IoTTFID: An Incremental IoT Device Identification Model Based on Traffic Fingerprint

Driven by 5G communication technology, IoT devices are widely deployed in various scenarios to provide automated services. However, a large number of IoT devices cannot install strong encryption suites and become the preferred target of cyber attackers. Specific vulnerabilities target specific types...

Full description

Bibliographic Details
Main Authors: Qinxia Hao, Zheng Rong
Format: Article
Language:English
Published: IEEE 2023-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10147226/
_version_ 1797800057754353664
author Qinxia Hao
Zheng Rong
author_facet Qinxia Hao
Zheng Rong
author_sort Qinxia Hao
collection DOAJ
description Driven by 5G communication technology, IoT devices are widely deployed in various scenarios to provide automated services. However, a large number of IoT devices cannot install strong encryption suites and become the preferred target of cyber attackers. Specific vulnerabilities target specific types of IoT devices. Screening and repairing corresponding vulnerabilities based on device information can improve device protection capabilities. Traditional device identification models are static and have limitations in the identification range. The model needs to be trained from scratch to identity new types of devices, which consumes a lot of computing resources and training time. To overcome these limitations, we propose IoTTFID, an incremental IoT device identification model based on traffic fingerprint. Extract the traffic fingerprint of the new device, convert it into an input vector after preprocessing, and input it to the original model to update some network parameters, so that the model has the ability to identify new devices. The results of evaluation on two open datasets show that the accuracy of IoTTFID is 98.09% on UNSW dataset and 98.29% on Yourthings dataset, which outperforms the existing methods. IoTTFID has an accuracy rate of 80.4% after five incremental learning stages, and an F1 of over 96% for encrypted IoT devices. IoTTFID can dynamically adjust with the actual environment to increase the range of identifiable device types, providing strong support for the security management of IoT devices.
first_indexed 2024-03-13T04:28:18Z
format Article
id doaj.art-cdf3d41dd07e4670af0817858eaeb787
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-03-13T04:28:18Z
publishDate 2023-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-cdf3d41dd07e4670af0817858eaeb7872023-06-19T23:00:43ZengIEEEIEEE Access2169-35362023-01-0111586795869110.1109/ACCESS.2023.328454210147226IoTTFID: An Incremental IoT Device Identification Model Based on Traffic FingerprintQinxia Hao0Zheng Rong1https://orcid.org/0000-0003-4813-5679College of Communication and Information Engineering, Xi’an University of Science and Technology, Xi’an, ChinaCollege of Communication and Information Engineering, Xi’an University of Science and Technology, Xi’an, ChinaDriven by 5G communication technology, IoT devices are widely deployed in various scenarios to provide automated services. However, a large number of IoT devices cannot install strong encryption suites and become the preferred target of cyber attackers. Specific vulnerabilities target specific types of IoT devices. Screening and repairing corresponding vulnerabilities based on device information can improve device protection capabilities. Traditional device identification models are static and have limitations in the identification range. The model needs to be trained from scratch to identity new types of devices, which consumes a lot of computing resources and training time. To overcome these limitations, we propose IoTTFID, an incremental IoT device identification model based on traffic fingerprint. Extract the traffic fingerprint of the new device, convert it into an input vector after preprocessing, and input it to the original model to update some network parameters, so that the model has the ability to identify new devices. The results of evaluation on two open datasets show that the accuracy of IoTTFID is 98.09% on UNSW dataset and 98.29% on Yourthings dataset, which outperforms the existing methods. IoTTFID has an accuracy rate of 80.4% after five incremental learning stages, and an F1 of over 96% for encrypted IoT devices. IoTTFID can dynamically adjust with the actual environment to increase the range of identifiable device types, providing strong support for the security management of IoT devices.https://ieeexplore.ieee.org/document/10147226/IoTdevice identificationIoT securityfingerprintingdeep learning
spellingShingle Qinxia Hao
Zheng Rong
IoTTFID: An Incremental IoT Device Identification Model Based on Traffic Fingerprint
IEEE Access
IoT
device identification
IoT security
fingerprinting
deep learning
title IoTTFID: An Incremental IoT Device Identification Model Based on Traffic Fingerprint
title_full IoTTFID: An Incremental IoT Device Identification Model Based on Traffic Fingerprint
title_fullStr IoTTFID: An Incremental IoT Device Identification Model Based on Traffic Fingerprint
title_full_unstemmed IoTTFID: An Incremental IoT Device Identification Model Based on Traffic Fingerprint
title_short IoTTFID: An Incremental IoT Device Identification Model Based on Traffic Fingerprint
title_sort iottfid an incremental iot device identification model based on traffic fingerprint
topic IoT
device identification
IoT security
fingerprinting
deep learning
url https://ieeexplore.ieee.org/document/10147226/
work_keys_str_mv AT qinxiahao iottfidanincrementaliotdeviceidentificationmodelbasedontrafficfingerprint
AT zhengrong iottfidanincrementaliotdeviceidentificationmodelbasedontrafficfingerprint