IoT Device Identification and Cybersecurity: Advancements, Challenges, and an LSTM-MLP Solution

Authors

  • Shaya A. Alshaya Computer Science Department, College of Sciences and Humanities at Al-Ghat, Majmaah University, Saudi Arabia
Volume: 13 | Issue: 6 | Pages: 11992-12000 | December 2023 | https://doi.org/10.48084/etasr.6295

Abstract

Over the past few years, there has been an undeniable surge in the deployment of IoT devices. However, this rapid growth has brought new challenges in cybersecurity, as unauthorized device deployment, malicious code modification, malware deployment, and vulnerability exploitation have emerged as significant issues. As a result, there is a growing need for device identification mechanisms based on behavior monitoring. To address these challenges, Machine Learning (ML) and Deep Learning (DL) techniques have been increasingly employed due to advances in the field and improved processing capabilities. However, cyber attackers have developed adversarial attacks that focus on modifying contexts and evading ML evaluations applied to IoT device identification solutions. This article highlights the importance of addressing cybersecurity challenges in the IoT landscape and proposes a hardware behavior-based individual device identification approach using an LSTM-MLP architecture. The proposed architecture was compared to the most common ML/DL classification techniques using data collected from 45 Raspberry Pi devices running identical software and showing promising results in improving device identification. The proposed LSTM-MLP method outperformed previous solutions, achieving an average increase in F1-Score of +0.97 and a minimum TPR of 0.97 for all devices.

Keywords:

IoT devices, LSTM-MLP architecture, adversarial attacks, cybersecurity challenges, device identification

Downloads

Download data is not yet available.

References

A. Ayub Khan, A. A. Laghari, Z. A. Shaikh, Z. Dacko-Pikiewicz, and S. Kot, "Internet of Things (IoT) Security With Blockchain Technology: A State-of-the-Art Review," IEEE Access, vol. 10, pp. 122679–122695, 2022.

K. Shafique, B. A. Khawaja, F. Sabir, S. Qazi, and M. Mustaqim, "Internet of Things (IoT) for Next-Generation Smart Systems: A Review of Current Challenges, Future Trends and Prospects for Emerging 5G-IoT Scenarios," IEEE Access, vol. 8, pp. 23022–23040, 2020.

A. E. Omolara et al., "The internet of things security: A survey encompassing unexplored areas and new insights," Computers & Security, vol. 112, Jan. 2022, Art. no. 102494.

S. Halder and T. Newe, "Radio fingerprinting for anomaly detection using federated learning in LoRa-enabled Industrial Internet of Things," Future Generation Computer Systems, vol. 143, pp. 322–336, Jun. 2023.

I. Sanchez-Rola, I. Santos, and D. Balzarotti, "Clock Around the Clock: Time-Based Device Fingerprinting," in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada, Jul. 2018, pp. 1502–1514.

P. M. Sánchez Sánchez, J. M. Jorquera Valero, A. Huertas Celdrán, G. Bovet, M. Gil Pérez, and G. M. Pérez, "A methodology to identify identical single-board computers based on hardware behavior fingerprinting," Journal of Network and Computer Applications, vol. 212, Mar. 2023, Art. no. 103579.

Y. Li, Y. Zuo, H. Song, and Z. Lv, "Deep Learning in Security of Internet of Things," IEEE Internet of Things Journal, vol. 9, no. 22, pp. 22133–22146, Aug. 2022.

Y. Liu, J. Wang, J. Li, S. Niu, and H. Song, "Machine Learning for the Detection and Identification of Internet of Things Devices: A Survey," IEEE Internet of Things Journal, vol. 9, no. 1, pp. 298–320, Jan. 2022.

A. Khan, A. Sohail, U. Zahoora, and A. S. Qureshi, "A survey of the recent architectures of deep convolutional neural networks," Artificial Intelligence Review, vol. 53, no. 8, pp. 5455–5516, Dec. 2020.

K. Sadeghi, A. Banerjee, and S. K. S. Gupta, "A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning," IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 4, no. 4, pp. 450–467, Dec. 2020.

Z. Tian, L. Cui, J. Liang, and S. Yu, "A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning," ACM Computing Surveys, vol. 55, no. 8, Sep. 2022, Art. no. 166-166.

M. Aprilpyone, Y. Kinoshita, and H. Kiya, "Adversarial Robustness by One Bit Double Quantization for Visual Classification," IEEE Access, vol. 7, pp. 177932–177943, 2019.

