Abstract
As the Internet of Things (IoT) landscape expands, new devices with various functionalities are continuously being integrated into the IoT ecosystem. When traditional systems, which involve human interaction, are replaced by devices, it becomes crucial to upgrade the conventional authorization and authentication systems. This is essential to establish a new access control system designed to manage accessibility of multiple devices. Traditional device identification approaches often struggle to accommodate the dynamic behaviors exhibited by IoT devices. In response, this paper introduces an innovative approach that leverages enhanced behavioral features to generate a representation of device behavior. This representation is then employed to train machine learning models for classifying devices based on their behaviors. Furthermore, this paper also considers special scenarios where the access management system lacks access to full network traffic data. In such cases, device identification is achieved based on HTTPS features and user agent information. We conducted experimental analyses using real data from state-of-the-art IoT device profiling datasets. The performance results indicate that the extracted behavioral-based features have the capability to identify multiple IoT devices with various functionalities and vendors.








Similar content being viewed by others
Data Availability
No datasets were generated or analysed during the current study.
References
IoT connected devices worldwide 2019-2030 | Statista. https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/. (Accessed on 11/09/2023)
Qiu J, Tian Z, Du C, Zuo Q, Su S, Fang B (2020) A survey on access control in the age of internet of things. IEEE Internet Things J 7(6):4682–4696
Kolias C, Kambourakis G, Stavrou A, Voas J (2017) Ddos in the iot: Mirai and other botnets. Computer 50(7):80–84
Ragothaman K, Wang Y, Rimal B, Lawrence M (2023) Access control for iot: A survey of existing research, dynamic policies and future directions. Sensors. 23(4):1805
Meidan Y, Bohadana M, Shabtai A, Guarnizo JD, Ochoa M, Tippenhauer NO, Elovici Y (2017) Profiliot: A machine learning approach for iot device identification based on network traffic analysis. In: Proceedings of the Symposium on Applied Computing, pp. 506–509
Habibi Lashkari A, Draper Gil G, Mamun MSI, Ghorbani AA (2017) Characterization of Tor Traffic Using Time Based Features. In: Proceedings of the 3rd International Conference on Information Systems Security and Privacy - ICISSP, pp. 253–262. SciTePress, Porto, Portugal. https://doi.org/10.5220/0006105602530262 . INSTICC
Draper-Gil G, Lashkari AH, Mamun MSI, Ghorbani AA (2016) Characterization of Encrypted and VPN Traffic Using Time-related Features. In: Proceedings of the 2nd International Conference on Information Systems Security and Privacy - ICISSP, pp. 407–414. SciTePress, Rome, Italy. https://doi.org/10.5220/0005740704070414 . INSTICC
Kostas K, Just M, Lones MA (2022) Iotdevid: A behavior-based device identification method for the iot. IEEE Internet Things J 9(23):23741–23749
Danso PK, Dadkhah S, Neto ECP, Zohourian A, Molyneaux H, Lu R, Ghorbani AA (2023) Transferability of machine learning algorithm for iot device profiling and identification. IEEE Internet of Things Journal
Babun L, Aksu H, Ryan L, Akkaya K, Bentley ES, Uluagac AS (2020) Z-iot: Passive device-class fingerprinting of zigbee and z-wave iot devices. In: ICC 2020-2020 IEEE International Conference on Communications (ICC), pp. 1–7 . IEEE
Kotak J, Elovici Y (2021) Iot device identification using deep learning. In: 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) 12, pp. 76–86. Springer
Song Y, Huang Q, Yang J, Fan M, Hu A, Jiang Y (2019) Iot device fingerprinting for relieving pressure in the access control. In: Proceedings of the ACM Turing Celebration Conference-China, pp. 1–8
Hamad SA, Zhang WE, Sheng QZ, Nepal S (2019) Iot device identification via network-flow based fingerprinting and learning. In: 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), pp. 103–111. IEEE
Marchal S, Miettinen M, Nguyen TD, Sadeghi A-R, Asokan N (2019) Audi: Toward autonomous iot device-type identification using periodic communication. IEEE J Sel Areas Commun 37(6):1402–1412
Aksoy A, Gunes MH (2019) Automated iot device identification using network traffic. In: ICC 2019-2019 IEEE International Conference on Communications (ICC), pp. 1–7. IEEE
Sivanathan A, Gharakheili HH, Sivaraman V (2019) Inferring iot device types from network behavior using unsupervised clustering. In: 2019 IEEE 44th Conference on Local Computer Networks (LCN), pp. 230–233. IEEE
Zhang S, Wang Z, Yang J, Bai D, Li F, Li Z, Wu J, Liu X (2021) Unsupervised iot fingerprinting method via variational auto-encoder and k-means. In: ICC 2021-IEEE International Conference on Communications, pp. 1–6. IEEE
Li Q, Fan H, Sun W, Li J, Chen L, Liu Z (2017) Fingerprints in the air: Unique identification of wireless devices using rf rss fingerprints. IEEE Sens J 17(11):3568–3579
Wan S, Li Q, Wang H, Li H, Sun L (2022) Devtag: A benchmark for fingerprinting iot devices. IEEE Internet Things J 10(7):6388–6399
Fan L, Zhang S, Wu Y, Wang Z, Duan C, Li J, Yang J (2020) An iot device identification method based on semi-supervised learning. In: 2020 16th International Conference on Network and Service Management (CNSM), pp. 1–7 . IEEE
Charyyev B, Gunes MH (2020) Locality-sensitive iot network traffic fingerprinting for device identification. IEEE Internet Things J 8(3):1272–1281
Dadkhah S, Mahdikhani H, Danso PK, Zohourian A, Truong KA, Ghorbani AA (2022) Towards the development of a realistic multidimensional iot profiling dataset. In: 2022 19th Annual International Conference on Privacy, Security & Trust (PST), pp. 1–11. IEEE
Miettinen M, Marchal S, Hafeez I, Asokan N, Sadeghi A-R, Tarkoma S (2017) Iot sentinel: Automated device-type identification for security enforcement in iot. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2177–2184. IEEE
Yang, Y., Xue, W., Sun, J., Yang, G., Li, Y., Pang, H., Deng, R.H.: Pkt-sin: A secure communication protocol for space information networks with periodic k-time anonymous authentication. IEEE Transactions on Information Forensics and Security. (2024)
Sun J, Xu G, Zhang T, Yang X, Alazab M, Deng RH (2023) Privacy-aware and security-enhanced efficient matchmaking encryption. IEEE Transactions on Information Forensics and Security
Ma X, Wang Y, Lai Y, Jia W, Zhao Z, He H, Yin R, Chen Y (2023) A multi-perspective feature approach to few-shot classification of iot traffic. IEEE Transactions on Green Communications and Networking
Acknowledgements
The authors express their gratitude to the anonymous reviewers for their valuable feedback.
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
A and C contributed to writing the original draft. B and D were responsible for the methodology and feature extraction processes. E, F, and G handled review and editing. H and I provided supervision and guidance. All authors have read and approved the final version of the manuscript.
Corresponding author
Ethics declarations
Ethical Approval
Not applicable.
Competing interests
The authors declare no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: 2 - Track on Security and Privacy
Guest Editors: Rongxing Lu
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rabbani, M., Gui, J., Zhou, Z. et al. A lightweight IoT device identification using enhanced behavioral-based features. Peer-to-Peer Netw. Appl. 18, 2 (2025). https://doi.org/10.1007/s12083-024-01891-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s12083-024-01891-9