Context-Aware Device Classification and Clustering for Smarter and Secure Connectivity in Internet of Things

Authors

  • Priyanka More Vishwakarma Institute of Information Technology, Pune
  • Sachin Sakhare Vishwakarma Institute of Information Technology, Pune

DOI:

https://doi.org/10.4108/eetinis.v10i3.3874

Keywords:

Internet of Things, IoT, Clusters, Context Parameters, Cluster Head Update, Authentication, Access Control

Abstract

With the increasing prevalence of the Internet of Things (IoT), there is a growing need for effective access control methods to secure IoT systems and data. Traditional access control models often prove inadequate when dealing with the specific challenges presented by IoT, characterized by a variety of heterogeneous devices, ever-changing network structures, and diverse contextual elements. Managing IoT devices effectively is a complex task in maintaining network security.

This study introduces a context-driven approach for IoT Device Classification and Clustering, aiming to address the unique characteristics of IoT systems and the limitations of existing access control methods. The proposed context-based model utilizes contextual information such as device attributes, location, time, and communication patterns to dynamically establish clusters and cluster leaders. By incorporating contextual factors, the model provides a more accurate and adaptable clustering mechanism that aligns with the dynamic nature of IoT systems. Consequently, network administrators can configure dynamic access policies for these clusters.

Downloads

Download data is not yet available.

References

Ashton K (2009) That ‘internet of things’ thing. RFID J 22(7):97–114 June 2009, http://www.rfidjournal.com/article/view/4986 (04- 04-2014)J. Clerk Maxwell, A Treatise on electricity and magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.

Inayat Ali et. al, “Internet of Things Security, device authentication and access control: A review”, international Jour. of comp. sci. and info. secu. (IJCSIS), vol. 14, no. 8, pp. 1-11, 2016., August 2016, https://doi.org/10.48550/arXiv.1901.07309.

Hassani et. al., “Efficient execution of complex context queries to enable near real-time smart iot applications”, sensors (Basel). 2019 Dec 11;19(24):5457. doi: 10.3390/s19245457. PMID: 31835743; PMCID: PMC6960719 DOI: https://doi.org/10.3390/s19245457

Pal et. al, “Protocol-based and hybrid access control for the IoT: approaches and research opportunities”, sensors (Basel). 2021 Oct 14;21(20):6832. PMID: 34696053; PMCID: PMC8539538, https://doi.org/10.3390/s21206832 DOI: https://doi.org/10.3390/s21206832

Abowd et. al, “Towards a better understanding of context and context-awareness”, In: Gellersen, HW. (eds) handheld and ubi. Comp. HUC 1999. Lecture notes in comp. sci., vol 1707. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48157-5_29 DOI: https://doi.org/10.1007/3-540-48157-5_29

Miettinen et. al, “IoT sentinel demo: automated device-type identification for security enforcement in iot”, In K. Lee, & L. Liu (Eds.), 2017 IEEE 37th Intern. Conf. on Distributed Comp. Syst. (ICDSC 2017) (pp. 2511-2514). (Interna. Conf. on Distri. Comp. Sys.). IEEE. https://doi.org/10.1109/ICDCS.2017.284 DOI: https://doi.org/10.1109/ICDCS.2017.284

Yair Meidan et. al, “, “Detection of unauthorized IoT devices using machine learning tech.”, CoRR, vol. abs/1709.04647, 2017, http: //arxiv.org/abs/1709.04647

Bekerman et. al, “Unknown malware detection using network traffic classification.” 2015 IEEE Conf. on Commu. & Network Secu. (CNS) (2015): 134-142. DOI: https://doi.org/10.1109/CNS.2015.7346821

Lopez-Martin et. al, “ (2017), “Network traffic classifier with convolutional and recurrent neural networks for Internet of Things”, IEEE Access. PP. 1-1. 10.1109/ACCESS.2017.2747560 DOI: https://doi.org/10.1109/ACCESS.2017.2747560

HAMZA, Muhammad et al, “Clustering of iot devices using device profiling and behavioral analysis to build efficient network policies”, Mehran University research jour. of engi. and tech., [S.l.], v. 40, n. 2, p. 335 - 345, apr. 2021. ISSN 2413-7219. https://search.informit.org/doi/10.3316/informit.734269516532678 DOI: https://doi.org/10.22581/muet1982.2102.08