M. Al-Rubaie and J. M. Chang, "Privacy-Preserving Machine Learning: Threats and Solutions," IEEE Security & Privacy, vol. 17, no. 2, pp. 49–58, Mar. 2019.

K. He, D. D. Kim, and M. R. Asghar, "Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey," IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 538–566, 2023.

T. Laor et al., "DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting," in Proceedings 2022 Network and Distributed System Security Symposium, 2022.

P. M. Sánchez Sánchez, J. M. Jorquera Valero, A. Huertas Celdrán, G. Bovet, M. Gil Pérez, and G. Martínez Pérez, "LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers," Internet of Things, vol. 22, Jul. 2023, Art. no. 100764.

A. Shamsoshoara, A. Korenda, F. Afghah, and S. Zeadally, "A survey on physical unclonable function (PUF)-based security solutions for Internet of Things," Computer Networks, vol. 183, Dec. 2020, Art. no. 107593.

I. J. Goodfellow, J. Shlens, and C. Szegedy, "Explaining and Harnessing Adversarial Examples." arXiv, Mar. 20, 2015.

J. Wang, "Adversarial Examples in Physical World," in Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, Montreal, Canada, Aug. 2021, pp. 4925–4926.

Y. Dong et al., "Boosting Adversarial Attacks with Momentum," in 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA, Jun. 2018, pp. 9185–9193.

A. Madry, A. Makelov, L. Schmidt, D. Tsipras, and A. Vladu, "Towards Deep Learning Models Resistant to Adversarial Attacks." arXiv, Sep. 04, 2019.

S. M. Moosavi-Dezfooli, A. Fawzi, and P. Frossard, "DeepFool: A Simple and Accurate Method to Fool Deep Neural Networks," in 2016 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Las Vegas, NV, USA, Jun. 2016, pp. 2574–2582.

N. Papernot, P. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami, "The Limitations of Deep Learning in Adversarial Settings," in 2016 IEEE European Symposium on Security and Privacy (EuroS&P), Saarbruecken, Germany, Mar. 2016, pp. 372–387.

K. J. Waldron, S. L. Wang, and S. J. Bolin, "A Study of the Jacobian Matrix of Serial Manipulators," Journal of Mechanisms, Transmissions, and Automation in Design, vol. 107, no. 2, pp. 230–237, Jun. 1985.

W. Brendel, J. Rauber, and M. Bethge, "Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models." arXiv, Feb. 16, 2018.

N. Carlini and D. Wagner, "Towards Evaluating the Robustness of Neural Networks," in 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, Feb. 2017, pp. 39–57.

I. Rosenberg, A. Shabtai, Y. Elovici, and L. Rokach, "Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain," ACM Computing Surveys, vol. 54, no. 5, Feb. 2021, Art. no. 108.

E. Wong, L. Rice, and J. Z. Kolter, "Fast is better than free: Revisiting adversarial training." arXiv, Jan. 12, 2020.

G. Hinton, O. Vinyals, and J. Dean, "Distilling the Knowledge in a Neural Network." arXiv, Mar. 09, 2015.

N. Papernot, P. McDaniel, X. Wu, S. Jha, and A. Swami, "Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks," in 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, May 2016, pp. 582–597.

Z. Bao, Y. Lin, S. Zhang, Z. Li, and S. Mao, "Threat of Adversarial Attacks on DL-Based IoT Device Identification," IEEE Internet of Things Journal, vol. 9, no. 11, pp. 9012–9024, Jun. 2022.

A. Namvar, C. Thapa, S. S. Kanhere, and S. Camtepe, "Evaluating the Security of Machine Learning Based IoT Device Identification Systems Against Adversarial Examples," in Service-Oriented Computing, 2021, pp. 800–810.

C. Benegui and R. T. Ionescu, "Adversarial Attacks on Deep Learning Systems for User Identification Based on Motion Sensors," in Neural Information Processing, Bangkok, Thailand, 2020, pp. 752–761.

N. Pourshahrokhi, M. Smith-Creasey, M. Ghassemian, and S. Kouchaki, "Generative adversarial attacks on motion-based continuous authentication schemes," in 2021 14th International Conference on Security of Information and Networks (SIN), Edinburgh, United Kingdom, Sep. 2021, vol. 1, pp. 1–6.

