{"title":"Requirements framework for IoT device authentication using behavioral fingerprinting","authors":"Ole Höfener , Qinghua Wang","doi":"10.1016/j.cose.2025.104459","DOIUrl":null,"url":null,"abstract":"<div><div>The Internet of Things (IoT) has more and more been integrated into our work and life. However, besides the benefits brought by the recent advancements, there is an increasing challenge for securing IoT devices and networks. A common security mechanism is authentication. However, IoT devices are often resource-constrained which make the use of state-of-the-art encryption technologies infeasible. Therefore, researchers are trying to develop lightweight authentication methods. A promising example of this is the use of behavioral device fingerprinting. Still, the remaining problem with this technology is that it is unclear which feature sets are most feasible to implement device fingerprinting schemes in practical systems. In short, the current research body lacks clearly defined requirements. To overcome this issue, this research aims to design a requirements framework for IoT authentication schemes using behavioral device fingerprinting. To do so, Design Science Research is used, incorporating a systematic literature review. In the end, a requirements framework for behavioral device fingerprinting authentication is presented. The proposed framework features 20 requirements in the four categories High-level IoT, Fingerprint sophistication, Machine learning sophistication, and Attack resistance. We have demonstrated the application of the requirements framework in this article. It is believed that the proposed framework will help researchers and practitioners to develop better IoT authentication solutions.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"154 ","pages":"Article 104459"},"PeriodicalIF":4.8000,"publicationDate":"2025-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825001488","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of Things (IoT) has more and more been integrated into our work and life. However, besides the benefits brought by the recent advancements, there is an increasing challenge for securing IoT devices and networks. A common security mechanism is authentication. However, IoT devices are often resource-constrained which make the use of state-of-the-art encryption technologies infeasible. Therefore, researchers are trying to develop lightweight authentication methods. A promising example of this is the use of behavioral device fingerprinting. Still, the remaining problem with this technology is that it is unclear which feature sets are most feasible to implement device fingerprinting schemes in practical systems. In short, the current research body lacks clearly defined requirements. To overcome this issue, this research aims to design a requirements framework for IoT authentication schemes using behavioral device fingerprinting. To do so, Design Science Research is used, incorporating a systematic literature review. In the end, a requirements framework for behavioral device fingerprinting authentication is presented. The proposed framework features 20 requirements in the four categories High-level IoT, Fingerprint sophistication, Machine learning sophistication, and Attack resistance. We have demonstrated the application of the requirements framework in this article. It is believed that the proposed framework will help researchers and practitioners to develop better IoT authentication solutions.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.