Machine Learning For The Detection and Identification of Internet of Things Devices A Survey
Machine Learning For The Detection and Identification of Internet of Things Devices A Survey
5, MAY 2020 1
Abstract—The Internet of Things (IoT) is becoming an indis- to provide automated services that would otherwise not be
pensable part of everyday life, enabling a variety of emerging possible [1]. Trillions of network-connected IoT devices are
services and applications. However, the presence of rogue IoT expected to emerge in the global network around 2020 [2]. The
devices has exposed the IoT to untold risks with severe conse-
quences. The first step in securing the IoT is detecting rogue IoT IoT is becoming an indispensable part of smart cities, enabling
devices and identifying legitimate ones. Conventional approaches a variety of emerging services and applications in cities and
use cryptographic mechanisms to authenticate and verify le- communities [3], including in health [4], transportation [5]–
gitimate devices’ identities. However, cryptographic protocols [8], energy/utilities, and other areas. Furthermore, big data
are not available in many systems. Meanwhile, these methods analytics enables the move from the IoT to real-time control
are less effective when legitimate devices can be exploited or
encryption keys are disclosed. Therefore, non-cryptographic IoT [9]–[11].
device identification and rogue device detection become efficient However, the IoT is subject to threats stemming from
solutions to secure existing systems and will provide addi- increased connectivity [12], [13]. For example, rogue IoT
tional protection to systems with cryptographic protocols. Non- devices, defined as devices claiming a falsified identity or
cryptographic approaches require more effort and are not yet ad- compromised legitimate devices, can exposed the IoT to untold
equately investigated. In this paper, we provide a comprehensive
survey on machine learning technologies for the identification risks with severe consequences. Rogue IoT devices could
of IoT devices along with the detection of compromised or conduct various attacks: forging the identity of trusted entities
falsified ones from the viewpoint of passive surveillance agents or to access sensitive resources, hijacking legitimate devices to
network operators. We classify the IoT device identification and participate in distributed denial of service (DDoS) attacks
detection into four categories: device-specific pattern recognition, [13], and etc. The problem of rogue devices becomes even
Deep Learning enabled device identification, unsupervised device
identification, and abnormal device detection. Meanwhile, we more hazardous in wirelessly connected IoT, as the network
discuss various ML-related enabling technologies for this pur- traffic is easier to be intercepted and falsified. Hence, from the
pose. These enabling technologies include learning algorithms, perspective of network operators, the first step in securing the
feature engineering on network traffic traces and wireless signals, IoT against rogue devices is identifying known (or unknown)
incremental learning, and abnormality detection. devices and detecting compromised ones. This survey defines
Index Terms—Internet of Things, Security, Physical-layer Se- the term Device Detection and Identification to contain two
curity, Malicious Transmitter Identification, Radiometric signa- perspectives: a) Identity verification of known devices. b)
ture, Non-cryptographic identification, Physical-layer identifica-
Detection of falsified or compromised devices.
tion.
Conventional cryptographic mechanisms use message au-
thentication code, digital signatures, challenge-response ses-
I. I NTRODUCTION sions, and etc. to authenticate legitimate peers or verify the
S a rapidly evolving field, the Internet of Things (IoT),
A involves the interconnection and interaction of smart
objects, i.e., IoT devices with embedded sensors, onboard
identities of message senders [14]. These methods make it
mathematically impossible for the malicious to forge the
legitimates’ identities. Even though cryptographic mechanisms
data processing capabilities, and means of communication, are effective as long as secret keys are securely protected,
security requirements may not be fully satisfied in pervasively
Yongxin Liu was with the Security and Optimization for Networked Globe
Laboratory (SONG Lab), Embry-Riddle Aeronautical University, Daytona distributed IoT. Reports have shown that it is possible to
Beach, FL 32114 USA, and is with the Department of Computer Science, use reverse engineering to access encryption keys or conduct
Auburn University at Montgomery, Montgomery, AL 36117 USA. further exploitations [15]–[19]. Moreover, it is impossible
Jian Wang and Houbing Song are with the Security and Optimization
for Networked Globe Laboratory (SONG Lab), Embry-Riddle Aeronautical to install cryptographic protocols into the huge amount of
University, Daytona Beach, FL 32114 USA. insecure systems or devices in a short time. Some of those
Shuteng Niu was with the Security and Optimization for Networked Globe insecure systems have already become part of critical infras-
Laboratory (SONG Lab), Embry-Riddle Aeronautical University, Daytona
Beach, FL 32114 USA, and is with the Department of Computer Science, tructures [20]–[25]. Finally, cryptographic approaches become
Bowling Green State University, Bowling Green, Ohio 43403 USA. less effective in dealing with hijacked devices. Therefore,
Jianqiang Li is with the College of Computer Science and Software as a supplementary to existing cryptography mechanisms,
Engineering, Shenzhen University, Shenzhen, Guangdong 518060 China.
Corresponding authors: Jianqiang Li, Houbing Song non-cryptographic Device Identification with Rogue Device
Manuscript received October 18, 2020; revised XXX. Detection are needed to secure the IoT ecosystem especially
Digital Object Identifier: 10.1109/JIOT.2021.3099028
2327-4662 c 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications standards/publications/rights/index.html for more information.
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 5, MAY 2020 2
Device-specific pattern
recognition
Statistical leanring Feature engineering Deep Learning enabled Continual leanring Explainable AI
device identification
Unsupervised device
identification
Abnormal device
Digital signal processing Deep learning identification Unsupervised learning Anomaly detection
Fig. 1. Overview of ML for the Detection and Identification of Rogue IoT Devices
TABLE II
C OMPARE OF CRYPTOGRAPHIC AND NON - CRYPTOGRAPHIC COUNTERMEASURES
Device identification
Identity verification of known deploy cryptographic protocols to existing systems without
devices
cryptographic protocols such as ADS-B, AIS, and etc. Non-
Continual
Open set recognition
Detection of unknown or cryptographic methods require higher computational capacity
Unsupervised device falsified devices
learning
detection & Identification
to derive device-specific fingerprints, but they are transparently
Abnormal device Detection of compromised
compatible with existing systems.
detection devices
Penetration Spying
and discrete autocorrelation to find the dominant periods B. Feature-based statistical learning for specific device iden-
in protocol-specific activities. They then used statistical and tification
stability metrics to model the devices’ behavioral patterns. IoT device identification can be formalized as a classifica-
Finally, the Bayesian-optimized k-Nearest Neighbor algorithm tion problem. In this section, we first introduce the generic
was employed for classification. In [54] and [55], the authors pipeline for signal reception and then focus on feature-based
extracted the protocols and network flow properties within a statistical learning approaches for specific device identification
sliding window to generate fingerprints of devices. They used from raw signals and their open issues.
one-versus-rest classifiers to identify commercial devices. In
[56], The authors first provided a Random Forest classifier 1) Generic wireless signal reception pipeline for device
using TCP/IP stream features. They incorporated confidence identification: Software-Defined Radios (SDR) are multipur-
thresholds and averaged decisions within a sliding window to pose front-ends to deal with various modulation and baseband
identify known or unknown device types. Similar research is encoding schemes in wireless device identification. Funda-
presented in [56] and [57]. In [58], the authors also present mental technologies in SDR are quadrature modulation and
that network traffic, device types, and their operation states demodulation [65].
(boot, active, and idle) can be inferred simultaneously. Generally, the wireless signals of IoT devices can be repre-
An extra benefit of modeling device activity patterns is in- sented as: S(t) = I(t)·cos[2π(fc +f ′ )t]+Q(t)·sin[2π(fc +
creasing the chances of identifying behavioral variations. Such f ′ )t], where I(t) and Q(t) are denoted as in-phase and
benefit directly contributes to the detection of compromised quadrature components, respectively. The key idea is use I(t)
devices or network attacks, which will be discussed in section and Q(t) to represent different modulation schemes.
IV. A brief quadrature demodulation pipeline is given in Fig-
Deriving devices’ benign flow characteristics is nontrivial, ure 7. We denote the reconstructed version of I(t) and
Q(t) as I(t)ˆ and Q̂(t), respectively. We can derive the
therefore, the IETF standard Manufacturer Usage Description
(MUD) profile [59] is proposed as an initial static profile to signals instantaneous
q amplitude, phase, and frequency by
describe IoT device network behavior and support the making m̂(t) = ˆ 2 ˆ
I (t) + Q̂ (t), φ̂(t) = tan−1 (Q̂(t)/I(t))
2 and
of security policies. A collection of MUD profiles from 30 ˆ
f (t) = ∂ φ̂(t)/∂t. Manufacturing imperfections and channel
commercial devices in [60]. The MUD profiles can be used characteristics can cause m̂(t), φ̂(t) and fˆ(t) to deviate from
to either verify device types or detect devices under attack its original form, providing side channels to identify wireless
or being compromised [61]. However, one issue of using the devices. A brief overview of features for IoT device identity
static profiles is that long observation time is needed to make verification using wireless signals in Physical Layer is given
decisions. in Figure 8. The features for wireless device identification are
Device identifiers based on network flow and activity also named Radiometric Fingerprints.
patterns may encounter emerging issues. First, IoT devices 2) Hardware imperfections: Heterogeneous imperfections
are becoming smart devices where new extensions can be exist in IoT devices’ wireless frontends. These imperfections
installed, and firmware upgrades can happen periodically, do not necessarily degrade the communication performance
thereby changing activity patterns or network flow statistics, but influence signal waveforms, thereby providing a side
as suggested in [62], [63] and [51]. Second, deriving relevant channel to identify different devices. Such features enclosed
and distinctive features is not always easy and straightforward. in transmitted signals are named Physical Unclonable Features
To automate the processes of deriving useful features, in [57], (PUF) [66], [67]) since regular users can not clone or forge
the authors proposed a Genetic Algorithm (GA) enabled fea- the characteristics of these manufacturing imperfections.
ture selector. Furthermore, a Deep Neural Network approach, a) Error / noise patterns: The errors between expected
which does not require complicated feature engineering, is rational signals and actual received signals can disclose useful
presented in [64]. Third, device types do not necessarily device-specific information. In [68] and [69], the authors used
correlate with their identities. Therefore, behavior-independent the phase errors of Phase Lock Loop (PLL) in transmitters
specific device identification is of great significance.. as a distinctive feature. Their simulations indicate promising
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 5, MAY 2020 6
Amplitude
authors used the instantaneous differences between received Transient periods are commonly seen at the beginning and end
I/Q signals and theoretically expected templates to construct of wireless packet transmission. In [83], the authors employed
error vectors. They combined error vectors’ statistics and time- the nonlinear in-band distortion and spectral regrowth of the
frequency domain statistics to synthesize the fingerprints of RF received signals (potentially caused by power amplifiers of
transmitters. transmitters) to distinguish the masquerading device. In [84],
In [71]–[73], the authors used the differential constellation the authors derived the energy spectrum from transmitters’
trace figure (DCTF), carrier frequency offset, phase offset, turn-on transient amplitude envelopes to classify eight different
and I/Q offset to identify different Zigbee devices. They devices. The results show that frequency-domain features are
developed a low-overhead classifier, which learns how to more reliable than time-domain features. In [85] and [86],
adjust feature weights under different SNRs. The behaviors of the time-domain statistical metrics and wavelet features of
their classifiers are similar to k-NN algorithms. Authors in [74] transmitters’ turn-on transient signals were transformed into
used the odd harmonics of center frequencies as fingerprints devices’ RF fingerprints. Finally, it is notable that the authors
for RFID transmitters. in [87] captured the turn-on transient signal of Bluetooth
b) Persistent patterns: Persistent pattern recognition as- devices and extracted 13 time-frequency domain features (via
sumes that the statistics of consecutive subregions in received Hibert-Huang spectrum) to construct the devices’ fingerprints.
signals can disclose identity-related information. A typical Their experiments have shown that well-designed fingerprints
method is named as RF-DNA (Distinctive Native Attributive provide promising results even without using complicated
[75], [76]. The basic idea is to use the statistical metrics of machine learning models.
signals’ consecutive subregions to form device fingerprints. The merit of transient features is that an adversary could
A brief dataflow of RF-DNA is given in Figure 9. In [77]– not forge such nonlinear features unless they can accurately
[79], the authors captured the preamble of WPAN (Wireless forge the coupled characteristics of pair-wise wireless channels
Personal Area Network) signals and extract the variance, skew- and RF front-ends between victims and surveillance agents.
ness, and kurtosis of signals’ subregions (bins) as signatures. In other words, the transient features can be influenced by the
Research in [80] showed that RF-DNA can even be applied to locations of devices, as different locations can result in vari-
model the Fourier spectrum of devices. ation of RF channel characteristics, e.g., transient responses,
From the perspective of Stochastic Process, a sequence of machine learning algorithms can produce accurate but unre-
signal symbols can be regarded as a sample from a multivariate liable device identification results by exploiting RF channel
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 5, MAY 2020 7
characteristics rather than learning device-specific features. Indirect recognition Direct recognition
3) Channel state features: : From the perspective of signal
propagation, the nonlinear characteristics of radio channels Channel specific Transient pattern
recognition recognition
can cause recognizable distortions to the received signals.
