增强物联网网络中的隐私:分类与防御方法的比较分析

IF 3.4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS
Ahmet Emre Ergun;Ozgu Can;Murat Kantarcioglu
{"title":"增强物联网网络中的隐私:分类与防御方法的比较分析","authors":"Ahmet Emre Ergun;Ozgu Can;Murat Kantarcioglu","doi":"10.1109/ACCESS.2025.3563799","DOIUrl":null,"url":null,"abstract":"The rapid proliferation of Internet of Things (IoT) devices has led to a substantial increase in network packet traffic, raising significant privacy concerns. Although traffic encryption is employed to protect the privacy of IoT devices, attackers can still leverage Machine Learning (ML) and Deep Learning (DL) techniques to classify device types by analyzing packet characteristics, such as size and timing. The main challenges in the state of the art are the lack of effective methods for exposing privacy violations in encrypted IoT traffic, and the absence of robust defense mechanisms to mitigate privacy breaches caused by network traffic analysis. Considering these challenges, this study presents two key contributions: (i) a novel vector-based classification method that enhances device-type identification from encrypted IoT traffic using advanced ML and DL techniques, and (ii) a robust defense mechanism based on Differential Privacy (DP) and advanced padding techniques against traffic analysis attacks. Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. The results demonstrate that the proposed vector-based classification method significantly improves the attacker’s classification accuracy, even when privacy-preserving techniques, such as padding, are used to obscure device-type classification. For this purpose, the study evaluates eXtreme Gradient Boosting (XGBoost), Long Short-Term Memory (LSTM), and Gated Recurrent Unit (GRU) for IoT traffic classification, achieving an accuracy rate of 99.61% with XGBoost, 96.74% with LSTM, and 96.94% with GRU. Additionally, the Decision Tree (DT), Random Forest (RF), k-Nearest Neighbors (kNN), and GRU classification algorithms are also evaluated and compared with the XGBoost and LSTM classifiers for the proposed attack model. As a defense mechanism, DP is applied using the Fourier Perturbation Algorithm (FPA) to optimize padding strategies while maintaining network efficiency. A comparative analysis with state of the art padding techniques, including Adaptive Packet Padding (APP), and the proposed DP-based defense mechanism demonstrates that the proposed defense approach achieves a superior privacy-utility balance. The findings reveal that while padding techniques reduce classification accuracy, the novel vector method significantly enhances attack performance, underscoring the need for stronger defense strategies. Consequently, this study addresses a critical gap in the literature by providing a comprehensive evaluation of privacy risks, classification robustness, and the effectiveness of DP-based defense in IoT network traffic. Thus, the proposed research provides practical insights for enhancing privacy preservation while maintaining network performance, thereby contributing to the development of more secure IoT communication frameworks.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"13 ","pages":"71611-71646"},"PeriodicalIF":3.4000,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10974975","citationCount":"0","resultStr":"{\"title\":\"Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods\",\"authors\":\"Ahmet Emre Ergun;Ozgu Can;Murat Kantarcioglu\",\"doi\":\"10.1109/ACCESS.2025.3563799\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid proliferation of Internet of Things (IoT) devices has led to a substantial increase in network packet traffic, raising significant privacy concerns. Although traffic encryption is employed to protect the privacy of IoT devices, attackers can still leverage Machine Learning (ML) and Deep Learning (DL) techniques to classify device types by analyzing packet characteristics, such as size and timing. The main challenges in the state of the art are the lack of effective methods for exposing privacy violations in encrypted IoT traffic, and the absence of robust defense mechanisms to mitigate privacy breaches caused by network traffic analysis. Considering these challenges, this study presents two key contributions: (i) a novel vector-based classification method that enhances device-type identification from encrypted IoT traffic using advanced ML and DL techniques, and (ii) a robust defense mechanism based on Differential Privacy (DP) and advanced padding techniques against traffic analysis attacks. Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. The results demonstrate that the proposed vector-based classification method significantly improves the attacker’s classification accuracy, even when privacy-preserving techniques, such as padding, are used to obscure device-type classification. For this purpose, the study evaluates eXtreme Gradient Boosting (XGBoost), Long Short-Term Memory (LSTM), and Gated Recurrent Unit (GRU) for IoT traffic classification, achieving an accuracy rate of 99.61% with XGBoost, 96.74% with LSTM, and 96.94% with GRU. Additionally, the Decision Tree (DT), Random Forest (RF), k-Nearest Neighbors (kNN), and GRU classification algorithms are also evaluated and compared with the XGBoost and LSTM classifiers for the proposed attack model. As a defense mechanism, DP is applied using the Fourier Perturbation Algorithm (FPA) to optimize padding strategies while maintaining network efficiency. A comparative analysis with state of the art padding techniques, including Adaptive Packet Padding (APP), and the proposed DP-based defense mechanism demonstrates that the proposed defense approach achieves a superior privacy-utility balance. The findings reveal that while padding techniques reduce classification accuracy, the novel vector method significantly enhances attack performance, underscoring the need for stronger defense strategies. Consequently, this study addresses a critical gap in the literature by providing a comprehensive evaluation of privacy risks, classification robustness, and the effectiveness of DP-based defense in IoT network traffic. Thus, the proposed research provides practical insights for enhancing privacy preservation while maintaining network performance, thereby contributing to the development of more secure IoT communication frameworks.\",\"PeriodicalId\":13079,\"journal\":{\"name\":\"IEEE Access\",\"volume\":\"13 \",\"pages\":\"71611-71646\"},\"PeriodicalIF\":3.4000,\"publicationDate\":\"2025-04-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10974975\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Access\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10974975/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Access","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10974975/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

物联网(IoT)设备的快速扩散导致网络数据包流量大幅增加,引发了重大的隐私问题。虽然流量加密用于保护物联网设备的隐私,但攻击者仍然可以利用机器学习(ML)和深度学习(DL)技术通过分析数据包特征(如大小和时间)来分类设备类型。目前的主要挑战是缺乏有效的方法来暴露加密物联网流量中的隐私侵犯,以及缺乏强大的防御机制来减轻网络流量分析造成的隐私泄露。考虑到这些挑战,本研究提出了两个关键贡献:(i)一种新的基于向量的分类方法,使用先进的ML和DL技术增强加密物联网流量的设备类型识别,以及(ii)基于差分隐私(DP)的强大防御机制和针对流量分析攻击的先进填充技术。因此,该研究检查了与连续物联网设备数据相关的隐私风险,并使用两个数据集评估了ML算法的有效性。结果表明,即使使用了诸如填充之类的隐私保护技术来模糊设备类型分类,所提出的基于向量的分类方法也显著提高了攻击者的分类准确性。为此,本研究对极限梯度增强(XGBoost)、长短期记忆(LSTM)和门控循环单元(GRU)进行了物联网流量分类评估,XGBoost的准确率为99.61%,LSTM的准确率为96.74%,GRU的准确率为96.94%。此外,还对所提出的攻击模型的决策树(DT)、随机森林(RF)、k-近邻(kNN)和GRU分类算法进行了评估,并与XGBoost和LSTM分类器进行了比较。DP作为一种防御机制,利用傅立叶摄动算法(FPA)优化填充策略,同时保持网络效率。通过与包括自适应包填充(APP)在内的最新填充技术和所提出的基于dp的防御机制的比较分析,表明所提出的防御方法实现了更好的隐私-效用平衡。研究结果表明,虽然填充技术降低了分类精度,但新的向量方法显着提高了攻击性能,强调需要更强的防御策略。因此,本研究通过对物联网网络流量中基于dp的防御的隐私风险、分类鲁棒性和有效性进行全面评估,解决了文献中的一个关键空白。因此,所提出的研究为在保持网络性能的同时增强隐私保护提供了实际见解,从而有助于开发更安全的物联网通信框架。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods
The rapid proliferation of Internet of Things (IoT) devices has led to a substantial increase in network packet traffic, raising significant privacy concerns. Although traffic encryption is employed to protect the privacy of IoT devices, attackers can still leverage Machine Learning (ML) and Deep Learning (DL) techniques to classify device types by analyzing packet characteristics, such as size and timing. The main challenges in the state of the art are the lack of effective methods for exposing privacy violations in encrypted IoT traffic, and the absence of robust defense mechanisms to mitigate privacy breaches caused by network traffic analysis. Considering these challenges, this study presents two key contributions: (i) a novel vector-based classification method that enhances device-type identification from encrypted IoT traffic using advanced ML and DL techniques, and (ii) a robust defense mechanism based on Differential Privacy (DP) and advanced padding techniques against traffic analysis attacks. Therefore, the study examines privacy risks associated with sequential IoT device data and evaluates the effectiveness of ML algorithms using two datasets. The results demonstrate that the proposed vector-based classification method significantly improves the attacker’s classification accuracy, even when privacy-preserving techniques, such as padding, are used to obscure device-type classification. For this purpose, the study evaluates eXtreme Gradient Boosting (XGBoost), Long Short-Term Memory (LSTM), and Gated Recurrent Unit (GRU) for IoT traffic classification, achieving an accuracy rate of 99.61% with XGBoost, 96.74% with LSTM, and 96.94% with GRU. Additionally, the Decision Tree (DT), Random Forest (RF), k-Nearest Neighbors (kNN), and GRU classification algorithms are also evaluated and compared with the XGBoost and LSTM classifiers for the proposed attack model. As a defense mechanism, DP is applied using the Fourier Perturbation Algorithm (FPA) to optimize padding strategies while maintaining network efficiency. A comparative analysis with state of the art padding techniques, including Adaptive Packet Padding (APP), and the proposed DP-based defense mechanism demonstrates that the proposed defense approach achieves a superior privacy-utility balance. The findings reveal that while padding techniques reduce classification accuracy, the novel vector method significantly enhances attack performance, underscoring the need for stronger defense strategies. Consequently, this study addresses a critical gap in the literature by providing a comprehensive evaluation of privacy risks, classification robustness, and the effectiveness of DP-based defense in IoT network traffic. Thus, the proposed research provides practical insights for enhancing privacy preservation while maintaining network performance, thereby contributing to the development of more secure IoT communication frameworks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Access
IEEE Access COMPUTER SCIENCE, INFORMATION SYSTEMSENGIN-ENGINEERING, ELECTRICAL & ELECTRONIC
CiteScore
9.80
自引率
7.70%
发文量
6673
审稿时长
6 weeks
期刊介绍: IEEE Access® is a multidisciplinary, open access (OA), applications-oriented, all-electronic archival journal that continuously presents the results of original research or development across all of IEEE''s fields of interest. IEEE Access will publish articles that are of high interest to readers, original, technically correct, and clearly presented. Supported by author publication charges (APC), its hallmarks are a rapid peer review and publication process with open access to all readers. Unlike IEEE''s traditional Transactions or Journals, reviews are "binary", in that reviewers will either Accept or Reject an article in the form it is submitted in order to achieve rapid turnaround. Especially encouraged are submissions on: Multidisciplinary topics, or applications-oriented articles and negative results that do not fit within the scope of IEEE''s traditional journals. Practical articles discussing new experiments or measurement techniques, interesting solutions to engineering. Development of new or improved fabrication or manufacturing techniques. Reviews or survey articles of new or evolving fields oriented to assist others in understanding the new area.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信