This section discusses various categories of artificial intelligence, including machine learning and deep learning, used to recognize authenticated devices.
3.3. Reinforcement Learning(RL)
Reinforcement learning (RL) is a key technology for enhancing IoT device authentication due to its adaptive learning capabilities. By utilizing RL algorithms, systems gain knowledge through interactions with the environment, which autonomously improves security mechanisms over time [
47]. RL enables a response to evolving IoT threats, allowing for better adaptation to dynamic security challenges.
According to [
28], RL is effective for real-time anomaly detection, as it identifies unusual patterns that may indicate potential security attacks. Moreover, authors in [
28] state that RL outperforms traditional ML models in detecting malware on IoT devices due to its inherent adaptability. RL-based authentication can be implemented as devices learn from their environments without requiring prior training data.
Additionally, RL can be applied in intrusion detection systems (IDS) and adaptive honeypots, both of which can utilize this technology to defend against attacks and malicious behavior. Furthermore, RL can assist in interoperability by determining how to communicate with poorly documented devices [
47] .
Table 5 provides a side-by-side comparison of reinforcement learning-based authentication in IoT devices, explaining their merits as well as the specific deficiencies and security concerns that each poses as the IoT environment becomes more heterogeneous and dynamic. A study by [
48]examined the effectiveness of Dynamic Q learning with the Double Estimation Strategy (DES DRL) for changing authentication challenges based on context-related risks as they arise. Based on the G-Mean, the approach is highly accurate, with a specificity of 92.62% for categorizing authentication requests, while the DES DRL captures most of the true positives as well. To adapt to changing threat scenarios, the system is designed to retrain every 1000 observations. However, the system requires a substantial computing resources [
48], since offline training takes approximately 130 seconds and convergence demands around 6,000 samples (one week). With a factor of
and a
value set to 1, the model still displays susceptibility to familiar threats, particularly from trusted users such as coworkers. To maintain privacy, data processing occurs directly on the device, thereby reducing the risk of exposing sensitive information.
In [
47], the authors investigated the use of real-time learning for optimizing IoT device interaction sequences. The system aimed to achieve Goal 1 in two steps and Goal 2 in four steps after 400 interactions. Although the approach converges quickly to more complex goals in some situations, it becomes more complicated as more commands are added (approximately 100-600 commands are required to reach Goal 2). Moreover, the system operates under a rate limit, resulting in delays of about 40 minutes for every 100 episodes. Among the main security issues identified are the interoperability of poorly documented protocols and the risk of adversaries exploiting the learned state machine to manipulate protocol states maliciously.
In [
49], the authors present a hybrid deep learning (DL) and reinforcement learning (RL)-based authentication framework designed for use in heterogeneous IoT environments. Several experiments have demonstrated that the model supports a wide range of IoT applications with high accuracy and effectiveness. However, this method lacks generalization to real-world scenarios and specific metrics for evaluating accuracy that are necessary for practical implementation.In addition to data integrity threats (e.g., data tampering), device heterogeneity creates significant authentication challenges. Furthermore, the increased complexity introduced by the model processing mechanisms heightens the potential for DoS attacks.
In [
50], the authors develop an adaptive
-greedy RL approach that updates the exploration-exploitation parameter (
) based on the volume of observed attacks. In terms of packet delivery ratio (PDR), the system can successfully handle both static and dynamic data sources, achieving a PDR of 1.0 for non-traffic and 0.929 for malicious traffic at 160 units. Although its end-to-end (E2E) delay increased to 1489.474 ms for malicious traffic at 40 units, it only increased to 1177.795 ms for normal traffic. This delay may adversely affect time-critical IoT applications. A proxy user attack occurs when a third party exploits a secured user identity and impersonates an entity.In contrast,a black hole attack involves malignant nodes dropping packets at the network layer. Additionally, IoT devices have limited memory and computational capacity, making the processing of high attack volumes particularly challenging.
According to [
51], a hybrid RL model is presented to address internal threats by using elliptic curve cryptography (ECC) and Lightweight Directory Access Protocol (LDAP). By using the nonces
and
, the system ensures that no plain text data is exchanged, which maintains data confidentiality. Although the setup is robust, the authentication process is expensive, taking more than 72 hours to authenticate 1000 users in a Jupyter notebook with the parameter choices (
–
and
–
). IoT devices with resource constraints are not suitable for this type of system. Even if the nonces are exposed in some way, the model still provides a high level of security, though man-in-the-middle attacks are not impossible. Additionally, if LDAP or ECC fail, the attacker remains an insider, and certain vulnerabilities may go unaddressed, such as spoofing and replay attacks.
In combination, the studies reported in Table 5 illustrate the potential of RL for IoT device authentication by providing solutions that are flexible, data-driven, and responsive to emerging security threats. It is important to note that the proposed implementations have some limitations as well—for instance, they use expensive computation curves, have relatively slow response times, and are not foolproof against advanced attacks. Based on these limitations, additional research is required to improve these approaches for the practical deployment of resource-constrained IoT systems. To fully leverage RL-based IoT authentication systems, it will be crucial to keep pace with advancements in RL and security. Hopes and challenges for enhancing IoT authentication systems are highlighted by RL.
3.4. IoT Device Authentication Using DL
Deep learning (DL) algorithms employ a multi-level neural network that uses numerous nonlinear processing layers so that the representation of the data learned is learned on the basis of the use of layers determined by a deep learning procedure to find patterns of any data outputs. DL approaches are noted to be a robust method for many contexts in image recognition to categorize images for convolutional neural networks (CNNs),general classification tasks for artificial neural networks (ANNs), and for sequential data such as speech and text for recurrent neural networks (RNN). The ability of DL techniques to learn complexity makes them suitable for IoT systems due to the volume of data and the advanced representation of data on a global scale, and now we’re beginning to see improvements around complex representation of data to help in the security of IoT systems including authentication [
52].
Neural Networks: Neural networks,consisting of interconnected neurons, are an effective tool for authenticating IoT devices. These networks process and analyze data, recognizing patterns and making decisions based on input. By adjusting connections and weights, neural networks learn from data and improve performance over time, making them particularly useful for verifying device identity in resource-constrained environments.
Neural networks can acquire data by inspecting radio frequency signals and analyzing device operability to distinguish between legitimate devices and security threats, according to [
53]. They demonstrate significant capabilities in maintaining IoT network integrity due to their adaptability and learning potential. In [
53] , the authors propose a unique authentication method for remote wireless devices based on self-organizing feature maps (SOFMs), a type of neural network designed to characterize RF fingerprint signatures.
To collect raw RF data, they built an experimental testbed that satisfies the essential requirement for IoT device authentication, particularly among the less secure, low-cost, long-range technologies in use today, such as LoRa. A unique SOFM algorithm was employed to pre-process the RF data and interpret the highly correlated signals into real-time RF fingerprint patterns. To determine the actual classification and authentication of each device, they integrated those patterns into CNNs. The results of their study showed nearly 100 per cent accuracy in identifying LoRa devices at an individual device level using a standard PC CPU; therefore, the novel method demonstrated considerable computational efficiency, leading to significant improvements in RF cyber-physical security.
The authors in [
54] propose a Process-based Pattern Authentication (PPA) method to improve the security of Internet of Things (IoT) devices by using dynamic pattern generation for authentication and touch pattern modelling with the help of an ANN network. Specific authentication patterns for each login session are created during the PPA process by combining user-input information (R-code) and the server-generated challenge (P-code), resulting in a Pass-code
The ANN performs touch dynamics analysis by measuring pressure and velocity parameters to achieve accurate user identification and authentication. It is trained on a database of 29,008 samples from 35 users, reaching a classification accuracy of 99.75%, a false rejection rate (FRR) of 5.03%, and a false acceptance rate (FAR) of 4.36%. Capable of preventing attacks such as shoulder surfing and smudge attacks, the PPA system provides a highly secure environment for IoT devices.
CNN: Convolutional Neural Networks
CNNs function as deep learning algorithms that utilise multiple processing layers to learn data representations and analyse patterns. They employ sparse interactions, parameter sharing, and equivariant representations to decrease the number of data parameters compared to traditional artificial neural networks (ANN). CNN architectures vary, consisting of cascading convolutional and pooling layers organised with multiple filters for convolving data parameters. The pooling layers typically perform down-sampling, resulting in smaller subsequent layers that may use maximum pooling or average pooling across a range of layers. Internally, the features include a key component called the activation unit, also known as the activation function, which applies a non-linear activation operation—most commonly the rectified linear unit (ReLU)—to the features [
52].
In [
55], the authors use a Convolutional Neural Network (CNN) to improve physical layer authentication in wireless communications. Specifically, the CNN depends on a Data-Adaptive Matrix (DAM) that incorporates channel statistics that change over time. It consists of two convolutional layers with 2×2 kernels and ReLU activation, two max-pooling layers with 2×2 kernels, and a final fully connected layer with a logistic activation function for classification. The detection rate of the CNN was 100% when SNRs were 6 db and higher, and 95.89% when the SNR was 4 db. Research findings show that the CNN yields superior results compared to GMM and SVM in detecting spoofing attacks in dynamic system environments.
The authors in [
56] discuss EENet-Lite, a lightweight early-exit CNN that uses whuGAIT IoT data and incorporates authentication methods based on gait recognition for IoT devices. The model features early-exit branches and specialized loss functions to balance accuracy and efficiency. It achieves an accuracy of over 85.00% while reducing multiplications, additions, and relational operations (MAC) by a factor of 5.9 compared to traditional deep neural networks (DNNs).
Additionally, the model supports intermittent computing through checkpointing, which enables it to save up to 34% of redundant computations. EENet-Lite also has between 166.67 and 357-times fewer parameters than ResNet-based models, making it well-suited for deployment on low-power platforms with limited memory.
The study in [
57] describes a new IoT authentication mechanism based on EEG signals (via a NeuroSky MindWave headset) and hand gestures (via a lightweight CNN) to meet one of the requirements of 92% effectiveness and 93% efficiency involving 30 subjects. The EEG signals are processed to determine a binary based on the levels of attention and meditation over time, using adaptive thresholds, and can generate up to 200 possible values for each bit.
For the hand gestures, we define three gestures: closed hand, open hand, and raised index finger. In total, there are four states related to the authentication process, each involving one of the hand gestures and the transitions between them, all implemented on a Raspberry Pi. The system achieves user satisfaction deemed acceptable based on the satisfaction assessment, with an average authentication time of 33 seconds when measuring a 4-bit key.
The security analysis indicated that the 4-bit EEG password was 4.3 times stronger than a 4-symbol ASCII password and that EEG signals could resist physical observation and impersonation threats. The work demonstrates that Deep Learning (CNN) can be used as a method for gesture recognition with IoT devices in a way that adheres to compatibility standards for authentication mechanisms as a security priority.
RNN: Recurrent Neural Networks
Recurrent neural networks (RNNs) are a class of Deep Learning algorithms developed to work with sequences of data. The prediction in these neural networks relies on current and past inputs. RNNs have a time layer that encodes temporal data; therefore, they can learn complex changes in their recurrent hidden units [
52].
In [
58], the authors developed an ECG-based authentication system for IoT devices using a deep recurrent neural network (DRNN) architecture, which applied a bidirectional and late fusion approach. The data to be authenticated in this study are ECG signals, which they processed with derivative and moving average filters. They segmented the ECG data using the detected R-peaks to create fixed-length input windows for real-time performance.
They evaluated their model using two open datasets, the MIT-BIH Normal Sinus Rhythm Database (NSRDB) and the MIT-BIH Arrhythmia Database (MITDB). The authors reported 100% precision, 100% recall, 100% accuracy, and an F1-score of 1.0 from NSRDB; and from MITDB they reported 99.8% precision, 99.8% recall, 99.8% accuracy, and an F1-score of 0.99. The authors demonstrated that the DRNN had high efficacy and reliability in delivering accurate and efficient real-time authentication in the IoT context.
The research in [
59] presents an RNN-based model for anomaly detection in UAV sensor data that classified a pavement with 99.7% accuracy in detecting anomalies in north speed and up to 100% for pneumatic lifting speed anomalies. The analysis was based on real UAV flight data, with 60% used for training and the remaining 40% for testing. The model was trained solely on normal data to identify anomalies with 99
The north speed had a false negative rate of 7.7%, and pneumatic lifting had a false negative rate of 0.0%, with neither showing any false positives. Overall, these results demonstrated that the model performed well and offered strong extrapolation. Furthermore, it presents an intelligent model based on time-series data that could be utilised in behavioral authentication within IoT-based systems using RNN architectures.
LSTM: Long Short-Term Memory network
The Long Short-Term Memory network (LSTM) uses a recurrent neural network structure to solve the gradient vanishing problem and improve its ability to learn sequential patterns in data. LSTMs are vital in enhancing the security and dependability of IoT systems by offering strong methods for detecting and identifying rogue or compromised devices.
The research studies [
52,
60] demonstrate the critical role of Recurrent Neural Networks (RNNs), especially Long Short-Term Memory (LSTM) networks, in improving Internet of Things (IoT) security through advanced authentication techniques .In source [
52],the authors discuss how LSTMs are used in network traffic analysis to detect malicious activity by accurately classifying network flows, highlighting their potential in real-time threat detection. Conversely, authors in [
60] presents an LSTM-based classifier in the IoT gateway for authenticating device-originated signals and defending against data injection attacks. Their method achieves high detection accuracy with minimal latency and processing costs, as shown through simulations modelling LoRa transmitters and embedded watermarks. The flexibility of LSTMs is clear from these outcomes, as they deliver IoT security solutions both at the network and device levels, forming an integrated defence system.
