DOE PAGES title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Behavioral fingerprinting of Internet‐of‐Things devices

Journal Article · · WIREs Data Mining and Knowledge Discovery
DOI: https://doi.org/10.1002/widm.1337 · OSTI ID:1567895
 [1]; ORCiD logo [1];  [2]
  1. Department of Computer Science Colorado State University Fort Collins Colorado
  2. Department of Computer Science Colorado State University Fort Collins Colorado, National Science Foundation Alexandria Virginia

Abstract Rapid advances in the Internet‐of‐Things (IoT) domain have led to the development of several useful and interesting devices that have enhanced the quality of home living and industrial automation. The vulnerabilities in the IoT devices have rendered them susceptible to compromise and forgery. The problem of device authentication, that is, the question of whether a device's identity is what it claims to be, is still an open problem. Device fingerprinting seems to be a promising authentication mechanism. Device fingerprinting profiles a device based on information available about the device and generate a robust, verifiable and unique identity for the device. Existing approaches for device fingerprinting may not be feasible or cost‐effective for the IoT domain due to the resource constraints and heterogeneity of the IoT devices. Due to resource and cost constraints, behavioral fingerprinting provides promising directions for fingerprinting IoT devices. Behavioral fingerprinting allows security researchers to understand the behavioral profile of a device and to establish some guidelines regarding the device operations. In this article, we discuss existing approaches for behavioral fingerprinting of devices in general and evaluate their applicability for IoT devices. Furthermore, we discuss potential approaches for fingerprinting IoT devices and give an overview of some of the preliminary attempts to fingerprint IoT devices. We conclude by highlighting the future research directions for fingerprinting in the IoT domain. This article is categorized under: Application Areas > Science and Technology Application Areas > Internet Technologies > Machine Learning Application Areas > Industry Specific Applications

Sponsoring Organization:
USDOE
Grant/Contract Number:
DE‐NE0008571
OSTI ID:
1567895
Journal Information:
WIREs Data Mining and Knowledge Discovery, Journal Name: WIREs Data Mining and Knowledge Discovery Vol. 11 Journal Issue: 1; ISSN 1942-4787
Publisher:
Wiley Blackwell (John Wiley & Sons)Copyright Statement
Country of Publication:
United States
Language:
English
Citation Metrics:
Cited by: 5 works
Citation information provided by
Web of Science

References (31)

GTID: A Technique for Physical Device and Device Type Fingerprinting journal September 2015
Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems conference January 2016
Device Fingerprinting in Wireless Networks: Challenges and Opportunities journal April 2016
Machine Learning Techniques for Passive Network Inventory journal December 2010
Towards automatic fingerprinting of IoT devices in the cyberspace journal January 2019
Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling conference September 2017
WDTF: A Technique for Wireless Device Type Fingerprinting journal July 2017
IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT conference June 2017
The Divergence and Bhattacharyya Distance Measures in Signal Selection journal February 1967
Estimation and removal of clock skew from network delay measurements conference January 1999
Behavioral Fingerprinting of IoT Devices conference January 2018
Passive classification of wireless NICs during active scanning journal January 2008
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews journal March 2010
Adversarial classification conference January 2004
MIMO Authentication via Deliberate Fingerprinting at the Physical Layer journal September 2011
Stuxnet, the real start of cyber warfare? [Editor's Note] journal November 2010
The Power of Models: Modeling Power Consumption for IoT Devices journal October 2015
On physical-layer identification of wireless devices journal November 2012
Statistical pattern recognition: a review journal January 2000
A channel-based hypothesis testing approach to enhance user authentication in wireless networks conference January 2010
IoTScanner: Detecting Privacy Threats in IoT Neighborhoods
  • Siby, Sandra; Maiti, Rajib Ranjan; Tippenhauer, Nils Ole
  • ASIA CCS '17: ACM Asia Conference on Computer and Communications Security, Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security https://doi.org/10.1145/3055245.3055253
conference April 2017
Wireless device identification with radiometric signatures conference January 2008
Remote physical device fingerprinting
  • Kohno, T.; Broido, A.; Claffy, K.
  • Proceedings. 2005 IEEE Symposium on Security and Privacy, 2005 IEEE Symposium on Security and Privacy (S&P'05) https://doi.org/10.1109/SP.2005.18
conference January 2005
IoT Devices Recognition Through Network Traffic Analysis conference December 2018
A passive approach to wireless device fingerprinting conference June 2010
Characterizing and classifying IoT traffic in smart cities and campuses
  • Sivanathan, Arunan; Sherratt, Daniel; Gharakheili, Hassan Habibi
  • 2017 IEEE Conference on Computer Communications: Workshops (INFOCOM WKSHPS), 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) https://doi.org/10.1109/INFCOMW.2017.8116438
conference May 2017
Classifying IoT Devices in Smart Environments Using Network Traffic Characteristics journal August 2019
Automatic Device Classification from Network Traffic Streams of Internet of Things conference October 2018
Active behavioral fingerprinting of wireless devices conference January 2008
ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis conference January 2017
Comparison of the Device Lifetime in Wireless Networks for the Internet of Things journal January 2017

Similar Records

Seamless Wireless Communication Platform for Internet of Things Applications
Journal Article · 2022 · IEEE Wireless Communications · OSTI ID:2008429

A Right Transfer Access Control Model of Internet of Things Based on Smart Contract
Journal Article · 2022 · Security and Communication Networks · OSTI ID:1865964

Tierless Programming for the Internet of Things
Technical Report · 2015 · OSTI ID:1169934

Related Subjects