Skip to main content

Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection

  • Conference paper
  • First Online:
Advances in Artificial Intelligence and Security (ICAIS 2021)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1424))

Included in the following conference series:

Abstract

Nowadays, large-scale IoT (Internet of Things) devices are connected to the network. However, due to the simplicity, limited memory and poor computing power of most IoT devices, it is difficult to apply complex security authentication protocols to these devices. Many attackers use this loophole, impersonating legitimate devices to launch malicious attacks on the network, threatening the security of other legitimate devices. Therefore, in order to strengthen the identification and management of devices, the existing device fingerprint identification technology based on machine learning is to extract device traffic at the access gateway and generate device fingerprinting to realize the identification of IoT devices. However, to achieve high recognition accuracy, existing device fingerprint algorithms need to extract a large number of fingerprint features from network traffic for machine learning, which increases the complexity of implementation and delay of device identification. Also, it is not suitable for the current large-scale access environment. Therefore, this paper proposes a hybrid feature selection method to preprocess features for the optimal feature subset, which can not only reduce the feature dimension, but also improve the accuracy of device recognition. Firstly, the method filters the irrelevant features according to the characteristic fluctuation and the entropy of correlation information between the feature and the target. Then, based on the classification accuracy of the learning algorithm, a random search method—forest optimization algorithm is used to further optimize the filtered feature subsets under the evaluation criteria. Experiments show that this method can reduce feature dimension by 81.0% and improve classification accuracy from 86.4% to 93.1%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Karie, N.M., Sahri, N.M., Haskell-Dowland, P.: Iot threat detection advances, challenges and future directions. In: 2020 IEEE Workshop on Emerging Technologies for Security in IoT (ETSecIoT) (2020)

    Google Scholar 

  2. Sen, R., Verma, A., Heim, G.R.: Impact of cyberattacks by malicious hackers on the competition in software markets. J. Manag. Inf. Syst. 37(1), 191–216 (2020)

    Google Scholar 

  3. Patsakis, C., Casino, F., Katos, V.: Encrypted and covert DNS queries for botnets: challenges and countermeasures. Comput. Secur. 88, 101614 (2020)

    Google Scholar 

  4. Wachter, S.: Normative challenges of identification in the internet of things: privacy, profiling, discrimination, and the gdpr. Comput. Law Secur. Rev. 34(3), 436–449 (2018)

    Article  Google Scholar 

  5. Meidan, Y., et al.: Profiliot: a machine learning approach for iot device identification based on network traffic analysis. In: Proceedings of the symposium on applied computing, pp. 506–509 (2017)

    Google Scholar 

  6. Shahid, M.R., Blanc, G., Zhang, Z., Debar, H.: Iot devices recognition through network traffic analysis. In: 2018 IEEE International Conference on Big Data (Big Data) (2018)

    Google Scholar 

  7. Yang, K., Li, Q., Sun, L.: Towards automatic fingerprinting of iot devices in the cyberspace. Comput. Netw. 148, 318–327 (2019)

    Google Scholar 

  8. Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.R., Tarkoma, S.: Iot sentinel: Automated device-type identification for security enforcement in iot. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 2177–2184. IEEE (2017)

    Google Scholar 

  9. Lei, S.: A feature selection method based on information gain and genetic algorithm. In: 2012 International Conference on Computer Science and Electronics Engineering. vol. 2, pp. 355–358. IEEE (2012)

    Google Scholar 

  10. Ghaemi, M., Feizi-Derakhshi, M.R.: Feature selection using forest optimization algorithm. Pattern Recognit.60, 121–129 (2016)

    Google Scholar 

  11. Xue, B., Zhang, M., Browne, W.N.: Novel initialisation and updating mechanisms in pso for feature selection in classification. In: European Conference on Applications of Evolutionary Computation (2013)

    Google Scholar 

  12. Xu, Y.: Research and implementation of improved random forest algorithm based on spark. In: 2017 IEEE 2nd International Conference on Big Data Analysis (ICBDA), pp. 499–503. IEEE (2017)

    Google Scholar 

  13. Aksoy, A., Gunes, M.H.: Automated iot device identification using network traffic. In: ICC 2019–2019 IEEE International Conference on Communications (ICC) (2019)

    Google Scholar 

  14. Song, Y., Huang, Q., Yang, J., Fan, M., Hu, A., Jiang, Y.: Iot device fingerprinting for relieving pressure in the access control. In: Proceedings of the ACM Turing Celebration Conference-China, pp. 1–8 (2019)

    Google Scholar 

  15. Hamad, S.A., Zhang, W.E., Sheng, Q.Z., Nepal, S.: Iot device identification via network-flow based fingerprinting and learning. In: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (2019)

    Google Scholar 

Download references

Funding

This work is supported in part by National Key Research and Development Program of China under Grant 2018YFB2100400.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yubo Song .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, Q., Song, Y., Hu, A., Wang, J. (2021). Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Advances in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and Information Science, vol 1424. Springer, Cham. https://doi.org/10.1007/978-3-030-78621-2_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78621-2_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78620-5

  • Online ISBN: 978-3-030-78621-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics