{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:14:27Z","timestamp":1774023267665,"version":"3.50.1"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T00:00:00Z","timestamp":1690243200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"name":"EU H2020","award":["GA 101020259, and GA 957197"],"award-info":[{"award-number":["GA 101020259, and GA 957197"]}]},{"DOI":"10.13039\/100018693","name":"Horizon Europe","doi-asserted-by":"crossref","award":["10048312"],"award-info":[{"award-number":["10048312"]}],"id":[{"id":"10.13039\/100018693","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Things"],"published-print":{"date-parts":[[2023,8,31]]},"abstract":"<jats:p>\n            Unidentified devices in a network can result in devastating consequences. It is, therefore, necessary to fingerprint and identify IoT devices connected to private or critical networks. With the proliferation of massive but heterogeneous IoT devices, it is getting challenging to detect vulnerable devices connected to networks. Current machine learning-based techniques for fingerprinting and identifying devices necessitate a significant amount of data gathered from IoT networks that must be transmitted to a central cloud. Nevertheless, private IoT data cannot be shared with the central cloud in numerous sensitive scenarios. Federated learning (FL) has been regarded as a promising paradigm for decentralized learning and has been applied in many different use cases. It enables machine learning models to be trained in a privacy-preserving way. In this article, we propose a privacy-preserved IoT device fingerprinting and identification mechanisms using FL; we call it FL4IoT. FL4IoT is a two-phased system combining unsupervised-learning-based device fingerprinting and supervised-learning-based device identification. FL4IoT shows its practicality in different performance metrics in a federated and centralized setup. For instance, in the best cases, empirical results show that FL4IoT achieves \u223c99%\n            <jats:italic>accuracy<\/jats:italic>\n            and\n            <jats:italic>F1-Score<\/jats:italic>\n            in identifying IoT devices using a federated setup without exposing any private data to a centralized cloud entity. In addition, FL4IoT can detect spoofed devices with over 99%\n            <jats:italic>accuracy<\/jats:italic>\n            .\n          <\/jats:p>","DOI":"10.1145\/3603257","type":"journal-article","created":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T11:59:55Z","timestamp":1686311995000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["FL4IoT: IoT Device Fingerprinting and Identification Using Federated Learning"],"prefix":"10.1145","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2772-4661","authenticated-orcid":false,"given":"Han","family":"Wang","sequence":"first","affiliation":[{"name":"RISE Research Institutes of Sweden, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1954-760X","authenticated-orcid":false,"given":"David","family":"Eklund","sequence":"additional","affiliation":[{"name":"RISE Research Institutes of Sweden, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4979-5292","authenticated-orcid":false,"given":"Alina","family":"Oprea","sequence":"additional","affiliation":[{"name":"Northeastern University, U.S.A."}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8192-0893","authenticated-orcid":false,"given":"Shahid","family":"Raza","sequence":"additional","affiliation":[{"name":"RISE Research Institutes of Sweden, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2023,7,25]]},"reference":[{"key":"e_1_3_1_2_2","first-page":"1093","volume-title":"Proceedings of the 26th USENIX Security Symposium (USENIX Security\u201917)","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis et\u00a0al. 2017. Understanding the Mirai Botnet. In Proceedings of the 26th USENIX Security Symposium (USENIX Security\u201917). 1093\u20131110."},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3266444.3266452"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133982"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339810"},{"key":"e_1_3_1_6_2","unstructured":"C. Chio and D. Freeman. 2018. Machine Learning and Security- Protecting System With Data and Algorithms . O\u2019Relliy Media Inc. https:\/\/mlsec.net\/."},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100514"},{"key":"e_1_3_1_8_2","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00023","volume-title":"2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE)","author":"Hamad Salma Abdalla","year":"2019","unstructured":"Salma Abdalla Hamad, W. Zhang, Quan Z. Sheng, and Surya Nepal. 2019. IoT device identification via network-flow based fingerprinting and learning. 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/13th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE) (2019), 103\u2013111."},{"key":"e_1_3_1_9_2","article-title":"Federated optimization: Distributed optimization beyond the datacenter","volume":"1511","author":"Konecn\u00fd Jakub","year":"2015","unstructured":"Jakub Konecn\u00fd, Brendan McMahan, and Daniel Ramage. 2015. Federated optimization: Distributed optimization beyond the datacenter. CoRR abs\/1511.03575 (2015).","journal-title":"CoRR"},{"key":"e_1_3_1_10_2","volume-title":"Proceedings of the NIPS Workshop on Private Multi-party Machine Learning","author":"Konecn\u00fd Jakub","year":"2016","unstructured":"Jakub Konecn\u00fd, H. Brendan McMahan, Felix X. Yu, Peter Richtarik, Ananda Theertha Suresh, and Dave Bacon. 