A Study on IoT Device Authentication Using Artificial Intelligence
Abstract
1. Introduction
- Assessing and comparing various AI algorithms and methods to enhance authentication for IoT devices. Additionally, we offer recommendations for authenticating IoT devices.
- Analyzing the strengths and weaknesses of machine learning and deep learning techniques, and outlining scenarios where they could be utilized, along with their accuracy and functionality.
- Outlining current and future research problems in device authentication.
2. Security Challenges and Adversarial Threats
2.1. Device Authentication Mechanisms
2.2. Threat Landscape in IoT Device Authentication
2.3. IoT Device Authentication Vulnerabilities and Their Solutions
3. Current Research in IoT Device Authentication Using AI Techniques
3.1. Evaluation Metrics
- TP (True Positives): Legitimate devices were accurately authenticated.
- TN (True Negatives): Unauthorized devices were properly rejected.
- FP (False Positives): Unauthorized devices were improperly authorized.
- FN (False Negatives): Legitimate devices were improperly denied access.
3.2. IoT Device Authentication Using ML
3.2.1. Supervised Learning
3.2.2. Unsupervised Learning
3.3. Reinforcement Learning (RL)
3.4. IoT Device Authentication Using DL
4. Research Gaps in AI-Based Authentication for IoT Devices
4.1. Challenges in Machine Learning-Based Authentication
4.1.1. Identifying Research Gaps in Current Authentication Approaches
4.1.2. Limitations of Existing Machine Learning Models in IoT Security
4.1.3. Scalability and Adaptability Concerns in Real-World Implementations
4.1.4. Addressing Data Privacy and Security Risks in the Authentication System
4.2. Comparative Analysis of IoT Authentication by Machine Learning and Traditional IoT Device Authentication Methods
- Scalability:
- Resource Efficiency:
- User Experience:
5. Lessons Learned and Open Challenges
5.1. Research Challenges
5.2. Future Directions
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Alzubaidi, A.; Kalita, J. Authentication of Smartphone Users Using Behavioral Biometrics. IEEE Commun. Surv. Tutor. 2016, 18, 1998–2026. [Google Scholar] [CrossRef]
- Khan, M.A.; Quasim, M.T.; Alghamdi, N.S.; Khan, M.Y. A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data. IEEE Access 2020, 8, 52018–52027. [Google Scholar] [CrossRef]
- Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT Privacy and Security: Challenges and Solutions. Appl. Sci. 2020, 10, 4102. [Google Scholar] [CrossRef]
- Sánchez, P.M.S.; Celdrán, A.H.; Bovet, G.; Pérez, G.M. Adversarial Attacks and Defenses on ML-and Hardware-Based IoT Device Fingerprinting and Identification. Future Gener. Comput. Syst. 2024, 152, 30–42. [Google Scholar] [CrossRef]
- Mazhar, T.; Talpur, D.B.; Shloul, T.A.; Ghadi, Y.Y.; Haq, I.; Ullah, I.; Ouahada, K.; Hamam, H. Analysis of IoT Security Challenges and Its Solutions Using Artificial Intelligence. Brain Sci. 2023, 13, 683. [Google Scholar] [CrossRef] [PubMed]
- Qiu, X.; Lit, Z.; Sun, X.; Xu, T. A Lightweight Intelligent Authentication Approach for Intrusion Detection. In Proceedings of the 2020 IEEE 31st Annual International Symposium on Personal, Indoor and Mobile Radio Communications, London, UK, 31 August–3 September 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Cirne, A.; Sousa, P.R.; Resende, J.S.; Antunes, L. Hardware Security for Internet of Things Identity Assurance. IEEE Commun. Surv. Tutorials 2024, 26, 1041–1079. [Google Scholar] [CrossRef]
- Chaudhari, A.; Pawar, A.; Pawar, A.; Pawar, A.; Pawar, G. A Comprehensive Study on Authentication Systems. In Proceedings of the 2023 7th International Conference on Computing, Communication, Control and Automation (ICCUBEA), Pune, India, 18–19 August 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–5. [Google Scholar] [CrossRef]
- Mehta, M.; Baldaniya, H.; Goriya, N. A Systematic Review of Authentication Methods for Internet of Things. In Proceedings of the 2020 IEEE International Conference for Innovation in Technology (INOCON), Bangluru, India, 6–8 November 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Yu, M.D.; Hiller, M.; Delvaux, J.; Sowell, R.; Devadas, S.; Verbauwhede, I. A Lockdown Technique to Prevent Machine Learning on PUFs for Lightweight Authentication. IEEE Trans. Multi-Scale Comput. Syst. 2016, 2, 146–159. [Google Scholar] [CrossRef]
