IoTSense: Behavioral Fingerprinting of IoT Devices

04/11/2018
by   Bruhadeshwar Bezawada, et al.
0

The Internet-of-Things (IoT) has brought in new challenges in, device identification --what the device is, and, authentication --is the device the one it claims to be. Traditionally, the authentication problem is solved by means of a cryptographic protocol. However, the computational complexity of cryptographic protocols and/or scalability problems related to key management, render almost all cryptography based authentication protocols impractical for IoT. The problem of device identification is, on the other hand, sadly neglected. We believe that device fingerprinting can be used to solve both these problems effectively. In this work, we present a methodology to perform device behavioral fingerprinting that can be employed to undertake device type identification. A device behavior is approximated using features extracted from the network traffic of the device. These features are used to train a machine learning model that can be used to detect similar device types. We validate our approach using five-fold cross validation; we report a identification rate of 86-99 successful even when a device uses encrypted communication. Furthermore, we show preliminary results for fingerprinting device categories, i.e., identifying different device types having similar functionality.

READ FULL TEXT

page 1

page 7

page 8

page 9

page 10

research
01/25/2021

Machine Learning for the Detection and Identification of Internet of Things (IoT) Devices: A Survey

The Internet of Things (IoT) is becoming an indispensable part of everyd...
research
10/11/2020

Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication

Continuous Authentication (CA) has been proposed as a potential solution...
research
01/10/2022

IoTGAN: GAN Powered Camouflage Against Machine Learning Based IoT Device Identification

With the proliferation of IoT devices, researchers have developed a vari...
research
09/14/2017

Detection of Unauthorized IoT Devices Using Machine Learning Techniques

Security experts have demonstrated numerous risks imposed by Internet of...
research
02/16/2021

Automated Identification of Vulnerable Devices in Networks using Traffic Data and Deep Learning

Many IoT devices are vulnerable to attacks due to flawed security design...
research
08/06/2022

Analysis of lightweight cryptographic solutions for authentication in IoT

Currently, special attention is being paid to scenarios where the interc...

Please sign up or login with your details

Forgot password? Click here to reset