2016. Federated learning: Strategies for improving communication efficiency. In Proceedings of the NIPS Workshop on Private Multi-party Machine Learning. Retrieved from https:\/\/arxiv.org\/abs\/1610.05492."},{"key":"e_1_3_1_11_2","first-page":"76","volume-title":"Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS\u201920)","author":"Kotak Jaidip","year":"2021","unstructured":"Jaidip Kotak and Yuval Elovici. 2021. IoT device identification using deep learning. In Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS\u201920). Springer International Publishing, Cham, 76\u201386."},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCEM50674.2020.00021"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT.2017.8256809"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0027"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737455"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2946500"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900506"},{"key":"e_1_3_1_18_2","series-title":"Proceedings of the 20th International Conference on Artificial Intelligence and Statistics","first-page":"1273","volume":"54","author":"McMahan Brendan","year":"2017","unstructured":"Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2017. Communication-efficient learning of deep networks from decentralized data. In Proceedings of the 20th International Conference on Artificial Intelligence and Statistics(Proceedings of Machine Learning Research, Vol. 54). PMLR, 1273\u20131282. Retrieved from https:\/\/proceedings.mlr.press\/v54\/mcmahan17a.html."},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2018.03367731"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019878"},{"key":"e_1_3_1_21_2","article-title":"Detection of unauthorized IoT devices using machine learning techniques","author":"Meidan Y.","year":"2017","unstructured":"Y. Meidan, M. Bohadana, A. Shabtai, M. Ochoa, N. O. Tippenhauer, J. D. Guarnizo, and Y. Elovici. 2017. Detection of unauthorized IoT devices using machine learning techniques. CoRR abs\/1709.04647 (2017).","journal-title":"CoRR abs\/1709.04647"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.283"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885429"},{"key":"e_1_3_1_24_2","unstructured":"NASA. 2019. Cybersecurity Management and Oversight at the Jet Propulsion Laboratory (Report No. IG-19-022). Retrieved from https:\/\/oig.nasa.gov\/docs\/IG-19-022.pdf."},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3302505.3310073"},{"key":"e_1_3_1_26_2","article-title":"AuDI: Toward autonomous IoT Device-type Identification using periodic communication","volume":"37","author":"Miettinen T. D. Nguyen, A. Sadeghi, S. Marchal, M.","year":"2019","unstructured":"T. D. Nguyen, A. Sadeghi, S. Marchal, M. Miettinen, and N. Asokan. 2019. AuDI: Toward autonomous IoT Device-type Identification using periodic communication. IEEE J. Select. Areas Commun. 37 (2019).","journal-title":"IEEE J. Select. Areas Commun."},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243796"},{"key":"e_1_3_1_28_2","article-title":"No radio left behind: Radio fingerprinting through deep learning of physical-layer hardware impairments","volume":"6","author":"Sankhe Kunal","year":"2020","unstructured":"Kunal Sankhe, Mauro Belgiovine, Fan Zhou, Luca Angioloni, Francesco Restuccia, Salvatore D\u2019Oro, Tommaso Melodia, Stratis Ioannidis, and Kaushik Chowdhury. 2020. No radio left behind: Radio fingerprinting through deep learning of physical-layer hardware impairments. IEEE Trans. Cogn. Commun. Netw. 6 (2020).","journal-title":"IEEE Trans. Cogn. Commun. Netw."},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2019.8737463"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2866249"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47426-3_27"},{"key":"e_1_3_1_32_2","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/978-3-642-41822-8_15","volume-title":"Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications","author":"Song Chunfeng","year":"2013","unstructured":"Chunfeng Song, Feng Liu, Yongzhen Huang, Liang Wang, and Tieniu Tan. 2013. Auto-encoder based data clustering. In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Springer Berlin Heidelberg, Berlin, Heidelberg, 117\u2013124."},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3128646"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC54503.2022.9720739"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/MASSW.2019.00009"},{"key":"e_1_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90196-7_1"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.013"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3298981"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2019.8802783"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354240"}],"container-title":["ACM Transactions on Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603257","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3603257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:49:11Z","timestamp":1750286951000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3603257"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7,25]]},"references-count":39,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,8,31]]}},"alternative-id":["10.1145\/3603257"],"URL":"https:\/\/doi.org\/10.1145\/3603257","relation":{},"ISSN":["2691-1914","2577-6207"],"issn-type":[{"value":"2691-1914","type":"print"},{"value":"2577-6207","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,7,25]]},"assertion":[{"value":"2021-12-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-17","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-07-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}