- Kiyani, A.T.; Lasebae, A.; Ali, K. Continuous User Authentication Based on Deep Neural Networks. In Proceedings of the 2020 International Conference on UK-China Emerging Technologies (UCET), Glasgow, UK, 20-21 August 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–4. [Google Scholar] [CrossRef]
- Kavianpour, S.; Razaq, A.; Hales, G. A Secure Lightweight Authentication Mechanism for IoT Devices in Generic Domain. In Proceedings of the 2023 3rd International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME), Tenerife, Spain, 19–21 July 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–6. [Google Scholar] [CrossRef]
- Feng, X.; Zhu, X.; Han, Q.L.; Zhou, W.; Wen, S.; Xiang, Y. Detecting Vulnerability on IoT Device Firmware: A Survey. IEEE/CAA J. Autom. Sin. 2023, 10, 25–41. [Google Scholar] [CrossRef]
- Shokeen, R.; Shanmugam, B.; Kannoorpatti, K.; Azam, S.; Jonkman, M.; Alazab, M. Vulnerabilities Analysis and Security Assessment Framework for the Internet of Things. In Proceedings of the 2019 Cybersecurity and Cyberforensics Conference (CCC), Melbourne, Australia, 8–9 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 22–29. [Google Scholar] [CrossRef]
- Chen, Z.; Lee, W.; Hong, Q.; Gu, C.; Guan, Z.; Ding, L.; Zhang, J. A Lightweight and Machine-Learning-Resistant PUF Using Obfuscation-Feedback-Shift-Register. IEEE Trans. Circuits Syst. II: Express Briefs 2022, 69, 4543–4547. [Google Scholar] [CrossRef]
- Cambosuela, L.; Kaur, M.; Astya, R. The Vulnerabilities and Risks of Implementing Internet of Things (IoT) in Cyber Security. In Proceedings of the 2024 11th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), Noida, India, 14–15 March 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 1–5. [Google Scholar] [CrossRef]
- Siwakoti, Y.R.; Bhurtel, M.; Rawat, D.B.; Oest, A.; Johnson, R.C. Advances in IoT Security: Vulnerabilities, Enabled Criminal Services, Attacks, and Countermeasures. IEEE Internet Things J. 2023, 10, 11224–11239. [Google Scholar] [CrossRef]
- Anna, K.; Olena, K.; Mykhailo, K.; Svitlana, K.; Olena, S.; Rostyslav, Z. Methods of Security Authentication and Authorization into Informationals Systems. In Proceedings of the 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine, 25–27 November 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 270–274. [Google Scholar] [CrossRef]
- Jin, X.; Lin, N.; Li, Z.; Jiang, W.; Jia, Y.; Li, Q. A Lightweight Authentication Scheme for Power IoT Based on PUF and Chebyshev Chaotic Map. IEEE Access 2024, 12, 83692–83706. [Google Scholar] [CrossRef]
- Huang, D.; Al-Hourani, A.; Sithamparanathan, K.; Rowe, W.S. Deep Learning Methods for IoT Device Authentication Using Symbols Density Trace Plot. IEEE Internet Things J. 2024, 11, 18167–18179. [Google Scholar] [CrossRef]
- Gupta, B.B.; Gaurav, A.; Chui, K.T.; Hsu, C.H. Identity-Based Authentication Technique for IoT Devices. In Proceedings of the 2022 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 7–9 January 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–4. [Google Scholar] [CrossRef]
- Sasi, T.; Lashkari, A.H.; Lu, R.; Xiong, P.; Iqbal, S. A Comprehensive Survey on IoT Attacks: Taxonomy, Detection Mechanisms and Challenges. J. Inf. Intell. 2024, 2, 455–513. [Google Scholar] [CrossRef]
- Manjula, H.; Chaitra, M.; Nehashree, K.; Navya, K.; Kiran, C.; Arun, C. Intrusion Detection System to Detect Impersonation Attacks in IoT Networks. In Proceedings of the 2024 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE), Bangalore, India, 24–25 January 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Sivasankari, N.; Kamalakkannan, S. Detection and Prevention of Man-in-the-Middle Attack in IoT Network Using Regression Modeling. Adv. Eng. Softw. 2022, 169, 103126. [Google Scholar] [CrossRef]
- Reardon, S.; Hssayeni, M.D.; Mahgoub, I. Detection of Zero-Day Attacks on IoT. In Proceedings of the 2024 International Conference on Smart Applications, Communications and Networking (SmartNets), Harrisonburg, VA, USA, 28–30 May 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 1–5. [Google Scholar] [CrossRef]
- Davis, B.D.; Mason, J.C.; Anwar, M. Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study. IEEE Internet Things J. 2020, 7, 10102–10110. [Google Scholar] [CrossRef]
- Ahmed, Z.; Nadir, I.; Mahmood, H.; Akbar, A.H.; Shah, G.A. Identifying Mirai-Exploitable Vulnerabilities in IoT Firmware Through Static Analysis. In Proceedings of the 2020 International Conference on Cyber Warfare and Security (ICCWS), Islamabad, Pakistan, 20–21 October 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 1–5. [Google Scholar] [CrossRef]
- Istiaque Ahmed, K.; Tahir, M.; Hadi Habaebi, M.; Lun Lau, S.; Ahad, A. Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction. Sensors 2021, 21, 5122. [Google Scholar] [CrossRef]
- Subramanian, A.K.; Samanta, A.; Manickam, S.; Kumar, A.; Shiaeles, S.; Mahendran, A. Linear Regression Trust Management System for IoT Systems. Cybern. Inf. Technol. 2021, 21, 15–27. [Google Scholar] [CrossRef]
- Kumar, H.; Mamoria, P.; Dewangan, D.K.; Kumari, S. Internet of Things (IoT): Role of Machine Learning in Power Management and Optimization Using Regression Analysis. In Proceedings of the 2024 IEEE International Conference on Computing, Power and Communication Technologies (IC2PCT), Greater Noida, India, 9–10 February 2024; IEEE: Piscataway, NJ, USA, 2024; Volume 5, pp. 1319–1326. [Google Scholar] [CrossRef]
- Manzini, C.; Mukoko, F.D. Utilizing Machine Learning Algorithms to Improve Device Authentication in IoT. Int. J. Innov. Sci. Res. Technol. 2022, 7, 752–756. [Google Scholar] [CrossRef]
- Pryor, L.; Dave, R.; Seliya, J.; Boone, E.S. Machine Learning Algorithms in User Authentication Schemes. In Proceedings of the 2021 International Conference on Electrical, Computer and Energy Technologies (ICECET), Cape Town, South Africa, 9–10 December 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Lu, Y.; Ye, T.; Zheng, J. Decision Tree Algorithm in Machine Learning. In Proceedings of the 2022 IEEE International Conference on Advances in Electrical Engineering and Computer Applications (AEECA), Dalian, China, 20–21 August 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1014–1017. [Google Scholar] [CrossRef]
- De Marcos, L.; Martínez-Herráiz, J.J.; Junquera-Sánchez, J.; Cilleruelo, C.; Pages-Arevalo, C. Comparing Machine Learning Classifiers for Continuous Authentication on Mobile Devices by Keystroke Dynamics. Electronics 2021, 10, 1622. [Google Scholar] [CrossRef]
- Alghamdi, I.; Alzahrani, M. Accurate and Efficient Security Authentication of IoT Devices Using Machine Learning Algorithms. CSIT Conf. Proc. 2024, 14, 07. [Google Scholar] [CrossRef]
- Saxena, V.; Aggarwal, A. Comparative Study of Select Non-Parametric and Ensemble Machine Learning Classification Techniques. In Proceedings of the 2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India, 18–19 December 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 110–115. [Google Scholar] [CrossRef]
- Chanal, P.M.; Kakkasageri, M.S. Random Forest Algorithm Based Device Authentication in IoT. In Proceedings of the 2023 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), Bangalore, India, 14–16 July 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–6. [Google Scholar] [CrossRef]
- Gupta, K.; Ghose, N.; Wang, B. Radtec: Re-Authentication of IoT Devices with Machine Learning. In Proceedings of the 2023 IEEE 20th Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 817–822. [Google Scholar] [CrossRef]
- Batool, S.; Hassan, A.; Saqib, N.A.; Khattak, M.A.K. Authentication of Remote IoT Users Based on Deeper Gait Analysis of Sensor Data. IEEE Access 2020, 8, 101784–101796. [Google Scholar] [CrossRef]
- Meidan, Y.; Bohadana, M.; Shabtai, A.; Ochoa, M.; Tippenhauer, N.O.; Guarnizo, J.D.; Elovici, Y. Detection of Unauthorized IoT Devices Using Machine Learning Techniques. arXiv 2017, arXiv:1709.04647. [Google Scholar] [CrossRef]
- Xi, T.; Kuzminykh, I.; Ghita, B.; Bakhshi, T. Evaluating Learning Algorithms for Keystroke Based User Authentication. In Proceedings of the 2023 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), Istanbul, Turkey, 4–7 July 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 283–288. [Google Scholar] [CrossRef]
- Amsyari, F.; Maylawati, D.S.; Wahana, A.; Uriawan, W.; Lukman, N.; Fikra, H. Enhancing Electricity Usage Monitoring and Prediction with IoT-Based Multiple Linear Regression Algorithm. In Proceedings of the 2024 10th International Conference on Wireless and Telematics (ICWT), Batam, Indonesia, 4–5 July 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Mgbeafulike, I.; Ndidi, I.E. Enhancing IoT Device Security a Hybrid Machine Learning-Based Approach Leveraging K-Means Clustering for Intrusion Detection. Int. J. Res. Innov. Appl. Sci. 2024, 9, 38–50. [Google Scholar] [CrossRef]