The authors in [
61] employed the LSTM Deep Learning technique to predict security attacks targeting MQTT-based Internet of Things (IoT) networks. A KDDCUP99 MQTT dataset was used to train the model with various attack types, including DDOS, DoS, Bot, BruteForce, and Infiltration. Initially, LSTM outperformed other algorithms with an accuracy of 78.2%. After adjusting hyperparameters, it reduced misclassification with Glove embedding and employing other strategies, the final LSTM model was able to predict these cyber-attacks within the IoT environment with a peak accuracy of 87%.
The authors in [
62] propose LSTM-Gauss-NBayes, an anomaly detection technique for large-scale Industrial Internet of Things (IIoT) time-series data generated by millions of heterogeneous sensors. The core idea is that an LSTM-NN can be trained exclusively on normal data, then used to predict future observations based on this training. The difference between actual data and predicted data, known as a time point error, is then fed into a Gaussian Naive Bayes model to classify data points as either normal or abnormal relative to the LSTM-NN forecast.
The method was evaluated using three real-world datasets (Power, Loop Sensor, Land Sensor) and outperformed competitor models, achieving an average precision of 0.955 and recall of 0.956. In the results for the Power dataset, their reported precision was 0.980 and recall 0.974. Once abnormal scenarios are identified in the IIoT space through anomaly detection methods, the output can help determine periods of anomalies by highlighting when irregular data might have occurred—either due to an unauthenticated, non-compliant unregistered device, or because a registered device has been compromised and is beginning to inject altered data into the overall IIoT data system.
The [
63] authors introduce DeepAuthen, a deep learning-based framework for continuous user authentication using mobile sensor data. The DeepAuthen framework employs a hybrid approach combining CNN and LSTM architectures to create a DeepConvLSTM model that analyzes activity patterns from accelerometer, gyroscope, and magnetometer data across three benchmark datasets: UCI-HAR, WISDM-HARB, and HMOG.
After filtering, normalization, and segmentation into overlapping time windows, the model employs CNN layers to capture spatial features and LSTM layers to learn temporal dependencies. DeepAuthen achieves state-of-the-art performance, reaching up to 99.99% accuracy and 0.01% EER for some HMOG activities, demonstrating its potential for smartphone user authentication.
Deep learning methods produce significant results for IoT device authentication systems because of their ability to extract advanced features and achieve high accuracy in authentication processes. Therefore, it is vital to prioritise addressing major challenges, including computational demands, reliance on data, and environmental vulnerabilities.
Table 6 summarizes studies that review deep learning (DL) approaches for IoT device authentication. The techniques are highly accurate, robust, and scalable across a wide range of IoT contexts. Although these methods exhibit great potential, they have several critical shortcomings, including high computational complexity, vulnerability to adversarial attacks, and low efficiency in dynamic or resource-constrained environments. The following discussion breaks these down in terms of their advantages, disadvantages, and security risks.
Research on IoT authentication using 2D-CNN, biLSTM, and 3D- CNN coherent blocks to identify deep temporal patterns (DTPs) showed 96.7% accuracy and high robustness, especially when analyzing 3D-DTP), as well as fast processing across all cases [
20].However, these models are computationally intensive, making them unsuitable for constrained IoT devices with short signal sequences. Moreover, their security is vulnerable due to risks such as spoofing, denial-of-service attacks, and data poisoning in adversarial environments [
20]. The deployment of LSTM models for IoT device authentication has increased because they better model sequences and temporal dependencies than other models. Their high noise resistance and protocol-agnostic performance enabled them to achieve 99.58% accuracy under LOS (line-of-sight) conditions [
64].Nevertheless, accuracy drops to 88% in non-line-of-sight (NLOS) scenarios, highlighting a weakness when the base station is controlled, allowing arbitrary traffic switching by an adversary [
64].
In [
54],ANNS have been studied as a passive authentication measure based on touch dynamics and mental calculations. Mental calculations involve a user performing arithmetic with their registered R-code digits and the P-code digits provided by the server. The user constructs their pass-code digits to authenticate based on their touch pattern to enter their code. With this method, the false rejection and false acceptance rates (FRR and FAR) are reduced to 5.03% and 4.36%, respectively, significantly lowering shoulder-surfing risks without additional hardware [
54].However, this approach requires 30 to 40 login attempts for training, leading to lengthy initial setup times and potential data compromise during the training process [
54].
Adaptive ANN models have been demonstrated to adapt dynamically to environmental changes, achieving 100% detection for all SNRs above 6 db and 95% detection for SNRs below 4 db [
55].However, the performance of existing models declines in low SNR conditions, making adaptive ANN models vulnerable to adverse channel conditions and interference [
55].