G. Apruzzese, M. Andreolini, L. Ferretti, M. Marchetti, and M. Colajanni, "Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems," Digital Threats: Research and Practice, vol. 3, no. 3, Oct. 2022, Art. no. 31.

Y. Chen and Y. He, "BrutePrint: Expose Smartphone Fingerprint Authentication to Brute-force Attack." arXiv, May 18, 2023.

H. Miao, Y. Guo, and Y. Wang, "RFDforFin: Robust Deep Forgery Detection for GAN-generated Fingerprint Images." arXiv, Sep. 13, 2023.

Z. X. Li, Y. J. Li, Y. W. Liu, C. Liu, and N. X. Zhou, "K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph," Symmetry, vol. 15, no. 2, Feb. 2023, Art. no. 337.

M. A. Gill, N. Ahmad, M. Khan, F. Asghar, and A. Rasool, "Cyber Attacks Detection Through Machine Learning in Banking," Bulletin of Business and Economics (BBE), vol. 12, no. 2, pp. 34–45, Aug. 2023.

S. Kiranyaz, O. Avci, O. Abdeljaber, T. Ince, M. Gabbouj, and D. J. Inman, "1D convolutional neural networks and applications: A survey," Mechanical Systems and Signal Processing, vol. 151, Apr. 2021, Art. no. 107398.

S. Zhang et al., "Deep Learning in Human Activity Recognition with Wearable Sensors: A Review on Advances," Sensors, vol. 22, no. 4, Jan. 2022, Art. no. 1476.

Z. He, J. Zhou, H.-N. Dai, and H. Wang, "Gold Price Forecast Based on LSTM-CNN Model," in 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Fukuoka, Japan, Dec. 2019, pp. 1046–1053.

Y. Ji, Z. Zhou, H. Liu, and R. V. Davuluri, "DNABERT: pre-trained Bidirectional Encoder Representations from Transformers model for DNA-language in genome," Bioinformatics, vol. 37, no. 15, pp. 2112–2120, Aug. 2021.

M. M. Ahsan, M. A. P. Mahmud, P. K. Saha, K. D. Gupta, and Z. Siddique, "Effect of Data Scaling Methods on Machine Learning Algorithms and Model Performance," Technologies, vol. 9, no. 3, Sep. 2021, Art. no. 52.

B. M. M. AlShahrani and E. Al, "Classification of Cyber-Attack using Adaboost Regression Classifier and Securing the Network," Turkish Journal of Computer and Mathematics Education (TURCOMAT), vol. 12, no. 10, pp. 1215–1223, Apr. 2021.

Q. H. Vu, D. Ruta, and L. Cen, "Gradient boosting decision trees for cyber security threats detection based on network events logs," in 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, Sep. 2019, pp. 5921–5928.

M. Choubisa, R. Doshi, N. Khatri, and K. Kant Hiran, "A Simple and Robust Approach of Random Forest for Intrusion Detection System in Cyber Security," in 2022 International Conference on IoT and Blockchain Technology (ICIBT), Ranchi, India, Feb. 2022, pp. 1–5.

T. T. Teoh, G. Chiew, E. J. Franco, P. C. Ng, M. P. Benjamin, and Y. J. Goh, "Anomaly detection in cyber security attacks on networks using MLP deep learning," in 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), Shah Alam, Malaysia, Jul. 2018, pp. 1–5.

H. Gasmi, J. Laval, and A. Bouras, "Information Extraction of Cybersecurity Concepts: An LSTM Approach," Applied Sciences, vol. 9, no. 19, Jan. 2019, Art. no. 3945.

A. Khan and C. Cotton, "Detecting Attacks on IoT Devices using Featureless 1D-CNN," in 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, Jul. 2021, pp. 461–466.

M. Al-Khafajiy, G. Al-Tameemi, and T. Baker, "DDoS-FOCUS: A Distributed DoS Attacks Mitigation using Deep Learning Approach for a Secure IoT Network," in 2023 IEEE International Conference on Edge Computing and Communications (EDGE), Chicago, IL, USA, Jul. 2023, pp. 393–399.

Downloads

How to Cite

[1]
S. A. Alshaya, “IoT Device Identification and Cybersecurity: Advancements, Challenges, and an LSTM-MLP Solution”, Eng. Technol. Appl. Sci. Res., vol. 13, no. 6, pp. 11992–12000, Dec. 2023.

Metrics

Abstract Views: 532
PDF Downloads: 415

Metrics Information