- Aslam, S.; Rabie, T.F. Principal Component Analysis in Image Classification: A Review. In Proceedings of the 2023 Advances in Science and Engineering Technology International Conferences (ASET), Dubai, United Arab Emirates, 20–23 February 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–7. [Google Scholar] [CrossRef]
- Chakraborty, N.; Li, J.Q.; Mondal, S.; Luo, C.; Wang, H.; Alazab, M.; Chen, F.; Pan, Y. On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things. IEEE Internet Things J. 2020, 8, 3255–3267. [Google Scholar] [CrossRef]
- Kavitha, S.; Karumanchi, V.R.; Rajeswari, T.S.; Jadala, V.C.; Raju, S.H.; Kavitha, M. Machine Learning Based Authentication of IoT Devices in Traffic Prediction for ITS. In Proceedings of the 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC), Salem, India, 9-11 May 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1530–1534. [Google Scholar] [CrossRef]
- Milan, G.; Vassio, L.; Drago, I.; Mellia, M. RL-IoT: Reinforcement Learning to Interact with IoT Devices. In Proceedings of the 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS), Barcelona, Spain, 23–25 August 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 1–6. [Google Scholar] [CrossRef]
- Ma, Z.; Zhang, R.; Ai, B.; Lian, Z.; Zeng, L.; Niyato, D.; Peng, Y. Deep Reinforcement Learning for Energy Efficiency Maximization in RSMA-IRS-Assisted ISAC System. IEEE Trans. Veh. Technol. 2025, 1, 1–6. [Google Scholar] [CrossRef]
- Picard, C.; Pierre, S. RLAuth: A Risk-Based Authentication System Using Reinforcement Learning. IEEE Access 2023, 11, 61129–61143. [Google Scholar] [CrossRef]
- Chen, J.I.Z.; Lai, K.L. Internet of Things (IoT) Authentication and Access Control by Hybrid Deep Learning Method—A Study. J. Soft Comput. Paradig. (JSCP) 2020, 2, 236–245. [Google Scholar] [CrossRef]
- Kumar, A.; Singh, D. Adaptive Epsilon Greedy Reinforcement Learning Method in Securing IoT Devices in Edge Computing. Discov. Internet Things 2024, 4, 27. [Google Scholar] [CrossRef]
- Adawadkar, A.M.K.; Kulkarni, N. EAARL: Enhanced Adaptive Authentication Based on Reinforcement Learning. In Proceedings of the 2022 Seventh International Conference on Parallel, Distributed and Grid Computing (PDGC), Solan, India, 25–27 November 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 474–477. [Google Scholar] [CrossRef]
- Al-Garadi, M.A.; Mohamed, A.; Al-Ali, A.K.; Du, X.; Ali, I.; Guizani, M. A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. IEEE Commun. Surv. Tutor. 2020, 22, 1646–1685. [Google Scholar] [CrossRef]
- Nair, M.; Dang, S.; Beach, M.A. IoT Device Authentication Using Self-Organizing Feature Map Data Sets. IEEE Commun. Mag. 2023, 61, 162–168. [Google Scholar] [CrossRef]
- Hasan, S.S.U.; Ghani, A.; Din, I.U.; Almogren, A.; Altameem, A. IoT Devices Authentication Using Artificial Neural Network. Comput. Mater. Contin. 2022, 70, 3701–3716. [Google Scholar] [CrossRef]
- Qiu, X.; Dai, J.; Hayes, M. A Learning Approach for Physical Layer Authentication Using Adaptive Neural Network. IEEE Access 2020, 8, 26139–26149. [Google Scholar] [CrossRef]
- Zouridakis, P.; Dinakarrao, S.M.P. Performance-and Energy-Aware Gait-Based User Authentication with Intermittent Computation for IoT Devices. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2023, 43, 600–612. [Google Scholar] [CrossRef]
- Elshenaway, A.R.; Guirguis, S.K. Adaptive Thresholds of EEG Brain Signals for IoT Devices Authentication. IEEE Access 2021, 9, 100294–100307. [Google Scholar] [CrossRef]
- Kim, B.H.; Pyun, J.Y. ECG Identification for Personal Authentication Using LSTM-Based Deep Recurrent Neural Networks. Sensors 2020, 20, 3069. [Google Scholar] [CrossRef]
- Wang, B.; Wang, Z.; Liu, L.; Liu, D.; Peng, X. Data-Driven Anomaly Detection for UAV Sensor Data Based on Deep Learning Prediction Model. In Proceedings of the 2019 Prognostics and System Health Management Conference (PHM-Paris), Paris, France, 2–5 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 286–290. [Google Scholar] [CrossRef]
- Ferdowsi, A.; Saad, W. Deep Learning for Signal Authentication and Security in Massive Internet-of-Things Systems. IEEE Trans. Commun. 2018, 67, 1371–1387. [Google Scholar] [CrossRef]