Those distortions can become unique profiles of transmitters. Channel state Transmitter
Therefore, the channel state recognition approach’s basic idea information specific features
is to: a) mathematically or statistically describe the nonlinear
characteristics of the propagation channel within receivers and Time/phase of Location based Persistent pattern
transmitters. b) Estimate whether a wireless device’s signals’ arrivals recognition recognition
TABLE III
I NFLUENTIAL FACTORS FOR FEATURE - BASED SPECIFIC DEVICE IDENTIFICATION
computationally expensive to retrain for operational variations. Input Convolution Convolution Fully-connected
layer layer layer
We can make better use of hybrid features in Deep Neural
Networks, which will be discussed in Section III-C.
Results
6) Open issues: In general, the following issues need to Input Filters Filters
TABLE V
C OUNTERMEASURES TO PREVENT LEARNING FROM TRIVIAL FEATURES
proaches, Deep Learning methods usually require a much Obtaining optimized hyperparameters is computationally
larger dataset to initialize the network. To know how large expensive. Several strategies are proposed for efficient hy-
the training data is needed. In [140], CNN models were used perparameter searching, such as grid search, random search,
to classify different devices’ signals with controlled difficulty prediction-based approaches, and evolutionary algorithms.
levels. The classification accuracy of a fixed CNN network Their characteristics are as follows:
with different dataset sizes was predicted using a power-law • Grid search: Grid search divides the whole parameter
model and the Levenberg-Marquardt algorithm. Their results space into identical intervals and performs brute-force
show that the dataset size should be at least 10,000 to 30,000 trials to find optimal parameter combinations. However,
times the number of devices to be identified. However, this this strategy is inefficient since useless combinations of
conclusion is only a rough estimation. parameters can not be pruned rapidly.
New architectures in Deep Learning are emerging and can • Random search: In random search, sample points are
significantly influence the performance of device identifica- distributed uniformly in the search space. This strategy
tion systems. In [125], the authors used Convolutional Deep increases the variation and outperforms the grid search
Complex-valued Neural Network (CDCN) and Recurrent Deep when only a small number of parameters can impact the
Complex-valued Neural Network [141] to address the device network performance.
identification problem. Their networks utilized fragments of • Prediction-based: In prediction-based approaches, the
raw I/Q symbols as input, and their test was conducted on algorithms first perform random trials at the beginning
both WiFi and ADS-B datasets. Their experiments show that to model the relation between the network performances
the Complex-valued neural networks surpass regular real- with hyperparameters. Then the algorithms perform new
valued deep neural networks. In [142], [143], a zero-bias trials based on parameters that are more probable to
dense layer was proposed. The authors have shown that their yield better results. Such trial-model-predict paradigm is
solution enables deep neural networks’ final decision stage to conducted repeatedly [152]. A typical prediction strategy
be transparent. Their zero-bias deep neural network maintains is the Bayesian optimization process [153], in which the
equivalent identification accuracy and outperforms regular algorithms model the target outcome space as Gaussian
DNN and one-class SVM in detecting unknown devices. processes.
2) Open issues in Deep Learning for IoT device identifica- • Evolution based: In evolutionary algorithm based ap-
tion: Deep Learning is becoming a promising technology in proaches, the heuristic searches are performed as in other
this domain. However, as in other domains, Deep Learning nonlinear optimization problems. In [154], the authors
encounters several challenges. Although researches in IoT used the Genetic Algorithm to find the optimal hyperpa-
device identification rarely cover the issues, we briefly discuss rameters of a neural network. Compared with prediction-
their current states and solutions. based approaches, evolutionary algorithms provide the
a) Hyperparameter searching: One critical problem for best guess with bio-inspired strategies. However, there
using deep neural networks is hyperparameter tuning. Hyper- is no guarantee for the performance of evolutionary
parameters such as learning rate, mini-batch size, dropout rate, algorithms.
etc. are used to initialize the training process. Hyperparame- b) Neural network Architecture search: Network Archi-
ters can significantly impact the performance of deep neural tecture Search (NAS) is another challenging task in designing
networks. For instance, in [151], the authors compared the neural networks. Network architecture defines the flow of
performance of Deep Neural Networks, Convolutional Neural tensors and could significantly affect the complexity and
Network, and the LSTM (Long Short Term Memory) in device performance of neural networks [155], [156]. At the current
identification using the raw I/Q signals directly. Their results stage, most network architectures are specified manually or
showed that CNN has the best performance, followed by DNN with trial-and-error.
and LSTM. They have pointed out that the hyper-parameters Architecture searching algorithms are provided by several
of Deep Learning, especially for network architectural param- Automatic Machine Learning (AutoML) platforms. A brief
eters, significantly influence the upper bound of performance. comparison of their functionality and performance on different
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 5, MAY 2020 11
TABLE VI
M ETHODS FOR UNKNOWN DEVICE RECOGNITION
datasets is in [157]. A collection of recent literature and open- and discover a novel architecture. Intuitively, evolution
source tools are given in [158] and [159] respectively. These algorithms use a fixed strategy to discover the optimal
efforts can be classified into three categories: (i) network architecture while RL agents learn their own strategies
pruning [160], (ii) progressively growing [161], and (iii) and have better capabilities in avoiding bad solutions.
heuristic network architecture search [162]. Their features are • Differentiable space search: Aforementioned, NAS
as follows: strategies use discrete space to encode the architecture of
neural networks, which is not differentiable and lacks ef-
• Network pruning: Network pruning algorithms use ficiency. Therefore, differentiable spaces to represent the
group sparsity regularizers [163] to remove unimportant Neural Networks’ architectures are proposed, in which ef-
connections from a regularly trained network. Then the ficient off-the-shelf optimization algorithms can be used.
pruned network will be retrained to fine-tune the weights Typical solutions are given in [177], [178]. The algorithm,
of the remaining connections [164], [165]. A key benefit DART (Differentiable Architecture search), is presented.
of network pruning is that it can greatly compress neural The authors used the Softmax function to represent the
networks and make them suitable to deploy in low discrete selections in a numerically continuous domain.
capacity IoT devices. They then used a gradient descent algorithm to explore
• Progressively growing: This strategy grows a neural the search space. Similar work with an enhanced stochas-
network architecture during training. It is effective in tic adaptive searching strategy is in [179]. Block-wise
simple networks with only one hidden layer [166], [167]. representations of the neural network and differentiable
More recent advances employ growing strategies to pro- searching space together are bringing NAS to practice.
gressively add nodes and layers to increase the network’s
approximation ability [168], [169]. Network architecture search has become an emerging topic
• Heuristic network search: In heuristic network search, for deep neural network research with publicly available
the architecture of the Deep Neural Network (which can benchmarking tools in [180] and [181], respectively.
either be block-wise [170] or element-wise [171]) can c) Openset recognition: A critical problem for learning
first be represented in a high dimension space with bil- based device identification is that classifiers only recognize
lions of parameters. Next, heuristic searching algorithms pretrained devices’ signals but can not deal with novel ones
are applied to transverse this search space to find the that are not in the training dataset. In [150], the authors
optimal solutions. Examples are given in [162], [172] formulated it as a semi-supervised learning problem. They
and [173]. The authors used the Genetic Algorithm to first trained a CNN model with the last layer as a Softmax
find the possible structure of neural networks. Notably, output on a collection of known devices. They then removed
the Genetic Algorithm fits perfectly in NAS problems the Softmax function and turn the neural network into a
since it allows using length-varying variables (genes) to nonlinear feature extractor. Finally, they used the DBSCAN
encode the candidate solutions. An empirical example is algorithm to perform cluster analysis on the remapped features
the NeuroEvolution of Augmenting Topologies (NEAT) of raw I/Q signals. Their results showed that such a semi-
algorithm [172]. supervised learning method has the potential of detecting a
• Reinforcement Learning: Reinforcement learning (RL) limited number of untrained devices. Comparably, in [182],
has become a popular strategy in NAS [174]–[176]. the authors used an incremental learning approach to train
The basic idea is to let a deep learning-enabled agent neural networks to classify newly registered devices.
explore network architectures’ representative space and From the perspective of Artificial Intelligence, this issue
use validation accuracy or other metrics as rewards to is categorized to the Open Set Recognition [183], [184] and
adjust the agents’ solutions. Ideally, as an RL process the Abnormality Detection problem. The taxonomy of existing
moves on, an agent can find an optimal searching strategy approaches is given in table VI. In [137], the authors used
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 5, MAY 2020 12
TABLE VII
B RIEF COMPARE OF I OT DEVICE IDENTIFICATION AND DETECTION METHODS
or probabilistic distributions. If behavior or signal propagation to associate different types of devices to corresponding cluster
patterns are strictly correlated with specific devices, extracted centers in the representative space. A similar approach using
behavior or signal features can be used to verify the identity Deep Learning is presented in [199]. The authors used TCP
of devices. Comparisons of the supervised and unsupervised data traffics for each device to train an LSTM-enabled au-
learning based device identification are (also in Table VII)): toencoder to map inputs into a representative feature space.
• The training data does not directly indicate device specific They then used a clustering algorithm to divide the training
information (device identifier, device type, and etc.). samples into their natural clusters. Finally, they used proba-
• The number of devices may not be known in advance. bilistic modeling to associate new data with known clusters
for device identification. Unfortunately, their results show that
As depicted in Figure 14, the work flow of unsupervised
unsupervised behavior identification may not work once there
learning enabled device detection and identification is made up
are devices with an identical model.
of three steps: a) Feature engineering on IoT devices’ signals
or behavior profiles, including feature selection and mapping. 2) Signal propagation pattern modeling: In the Physical
b) Modeling the latent spaces, this step finds out cluster Layer, signal propagation patterns provide information for
centers, probabilistic distributions, related decision boundaries, device identification. On the one hand, if devices positions are
or state transition models. c) Matching input signal or behavior unique and known in advance, we may directly use wireless
profiles to the most likely clusters or reporting abnormalities. localization algorithms to specify whether a received data
1) Device behavior modeling: Device behavior modeling packet is from its claimed identity. Corresponding surveys
extracts distinctive features from the input data and finds out on wireless device localization are available in [204]–[206],
the number of different devices using unsupervised learning and we provide a brief comparison of the widely employed
algorithms. However, the physical layer does not provide methods in Table VIII.
much information for device behavior modeling. Therefore, On the other hand, signal propagation modeling derives the
the methods are more frequently employed in the upper layers path loss or attenuation patterns of received signals to detect
with related techniques employed are unsupervised feature en- different devices using unsupervised learning algorithms [39].
gineering, clustering, and Software-Defined Networking [49]. In [207], the authors used the signals’ propagation path effect,
and they discovered that the received signal strength from
In [197] and [198], the data traffic attributes were obtained transmitters in the same location would have very similar
from flow-level network telemetry to recognize different IoT varying trends. They converted the signal strength metrics into
devices. The authors utilized Principle Component Analysis time series and incorporated the Dynamic Time Warping algo-
along with an adaptive one-class clustering algorithm to find rithm to align and find differences between received signals.
the optimal representative components and cluster centers for Finally, they applied a clustering algorithm to identify signals
each device. They provided a conflict resolution mechanism from active transmitters. In [208], the authors assumed that
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 5, MAY 2020 14
TABLE VIII
C OMPARISON OF DEVICE LOCALIZATION METHODS IN I OT
presented that by comparing the deviation of devices’ run- Deep Predictive Coding Neural Network [230] was used to
time MUD profiles with static ones, they can identify their predict consecutive frames of time-frequency video streams
behavioral deviations or even identify device types. In [218], of wireless devices. They can even specify the type of attacks
the authors translated MUD profiles of devices into flowtable using the spatial distribution of error pixels in the reconstructed
rules. The authors then used PCA to map each device’s data frames.
traffic from side windows into its own representative one-
class space, where X-Means [213] and Markov chains were D. Open issue
used to partition the space and model the state transition in Methods in this topic overlap with the methods of open
cluster centers. Finally, an exception will be triggered by a set recognition in Deep Learning. We briefly list several open
specific detector on either the mapped traffic pattern is out issues in this topic:
of boundaries or the state transitions do not comply with the • Selection of behavioral features: Manual feature selec-
reference model. Their results showed the accurate detection tion along with dimension reduction are applied exten-
of several types of volumetric attacks. sively. A concern is that we can not guarantee the selected
features are sensitive to unknown intrusions in the future.
B. Reconstruction Approaches • Processing of abnormality metrics: Generally, intrusion
detection approaches provide metrics corresponding to
Reconstruction approaches aim to learn and reconstruct
the degree of deviation. However, the output error metrics
domain-specific patterns from devices’ normal operation
require a posterior process, e.g., selecting appropriate
records. In other words, we need to develop a model to ”mem-
decision thresholds or aggregation window length, which
orize” the normal schemes of IoT devices by producing low
balances between the true positive, false negative, and
reconstruction errors. Simultaneously, the model is supposed
response latency. One solution is to regard the corre-
to produce high reconstruction errors for unknown scenarios
sponding parameters as hyperparameters and use cross-
or encounters behavioral deviations. This goal is generally
validation to tune them. The processing of error metrics
achieved using deep autoencoders. Since an encoder removes
remains a case-specific open issue.
a great amount of information, the corresponding decoder
needs to reconstruct the lost information according to domain- V. C HALLENGES AND F UTURE R ESEARCH D IRECTIONS
specific memories. Consequently, once abnormal inputs are Our literature review has shown that device detection and
given to a well-trained autoencoder, its decoder would not be identification provide another layer of security features to IoT.
able to reconstruct such unknown inputs and yields a high However, the existing solutions are still far from perfect. This
abnormal score (reconstruction error). In [219]–[221], the au- section summarizes the existing challenges of IoT device iden-
thors utilized a deep autoencoder to detect abnormal activities tification and detection as well as future research directions.
by modeling the data traffic and content of IoT devices once
abnormal activities are detected. In [222], the authors have A. Challenges in machine learning models
shown that compared with other anomaly detection methods 1) Unknown device recognition: Existing works focus on
(one-class SVM [223], Isolation Forest [224] and Local Outlier the accuracy they can obtain using a fixed dataset with all
Factor [225]), deep autoencoder yields the best result in terms devices labeled, in which Black-Box models (e.g., Deep Learn-
of reliability and accuracy. ing and SVM) are commonly employed. In practical scenarios,
these models can produce wrong answers when encountering
C. Prediction Approaches novel devices. Additional mechanisms are needed to identify
Prediction approaches utilize temporal information in de- unknown signals. Although we can use the one-versus-rest
vices’ operation records. Corresponding methods model each technique to train a group of classifiers and avoid producing
IoT device’s operational data as multi-dimension time series. results on unknown devices. However, once we have new
Then, device-specific prediction models are trained using time devices to register, all classifiers in the group are supposed
series from normal schemes. When devices are hijacked for to be retrained from scratch. Therefore, we need to provide a
rogue activities, they are not supposed to behave as predicted, solution to verify the known devices. Meanwhile, we need to
causing the corresponding time series predictors to output high identify:
prediction errors. • Devices that are exactly not in the scope of the identifi-
In [226], the authors employed a CNN based predictor to cation system.
analyze the abnormal behaviors in devices’ network traffics. • Unknown devices that are from identical manufacturers.
The results showed that predictors trained without abnormal Devices of the same model from an identical manufac-
data are sensitive (yield high prediction error) to anomalies. turer can share similar behavior patterns, e.g., network
Similar work is shown in [227], and the authors used an flow characteristics. Such similarities can impede identity
autoregression model to capture the normal varying trend of verification in the network, transportation, or application
devices’ traffic volumes. However, modeling a single variable layers.
can not be sufficient in dealing with complicated scenarios. The latter is more challenging and requires extracting
Recent studies combine deep Autoencoder with Long Short behavior-independent characteristics. We believe that without
Term Memory (LSTM) to derive abstracted representations of the capability of unknown device recognition, these types of
complex scenarios and make predictions. In [228] and [229], systems are still far from practice.
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 5, MAY 2020 16
TABLE IX
E XISTING DATASET FOR P HYSICAL L AYER I OT DEVICE IDENTIFICATION
2) Incremental learning with new devices: Incremental only contain a limited number of devices, while a larger dataset
learning [188] in this domain emphasizes that an identification containing only ADS-B raw signals from more than 100
or detection model should be able to learn newly registered airborne transponders are provided in [135]. Another dataset
devices without retraining on a large dataset containing new containing more than 30 IoT devices’ traffic traces under vol-
and old devices. Because retaining the old dataset or deriving umetric attack and benign scenarios are in [60]. These dataset
generators for knowledge replay is computationally expensive. are important because they provide fair comparisons between
This topic faces several challenges: algorithms. Additionally, models trained on large datasets can
• Knowing the maximum number of devices a model can be efficiently transferred to more specific applications [241],
memorize, especially for the Deep Neural Networks. [242].
• Expanding models dynamically as new devices are being
added. Incremental learning is natively supported in Near- B. Challenges in feature engineering
est Neighbor algorithms but is challenging to implement
1) The robustness of features: Although many existing
in Deep Neural Networks.
works claim the effectiveness of their discovered features,
3) Deployment of device identification models: The deploy- only very few evaluate the features’ robustness under various
ment sites and model providers’ lab can differ dramatically, in scenarios in terms of device mobility pattern, temperature,
which identification accuracy can be impaired. This issue is obstacles, etc. Feature robustness has a limited influence on
more severe in device identification models using wireless sig- device type identification in the network or higher layers.
nals due to the difference of wireless channel characteristics. However, in the Physical Layer identification of wireless
For alleviation, extra works are needed: devices, the robustness of features would severely impair
• Deriving features that are independent of wireless chan- the final model. Currently, a popular way to enforce robust
nels or deployment sites. Authors in [235], [239] sug- feature discovery is through data augmentation to simulate
gested that neural networks can only learn about channel- various scenarios. Besides, in neural networks, regularization
specific features rather than device-specific features. and dropout methods can encourage models to make full use
• Occasional finetunes are needed with the help of incre- of input data and discover robust latent features, but their
mental or transfer learning to adapt to variations. effectiveness needs further study.
• Model providers need to use data augmentation methods 2) Making use of time-varying features: Some device de-
to simulate operational variations during lab training, as tection and identification models use protocol-agnostic and
suggested in [240]. behavior-independent features from physical layer wireless
• Model providers can use multi-domain training to derive signals. However, in mobile environments, devices’ move-
multi-purpose feature extractors, which will be utilized as ments can result in time-varying channel conditions, in which
building blocks for domain-specific device identification device identification methods based on static channel char-
models. Diverse training from different domains could acteristics can be impaired. On the other hand, varying pat-
provide more robust feature extractors. terns of channels, signal strength, etc. also encode valuable
4) Reliable benchmark datasets: The IoT device identifi- features, e.g., location, distance, noise pattern, and etc., to
cation is a pattern recognition problem on signals or commu- help distinguish IoT devices [243], [244]. Therefore, both
nication patterns. A common benchmark dataset is critical for discovering time-invariant features and making use of time-
comparing various methods in device identification and rogue varying features are still an open issue in device identification
device detection reliably. However, by the end of this survey, and detection.
we only find a limited number of datasets providing devices’ 3) Challenges from deep generative attackers: : The uti-
raw signals or network traffic traces in diverse scenarios. Some lization of GAN brings challenges to device identification,
datasets are available in [132], [133] and [134], respectively. especially in the Physical Layer. Using GAN models, an
For physical layer device identification, some popular datasets attacker can train highly realistic signal or data packet gen-
are summarized in Table IX. As summarized, many of them erators to mimic its victims’ signal characteristics. Research
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 5, MAY 2020 17
in [245] showed that GAN can increase the success rate of passively collected network traffic traces and wireless signal
spoofing attacks from less than 10% to approximately 80%. patterns. We discuss existing non-cryptographic IoT device
Fortunately, a simple remedy is to use MIMO receivers and identification mechanisms from the perspective of machine
wireless localization methods to estimate whether a transmitter learning and pinpoint several key developing trends such as
is at an expected position. Additionally, controlled imperfec- incremental learning, abnormality detection, and deep unsu-
tions can be dynamically imprinted into the devices’ signals pervised learning with explainability. We found that a multi-
or data flows in a Pseudorandom Noise Code driven time- perspective IoT wireless device detection and identification
varying manner [239], which is cryptographically impossible framework is needed. Future research for rogue IoT device
to predict. identification and detection needs to cope with challenges
beyond signal processing and borrow ideas from advanced
C. Future research trends topics in Artificial Intelligence and Knowledge Discovery.
1) Deep identification models with explainable behaviors
ACKNOWLEDGMENT
and assured performances: The conveniences of Deep Neural
Network make it a versatile tool to implement IoT device This research was partially supported through Embry-Riddle
identification and rogue device detection systems, but more ef- Aeronautical University’s Faculty Innovative Research in Sci-
forts have to be made, especially for model explainability and ence and Technology (FIRST) Program and the National
performance assurability. On the one hand, we have limited Science Foundation under Grant No. 1956193.
knowledge of the decision process, especially on how a deep
neural network makes its final decisions and corresponding de- R EFERENCES
cision boundaries. Without knowing the decision process and [1] S. Jeschke, C. Brecher, H. Song, and D. Rawat, Industrial Internet of
Things: Cybermanufacturing Systems. Cham, Switzerland: Springer,
decision boundaries, there is no way to assure its performance. 2017.
On the other hand, researches on the explainability of Deep [2] Y. Sun, H. Song, A. J. Jara, and R. Bie, “Internet of things and big data
Neural Networks focus on explaining models’ behaviors but analytics for smart and connected communities,” IEEE Access, vol. 4,
pp. 766–773, 2016.
do not provide guidelines on deriving assurable performance. [3] H. Song, R. Srinivasan, T. Sookoor, and S. Jeschke, Smart Cities:
Without explainability, we can not assure the performance of Foundations, Principles and Applications. Hoboken, NJ: Wiley, 2017.
models. [4] Y. Zhang, L. Sun, H. Song, and X. Cao, “Ubiquitous wsn for health-
care: Recent advances and future prospects,” IEEE Internet of Things
2) Unsupervised and incremental deep learning for device Journal, vol. 1, no. 4, pp. 311–318, Aug 2014.
identification: With a large number of devices being connected [5] Y. Sun and H. Song, Secure and Trustworthy Transportation Cyber-
to IoT, device identification and detection models need to Physical Systems. Singapore: Springer, 2017.
[6] K. Zhang, Y. Jiang, D. Liu, and H. Song, “Spatio-temporal data
incrementally adapt to operational variations in real-time. mining for aviation delay prediction,” in 2020 IEEE 39th International
A solution can be the seamless integration of the feature Performance Computing and Communications Conference (IPCCC).
abstraction capability of deep neural networks, incremental IEEE, 2020, pp. 1–7.
[7] Y. Liu, J. Li, Z. Ming, H. Song, X. Weng, and J. Wang, “Domain-
learning, and unsupervised learning. The knowledge of using specific data mining for residents’ transit pattern retrieval from incom-
deep neural networks to perform unsupervised learning for plete information,” Journal of Network and Computer Applications,
IoT device identification and detection is currently limited. vol. 134, pp. 62–71, 2019.
[8] Y. Jiang, S. Niu, K. Zhang, B. Chen, C. Xu, D. Liu, and H. Song,
Meanwhile, incremental learning in deep models for device “Spatial-temporal graph data mining for iot-enabled air mobility pre-
identification and detection is also rarely investigated. diction,” IEEE Internet of Things Journal, pp. 1–1, 2021.
3) Controlled imprinting of verifiable patterns: Compared [9] G. Dartmann, H. Song, and A. Schmeink, Big Data Analytics for
Cyber-Physical Systems: Machine Learning for the Internet of Things.
with passive non-cryptographic device identification and de- Elsevier, 2019.
tection methods in this survey, a proactive way is imprinting [10] Y. Jiang, Y. Liu, D. Liu, and H. Song, “Applying machine learning
verifiable patterns into devices’ transmitted signals or activity to aviation big data for flight delay prediction,” in 2020 IEEE Intl
Conf on Dependable, Autonomic and Secure Computing, Intl Conf on
patterns. As suggested in [236], controlled imperfections are Pervasive Intelligence and Computing, Intl Conf on Cloud and Big
utilized as verifiable patterns. Embedded these patterns in Data Computing, Intl Conf on Cyber Science and Technology Congress
signals could significantly enhance the performance of device (DASC/PiCom/CBDCom/CyberSciTech). IEEE, 2020, pp. 665–672.
[11] K. Zhang, Y. Liu, J. Wang, H. Song, and D. Liu, “Tree-based airspace
identification. However, a critical concern is how to prevent the capacity estimation,” in 2020 Integrated Communications Navigation
adversaries from collecting and learning about the imprinted and Surveillance Conference (ICNS). IEEE, 2020, pp. 5C1–1.
identity verification information. As suggested in [235], a pos- [12] H. Song, G. A. Fink, and S. Jeschke, Security and Privacy in Cyber-
Physical Systems: Foundations, Principles and Applications. Chich-
sible solution is to dynamically change the identity verification ester, UK: Wiley-IEEE Press, 2017.
patterns according to a pair of synchronized pseudorandom [13] I. Butun, P. sterberg, and H. Song, “Security of the internet of things:
code generators, where the initialization keys are only shared Vulnerabilities, attacks and countermeasures,” IEEE Communications
Surveys Tutorials, pp. 1–1, 2019.
among the device and corresponding device identifiers. Meth- [14] J. Wang, Y. Liu, S. Niu, H. Song, W. Jing, and J. Yuan, “Blockchain
ods are still limited in imprinting verifiable patterns that are enabled verification for cellular-connected unmanned aircraft system
difficult to learn. networking,” Future Generation Computer Systems, vol. 123, pp.
233–244, 2021. [Online]. Available: https://www.sciencedirect.com/
science/article/pii/S0167739X21001461
VI. C ONCLUSION [15] J. Wurm, K. Hoang, O. Arias, A.-R. Sadeghi, and Y. Jin, “Security
analysis on consumer and industrial iot devices,” in 2016 21st Asia
This survey aims to provide a comprehensive on the existing and South Pacific Design Automation Conference (ASP-DAC). IEEE,
technologies on IoT device detection and identification from 2016, pp. 519–524.
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 5, MAY 2020 18
[16] O. Shwartz, Y. Mathov, M. Bohadana, Y. Elovici, and Y. Oren, “Reverse [39] K. Zeng, K. Govindan, and P. Mohapatra, “Non-cryptographic authenti-
engineering iot devices: Effective techniques and methods,” IEEE cation and identification in wireless networks,” network security, vol. 1,
Internet of Things Journal, vol. 5, no. 6, pp. 4965–4976, 2018. p. 3, 2010.
[17] A. Gupta, The IoT Hacker’s Handbook. Springer, 2019. [40] K.-H. Wang, C.-M. Chen, W. Fang, and T.-Y. Wu, “On the security of
[18] K. Liu, M. Yang, Z. Ling, H. Yan, Y. Zhang, X. Fu, and W. Zhao, “On a new ultra-lightweight authentication protocol in iot environment for
manually reverse engineering communication protocols of linux based rfid tags,” The Journal of Supercomputing, vol. 74, no. 1, pp. 65–70,
iot systems,” arXiv preprint arXiv:2007.11981, 2020. 2018.
[19] L. Costa, J. P. Barros, and M. Tavares, “Vulnerabilities in iot devices [41] F. Loi, A. Sivanathan, H. H. Gharakheili, A. Radford, and V. Sivara-
for smart home environment,” in Proceedings of the 5th International man, “Systematically evaluating security and privacy for consumer iot
Conference on Information Systems Security e Privacy, ICISSP 2019., devices,” in Proceedings of the 2017 Workshop on Internet of Things
vol. 1. SCITEPRESS, 2019, pp. 615–622. Security and Privacy, 2017, pp. 1–6.
[20] J. Pollack and P. Ranganathan, “Aviation navigation systems security: [42] D. S. Guamán, J. M. Del Alamo, and J. C. Caiza, “A systematic
Ads-b, gps, iff,” in Proceedings of the International Conference on mapping study on software quality control techniques for assessing
Security and Management (SAM). The Steering Committee of The privacy in information systems,” IEEE Access, vol. 8, pp. 74 808–
World Congress in Computer Science, Computer , 2018, pp. 129–135. 74 833, 2020.
[21] M. R. Manesh and N. Kaabouch, “Analysis of vulnerabilities, at- [43] J. Ren, D. J. Dubois, D. Choffnes, A. M. Mandalari, R. Kolcun,
tacks, countermeasures and overall risk of the automatic dependent and H. Haddadi, “Information exposure from consumer iot devices:
surveillance-broadcast (ads-b) system,” International Journal of Criti- A multidimensional, network-informed measurement approach,” in
cal Infrastructure Protection, vol. 19, pp. 16–31, 2017. Proceedings of the Internet Measurement Conference, 2019, pp. 267–
[22] D. Dimitrios, M. Baldauf, and M. Kitada, “Vulnerabilities of the 279.
automatic identification system in the era of maritime autonomous [44] S. Al-Sarawi, M. Anbar, K. Alieyan, and M. Alzubaidi, “Internet
surface ships,” 06 2018. of things (iot) communication protocols,” in 2017 8th International
[23] C. Ray, R. Gallen, C. Iphar, A. Napoli, and A. Bouju, “Deais project: conference on information technology (ICIT). IEEE, 2017, pp. 685–
detection of ais spoofing and resulting risks,” in OCEANS 2015- 690.
Genova. IEEE, 2015, pp. 1–6. [45] I. Jawhar, N. Mohamed, and J. Al-Jaroodi, “Networking architectures
[24] F. L. Yihunie, A. K. Singh, and S. Bhatia, “Assessing and exploiting and protocols for smart city systems,” Journal of Internet Services and
security vulnerabilities of unmanned aerial vehicles,” in Smart Systems Applications, vol. 9, no. 1, p. 26, 2018.
and IoT: Innovations in Computing. Springer, 2020, pp. 701–710. [46] F. Metzger, T. Hoßfeld, A. Bauer, S. Kounev, and P. E. Heegaard,
[25] A. Koubaa, A. Allouch, M. Alajlan, Y. Javed, A. Belghith, and “Modeling of aggregated iot traffic and its application to an iot cloud,”
M. Khalgui, “Micro air vehicle link (mavlink) in a nutshell: A survey,” Proceedings of the IEEE, vol. 107, no. 4, pp. 679–694, 2019.
IEEE Access, vol. 7, pp. 87 658–87 680, 2019. [47] S. Han, K. Jang, K. Park, and S. Moon, “Packetshader: a gpu-
accelerated software router,” ACM SIGCOMM Computer Communi-
[26] L. Y. Paul, J. S. Baras, and B. M. Sadler, “Physical-layer authentica-
cation Review, vol. 40, no. 4, pp. 195–206, 2010.
tion,” IEEE Transactions on Information Forensics and Security, vol. 3,
[48] F. Hu, Q. Hao, and K. Bao, “A survey on software-defined network and
no. 1, pp. 38–51, 2008.
openflow: From concept to implementation,” IEEE Communications
[27] W. Wang, Z. Sun, S. Piao, B. Zhu, and K. Ren, “Wireless physical-
Surveys & Tutorials, vol. 16, no. 4, pp. 2181–2206, 2014.
layer identification: Modeling and validation,” IEEE Transactions on
[49] W. Rafique, L. Qi, I. Yaqoob, M. Imran, R. ur Rasool, and W. Dou,
Information Forensics and Security, vol. 11, no. 9, pp. 2091–2106,
“Complementing iot services through software defined networking and
2016.
edge computing: A comprehensive survey,” IEEE Communications
[28] H. A. Khattak, M. A. Shah, S. Khan, I. Ali, and M. Imran, “Perception
Surveys & Tutorials, 2020.
layer security in internet of things,” Future Generation Computer
[50] L. Gao, C. Zhang, and L. Sun, “Restful web of things api in sharing
Systems, vol. 100, pp. 144–164, 2019.
sensor data,” in 2011 International Conference on Internet Technology
[29] L. Bai, L. Zhu, J. Liu, J. Choi, and W. Zhang, “Physical layer and Applications. IEEE, 2011, pp. 1–4.
authentication in wireless communication networks: A survey,” Journal [51] A. Sivanathan, “Iot behavioral monitoring via network traffic analysis,”
of Communications and Information Networks, vol. 5, no. 3, pp. 237– arXiv preprint arXiv:2001.10632, 2020.
264, 2020. [52] A. Sivanathan, D. Sherratt, H. H. Gharakheili, A. Radford, C. Wi-
[30] V. Brik, S. Banerjee, M. Gruteser, and S. Oh, “Wireless device jenayake, A. Vishwanath, and V. Sivaraman, “Characterizing and
identification with radiometric signatures,” in Proceedings of the 14th classifying iot traffic in smart cities and campuses,” in 2017 IEEE
ACM international conference on Mobile computing and networking. Conference on Computer Communications Workshops (INFOCOM
ACM, 2008, pp. 116–127. WKSHPS). IEEE, 2017, pp. 559–564.
[31] J. Sun, “An open-access book about decoding mode-s and ads-b data,” [53] S. Marchal, M. Miettinen, T. D. Nguyen, A.-R. Sadeghi, and
https://mode-s.org/, May 2017. N. Asokan, “Audi: Toward autonomous iot device-type identification
[32] B. J. Tetreault, “Use of the automatic identification system (ais) for using periodic communication,” IEEE Journal on Selected Areas in
maritime domain awareness (mda),” in Proceedings of Oceans 2005 Communications, vol. 37, no. 6, pp. 1402–1412, 2019.
Mts/Ieee. IEEE, 2005, pp. 1590–1594. [54] M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A.-R. Sadeghi,
[33] M. A. Amanullah, R. A. A. Habeeb, F. H. Nasaruddin, A. Gani, and S. Tarkoma, “Iot sentinel: Automated device-type identification
E. Ahmed, A. S. M. Nainar, N. M. Akim, and M. Imran, “Deep learning for security enforcement in iot,” in 2017 IEEE 37th International
and big data technologies for iot security,” Computer Communications, Conference on Distributed Computing Systems (ICDCS). IEEE, 2017,
vol. 151, pp. 495–517, 2020. pp. 2177–2184.
[34] M. A. Al-Garadi, A. Mohamed, A. Al-Ali, X. Du, I. Ali, and [55] Y. Meidan, M. Bohadana, A. Shabtai, J. D. Guarnizo, M. Ochoa, N. O.
M. Guizani, “A survey of machine and deep learning methods for Tippenhauer, and Y. Elovici, “Profiliot: a machine learning approach
internet of things (iot) security,” IEEE Communications Surveys & for iot device identification based on network traffic analysis,” in
Tutorials, 2020. Proceedings of the symposium on applied computing, 2017, pp. 506–
[35] N. Wang, P. Wang, A. Alipour-Fanid, L. Jiao, and K. Zeng, “Physical- 509.
layer security of 5g wireless networks for iot: Challenges and opportu- [56] Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N. O. Tippenhauer,
nities,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8169–8181, J. D. Guarnizo, and Y. Elovici, “Detection of unauthorized iot devices
2019. using machine learning techniques,” arXiv preprint arXiv:1709.04647,
[36] G. Baldini and G. Steri, “A survey of techniques for the identification 2017.
of mobile phones using the physical fingerprints of the built-in com- [57] A. Aksoy and M. H. Gunes, “Automated iot device identification using
ponents,” IEEE Communications Surveys & Tutorials, vol. 19, no. 3, network traffic,” in ICC 2019-2019 IEEE International Conference on
pp. 1761–1789, 2017. Communications (ICC). IEEE, 2019, pp. 1–7.
