2021
DOI: 10.3390/s21082660
|View full text |Cite
|
Sign up to set email alerts
|

Automated IoT Device Identification Based on Full Packet Information Using Real-Time Network Traffic

Abstract: In an Internet of Things (IoT) environment, a large volume of potentially confidential data might be leaked from sensors installed everywhere. To ensure the authenticity of such sensitive data, it is important to initially verify the source of data and its identity. Practically, IoT device identification is the primary step toward a secure IoT system. An appropriate device identification approach can counteract malicious activities such as sending false data that trigger irreparable security issues in vital or… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 30 publications
(20 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…In future research, we intend to develop an algorithm that can determine the optimal DC and number of receiving nodes that can effectively reduce data latency with minimal energy through deep learning [ 18 , 19 , 20 ]. We also plan to improve it to the point of being a pre-emption MAC that can be applied in real time in the real-world IoT [ 21 , 22 , 23 ] environment.…”
Section: Discussionmentioning
confidence: 99%
“…In future research, we intend to develop an algorithm that can determine the optimal DC and number of receiving nodes that can effectively reduce data latency with minimal energy through deep learning [ 18 , 19 , 20 ]. We also plan to improve it to the point of being a pre-emption MAC that can be applied in real time in the real-world IoT [ 21 , 22 , 23 ] environment.…”
Section: Discussionmentioning
confidence: 99%
“…Recently, device identification by learning from traffic features has become a hotspot of research. The related supervised ML algorithms [14] include Random Forest (RF) [15][16][17][18], K-Nearest Neighbors (KNN) [19], Support Vector Machine (SVM) [20][21][22], Gradient boosting [23], Naive Bayes [24,25], Decision Trees (DT) [26], NLP [27], and so on. The related unsupervised ML methods include the Gibbs Sampling Dirichlet Multinomial Mixture Model (GSDMM) [28], Density-Based Spatial Clustering of Applications with Noise (DBSCAN) [29], Kmeans [30], and so on.…”
Section: Introductionmentioning
confidence: 99%
“…A considerably explored area of research for securing IoT devices is the use of machine learning to detect security issues [ 2 , 3 ]. Most machine learning approaches learn device and traffic features from existing data for detecting security attacks using classification methods [ 4 , 5 ]. Moreover, IoT sensors can provide data that can be effectively used for making real time decisions.…”
Section: Introductionmentioning
confidence: 99%