- Thavamani, S.; Sinthuja, U. LSTM Based Deep Learning Technique to Forecast Internet of Things Attacks in MQTT Protocol. In Proceedings of the 2022 IEEE Fourth International Conference on Advances in Electronics, Computers and Communications (ICAECC), Bengaluru, India, 10–11 January 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–4. [Google Scholar] [CrossRef]
- Wu, D.; Jiang, Z.; Xie, X.; Wei, X.; Yu, W.; Li, R. LSTM Learning with Bayesian and Gaussian Processing for Anomaly Detection in Industrial IoT. IEEE Trans. Ind. Inform. 2019, 16, 5244–5253. [Google Scholar] [CrossRef]
- Mekruksavanich, S.; Jitpattanakul, A. Deep Learning Approaches for Continuous Authentication Based on Activity Patterns Using Mobile Sensing. Sensors 2021, 21, 7519. [Google Scholar] [CrossRef]
- Das, R.; Gadre, A.; Zhang, S.; Kumar, S.; Moura, J.M. A Deep Learning Approach to IoT Authentication. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar] [CrossRef]
- Varugu, R.B.; Kumar, G.A. A Survey on IoT Device Authentication and Anomaly Detection for Cyber Security Using Machine Learning. SSRN 2023, 4798899. [Google Scholar] [CrossRef]
- Yue, Y.; Li, S.; Legg, P.; Li, F. Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey. Secur. Commun. Networks 2021, 2021, 8873195. [Google Scholar] [CrossRef]
- Weqar, M.; Mehfuz, S.; Gupta, D. Authentication in IoT Networks via Machine Learning and Deep Learning: A Review. In Proceedings of the 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kamand, India, 24–28 June 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Jing, T.; Huang, H.; Gao, Q.; Wu, Y.; Huo, Y.; Wang, Y. Multi-User Physical Layer Authentication Based on CSI Using ResNet in Mobile IIoT. IEEE Trans. Inf. Forensics Secur. 2023, 19, 1896–1907. [Google Scholar] [CrossRef]
- Guo, Y.; Zhang, J.; Hong, Y.W.P. Deep Learning-Enhanced Physical Layer Authentication for Mobile Devices. In Proceedings of the GLOBECOM 2023—2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 4–8 December 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 826–831. [Google Scholar] [CrossRef]
- Zhu, T.; Weng, Z.; Chen, G.; Fu, L. A Hybrid Deep Learning System for Real-World Mobile User Authentication Using Motion Sensors. Sensors 2020, 20, 3876. [Google Scholar] [CrossRef] [PubMed]
- Kumar, N.V.R.; Arun, M. Deep Learning Model to Improve Security in IoT Systems. In Proceedings of the 2022 International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN), Villupuram, India, 25–26 March 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1–5. [Google Scholar] [CrossRef]
- Bharati, S.; Podder, P. Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions. Secur. Commun. Netw. 2022, 2022, 8951961. [Google Scholar] [CrossRef]
- Shende, S.W.; Tembhurne, J.V.; Ansari, N.A. Deep Learning Based Authentication Schemes for Smart Devices in Different Modalities: Progress, Challenges, Performance, Datasets and Future Directions. Multimed. Tools Appl. 2024, 83, 71451–71493. [Google Scholar] [CrossRef]
- Hussain, F.; Hussain, R.; Hassan, S.A.; Hossain, E. Machine Learning in IoT Security: Current Solutions and Future Challenges. IEEE Commun. Surv. Tutor. 2020, 22, 1686–1721. [Google Scholar] [CrossRef]
- Bao, Z.; Lin, Y.; Zhang, S.; Li, Z.; Mao, S. Threat of Adversarial Attacks on DL-Based IoT Device Identification. IEEE Internet Things J. 2021, 9, 9012–9024. [Google Scholar] [CrossRef]
- Fang, H.; Wang, X.; Tomasin, S. Machine Learning for Intelligent Authentication in 5G and Beyond Wireless Networks. IEEE Wirel. Commun. 2019, 26, 55–61. [Google Scholar] [CrossRef]
- Mostafa, T.; Ibrahem, M.I.; Fouda, M.M. Unraveling Model Inversion Attacks: A Survey of Machine Learning Vulnerabilities. In Proceedings of the 2024 2nd International Conference on Artificial Intelligence, Blockchain, and Internet of Things (AIBThings), Mt Pleasant, MI, USA, 7–8 September 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 1–8. [Google Scholar] [CrossRef]
- Aqeel, M.; Ali, F.; Iqbal, M.W.; Rana, T.A.; Arif, M.; Auwul, M.R. A Review of Security and Privacy Concerns in the Internet of Things (IoT). J. Sens. 2022, 2022, 5724168. [Google Scholar] [CrossRef]
- Abdullahi, M.; Baashar, Y.; Alhussian, H.; Alwadain, A.; Aziz, N.; Capretz, L.F.; Abdulkadir, S.J. Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics 2022, 11, 198. [Google Scholar] [CrossRef]
- Talluri, S. Machine Learning Usages and Role for Authentication in Identity and Access Management Systems. Int. J. Curr. Sci. 2022, 12, 844–852. [Google Scholar]