[37] Q. Xu, R. Zheng, W. Saad, and Z. Han, “Device fingerprinting in wire- [58] A. Sivanathan, H. H. Gharakheili, and V. Sivaraman, “Managing iot
less networks: Challenges and opportunities,” IEEE Communications cyber-security using programmable telemetry and machine learning,”
Surveys Tutorials, vol. 18, no. 1, pp. 94–104, 2016. IEEE Transactions on Network and Service Management, vol. 17, no. 1,
[38] B. Danev and S. Capkun, “Physical-layer identification of wireless pp. 60–74, 2020.
sensor nodes,” Technical report/ETH Zürich, Department of Computer [59] E. Lear, R. Droms, and D. Romascanu, “Rfc 8520: Manufacturer usage
Science, vol. 604, 2012. description specification,” Internet Engineering Task Force, 2019.
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 5, MAY 2020 19
[60] H. Hassan, S. Vijay, H. Ayyoob, S. Arunan, and P. Arman, “IoT device [82] B. Danev, H. Luecken, S. Capkun, and K. El Defrawy, “Attacks
profiles, attack traces and traffic traces,” https://iotanalytics.unsw.edu. on physical-layer identification,” in Proceedings of the third ACM
au/index, Accessed on Oct. 2020. conference on Wireless network security. ACM, 2010, pp. 89–98.
[61] A. Hamza, D. Ranathunga, H. H. Gharakheili, T. A. Benson, [83] A. C. Polak and D. L. Goeckel, “Identification of wireless devices
M. Roughan, and V. Sivaraman, “Verifying and monitoring iots network of users who actively fake their rf fingerprints with artificial data
behavior using mud profiles,” IEEE Transactions on Dependable and distortion,” IEEE Transactions on Wireless Communications, vol. 14,
Secure Computing, 2020. no. 11, pp. 5889–5899, 2015.
[62] Y. Ashibani and Q. H. Mahmoud, “A user authentication model for [84] M. Köse, S. Taşcioğlu, and Z. Telatar, “Rf fingerprinting of iot devices
iot networks based on app traffic patterns,” in 2018 IEEE 9th Annual based on transient energy spectrum,” IEEE Access, vol. 7, pp. 18 715–
Information Technology, Electronics and Mobile Communication Con- 18 726, 2019.
ference (IEMCON). IEEE, 2018, pp. 632–638. [85] Z. Zhang, Y. Li, C. Wang, M. Wang, Y. Tu, and J. Wang, “An ensemble
[63] ——, “Design and evaluation of a user authentication model for iot learning method for wireless multimedia device identification,” Security
networks based on app event patterns,” Cluster Computing, pp. 1–14, and Communication Networks, vol. 2018, 2018.
2020. [86] Y. Tu, Z. Zhang, Y. Li, C. Wang, and Y. Xiao, “Research on the internet
[64] J. Kotak and Y. Elovici, “Iot device identification using deep learning,” of things device recognition based on rf-fingerprinting,” IEEE Access,
arXiv preprint arXiv:2002.11686, 2020. vol. 7, pp. 37 426–37 431, 2019.
[65] Z. Zvonar and J. Mitola, Software radio technologies: selected read- [87] A. M. Ali, E. Uzundurukan, and A. Kara, “Assessment of features
ings. Wiley-IEEE Press, 2001. and classifiers for bluetooth rf fingerprinting,” IEEE Access, vol. 7, pp.
[66] B. Chatterjee, D. Das, S. Maity, and S. Sen, “Rf-puf: Enhancing iot 50 524–50 535, 2019.
security through authentication of wireless nodes using in-situ machine [88] J. Yu, A. Hu, F. Zhou, Y. Xing, Y. Yu, G. Li, and L. Peng, “Radio
learning,” IEEE Internet of Things Journal, vol. 6, no. 1, pp. 388–398, frequency fingerprint identification based on denoising autoencoders,”
2018. arXiv preprint arXiv:1907.08809, 2019.
[67] C. Herder, M.-D. Yu, F. Koushanfar, and S. Devadas, “Physical [89] J. M. T. Romano, R. Attux, C. C. Cavalcante, and R. Suyama, Unsuper-
unclonable functions and applications: A tutorial,” Proceedings of the vised signal processing: channel equalization and source separation.
IEEE, vol. 102, no. 8, pp. 1126–1141, 2014. CRC Press, 2018.
[68] A. C. Polak and D. L. Goeckel, “Wireless device identification based [90] F. Restuccia, S. D’Oro, A. Al-Shawabka, M. Belgiovine, L. Angioloni,
on rf oscillator imperfections,” IEEE Transactions on Information S. Ioannidis, K. Chowdhury, and T. Melodia, “Deepradioid: Real-time
Forensics and Security, vol. 10, no. 12, pp. 2492–2501, 2015. channel-resilient optimization of deep learning-based radio fingerprint-
[69] M. Azarmehr, A. Mehta, and R. Rashidzadeh, “Wireless device identifi- ing algorithms,” arXiv preprint arXiv:1904.07623, 2019.
cation using oscillator control voltage as rf fingerprint,” in 2017 IEEE [91] C. Xu, G. Huang, and X. Hou, “Research on communication fm signal
30th Canadian Conference on Electrical and Computer Engineering blind separation under jamming environments,” in 2nd International
(CCECE). IEEE, 2017, pp. 1–4. Forum on Management, Education and Information Technology Appli-
[70] Z. Zhuang, X. Ji, T. Zhang, J. Zhang, W. Xu, Z. Li, and Y. Liu, cation (IFMEITA 2017). Atlantis Press, 2018.
“Fbsleuth: Fake base station forensics via radio frequency fingerprint- [92] S. N. Baliarsingh, A. Senapati, A. Deb, and J. S. Roy, “Adaptive
ing,” in Proceedings of the 2018 on Asia Conference on Computer and beam formation for smart antenna for mobile communication network
Communications Security. ACM, 2018, pp. 261–272. using new hybrid algorithms,” in 2016 International Conference on
[71] L. Peng, A. Hu, Y. Jiang, Y. Yan, and C. Zhu, “A differential constella- Communication and Signal Processing (ICCSP). IEEE, 2016, pp.
tion trace figure based device identification method for zigbee nodes,” 2146–2151.
in 2016 8th International Conference on Wireless Communications & [93] S. S. Hanna and D. Cabric, “Deep learning based transmitter iden-
Signal Processing (WCSP). IEEE, 2016, pp. 1–6. tification using power amplifier nonlinearity,” in 2019 International
[72] L. Peng, A. Hu, J. Zhang, Y. Jiang, J. Yu, and Y. Yan, “Design of a Conference on Computing, Networking and Communications (ICNC).
hybrid rf fingerprint extraction and device classification scheme,” IEEE IEEE, 2019, pp. 674–680.
Internet of Things Journal, vol. 6, no. 1, pp. 349–360, 2018. [94] T. Zheng, Z. Sun, and K. Ren, “Fid: Function modeling-based data-
[73] L. Peng, J. Zhang, M. Liu, and A. Hu, “Deep learning based rf independent and channel-robust physical-layer identification,” in IEEE
fingerprint identification using differential constellation trace figure,” INFOCOM 2019-IEEE Conference on Computer Communications.
IEEE Transactions on Vehicular Technology, 2019. IEEE, 2019, pp. 199–207.
[74] G. Zhang, L. Xia, S. Jia, and Y. Ji, “Identification of cloned hf [95] D. Halperin, W. Hu, A. Sheth, and D. Wetherall, “Tool release: Gather-
rfid proximity cards based on rf fingerprinting,” in 2016 IEEE Trust- ing 802.11 n traces with channel state information,” ACM SIGCOMM
com/BigDataSE/ISPA. IEEE, 2016, pp. 292–300. Computer Communication Review, vol. 41, no. 1, pp. 53–53, 2011.
[75] W. E. Cobb, E. W. Garcia, M. A. Temple, R. O. Baldwin, and Y. C. [96] Y. Ma, G. Zhou, and S. Wang, “Wifi sensing with channel state
Kim, “Physical layer identification of embedded devices using rf- information: A survey,” ACM Computing Surveys (CSUR), vol. 52,
dna fingerprinting,” in 2010-Milcom 2010 Military Communications no. 3, p. 46, 2019.
Conference. IEEE, 2010, pp. 2168–2173. [97] H. Liu, Y. Wang, J. Liu, J. Yang, and Y. Chen, “Practical user authenti-
[76] C. Wang, Y. Lin, and Z. Zhang, “Research on physical layer security of cation leveraging channel state information (csi),” in Proceedings of the
cognitive radio network based on rf-dna,” in 2017 IEEE International 9th ACM symposium on Information, computer and communications
Conference on Software Quality, Reliability and Security Companion security. ACM, 2014, pp. 389–400.
(QRS-C). IEEE, 2017, pp. 252–255. [98] S. Zaman, C. Chakraborty, N. Mehajabin, M. Mamun-Or-Rashid, and
[77] T. J. Bihl, K. W. Bauer, and M. A. Temple, “Feature selection for M. A. Razzaque, “A deep learning based device authentication scheme
rf fingerprinting with multiple discriminant analysis and using zigbee using channel state information,” in 2018 International Conference on
device emissions,” IEEE Transactions on Information Forensics and Innovation in Engineering and Technology (ICIET). IEEE, 2018, pp.
Security, vol. 11, no. 8, pp. 1862–1874, 2016. 1–5.
[78] B. W. Ramsey, T. D. Stubbs, B. E. Mullins, M. A. Temple, and [99] Y. Zou, Y. Wang, S. Ye, K. Wu, and L. M. Ni, “Tagfree: Passive
M. A. Buckner, “Wireless infrastructure protection using low-cost radio object differentiation via physical layer radiometric signatures,” in
frequency fingerprinting receivers,” international journal of critical 2017 IEEE International Conference on Pervasive Computing and
infrastructure protection, vol. 8, pp. 27–39, 2015. Communications (PerCom). IEEE, 2017, pp. 237–246.
[79] C. K. Dubendorfer, B. W. Ramsey, and M. A. Temple, “An rf-dna [100] J. Hua, H. Sun, Z. Shen, Z. Qian, and S. Zhong, “Accurate and efficient
verification process for zigbee networks,” in MILCOM 2012-2012 IEEE wireless device fingerprinting using channel state information,” in IEEE
Military Communications Conference. IEEE, 2012, pp. 1–6. INFOCOM 2018-IEEE Conference on Computer Communications.
[80] P. K. Harmer, M. A. Temple, M. A. Buckner, and E. Farquahar, “Using IEEE, 2018, pp. 1700–1708.
differential evolution to optimize’learning from signals’ and enhance [101] P. Liu, P. Yang, W.-Z. Song, Y. Yan, and X.-Y. Li, “Real-time identifica-
network security,” in Proceedings of the 13th annual conference on tion of rogue wifi connections using environment-independent physical
Genetic and evolutionary computation. ACM, 2011, pp. 1811–1818. features,” in IEEE INFOCOM 2019-IEEE Conference on Computer
[81] X. Zhou, A. Hu, G. Li, L. Peng, Y. Xing, and J. Yu, “Design of a Communications. IEEE, 2019, pp. 190–198.
robust rf fingerprint generation and classification scheme for practical [102] Z. Wang, B. Guo, Z. Yu, and X. Zhou, “Wi-fi csi-based behavior recog-
device identification,” in 2019 IEEE Conference on Communications nition: From signals and actions to activities,” IEEE Communications
and Network Security (CNS). IEEE, 2019, pp. 196–204. Magazine, vol. 56, no. 5, pp. 109–115, 2018.
