Clustering of IoT Devices Using Device Profiling and Behavioral Analysis to Build Efficient Network Policies

The Internet of Things (IoT) has emerged as a new paradigm, and billions of devices are connected with the internet. IoT is being penetrated in major domains of daily life like health care, agriculture, industry, smart homes and monitoring of the environment. The operator of such complex, huge and d...

Full description

Bibliographic Details
Main Authors: Muhammad Hamza, Syed Mashhad M. Geelani, Qamar Nawaz, Asif Kabir, Isma Hamid
Format: Article
Language:English
Published: Mehran University of Engineering and Technology 2021-04-01
Series:Mehran University Research Journal of Engineering and Technology
Online Access:https://publications.muet.edu.pk/index.php/muetrj/article/view/2086
Description
Summary:The Internet of Things (IoT) has emerged as a new paradigm, and billions of devices are connected with the internet. IoT is being penetrated in major domains of daily life like health care, agriculture, industry, smart homes and monitoring of the environment. The operator of such complex, huge and diverse heterogeneous networks may not even be fully aware of their IoT devices working, activity, behavior and resource utilization etc. The efficient management of IoT devices becomes a challenge for network managers to ensure smooth network operation. Network traffic analysis of IoT devices is a necessary and rudimentary tool to understand the behavior of devices. In this paper firstly, we identify insights of device network traffic, discuss the activity patterns of some IoT devices and present a visual description of the pattern of IoT devices. Secondly, after analyzing the device's behavior, we build and demonstrate a profile of each device based on its activity cycle and traffic patterns information. Thirdly, the K-Means clustering algorithm is used to make clusters of IoT devices using their profile information. The clustering algorithm groups similar devices in a single group. The obtained results clearly describe the patterns of devices which help the network managers to make appropriate network policies for efficient secure network management.
ISSN:0254-7821
2413-7219