based device identification method for the iot. IEEE Internet Things J 9(23):23741–23749

    Article  MATH  Google Scholar 

  9. Danso PK, Dadkhah S, Neto ECP, Zohourian A, Molyneaux H, Lu R, Ghorbani AA (2023) Transferability of machine learning algorithm for iot device profiling and identification. IEEE Internet of Things Journal

  10. Babun L, Aksu H, Ryan L, Akkaya K, Bentley ES, Uluagac AS (2020) Z-iot: Passive device-class fingerprinting of zigbee and z-wave iot devices. In: ICC 2020-2020 IEEE International Conference on Communications (ICC), pp. 1–7 . IEEE

  11. Kotak J, Elovici Y (2021) Iot device identification using deep learning. In: 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) 12, pp. 76–86. Springer

  12. Song Y, Huang Q, Yang J, Fan M, Hu A, Jiang Y (2019) Iot device fingerprinting for relieving pressure in the access control. In: Proceedings of the ACM Turing Celebration Conference-China, pp. 1–8

  13. Hamad SA, Zhang WE, Sheng QZ, Nepal S (2019) Iot device identification via network-flow based fingerprinting and learning. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 103–111. IEEE

  14. Marchal S, Miettinen M, Nguyen TD, Sadeghi A-R, Asokan N (2019) Audi: Toward autonomous iot device-type identification using periodic communication. IEEE J Sel Areas Commun 37(6):1402–1412

    Article  Google Scholar 

  15. Aksoy A, Gunes MH (2019) Automated iot device identification using network traffic. In: ICC 2019-2019 IEEE International Conference on Communications (ICC), pp. 1–7. IEEE

  16. Sivanathan A, Gharakheili HH, Sivaraman V (2019) Inferring iot device types from network behavior using unsupervised clustering. In: 2019 IEEE 44th Conference on Local Computer Networks (LCN), pp. 230–233. IEEE

  17. Zhang S, Wang Z, Yang J, Bai D, Li F, Li Z, Wu J, Liu X (2021) Unsupervised iot fingerprinting method via variational auto-encoder and k-means. In: ICC 2021-IEEE International Conference on Communications, pp. 1–6. IEEE

  18. Li Q, Fan H, Sun W, Li J, Chen L, Liu Z (2017) Fingerprints in the air: Unique identification of wireless devices using rf rss fingerprints. IEEE Sens J 17(11):3568–3579

    Article  MATH  Google Scholar 

  19. Wan S, Li Q, Wang H, Li H, Sun L (2022) Devtag: A benchmark for fingerprinting iot devices. IEEE Internet Things J 10(7):6388–6399

    Article  MATH  Google Scholar 

  20. Fan L, Zhang S, Wu Y, Wang Z, Duan C, Li J, Yang J (2020) An iot device identification method based on semi-supervised learning. In: 2020 16th International Conference on Network and Service Management (CNSM), pp. 1–7 . IEEE

  21. Charyyev B, Gunes MH (2020) Locality-sensitive iot network traffic fingerprinting for device identification. IEEE Internet Things J 8(3):1272–1281

    Article  MATH  Google Scholar 

  22. Dadkhah S, Mahdikhani H, Danso PK, Zohourian A, Truong KA, Ghorbani AA (2022) Towards the development of a realistic multidimensional iot profiling dataset. In: 2022 19th Annual International Conference on Privacy, Security & Trust (PST), pp. 1–11. IEEE

  23. Miettinen M, Marchal S, Hafeez I, Asokan N, Sadeghi A-R, Tarkoma S (2017) Iot sentinel: Automated device-type identification for security enforcement in iot. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2177–2184. IEEE

  24. Yang, Y., Xue, W., Sun, J., Yang, G., Li, Y., Pang, H., Deng, R.H.: Pkt-sin: A secure communication protocol for space information networks with periodic k-time anonymous authentication. IEEE Transactions on Information Forensics and Security. (2024)

  25. Sun J, Xu G, Zhang T, Yang X, Alazab M, Deng RH (2023) Privacy-aware and security-enhanced efficient matchmaking encryption. IEEE Transactions on Information Forensics and Security

  26. Ma X, Wang Y, Lai Y, Jia W, Zhao Z, He H, Yin R, Chen Y (2023) A multi-perspective feature approach to few-shot classification of iot traffic. IEEE Transactions on Green Communications and Networking

Download references

Acknowledgements

The authors express their gratitude to the anonymous reviewers for their valuable feedback.

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

A and C contributed to writing the original draft. B and D were responsible for the methodology and feature extraction processes. E, F, and G handled review and editing. H and I provided supervision and guidance. All authors have read and approved the final version of the manuscript.

Corresponding author

Correspondence to Mahdi Rabbani.

Ethics declarations

Ethical Approval

Not applicable.

Competing interests

The authors declare no competing interests.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: 2 - Track on Security and Privacy

Guest Editors: Rongxing Lu

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rabbani, M., Gui, J., Zhou, Z. et al. A lightweight IoT device identification using enhanced behavioral-based features. Peer-to-Peer Netw. Appl. 18, 2 (2025). https://doi.org/10.1007/s12083-024-01891-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s12083-024-01891-9

Keywords