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 5, MAY 2020 20
[103] F. Hong, X. Wang, Y. Yang, Y. Zong, Y. Zhang, and Z. Guo, “Wfid: signals,” Proceedings of the Royal Society A: Mathematical, Physical
Passive device-free human identification using wifi signal,” in Proceed- and Engineering Sciences, vol. 463, no. 2078, pp. 321–342, 2006.
ings of the 13th International Conference on Mobile and Ubiquitous [123] Y. Shi and M. A. Jensen, “Improved radiometric identification of
Systems: Computing, Networking and Services. ACM, 2016, pp. 47– wireless devices using mimo transmission,” IEEE Transactions on
56. Information Forensics and Security, vol. 6, no. 4, pp. 1346–1354, 2011.
[104] Y. Zeng, P. H. Pathak, C. Xu, and P. Mohapatra, “Your ap knows [124] T. D. Vo-Huu, T. D. Vo-Huu, and G. Noubir, “Fingerprinting wi-fi
how you move: fine-grained device motion recognition through wifi,” devices using software defined radios,” in Proceedings of the 9th ACM
in Proceedings of the 1st ACM workshop on Hot topics in wireless. Conference on Security & Privacy in Wireless and Mobile Networks.
ACM, 2014, pp. 49–54. ACM, 2016, pp. 3–14.
[105] Y. Wang, J. Liu, Y. Chen, M. Gruteser, J. Yang, and H. Liu, “E-eyes: [125] I. Agadakos, N. Agadakos, J. Polakis, and M. R. Amer, “Deep complex
device-free location-oriented activity identification using fine-grained networks for protocol-agnostic radio frequency device fingerprinting in
wifi signatures,” in Proceedings of the 20th annual international the wild,” arXiv preprint arXiv:1909.08703, 2019.
conference on Mobile computing and networking. ACM, 2014, pp. [126] J. Yu, A. Hu, G. Li, and L. Peng, “A robust rf fingerprinting approach
617–628. using multi-sampling convolutional neural network,” IEEE Internet of
[106] Y. Wang, K. Wu, and L. M. Ni, “Wifall: Device-free fall detection by Things Journal, 2019.
wireless networks,” IEEE Transactions on Mobile Computing, vol. 16,
[127] K. Merchant, S. Revay, G. Stantchev, and B. Nousain, “Deep learning
no. 2, pp. 581–594, 2016.
for rf device fingerprinting in cognitive communication networks,”
[107] G. Li, J. Yu, Y. Xing, and A. Hu, “Location-invariant physical layer
IEEE Journal of Selected Topics in Signal Processing, vol. 12, no. 1,
identification approach for wifi devices,” IEEE Access, vol. 7, pp.
pp. 160–167, 2018.
106 974–106 986, 2019.
[128] S. Riyaz, K. Sankhe, S. Ioannidis, and K. Chowdhury, “Deep learning
[108] C. Xu, B. Chen, Y. Liu, F. He, and H. Song, “Rf fingerprint mea-
convolutional neural networks for radio identification,” IEEE Commu-
surement for detecting multiple amateur drones based on stft and
nications Magazine, vol. 56, no. 9, pp. 146–152, 2018.
feature reduction,” in 2020 Integrated Communications Navigation and
Surveillance Conference (ICNS). IEEE, 2020, pp. 4G1–1. [129] G. Huang, Y. Yuan, X. Wang, and Z. Huang, “Specific emitter iden-
[109] S. Chen, F. Xie, Y. Chen, H. Song, and H. Wen, “Identification of tification for communications transmitter using multi-measurements,”
wireless transceiver devices using radio frequency (rf) fingerprinting Wireless Personal Communications, vol. 94, no. 3, pp. 1523–1542,
based on stft analysis to enhance authentication security,” in 2017 IEEE 2017.
5th International Symposium on Electromagnetic Compatibility (EMC- [130] C. Bandt and B. Pompe, “Permutation entropy: a natural complexity
Beijing). IEEE, 2017, pp. 1–5. measure for time series,” Physical review letters, vol. 88, no. 17, p.
[110] D. R. Reising, M. A. Temple, and J. A. Jackson, “Authorized and rogue 174102, 2002.
device discrimination using dimensionally reduced rf-dna fingerprints,” [131] C. L. Nikias and M. R. Raghuveer, “Bispectrum estimation: A digital
IEEE Transactions on Information Forensics and Security, vol. 10, signal processing framework,” Proceedings of the IEEE, vol. 75, no. 7,
no. 6, pp. 1180–1192, 2015. pp. 869–891, 1987.
[111] Y. Li, L. Chen, J. Chen, F. Xie, S. Chen, and H. Wen, “A low [132] C. Morin, L. Cardoso, J. Hoydis, J.-M. Gorce, and T. Vial, “Trans-
complexity feature extraction for the rf fingerprinting process,” in 2018 mitter classification with supervised deep learning,” arXiv preprint
IEEE Conference on Communications and Network Security (CNS). arXiv:1905.07923, 2019.
IEEE, 2018, pp. 1–2. [133] M. S. Allahham, M. F. Al-Sa’d, A. Al-Ali, A. Mohamed, T. Khattab,
[112] X. Wu, Y. Shi, W. Meng, X. Ma, and N. Fang, “Specific emitter and A. Erbad, “Dronerf dataset: A dataset of drones for rf-based
identification for satellite communication using probabilistic neural detection, classification and identification,” Data in brief, vol. 26, p.
networks,” International Journal of Satellite Communications and 104313, 2019.
Networking, vol. 37, no. 3, pp. 283–291, 2019. [134] C. Kaushik, “Genesys lab mldatasets,” http://genesys-lab.org/
[113] D. Sun, Y. Li, and Y. Xu, “Specific emitter identification based on mldatasets.au/index, Accessed on Oct. 2020.
normalized frequency spectrum,” in 2016 2nd IEEE International [135] Y. Liu, J. Wang, H. Song, S. Niu, and Y. Thomas, “A 24-hour
Conference on Computer and Communications (ICCC). IEEE, 2016, signal recording dataset with labels for cybersecurity and IoT,” 2020.
pp. 1875–1879. [Online]. Available: http://dx.doi.org/10.21227/gt9v-kz32
[114] Y. Yuan, Z. Huang, H. Wu, and X. Wang, “Specific emitter identifi- [136] G. Baldini, C. Gentile, R. Giuliani, and G. Steri, “Comparison of
cation based on hilbert–huang transform-based time–frequency–energy techniques for radiometric identification based on deep convolutional
distribution features,” IET Communications, vol. 8, no. 13, pp. 2404– neural networks,” Electronics Letters, vol. 55, no. 2, pp. 90–92, 2018.
2412, 2014. [137] D. Roy, T. Mukherjee, M. Chatterjee, E. Blasch, and E. Pasiliao, “Rfal:
[115] U. Satija, N. Trivedi, G. Biswal, and B. Ramkumar, “Specific emitter Adversarial learning for rf transmitter identification and classification,”
identification based on variational mode decomposition and spectral IEEE Transactions on Cognitive Communications and Networking,
features in single hop and relaying scenarios,” IEEE Transactions on 2019.
Information Forensics and Security, vol. 14, no. 3, pp. 581–591, 2018.
[138] S. Gopalakrishnan, M. Cekic, and U. Madhow, “Robust wireless
[116] X. Wang, J. Duan, C. Wang, G. Cui, and W. Wang, “A radio frequency
fingerprinting via complex-valued neural networks,” arXiv preprint
fingerprinting identification method based on energy entropy and color
arXiv:1905.09388, 2019.
moments of the bispectrum,” in 2017 9th International Conference on
[139] J. Huang, Y. Lei, and X. Liao, “Communication transmitter individual
Advanced Infocomm Technology (ICAIT). IEEE, 2017, pp. 150–154.
feature extraction method based on stacked denoising autoencoders
[117] Y.-K. Lei, “Individual communication transmitter identification using
under small sample prerequisite,” in 2017 7th IEEE International
correntropy-based collaborative representation,” in 2016 9th Interna-
Conference on Electronics Information and Emergency Communication
tional Congress on Image and Signal Processing, BioMedical Engi-
(ICEIEC). IEEE, 2017, pp. 132–135.
neering and Informatics (CISP-BMEI). IEEE, 2016, pp. 1194–1200.
[118] M. Sun, L. Zhang, J. Bao, and Y. Yan, “Rf fingerprint extraction for [140] T. Oyedare and J.-M. J. Park, “Estimating the required training dataset
gnss anti-spoofing using axial integrated wigner bispectrum,” Journal size for transmitter classification using deep learning.”
of Information Security and Applications, vol. 35, pp. 51–54, 2017. [141] J. S. Dramsch, M. Lüthje, and A. N. Christensen, “Complex-
[119] Z. Zhang, Y. Li, and C. Wang, “Research on individual identification of valued neural networks for machine learning on non-stationary
wireless devices based on signal’s energy distribution,” in 2018 IEEE physical data,” CoRR, vol. abs/1905.12321, 2019. [Online]. Available:
23rd International Conference on Digital Signal Processing (DSP). http://arxiv.org/abs/1905.12321
IEEE, 2018, pp. 1–5. [142] Y. Liu, J. Wang, J. Li, H. Song, T. Yang, S. Niu, and Z. Ming, “Zero-
[120] N. E. Huang, Hilbert-Huang transform and its applications. World bias deep learning for accurate identification of internet of things (iot)
Scientific, 2014, vol. 16. devices,” IEEE Internet of Things Journal, 2020.
[121] W. Wang, H. Liu, J. Yang, and H. Yin, “Specific emitter identification [143] Y. Liu, J. Wang, S. Niu, and H. Song, “Deep learning enabled reliable
using decomposed hierarchical feature extraction methods,” in 2017 identity verification and spoofing detection,” in International Confer-
13th International Conference on Natural Computation, Fuzzy Systems ence on Wireless Algorithms, Systems, and Applications. Springer,
and Knowledge Discovery (ICNC-FSKD). IEEE, 2017, pp. 1639– 2020, pp. 333–345.
1643. [144] M. Li, O. Li, G. Liu, and C. Zhang, “Generative adversarial networks-
[122] M. G. Frei and I. Osorio, “Intrinsic time-scale decomposition: time– based semi-supervised automatic modulation recognition for cognitive
frequency–energy analysis and real-time filtering of non-stationary radio networks,” Sensors, vol. 18, no. 11, p. 3913, 2018.
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 5, MAY 2020 21
[145] E. Marchi, F. Vesperini, F. Eyben, S. Squartini, and B. Schuller, [167] P. L. Narasimha, W. H. Delashmit, M. T. Manry, J. Li, and F. Maldon-
“A novel approach for automatic acoustic novelty detection using a ado, “An integrated growing-pruning method for feedforward network
denoising autoencoder with bidirectional lstm neural networks,” in training,” Neurocomputing, vol. 71, no. 13-15, pp. 2831–2847, 2008.
2015 IEEE International Conference on Acoustics, Speech and Signal [168] L. Ma and K. Khorasani, “A new strategy for adaptively constructing
Processing (ICASSP). IEEE, 2015, pp. 1996–2000. multilayer feedforward neural networks,” Neurocomputing, vol. 51, pp.
[146] S. S. Khan and B. Taati, “Detecting unseen falls from wearable devices 361–385, 2003.
using channel-wise ensemble of autoencoders,” Expert Systems with [169] C. Cortes, X. Gonzalvo, V. Kuznetsov, M. Mohri, and S. Yang, “Adanet:
Applications, vol. 87, pp. 280–290, 2017. Adaptive structural learning of artificial neural networks,” in Proceed-
[147] Y. Shi, K. Davaslioglu, Y. E. Sagduyu, W. C. Headley, M. Fowler, ings of the 34th International Conference on Machine Learning-Volume
and G. Green, “Deep learning for rf signal classification in unknown 70. JMLR. org, 2017, pp. 874–883.
and dynamic spectrum environments,” in 2019 IEEE International [170] C. Liu, B. Zoph, M. Neumann, J. Shlens, W. Hua, L.-J. Li, L. Fei-Fei,
Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, A. Yuille, J. Huang, and K. Murphy, “Progressive neural architecture
2019, pp. 1–10. search,” in Proceedings of the European Conference on Computer
[148] A. Gritsenko, Z. Wang, T. Jian, J. Dy, K. Chowdhury, and S. Ioannidis, Vision (ECCV), 2018, pp. 19–34.
“Finding a newneedle in the haystack: Unseen radio detection in [171] K. O. Stanley and R. Miikkulainen, “Efficient evolution of neural net-
large populations using deep learning,” in 2019 IEEE International work topologies,” in Proceedings of the 2002 Congress on Evolutionary
Symposium on Dynamic Spectrum Access Networks (DySPAN). IEEE, Computation. CEC’02 (Cat. No. 02TH8600), vol. 2. IEEE, 2002, pp.