- Albalawi, A.; Almrshed, A.; Badhib, A.; Alshehri, S. A Survey on Authentication Techniques for the Internet of Things. In Proceedings of the 2019 International Conference on Computer and Information Sciences (ICCIS), Sakaka, Saudi Arabia, 3–4 April 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–5. [Google Scholar] [CrossRef]
- Al Abdulwahid, A.; Clarke, N.; Furnell, S.; Stengel, I.; Reich, C. The Current Use of Authentication Technologies: An Investigative Review. In Proceedings of the 2015 International Conference on Cloud Computing (ICCC), Riyadh, Saudi Arabia, 26–29 April 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–8. [Google Scholar] [CrossRef]
- Joy, J.P.; S, J.T. Secure Authentication. In Proceedings of the 2016 Online International Conference on Green Engineering and Technologies (IC-GET), Coimbatore, India, 19 November 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–3. [Google Scholar] [CrossRef]
- Noginova, L.Y. Intelligent Authentication System Based on Machine Learning Algorithms. In The Challenge of Sustainability in Agricultural Systems: Volume 2; Springer: Cham, Switzerland, 2021; pp. 1053–1060. [Google Scholar] [CrossRef]
- Gope, P.; Millwood, O.; Sikdar, B. A Scalable Protocol Level Approach to Prevent Machine Learning Attacks on Physically Unclonable Function Based Authentication Mechanisms for Internet of Medical Things. IEEE Trans. Ind. Inform. 2021, 18, 1971–1980. [Google Scholar] [CrossRef]
- Lee, K.; Yim, K. Cybersecurity Threats Based on Machine Learning-Based Offensive Technique for Password Authentication. Appl. Sci. 2020, 10, 1286. [Google Scholar] [CrossRef]
- Enad, E.H.; Younis, S. Machine Learning Based Decision Strategies for Physical Layer Authentication in Wireless Systems. In Proceedings of the 2020 2nd Annual International Conference on Information and Sciences (AiCIS), Fallujah, Iraq, 24–25 November 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 114–118. [Google Scholar] [CrossRef]
- Thakare, A.; Kim, Y.G. Secure and Efficient Authentication Scheme in IoT Environments. Appl. Sci. 2021, 11, 1260. [Google Scholar] [CrossRef]
- Humayoun, S.R.; Abbas, G.; Al-Tarawneh, R. Touch-Behavioral Authentication on Smartphones Using Machine Learning. In Proceedings of the Companion Proceedings of the 27th International Conference on Intelligent User Interfaces, Virtual Event, Helsinki, Finland, 22–25 March 2022; ACM: New York, NY, USA, 2022; pp. 105–108. [Google Scholar] [CrossRef]
- Punithavathi, P.; Geetha, S.; Karuppiah, M.; Islam, S.K.H.; Hassan, M.M.; Choo, K.K.R. A Lightweight Machine Learning-Based Authentication Framework for Smart IoT Devices. Inf. Sci. 2019, 484, 255–268. [Google Scholar] [CrossRef]
- Altinkemer, K.; Wang, T. Cost and Benefit Analysis of Authentication Systems. Decis. Support Syst. 2011, 51, 394–404. [Google Scholar] [CrossRef]
- Mahansaria, D.; Roy, U.K. Contextual Authentication of Users and Devices Using Machine Learning. Computing 2024, 106, 4083–4107. [Google Scholar] [CrossRef]
- Liu, Y.; Zhou, Y.; Yang, K.; Wang, X. Unsupervised Deep Learning for IoT Time Series. IEEE Internet Things J. 2023, 10, 14285–14306. [Google Scholar] [CrossRef]
Component | Vulnerabilities | Assessment Tools | Challenges | Security Measures |
---|---|---|---|---|
Software [13,14] | Insecure APIs, encryption flaws, injection, firmware bugs, buffer overflows, MITM, DoS, remote code exec [13,14] | Firmadyne, DiscovRE, IoTFuzzer, manual RE, security frameworks [13,14] | Limited resources, device variety, lack of standards, firmware access [13,14] | Secure coding, firmware analysis, updates, authentication, patching, monitoring [13,14] |
Hardware [15,16,17] | Default credentials, outdated TCP/IP stacks, open ports, reused keys [16,17] | Shodan, Nessus [17], NIST 800-22 [15] | Low memory, protocol diversity (CoAP, MQTT), device constraints [17] | Secure boot, disable ports, tamper resistance, lightweight encryption [15,16,17] |
Type | Verification Process | Credentials | Vulnerabilities | Use Case | Technologies |
---|---|---|---|---|---|
Static [8,9,18] | One-time, fixed checks [8] | Passwords, keys, MD5, certs [8,18] | Brute force, phishing, replay, key theft [8,18] | Low-security or legacy IoT [9,18] | MD5, AES, RSA, static certs [9] |
Dynamic [10,11,19,20,21] | Context or behavior based [21] | RF prints, keystrokes, sensors [20] | Noise, impersonation, replay, memory limits [10,11] | High-security, adaptive IoT [21] | LSTM, RNN, biometrics, PUFs [10,11] |