Xiaobo Ma et. al, 2021, “Inferring hidden iot devices and user interactions via Spatial-Temporal traffic

fingerprinting”, IEEE/ACM Trans. Netw. 30, 1 (Feb. 2022), 394–408. https://doi.org/10.1109/TNET.2021.3112480 DOI: https://doi.org/10.1109/TNET.2021.3112480

Cvitić, et al, “Ensemble machine learning approach for classification of IoT devices in smart home”, Int. J. mach. Learn. & Cyber. 12, 3179–3202 (2021). https://doi.org/10.1007/s13042-020-01241-0 DOI: https://doi.org/10.1007/s13042-020-01241-0

https://www.hipaajournal.com/

10 internet of things (IoT) healthcare examples (ordr.net)

Priyanka More, Sachin Sakhare, Payas Sawane, “Implementation and Analysis of ECC (Elliptic Curve Cryptography) security routing protocol in NS2”, IEEE 3rd ASIANCON2023, India, in Press

Priyanka More et. al, “Generating network simulations and comparing different routing protocols using NS2”, IEEE 3rd ASIANCON2023, India, in Press

Priyanka More, Sachin Sakhare, P Mahalle, “Identity Management in Internet of Things: A Survey of State of the Art”, IEEE Sys., Man, and Cybernetics Maga., 10.1109/MSMC.2022.3230215, in Press

Perera et. al, "CA4IOT: Context Awareness for Internet of Things," 2012 IEEE Intern. Conf. on Green Computing and Commu., Besancon, France, 2012, pp. 775-782, doi: 10.1109/GreenCom.2012.128. DOI: https://doi.org/10.1109/GreenCom.2012.128

Gallacher, S et. al, MH 2014, “Dynamic context-aware personalisation in a pervasive environment', Pervasive and Mobile Computing”, vol. 10, no. PART B, pp. 120-137. https://doi.org/10.1016/j.pmcj.2012.11.002 DOI: https://doi.org/10.1016/j.pmcj.2012.11.002

Moradeyo et. al, 2017, “Context-Aware personalization using Neighborhood-Based Context Similarity. Wirel. Pers. Commun. 94, 3 (June 2017), 1595–1618. https://doi.org/10.1007/s11277-016-3701-2 DOI: https://doi.org/10.1007/s11277-016-3701-2

Rajarshi Roy Chowdhury, Azam Che Idris, Pg Emeroylariffion Abas, “Device identification using optimized digital footprints”, IAES Intern. Journal of artificial intelligence (IJ-AI) Vol. 12, No. 1, March 2023, pp. 232~240 ISSN: 2252-8938, DOI: 10.11591/ijai.v12.i1.pp232-240 DOI: https://doi.org/10.11591/ijai.v12.i1.pp232-240

Sivanathan et al., "Characterizing and classifying IoT traffic in smart cities and campuses," 2017 IEEE Confe. on Comp. Commun. Workshops (INFOCOM WKSHPS), Atlanta, GA, USA, 2017, pp. 559-564, doi: 10.1109/INFCOMW.2017.8116438. DOI: https://doi.org/10.1109/INFCOMW.2017.8116438

R. Kumar et. al. “IoT network traffic classification using machine learning algorithms: an experimental analysis," in IEEE IoT , vol. 9, no. 2, pp. 989-1008, 15 Jan.15, 2022, doi: 10.1109/JIOT.2021.3121517. DOI: https://doi.org/10.1109/JIOT.2021.3121517

A. Aksoy, M. H. Gunes, “Automated IoT device identification using network traffic”, in procee. of the 2019, IEEE Intern. Confe. on Comm., ICC 2019, Shanghai, China, 20–24 May 2019; pp. 1–7 DOI: https://doi.org/10.1109/ICC.2019.8761559

H. Jmila, et. al, "A survey of smart home iot device classification using machine learning-based network traffic analysis," in IEEE Access, vol. 10, pp. 97117-97141, 2022, doi: 10.1109/ACCESS.2022.3205023. DOI: https://doi.org/10.1109/ACCESS.2022.3205023

EAI

Downloads

Published

02-10-2023

How to Cite

More, P., & Sachin Sakhare. (2023). Context-Aware Device Classification and Clustering for Smarter and Secure Connectivity in Internet of Things . EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 10(3), e5. https://doi.org/10.4108/eetinis.v10i3.3874