2019, pp. 1–10. 1757–1762.
[149] Y. Kim, S. An, and J. So, “Identifying signal source using channel [172] ——, “Evolving neural networks through augmenting topologies,”
state information in wireless lans,” in 2018 International Conference Evolutionary computation, vol. 10, no. 2, pp. 99–127, 2002.
on Information Networking (ICOIN). IEEE, 2018, pp. 616–621. [173] J. Liang, E. Meyerson, B. Hodjat, D. Fink, K. Mutch, and R. Miikku-
[150] L. J. Wong, W. C. Headley, S. Andrews, R. M. Gerdes, and A. J. lainen, “Evolutionary neural automl for deep learning,” in Proceedings
Michaels, “Clustering learned cnn features from raw i/q data for emitter of the Genetic and Evolutionary Computation Conference, 2019, pp.
identification,” in MILCOM 2018-2018 IEEE Military Communications 401–409.
Conference (MILCOM). IEEE, 2018, pp. 26–33. [174] B. Baker, O. Gupta, N. Naik, and R. Raskar, “Designing neural
[151] H. Jafari, O. Omotere, D. Adesina, H.-H. Wu, and L. Qian, “Iot network architectures using reinforcement learning,” arXiv preprint
devices fingerprinting using deep learning,” in MILCOM 2018-2018 arXiv:1611.02167, 2016.
IEEE Military Communications Conference (MILCOM). IEEE, 2018, [175] M. Tan, B. Chen, R. Pang, V. Vasudevan, M. Sandler, A. Howard,
pp. 1–9. and Q. V. Le, “Mnasnet: Platform-aware neural architecture search for
[152] J. S. Bergstra, R. Bardenet, Y. Bengio, and B. Kégl, “Algorithms mobile,” in Proceedings of the IEEE Conference on Computer Vision
for hyper-parameter optimization,” in Advances in neural information and Pattern Recognition, 2019, pp. 2820–2828.
processing systems, 2011, pp. 2546–2554. [176] C.-H. Hsu, S.-H. Chang, J.-H. Liang, H.-P. Chou, C.-H. Liu, S.-C.
[153] M. Pelikan, D. E. Goldberg, E. Cantú-Paz et al., “Boa: The bayesian Chang, J.-Y. Pan, Y.-T. Chen, W. Wei, and D.-C. Juan, “Monas: Multi-
optimization algorithm,” in Proceedings of the genetic and evolutionary objective neural architecture search using reinforcement learning,”
computation conference GECCO-99, vol. 1, 1999, pp. 525–532. arXiv preprint arXiv:1806.10332, 2018.
[154] S. R. Young, D. C. Rose, T. P. Karnowski, S.-H. Lim, and R. M. Patton, [177] H. Liu, K. Simonyan, and Y. Yang, “Darts: Differentiable architecture
“Optimizing deep learning hyper-parameters through an evolutionary search,” arXiv preprint arXiv:1806.09055, 2018.
algorithm,” in Proceedings of the Workshop on Machine Learning in [178] X. Chen, L. Xie, J. Wu, and Q. Tian, “Progressive differentiable archi-
High-Performance Computing Environments, 2015, pp. 1–5. tecture search: Bridging the depth gap between search and evaluation,”
in Proceedings of the IEEE International Conference on Computer
[155] T. Elsken, J. H. Metzen, and F. Hutter, “Neural architecture search: A
Vision, 2019, pp. 1294–1303.
survey,” arXiv preprint arXiv:1808.05377, 2018.
[179] X. Dong and Y. Yang, “Searching for a robust neural architecture in
[156] W. Liu, Z. Wang, X. Liu, N. Zeng, Y. Liu, and F. E. Alsaadi, “A
four gpu hours,” in Proceedings of the IEEE Conference on Computer
survey of deep neural network architectures and their applications,”
Vision and Pattern Recognition, 2019, pp. 1761–1770.
Neurocomputing, vol. 234, pp. 11–26, 2017.
[180] C. Ying, A. Klein, E. Real, E. Christiansen, K. Murphy, and F. Hutter,
[157] A. Truong, A. Walters, J. Goodsitt, K. Hines, B. Bruss, and R. Farivar, “Nas-bench-101: Towards reproducible neural architecture search,”
“Towards automated machine learning: Evaluation and comparison of arXiv preprint arXiv:1902.09635, 2019.
automl approaches and tools,” arXiv preprint arXiv:1908.05557, 2019. [181] X. Dong and Y. Yang, “Nas-bench-102: Extending the scope of repro-
[158] M. Lindauer, “Literature on neural architecture search,” https://www. ducible neural architecture search,” arXiv preprint arXiv:2001.00326,
automl.org/automl/literature-on-neural-architecture-search/, Feb. 2020. 2020.
[159] X. Dong, “Awesome-nas: A curated list of neural architecture search [182] K. Youssef, L. Bouchard, K. Haigh, J. Silovsky, B. Thapa, and C. Van-
(nas) resources.” https://github.com/D-X-Y/Awesome-NAS, Jan. 2020. der Valk, “Machine learning approach to rf transmitter identification,”
[160] C. Zanchettin and T. B. Ludermir, “A methodology to train and improve IEEE Journal of Radio Frequency Identification, vol. 2, no. 4, pp. 197–
artificial neural networks’ weights and connections,” in The 2006 IEEE 205, 2018.
International Joint Conference on Neural Network Proceedings. IEEE, [183] W. J. Scheirer, A. de Rezende Rocha, A. Sapkota, and T. E. Boult,
2006, pp. 5267–5274. “Toward open set recognition,” IEEE transactions on pattern analysis
[161] M. M. Islam, M. A. Sattar, M. F. Amin, X. Yao, and K. Murase, “A new and machine intelligence, vol. 35, no. 7, pp. 1757–1772, 2012.
adaptive merging and growing algorithm for designing artificial neural [184] A. Bendale and T. E. Boult, “Towards open set deep networks,” in
networks,” IEEE Transactions on Systems, Man, and Cybernetics, Part Proceedings of the IEEE conference on computer vision and pattern
B (Cybernetics), vol. 39, no. 3, pp. 705–722, 2009. recognition, 2016, pp. 1563–1572.
[162] H. Lam, S. Ling, F. H. Leung, and P. K.-S. Tam, “Tuning of the [185] D. Gunning, “Explainable artificial intelligence (xai),” Defense Ad-
structure and parameters of neural network using an improved genetic vanced Research Projects Agency (DARPA), nd Web, vol. 2, 2017.
algorithm,” in IECON’01. 27th Annual Conference of the IEEE Indus- [186] C. Tan, F. Sun, T. Kong, W. Zhang, C. Yang, and C. Liu, “A survey on
trial Electronics Society (Cat. No. 37243), vol. 1. IEEE, 2001, pp. deep transfer learning,” in International conference on artificial neural
25–30. networks. Springer, 2018, pp. 270–279.
[163] J. M. Alvarez and M. Salzmann, “Learning the number of neurons [187] S. Niu, Y. Liu, J. Wang, and H. Song, “A decade survey of transfer
in deep networks,” in Advances in Neural Information Processing learning (20102020),” IEEE Transactions on Artificial Intelligence,
Systems, 2016, pp. 2270–2278. vol. 1, no. 2, pp. 151–166, 2020.
[164] Y. Guo, A. Yao, and Y. Chen, “Dynamic network surgery for efficient [188] G. I. Parisi, R. Kemker, J. L. Part, C. Kanan, and S. Wermter,
dnns,” in Advances in neural information processing systems, 2016, pp. “Continual lifelong learning with neural networks: A review,” Neural
1379–1387. Networks, 2019.
[165] S. Han, J. Pool, J. Tran, and W. Dally, “Learning both weights [189] H. Shin, J. K. Lee, J. Kim, and J. Kim, “Continual learning with
and connections for efficient neural network,” in Advances in neural deep generative replay,” in Advances in Neural Information Processing
information processing systems, 2015, pp. 1135–1143. Systems, 2017, pp. 2990–2999.
[166] M. M. Islam, X. Yao, and K. Murase, “A constructive algorithm for [190] F. Girosi, M. Jones, and T. Poggio, “Regularization theory and neural
training cooperative neural network ensembles,” IEEE Transactions on networks architectures,” Neural computation, vol. 7, no. 2, pp. 219–
neural networks, vol. 14, no. 4, pp. 820–834, 2003. 269, 1995.
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 5, MAY 2020 22
[191] J. Kirkpatrick, R. Pascanu, N. Rabinowitz, J. Veness, G. Desjardins, Transactions on Database Systems (TODS), vol. 42, no. 3, pp. 1–21,
A. A. Rusu, K. Milan, J. Quan, T. Ramalho, A. Grabska-Barwinska 2017.
et al., “Overcoming catastrophic forgetting in neural networks,” Pro- [212] M. Ankerst, M. M. Breunig, H.-P. Kriegel, and J. Sander, “Optics:
ceedings of the national academy of sciences, vol. 114, no. 13, pp. ordering points to identify the clustering structure,” ACM Sigmod
3521–3526, 2017. record, vol. 28, no. 2, pp. 49–60, 1999.
[192] J. Yoon, E. Yang, J. Lee, and S. J. Hwang, “Lifelong learning with [213] D. Pelleg, A. W. Moore et al., “X-means: Extending k-means with
dynamically expandable networks,” arXiv preprint arXiv:1708.01547, efficient estimation of the number of clusters.” in Icml, vol. 1, 2000,
2017. pp. 727–734.
[193] Y. Liu, J. Wang, J. Li, S. Niu, and H. Song, “Formal [214] R.-H. Hwang, M.-C. Peng, C.-W. Huang, P.-C. Lin, and V.-L. Nguyen,
Proofs of Orthogonality for Class-Incremental Learning for “An unsupervised deep learning model for early network traffic
Wireless Device Identification in IoT,” 5 2021. [Online]. anomaly detection,” IEEE Access, vol. 8, pp. 30 387–30 399, 2020.
Available: https://www.techrxiv.org/articles/preprint/Formal Proofs [215] R.-H. Hwang, M.-C. Peng, and C.-W. Huang, “Detecting iot malicious
of Orthogonality for Class-Incremental Learning for Wireless traffic based on autoencoder and convolutional neural network,” in 2019
Device Identification in IoT/14559765 IEEE Globecom Workshops (GC Wkshps). IEEE, 2019, pp. 1–6.
[194] ——, “Formal Proofs of Orthogonality for Class-Incremental [216] H. Alipour, Y. B. Al-Nashif, P. Satam, and S. Hariri, “Wireless anomaly
Learning for Wireless Device Identification in IoT,” 5 2021. [Online]. detection based on ieee 802.11 behavior analysis,” IEEE transactions
Available: https://www.techrxiv.org/articles/preprint/Formal Proofs on information forensics and security, vol. 10, no. 10, pp. 2158–2170,
of Orthogonality for Class-Incremental Learning for Wireless 2015.
Device Identification in IoT/14559765 [217] N. Sehatbakhsh, M. Alam, A. Nazari, A. Zajic, and M. Prvulovic,
[195] ——, “Class-incremental learning for wireless device identification in “Syndrome: Spectral analysis for anomaly detection on medical iot
iot,” IEEE Internet of Things Journal, pp. 1–1, 2021. and embedded devices,” in 2018 IEEE international symposium on
[196] E. Axell, G. Leus, E. G. Larsson, and H. V. Poor, “Spectrum sensing hardware oriented security and trust (HOST). IEEE, 2018, pp. 1–8.
for cognitive radio: State-of-the-art and recent advances,” IEEE signal [218] A. Hamza, H. H. Gharakheili, T. A. Benson, and V. Sivaraman,
processing magazine, vol. 29, no. 3, pp. 101–116, 2012. “Detecting volumetric attacks on lot devices via sdn-based monitoring
[197] A. Sivanathan, H. H. Gharakheili, and V. Sivaraman, “Detecting of mud activity,” in Proceedings of the 2019 ACM Symposium on SDN
behavioral change of iot devices using clustering-based network traffic Research, 2019, pp. 36–48.
modeling,” IEEE Internet of Things Journal, 2020. [219] V. L. Thing, “Ieee 802.11 network anomaly detection and attack
[198] ——, “Inferring iot device types from network behavior using unsuper- classification: A deep learning approach,” in 2017 IEEE Wireless
vised clustering,” in 2019 IEEE 44th Conference on Local Computer Communications and Networking Conference (WCNC). IEEE, 2017,
Networks (LCN). IEEE, 2019, pp. 230–233. pp. 1–6.