Methods | Benefits | Drawbacks | Security Issues |
---|---|---|---|
Support Vector Machines (SVMs) | High accuracy (97.1%) [32] Effective with 10K+ samples [32] | Long training time: 5–10 min (1 K samples), 2h (10 K samples) [32] Limited effectiveness with fewer than 1 K samples [32] | High false rejection rate (50%) in low-data settings [32,34] Vulnerable to adversarial attacks [28,32,34] |
Random Forest (RF) | High accuracy across datasets: 98.1% (IoT authentication) [37], 99% (BoT-IoT) [35] | Large memory requirement (16 GB RAM for 30 K rows × 500 features × 1 K trees) [32] Fails with extensive datasets (400 K rows × 50 trees) [32,38] | Susceptible to adversarial input, DoS, and training contamination [31,35,37] |
K-Nearest Neighbors (KNNs) | Effective accuracy: 74.58% (keystroke analysis) [41] Low error rate (EER = 2.52% for known users) [32] | Large dataset requirement (712 K+ keypresses) [34] High false rejection rate (FRR = 25%) with noisy input [41] | False acceptance rate (FAR = 10–15%) for impostors [41] Privacy concerns due to user variability [32,34] |
Naïve Bayes (NB) | Varied accuracy: 64–99% across datasets [31,34,35] | Assumes feature independence, impacting real-world performance [35] | Susceptible to misclassification and dataset poisoning [32,35] |
Decision Trees | High accuracy (96.32% for IoT smart home) [31] Reliable across datasets (99% for BoT-IoT) [35] | Varied precision range (0.97–0.98, XGBoost performs better) [35] Performance declines with limited data (2–8 devices, 483 flows) [31] | Keystroke exposure risks [34] Traffic manipulation vulnerabilities [35] |
Logistic Regression | Applicable to small datasets (483 traffic flows) [31] Suitable for IoT (2–8 devices, Raspberry Pi) [31] | Lower accuracy than Decision Trees (96.32%) [31] Limited predictive flexibility due to linear assumptions [31] | Susceptible to packet manipulation [31] False positives: 5, False negatives: 12 [31] |
Linear Regression | High real-time accuracy (98.07%) with minimal delay (<3 s) [42] Effective billing prediction (91.98%, RMSE 0.0493) [42] | Reliable variable prediction (e.g., 89.48% in Room 10A, RMSE 0.0596) [42] Limited granularity (day-based intervals, lacks hourly/dynamic options) [42] | Security risks: Weak/default passwords on PZEM-004T, NodeMCU, APIs [42] |
ML Method | Benefits | Drawbacks | Security Issues |
---|---|---|---|
K-means Clustering [41,46] | Acc. ↑ from purity 0.44 to 0.877 with preprocessing; clusters efficiently (2–50 clusters) | Noise-sensitive; init. purity = 0.44 (keystroke); requires preset k | DoS on IoT; false auth. due to noise |
PCA (Principal Comp. Analysis) [41,45] | Reduces dimension; speeds up processing; useful in CSI-based keystroke inference (64–82% acc.) | Poor clustering: purity = 0.20, neg. silhouette; weak on fine-grain CSI | Vulnerable to data perturbation; usable for PIN inference attacks (64–82%) |
Approach | Pros | Cons | Security Issues |
---|---|---|---|
Auth. via RL for Risk Adaptation [49] | G-Mean = 92.62%; dynamic challenge adj. via DES-DRL; trained every 1000 obs. | 130 h offline training; 6000 samples (∼1 week) for convergence; high memory | Class imbalance ( = 0.25); vulnerable to context-based misuse; on-device privacy preserved |
RL for IoT Interface Control [47] | Learns opt. seq.: Goal 1 (2 steps), Goal 2 (4 steps); 400 interactions; finds alternates (e.g., dim = off) | Goal 2 slow (>100 episodes); 40 min per 100 episodes due to 250–600 commands | Learned FSMs may be exploited via undocumented protocols; weak interop. creates risks |
DL + RL for IoT Auth. [50] | Handles heterogeneous data; scalable with deep models | Limited real-world validation; no detailed acc. metrics | Modified inputs can cause auth. failure; DoS attacks degrade system integrity |
Adaptive -Greedy RL for Security [51] | adjusted (0.1–0.9) by attack freq.; PDR = 1.0 (benign), 0.929 (malicious) @ 160 units | Delay: 1489 ms (malicious), 1178 ms (non-malicious); slower in attack scenarios | Proxy user mimicry; black hole attacks drop packets; limited resources increase risk |
RL + ECC for Auth. [52] | ECC base G resists insider attacks; XORed nonces ensure confidentiality; no plaintext shared | >72 h for 1000 users (Jupyter); = 0.1–0.5, = 0.6–0.9; slow for constrained devices | Without nonces: MITM risk; ECC/LDAP failure exposes spoofing/ replay vulnerabilities |
