{"id":"https://openalex.org/W4410226749","doi":"https://doi.org/10.1109/access.2025.3568673","title":"IoT Device Identification Techniques: A Comparative Analysis for Security Practitioners","display_name":"IoT Device Identification Techniques: A Comparative Analysis for Security Practitioners","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4410226749","doi":"https://doi.org/10.1109/access.2025.3568673"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3568673","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3568673","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3568673","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065826523","display_name":"Ashley Andrews","orcid":"https://orcid.org/0000-0001-8657-3448"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Ashley Andrews","raw_affiliation_strings":["Department of Electrical, Electronic and Mechanical Engineering, University of Bristol, Merchant Venturers Building, Bristol, U.K","University of Bristol, Bristol, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0001-8657-3448","affiliations":[{"raw_affiliation_string":"Department of Electrical, Electronic and Mechanical Engineering, University of Bristol, Merchant Venturers Building, Bristol, U.K","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"University of Bristol, Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072981915","display_name":"George Oikonomou","orcid":"https://orcid.org/0000-0002-1684-6989"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"George Oikonomou","raw_affiliation_strings":["Department of Electrical, Electronic and Mechanical Engineering, University of Bristol, Merchant Venturers Building, Bristol, U.K","University of Bristol, Bristol, United Kingdom"],"raw_orcid":"https://orcid.org/0000-0002-1684-6989","affiliations":[{"raw_affiliation_string":"Department of Electrical, Electronic and Mechanical Engineering, University of Bristol, Merchant Venturers Building, Bristol, U.K","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"University of Bristol, Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082279856","display_name":"Simon Armour","orcid":"https://orcid.org/0009-0008-6319-9789"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Simon Armour","raw_affiliation_strings":["Department of Electrical, Electronic and Mechanical Engineering, University of Bristol, Merchant Venturers Building, Bristol, U.K","University of Bristol, Bristol, United Kingdom"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical, Electronic and Mechanical Engineering, University of Bristol, Merchant Venturers Building, Bristol, U.K","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"University of Bristol, Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Paul Thomas","orcid":"https://orcid.org/0009-0003-5538-0338"},"institutions":[{"id":"https://openalex.org/I36234482","display_name":"University of Bristol","ror":"https://ror.org/0524sp257","country_code":"GB","type":"education","lineage":["https://openalex.org/I36234482"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Paul Thomas","raw_affiliation_strings":["Department of Electrical, Electronic and Mechanical Engineering, University of Bristol, Merchant Venturers Building, Bristol, U.K","University of Bristol, Bristol, United Kingdom"],"raw_orcid":"https://orcid.org/0009-0003-5538-0338","affiliations":[{"raw_affiliation_string":"Department of Electrical, Electronic and Mechanical Engineering, University of Bristol, Merchant Venturers Building, Bristol, U.K","institution_ids":["https://openalex.org/I36234482"]},{"raw_affiliation_string":"University of Bristol, Bristol, United Kingdom","institution_ids":["https://openalex.org/I36234482"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038672273","display_name":"Thomas Cattermole","orcid":"https://orcid.org/0009-0001-2069-4922"},"institutions":[{"id":"https://openalex.org/I4210092297","display_name":"Ulverscroft (United Kingdom)","ror":"https://ror.org/00p3nsd37","country_code":"GB","type":"company","lineage":["https://openalex.org/I4210092297"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Thomas Cattermole","raw_affiliation_strings":["Tiberos Research, Bencroft, Ware, U.K","Tiberos Research, London, United Kingdom"],"raw_orcid":"https://orcid.org/0009-0001-2069-4922","affiliations":[{"raw_affiliation_string":"Tiberos Research, Bencroft, Ware, U.K","institution_ids":["https://openalex.org/I4210092297"]},{"raw_affiliation_string":"Tiberos