Affiliation:
1. RISE Research Institutes of Sweden, Sweden
2. Northeastern University, U.S.A.
Abstract
Unidentified devices in a network can result in devastating consequences. It is, therefore, necessary to fingerprint and identify IoT devices connected to private or critical networks. With the proliferation of massive but heterogeneous IoT devices, it is getting challenging to detect vulnerable devices connected to networks. Current machine learning-based techniques for fingerprinting and identifying devices necessitate a significant amount of data gathered from IoT networks that must be transmitted to a central cloud. Nevertheless, private IoT data cannot be shared with the central cloud in numerous sensitive scenarios. Federated learning (FL) has been regarded as a promising paradigm for decentralized learning and has been applied in many different use cases. It enables machine learning models to be trained in a privacy-preserving way. In this article, we propose a privacy-preserved IoT device fingerprinting and identification mechanisms using FL; we call it FL4IoT. FL4IoT is a two-phased system combining unsupervised-learning-based device fingerprinting and supervised-learning-based device identification. FL4IoT shows its practicality in different performance metrics in a federated and centralized setup. For instance, in the best cases, empirical results show that FL4IoT achieves ∼99%
accuracy
and
F1-Score
in identifying IoT devices using a federated setup without exposing any private data to a centralized cloud entity. In addition, FL4IoT can detect spoofed devices with over 99%
accuracy
.
Publisher
Association for Computing Machinery (ACM)
Subject
Software,Information Systems,Hardware and Architecture,Computer Science Applications,Computer Networks and Communications
Reference39 articles.
1. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis et al. 2017. Understanding the Mirai Botnet. In Proceedings of the 26th USENIX Security Symposium (USENIX Security’17). 1093–1110.
2. Behavioral Fingerprinting of IoT Devices
3. DeMiCPU: Device Fingerprinting with Magnetic Signals Radiated by CPU
4. C. Chio and D. Freeman. 2018. Machine Learning and Security- Protecting System With Data and Algorithms . O’Relliy Media Inc. https://mlsec.net/.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献