DL Method | Benefits | Drawbacks | Security Issues |
---|---|---|---|
2D-CNN, 3D-CNN + biLSTM [20] | 96.7% accuracy; good for 3D-DTPs; efficient computation | High resource use; limited with short signals | Susceptible to spoofing, DoS, poisoning |
LSTM for Auth. [65] | 99.58% in LOS; works in noise; protocol-free | Drops to 88% in NLOS; overfitting possible | Base station compromise risk |
ANN (Touch Dynamics) [55] | FRR 5.03%, FAR 4.36%; no extra HW | Needs 30–40 logins to train | Training data may be leaked |
Adaptive ANN [56] | 100% detect. @ SNR ≥ 6 dB; robust @ 4 dB | Drops in low SNR | Susceptible to interference |
CNNs (RF Features) [53,66,67] | +10–15% accuracy; tunable; scalable | Needs samples for HPC | Prone to adversarial/privacy attacks |
LSTMs (Traffic Analysis) [53,66,68] | 2% gain; adapts well to attacks | 50–100 ms latency; needs retraining | 30% false negatives (zero-day), poisoning risk |
Autoencoders (Anomaly Detect.) [66,67,68] | 95% recall; 10% fewer false positives | 15–20% error with >10 GB data | Poor zero-day detect., false data vulnerable |
DNNs (Multi-Device) [53,66,68] | 90% accuracy; low preprocessing | 100–500 mW energy; overfitting risk | −25% acc. due to adversarial attacks, privacy threats |
RNNs (Traffic Modeling) [53,67,68] | 88% for 1 K devices; scalable | Gradient issues on low-RAM devices | 50% miss rate (zero-day); input manipulation |
Federated Learning [66,67,68] | −80% privacy risk; supports 1 K devices | 20–50 ms latency with heterogeneity | Poisoning cuts acc. 15%; risk of data leaks |
CNN-CSI [69,70] | 99.64% accuracy; high TPR | Needs 5145 packets; ResNet50 = params | Acc. drops with user separation |
LSTM + Watermarking [61] | 0.1 s detect. time; BER = 0.001 vs. 0.03 | Long training; high complexity | Fails if attacker mimics spectral traits |
Hybrid CNN-SVM + VMD [71] | 95.01% acc.; 99.9% imitation resist. | High battery use; slow auth. | 0.1% imitation breach leaks privacy |
ADN/CNN/Autoencoder [72] | 94.8% botnet, 99.9% fall detect. | Lower acc. in fading channels | Trojan detect. unreliable under latency |
Aspect | Traditional Methods | ML-Based Methods | Similarity | Difference |
---|---|---|---|---|
Auth. Mechanism [81] | Passwords, PKI, MAC/IP, MFA | Behavioral patterns, anomaly detection | Both secure IoT access | Static credentials vs. dynamic profiling |
Security Features [82,83,84] | Low to high (PSK to MFA) | Real-time threat detection, learning models | Strong security goals | Manual strength vs. adaptive response |
Attack Vulnerability [56,85] | Spoofing, brute force, theft | Resistant to new/unseen attacks | Access control against threats | Static failure vs. adaptive resilience |
Scalability [38,86] | Manual setup limits scale | Auto-model updates, online learning | Scale with IoT growth | Manual vs. autonomous scalability |
Threat Adaptation [56,87] | Manual updates needed | Continuously adapts to attacks | Evolves with threat landscape | Reactive vs. proactive learning |
Latency [56,88] | High due to crypto/MFA ops | Low with optimized inference | Impacts user access time | Traditional slower than ML |
Energy Use [86,89] | High for certs/MFA | Efficient edge models | Energy-constrained IoT relevance | Higher traditional consumption |
Maintenance [85,90] | Frequent manual updates | Minimal updates, self-adaptive | Ongoing system upkeep | Traditional needs more manual work |
Cost [91,92] | Low setup, high upkeep | High setup, low upkeep | Resource investment trade-off | Traditional cheaper upfront |
IoT Integration [38,93] | Easy for simple devices | Needs infrastructure, compute | IoT device compatibility | Traditional fits constrained IoT |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Miri Kelaniki, S.; Komninos, N. A Study on IoT Device Authentication Using Artificial Intelligence. Sensors 2025, 25, 5809. https://doi.org/10.3390/s25185809
Miri Kelaniki S, Komninos N. A Study on IoT Device Authentication Using Artificial Intelligence. Sensors. 2025; 25(18):5809. https://doi.org/10.3390/s25185809
Chicago/Turabian StyleMiri Kelaniki, Shahram, and Nikos Komninos. 2025. "A Study on IoT Device Authentication Using Artificial Intelligence" Sensors 25, no. 18: 5809. https://doi.org/10.3390/s25185809
APA StyleMiri Kelaniki, S., & Komninos, N. (2025). A Study on IoT Device Authentication Using Artificial Intelligence. Sensors, 25(18), 5809. https://doi.org/10.3390/s25185809