Research, London, United Kingdom","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5065826523"],"corresponding_institution_ids":["https://openalex.org/I36234482"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.5506,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.88527108,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":"13","issue":null,"first_page":"82610","last_page":"82620"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9829999804496765,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9829999804496765,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7180104851722717},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.636711835861206},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4515220522880554}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7180104851722717},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.636711835861206},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4515220522880554},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/access.2025.3568673","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3568673","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire/c6a8beb2-1670-4d58-b2c1-58be7ba48743","is_oa":true,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/c6a8beb2-1670-4d58-b2c1-58be7ba48743","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Andrews, A, Oikonomou, G, Armour, S M D, Thomas, P & Cattermole, T 2025, 'IoT Device Identification Techniques : A Comparative Analysis for Security Practitioners', IEEE Access, vol. 13, 3568673, pp. 82610-82620. https://doi.org/10.1109/ACCESS.2025.3568673","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:54437491aaa141ebb5c42b71a40d6a1f","is_oa":true,"landing_page_url":"https://doaj.org/article/54437491aaa141ebb5c42b71a40d6a1f","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 82610-82620 (2025)","raw_type":"article"},{"id":"pmh:oai:research-information.bris.ac.uk:publications/c6a8beb2-1670-4d58-b2c1-58be7ba48743","is_oa":true,"landing_page_url":"https://hdl.handle.net/1983/c6a8beb2-1670-4d58-b2c1-58be7ba48743","pdf_url":null,"source":{"id":"https://openalex.org/S7407055359","display_name":"Explore Bristol Research","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Andrews, A, Oikonomou, G, Armour, S M D, Thomas, P & Cattermole, T 2025, 'IoT Device Identification Techniques : A Comparative Analysis for Security Practitioners', IEEE Access, vol. 13, 3568673, pp. 82610-82620. https://doi.org/10.1109/ACCESS.2025.3568673","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3568673","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3568673","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":77,"referenced_works":["https://openalex.org/W1978973474","https://openalex.org/W2065085533","https://openalex.org/W2574448563","https://openalex.org/W2621148797","https://openalex.org/W2735618023","https://openalex.org/W2768718335","https://openalex.org/W2799968554","https://openalex.org/W2887149310","https://openalex.org/W2888096149","https://openalex.org/W2888505697","https://openalex.org/W2889246729","https://openalex.org/W2895909303","https://openalex.org/W2900235511","https://openalex.org/W2901321248","https://openalex.org/W2905724129","https://openalex.org/W2912944782","https://openalex.org/W2921669466","https://openalex.org/W2922333605","https://openalex.org/W2928689123","https://openalex.org/W2944968054","https://openalex.org/W2950767885","https://openalex.org/W2953381066","https://openalex.org/W2961816263","https://openalex.org/W2967569942","https://openalex.org/W2970180303","https://openalex.org/W2977752193","https://openalex.org/W2980558733","https://openalex.org/W2982540247","https://openalex.org/W2994639670","https://openalex.org/W3005645561","https://openalex.org/W3008916115","https://openalex.org/W3010664548","https://openalex.org/W3012929965","https://openalex.org/W3015181824","https://openalex.org/W3028495510","https://openalex.org/W3031385726","https://openalex.org/W3043781642","https://openalex.org/W3045680488","https://openalex.org/W3045795781","https://openalex.org/W3046098070","https://openalex.org/W3046125599","https://openalex.org/W3047208927","https://openalex.org/W3048094199","https://openalex.org/W3082060673","https://openalex.org/W3084997812","https://openalex.org/W3092066520","https://openalex.org/W3094149426","https://openalex.org/W3095838287","https://openalex.org/W3096391524","https://openalex.org/W3096708903","https://openalex.org/W3108225283","https://openalex.org/W3120036043","https://openalex.org/W3125731384","https://openalex.org/W3130068540","https://openalex.org/W3134299719","https://openalex.org/W3167826121","https://openalex.org/W3203798886","https://openalex.org/W3209255507","https://openalex.org/W4205758417","https://openalex.org/W4211068754","https://openalex.org/W4214863110","https://openalex.org/W4220805132","https://openalex.org/W4224939103","https://openalex.org/W4245316679","https://openalex.org/W4286521366","https://openalex.org/W4307941479","https://openalex.org/W4324267469","https://openalex.org/W4324267471","https://openalex.org/W4378904838","https://openalex.org/W4385329470","https://openalex.org/W4388925691","https://openalex.org/W4399154704","https://openalex.org/W6744392808","https://openalex.org/W6773084380","https://openalex.org/W6782012779","https://openalex.org/W6799282780","https://openalex.org/W7048512237"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"As":[0],"the":[1,139,178,198,205,239,249,252,278],"Internet":[2],"of":[3,52,180],"Things":[4],"(IoT)":[5],"continues":[6],"to":[7,20,55,66,110,124,141,163,218,264,281,288,291],"grow,":[8],"networks":[9,185,294],"are":[10,25,94,155,230],"increasingly":[11],"at":[12],"risk":[13],"from":[14],"vulnerable":[15,76],"devices":[16,29,31,42,72,77,183],"that":[17,36,89,207],"allow":[18,209],"access":[19],"attackers.":[21],"Two":[22],"particular":[23,229],"threats":[24],"posed":[26],"by":[27],"rogue":[28],"(i.e.":[30],"present":[32],"on":[33,73,165],"a":[34,74,108,126,173,210,244],"network":[35,82,188],"should":[37],"not":[38,106,157],"be)":[39],"and":[40,68,104,131,161,213,232,258,266,276,286,295],"unpatched":[41],"(devices":[43],"with":[44],"out-of-date":[45],"software":[46],"or":[47,151],"firmware).":[48],"A":[49],"growing":[50],"body":[51],"research":[53,133],"attempts":[54],"address":[56],"these":[57,225,236],"risks:":[58],"automated":[59],"IoT":[60,71,98,135,182],"device":[61,99,136],"identification.":[62],"By":[63],"using":[64,186],"methods":[65],"quickly":[67],"easily":[69],"identify":[70],"network,":[75],"can":[78,208,261],"be":[79,219,262],"identified,":[80],"improving":[81],"security.":[83],"Although":[84],"there":[85],"have":[86],"been":[87],"publications":[88,193],"survey":[90],"this":[91,121],"research,":[92],"they":[93,260,297],"typically":[95],"broad,":[96],"discussing":[97],"identification":[100],"only":[101],"in":[102,120,184,191,228,235],"passing,":[103],"do":[105],"provide":[107,125,172],"methodology":[109,128],"clearly":[111],"compare":[112,267,282],"existing":[113],"(or":[114],"future)":[115],"research.":[116,303],"Our":[117],"novel":[118],"approach":[119],"paper":[122],"is":[123],"simple":[127],"for":[129,177,200,251,255],"assessing":[130],"comparing":[132],"into":[134,143],"identification,":[137],"bypassing":[138],"need":[140],"delve":[142],"granular":[144],"details":[145],"such":[146],"as":[147],"specific":[148],"algorithmic":[149],"choices":[150],"feature":[152],"selections,":[153],"which":[154],"attributes":[156,167],"all":[158],"papers":[159],"have,":[160],"instead":[162],"focus":[164],"common":[166,203],"shared":[168],"across":[169,204,238],"papers.":[170],"We":[171,195,222,241],"comprehensive":[174],"literature":[175,199],"review":[176],"topic":[179],"identifying":[181],"passive":[187],"traffic,":[189],"resulting":[190],"69":[192],"examined.":[194],"systematically":[196],"analyse":[197],"key":[201],"elements":[202,227,237,254],"studies":[206],"comparative":[211],"analysis,":[212],"define":[214],"five":[215,226,253],"we":[216],"determine":[217],"most":[220],"important.":[221],"state":[223],"why":[224],"important,":[231],"discuss":[233],"trends":[234],"studies.":[240],"then":[242],"produce":[243],"summary":[245],"table":[246],"containing":[247],"just":[248],"information":[250],"each":[256],"study,":[257],"how":[259,290],"used":[263],"understand":[265,289],"techniques,":[268],"considering":[269],"their":[270,293],"context.":[271],"This":[272],"gives":[273],"security":[274],"professionals":[275],"researchers":[277],"necessary":[279],"tools":[280],"studies,":[283],"both":[284],"current":[285],"future,":[287],"secure":[292],"what":[296],"must":[298],"consider":[299],"when":[300],"completing":[301],"further":[302]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