CNN-based models have been widely utilized for RF feature extraction, achieving accuracy comparable to previous state-of-the-art methods, with improvements of at least 10-15% in most cases.CNN models can scale for both small and large IoT networks; however, they require
samples for training, which entails significant computational cost [
52,
65,
66,
67].Additionally,CNN models are vulnerable to adversarial attacks and privacy issues.
An adversary can compromise authentication results by manipulating the input data [
52,
65,
66,
67].The performance of LSTM-based systems for traffic analysis in time-series has demonstrated usable accuracy (92%) and good sensitivity to changing attack patterns [
52,
65,
67]. However, these LSTM-based systems create about 50-100ms of latency in real-time scenarios and require repeated training, which diminishes the system’s value. Additionally, they have experienced a 30% false-negative rate when attempting to detect zero-day attacks, indicating potential vulnerability to poisoning attacks or other types of unknown attacks [
52,
65,
67].
Based on the results of combining anomaly detection with autoencoders for IoT networks, it has been found that state-of-the-art accuracy can be achieved at 95% recall rates with a 10% reduction in false positives compared to traditional techniques [
65,
66,
67]. In contrast, these approaches have large data storage requirements (i.e.,>10 GB) and can produce error rates of 15-20% when faced with these changing dynamics. Additionally, the systems were unable to detect more than 60% of zero-day attacks, indicating that they were ineffective against unknown attack scenarios [
65,
66,
67].
DNNs have also been studied for the purpose of multi-device authentication, achieving performance of over 90% accuracy with limited preprocessing methods DNNs have also been examined for multi-device authentication, achieving accuracy rates over 90% with limited preprocessing techniques [
52,
65,
67]. However, DNNs consume more energy, averaging between 100 and 500 mW, and are particularly susceptible to overfitting when limited feature data is available. Notably, DNN accuracy decreased by 25% during adversarial attacks, further highlighting its limited viability in hostile environments [
52,
65,
67].
RNNs showed 88% accuracy in modelling temporal traffic patterns and were compatible with over 1000 devices [
52,
66,
67].Conversely, RNNs are prone to gradient-related issues that may limit their convergence or performance, making them unsuitable for low-memory devices. Additionally, RNNs exhibited a 50% zero-day detection error rate, indicating they are not resilient to suggested inputs [
52,
67].
Federated Learning (FL) decreases privacy risks by 80%, while providing decentralized IoT authentication for over 103 devices [
65,
66,
67].However, FL encounters latency issues with heterogeneous data (20-50 ms), affecting performance. There is also a risk of data poisoning attacks in FL, which could reduce accuracy by 15% if encryption protocols are not implemented [
65,
66,
67].
CNN-based systems that utilize Channel State Information (CSI) have demonstrated a higher true positive rate (TPR) of 99.64% [
68,
69]. However, they require 5145 packets for dual-input CNNs and exhibit substantial computational overhead, especially for ResNet50 models, which have
parameters. Additionally, model accuracy continues to decline as the distance between devices and the number of concurrent users increases [
68] [
69].
Dynamic watermarking and LSTM models have demonstrated promising performance by detecting attacks within 0.1 seconds and attaining a bit error rate (BER) of 0.001, compared to 0.03 for static watermarking at
[
60].Although this method involves high computation and longer training times, it becomes ineffective if an adversary replicates the signal’s spectral properties [
60].In a CNN-SVM hybrid model with VMD and Tri-Training, 95.01% accuracy was achieved, with a 99.90% success rate for imitation attacks [
70]. However, this increases authentication time and battery consumption, making it unsuitable for IoT devices with limited power sources.
Additionally, privacy concerns remain due to a 0.10% success rate of imitation attacks, indicating that further improvements are needed [
70].Finally, ADN models, CNNs, and autoencoders were employed to enhance IoT security, achieving 94.8% accuracy in botnet detection and 99.9% accuracy in fall detection [
71].One limitation of their work is that the model had issues with fading channels and latency in dynamic environments. Moreover, their approach would not be resistant to Trojan-based attacks, which could compromise its effectiveness against complex malware [
71].
In Table 6, the research studies presented and organized demonstrate the significant potential of DL approaches for advancing IoT device authentication. However, the aforementioned frameworks face serious challenges due to their high computational costs, adversarial attacks, and poor performance in dynamic environments. To further promote the security and reliability of IoT authentication frameworks, future research should focus on optimizing computational costs, enhancing adversarial resilience, and improving the ability to detect zero-day attacks.