[199] J. Ortiz, C. Crawford, and F. Le, “Devicemien: network device behavior [220] R. Sridharan, R. R. Maiti, and N. O. Tippenhauer, “Wadac: Privacy-
modeling for identifying unknown iot devices,” in Proceedings of the preserving anomaly detection and attack classification on wireless
International Conference on Internet of Things Design and Implemen- traffic,” in Proceedings of the 11th ACM Conference on Security &
tation, 2019, pp. 106–117. Privacy in Wireless and Mobile Networks, 2018, pp. 51–62.
[200] G. Liu, R. Zhang, C. Wang, and L. Liu, “Synchronization-free gps [221] T. Luo and S. G. Nagarajan, “Distributed anomaly detection using au-
spoofing detection with crowdsourced air traffic control data,” in 2019 toencoder neural networks in wsn for iot,” in 2018 IEEE International
20th IEEE International Conference on Mobile Data Management Conference on Communications (ICC). IEEE, 2018, pp. 1–6.
(MDM). IEEE, 2019, pp. 260–268. [222] Y. Meidan, M. Bohadana, Y. Mathov, Y. Mirsky, A. Shabtai, D. Breit-
[201] M. Monteiro, A. Barreto, T. Kacem, D. Wijesekera, and P. Costa, enbacher, and Y. Elovici, “N-baiotnetwork-based detection of iot botnet
“Detecting malicious ads-b transmitters using a low-bandwidth sensor attacks using deep autoencoders,” IEEE Pervasive Computing, vol. 17,
network,” in 2015 18th International Conference on Information Fusion no. 3, pp. 12–22, 2018.
(Fusion). IEEE, 2015, pp. 1696–1701. [223] Y. Chen, X. S. Zhou, and T. S. Huang, “One-class svm for learning
[202] B. Xu, G. Sun, R. Yu, and Z. Yang, “High-accuracy tdoa-based local- in image retrieval,” in Proceedings 2001 International Conference on
ization without time synchronization,” IEEE Transactions on Parallel Image Processing (Cat. No. 01CH37205), vol. 1. IEEE, 2001, pp.
and Distributed Systems, vol. 24, no. 8, pp. 1567–1576, 2012. 34–37.
[203] M. Schäfer, M. Strohmeier, V. Lenders, I. Martinovic, and M. Wil- [224] Z. Ding and M. Fei, “An anomaly detection approach based on
helm, “Bringing up opensky: A large-scale ads-b sensor network for isolation forest algorithm for streaming data using sliding window,”
research,” in Proceedings of the 13th international symposium on IFAC Proceedings Volumes, vol. 46, no. 20, pp. 12–17, 2013.
Information processing in sensor networks. IEEE Press, 2014, pp. [225] H.-P. Kriegel, P. Kröger, E. Schubert, and A. Zimek, “Loop: local
83–94. outlier probabilities,” in Proceedings of the 18th ACM conference on
[204] H. Liu, H. Darabi, P. Banerjee, and J. Liu, “Survey of wireless indoor Information and knowledge management, 2009, pp. 1649–1652.
positioning techniques and systems,” IEEE Transactions on Systems, [226] M. S. Parwez, D. B. Rawat, and M. Garuba, “Big data analytics for
Man, and Cybernetics, Part C (Applications and Reviews), vol. 37, user-activity analysis and user-anomaly detection in mobile wireless
no. 6, pp. 1067–1080, 2007. network,” IEEE Transactions on Industrial Informatics, vol. 13, no. 4,
[205] I. Guvenc and C.-C. Chong, “A survey on toa based wireless localiza- pp. 2058–2065, 2017.
tion and nlos mitigation techniques,” IEEE Communications Surveys [227] M. Wei and K. Kim, “Intrusion detection scheme using traffic predic-
& Tutorials, vol. 11, no. 3, pp. 107–124, 2009. tion for wireless industrial networks,” journal of communications and
[206] G. Han, H. Xu, T. Q. Duong, J. Jiang, and T. Hara, “Localization networks, vol. 14, no. 3, pp. 310–318, 2012.
algorithms of wireless sensor networks: a survey,” Telecommunication [228] N. Tandiya, A. Jauhar, V. Marojevic, and J. H. Reed, “Deep predictive
Systems, vol. 52, no. 4, pp. 2419–2436, 2013. coding neural network for rf anomaly detection in wireless networks,”
[207] Q. Li, H. Fan, W. Sun, J. Li, L. Chen, and Z. Liu, “Fingerprints in the in 2018 IEEE International Conference on Communications Workshops
air: unique identification of wireless devices using rf rss fingerprints,” (ICC Workshops). IEEE, 2018, pp. 1–6.
IEEE Sensors Journal, vol. 17, no. 11, pp. 3568–3579, 2017. [229] S. Rajendran, W. Meert, V. Lenders, and S. Pollin, “Saife: Unsupervised
[208] M. Zheleva, R. Chandra, A. Chowdhery, A. Kapoor, and P. Garnett, wireless spectrum anomaly detection with interpretable features,” in
“Txminer: Identifying transmitters in real-world spectrum measure- 2018 IEEE International Symposium on Dynamic Spectrum Access
ments,” in 2015 IEEE International Symposium on Dynamic Spectrum Networks (DySPAN). IEEE, 2018, pp. 1–9.
Access Networks (DySPAN). IEEE, 2015, pp. 94–105. [230] W. Lotter, G. Kreiman, and D. Cox, “Deep predictive coding net-
[209] Y. A. Nijsure, G. Kaddoum, G. Gagnon, F. Gagnon, C. Yuen, and works for video prediction and unsupervised learning,” arXiv preprint
R. Mahapatra, “Adaptive air-to-ground secure communication system arXiv:1605.08104, 2016.
based on ads-b and wide-area multilateration,” IEEE Transactions on [231] R. Morales-Ferre, W. Wang, A. Sanz-Abia, and E.-S. Lohan,
Vehicular Technology, vol. 65, no. 5, pp. 3150–3165, 2015. “Identifying gnss signals based on their radio frequency (rf)
[210] M. Monteiro, A. Barreto, T. Kacem, J. Carvalho, D. Wijesekera, features?a dataset with gnss raw signals based on roof antennas and
and P. Costa, “Detecting malicious ads-b broadcasts using wide area spectracom generator,” Data, vol. 5, no. 1, 2020. [Online]. Available:
multilateration,” in 2015 IEEE/AIAA 34th Digital Avionics Systems https://www.mdpi.com/2306-5729/5/1/18
Conference (DASC). IEEE, 2015, pp. 4A3–1. [232] Y. Liu, J. Wang, S. Niu, and H. Song, “Ads-b signals records
[211] E. Schubert, J. Sander, M. Ester, H. P. Kriegel, and X. Xu, “Dbscan for non-cryptographic identification and incremental learning.” 2021.
revisited, revisited: why and how you should (still) use dbscan,” ACM [Online]. Available: https://dx.doi.org/10.21227/1bxc-ke87
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 5, MAY 2020 23
[233] M. Ezuma, F. Erden, C. K. Anjinappa, O. Ozdemir, and I. Guvenc, Jian Wang ([email protected]) is a Ph.D. stu-
“Drone remote controller rf signal dataset,” 2020. [Online]. Available: dent in the Department of Electrical Engineering and
https://dx.doi.org/10.21227/ss99-8d56 Computer Science (EECS), Embry-Riddle Aeronau-
[234] E. Uzundurukan, Y. Dalveren, and A. Kara, “A database for the radio tical University (ERAU), Daytona Beach, Florida,
frequency fingerprinting of bluetooth devices,” Data, vol. 5, no. 2, and a graduate research assistant in the Security
p. 55, 2020. and Optimization for Networked Globe Labora-
[235] K. Sankhe, M. Belgiovine, F. Zhou, S. Riyaz, S. Ioannidis, and tory (SONG Lab, www.SONGLab.us). He received
K. Chowdhury, “Oracle: Optimized radio classification through convo- his M.S. from South China Agricultural University
lutional neural networks,” in IEEE INFOCOM 2019-IEEE Conference (SCAU) in 2017 and B.S. from Nanyang Normal
on Computer Communications. IEEE, 2019, pp. 370–378. University in 2014. His major research interests
[236] S. Mohanti, N. Soltani, K. Sankhe, D. Jaisinghani, M. Di Felice, and include wireless networks, unmanned aerial systems,
K. Chowdhury, “Airid: Injecting a custom rf fingerprint for enhanced and machine learning.
uav identification using deep learning,” in IEEE GLOBECOM 2020-
IEEE Global Communications Conference. IEEE, 2020, pp. 370–378.
[237] G. Reus-Muns, D. Jaisinghani, K. Sankhe, and K. Chowdhury, “Trust
in 5g open rans through machine learning: Rf fingerprinting on the
powder pawr platform,” in IEEE Globecom 2020-IEEE Global Com-
munications Conference. IEEE, 2020.
[238] N. Soltani, G. Reus-Muns, B. Salehi, J. Dy, S. Ioannidis, and
K. Chowdhury, “RF Fingerprinting Unmanned Aerial Vehicles With
Non-Standard Transmitter Waveforms,” IEEE Transactions on Vehicu-
lar Technology, vol. 69, no. 12, pp. 15 518–15 531, 2020.
[239] K. Sankhe, M. Belgiovine, F. Zhou, L. Angioloni, F. Restuccia,
S. DOro, T. Melodia, S. Ioannidis, and K. Chowdhury, “No radio left
behind: Radio fingerprinting through deep learning of physical-layer
hardware impairments,” IEEE Transactions on Cognitive Communica-
tions and Networking, vol. 6, no. 1, pp. 165–178, 2019.
[240] N. Soltani, K. Sankhe, J. Dy, S. Ioannidis, and K. Chowdhury, “More is
Better: Data Augmentation for Channel-Resilient RF Fingerprinting,”
IEEE Communications Magazine, vol. 58, no. 10, pp. 66–72, 2020.
[241] S. J. Pan and Q. Yang, “A survey on transfer learning,” IEEE Transac-
tions on knowledge and data engineering, vol. 22, no. 10, pp. 1345–
1359, 2009. Jianqiang Li ([email protected]) received his B.S.
[242] S. Niu, J. Wang, Y. Liu, and H. Song, “Transfer learning based data- and Ph.D. degrees from the South China University
efficient machine learning enabled classification,” in 2020 IEEE Intl of Technology in 2003 and 2008, respectively. He is
Conf on Dependable, Autonomic and Secure Computing, Intl Conf on a Professor with the College of Computer and Soft-
Pervasive Intelligence and Computing, Intl Conf on Cloud and Big ware Engineering, Shenzhen University, Shenzhen,
Data Computing, Intl Conf on Cyber Science and Technology Congress China. He is leading two projects funded by the Na-
(DASC/PiCom/CBDCom/CyberSciTech). IEEE, 2020, pp. 620–626. tional Natural Science Foundation of China and two
[243] P. Nguyen, H. Truong, M. Ravindranathan, A. Nguyen, R. Han, and projects funded by the Natural Science Foundation
T. Vu, “Matthan: Drone presence detection by identifying physical of Guangdong, China. His major research interests
signatures in the drone’s rf communication,” in Proceedings of the 15th include Internet of Things, robotic, hybrid systems,
Annual International Conference on Mobile Systems, Applications, and and embedded systems.
Services. ACM, 2017, pp. 211–224.
[244] J. Wang, Y. Liu, and H. Song, “Counter-unmanned aircraft system(s)
(c-uas): State of the art, challenges, and future trends,” IEEE Aerospace
and Electronic Systems Magazine, vol. 36, no. 3, pp. 4–29, 2021.
[245] Y. Shi, K. Davaslioglu, and Y. E. Sagduyu, “Generative adversarial
network for wireless signal spoofing,” in Proceedings of the ACM
Workshop on Wireless Security and Machine Learning. ACM, 2019,
pp. 55–60.