Analyzing consumer IoT traffic from security and privacy perspectives: a comprehensive survey
Yan JIA , Yuxin SONG , Zihou LIU , Qingyin TAN , Yang SONG , Yu ZHANG , Zheli LIU
Front. Comput. Sci. ›› 2026, Vol. 20 ›› Issue (7) : 2007809
Analyzing consumer IoT traffic from security and privacy perspectives: a comprehensive survey
The Consumer Internet of Things (CIoT), a notable segment within the IoT domain, involves the integration of IoT technology into consumer electronics and devices, such as smart homes and smart wearables. Compared to traditional IoT fields, CIoT differs notably in target users, product types, and design approaches. While offering convenience to users, it also raises new security and privacy concerns. Network traffic analysis, a widely used technique in the security community, has been extensively applied to investigate these concerns about CIoT. Compared to traditional network traffic analysis in fields like mobile apps and websites, CIoT introduces unique characteristics that pose new challenges and research opportunities. Researchers have made significant contributions in this area. To aid researchers in understanding the application of traffic analysis tools for assessing CIoT security and privacy risks, this survey reviews 310 publications on traffic analysis within the CIoT security and privacy domain from January 2018 to June 2024, focusing on three research questions. Our work: 1) outlines the CIoT traffic analysis process and highlights its differences from general network traffic analysis; 2) summarizes and classifies existing research into four categories according to its application objectives, device fingerprinting, user activity inference, malicious traffic detection, and measurement; 3) explores emerging challenges and potential future research directions based on each step of the CIoT traffic analysis process. This will provide new insights to the community and guide the industry towards safer product designs.
consumer IoT / smart home / consumer IoT security / user privacy / traffic analysis / survey
| [1] |
|
| [2] |
|
| [3] |
|
| [4] |
Mehta K, Gaur S, Maheshwari S, Chugh H, Kumar M A. Big data analytics cloud based smart IoT healthcare network. In: Proceedings of the 7th International Conference on Trends in Electronics and Informatics (ICOEI). 2023, 437−443 |
| [5] |
|
| [6] |
|
| [7] |
|
| [8] |
|
| [9] |
|
| [10] |
|
| [11] |
|
| [12] |
|
| [13] |
|
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
|
| [18] |
|
| [19] |
|
| [20] |
|
| [21] |
|
| [22] |
James F, Ray I, Medhi D. Worst attack vulnerability and fortification for IoT security management: an approach and an illustration for smart home IoT. In: Proceedings of 2023 IEEE/IFIP Network Operations and Management Symposium. 2023, 1−6 |
| [23] |
|
| [24] |
Charyyev B, Gunes M H. IoT traffic flow identification using locality sensitive hashes. In: Proceedings of 2020 IEEE International Conference on Communications (ICC). 2020, 1−6 |
| [25] |
|
| [26] |
Gupta S, Ghanavati S. Privacy in the internet of things: Where do we stand? a systematic literature review. 2022 |
| [27] |
|
| [28] |
|
| [29] |
|
| [30] |
|
| [31] |
|
| [32] |
|
| [33] |
|
| [34] |
|
| [35] |
|
| [36] |
|
| [37] |
|
| [38] |
|
| [39] |
|
| [40] |
|
| [41] |
|
| [42] |
|
| [43] |
|
| [44] |
|
| [45] |
|
| [46] |
|
| [47] |
|
| [48] |
Miettinen M, Marchal S, Hafeez I, Asokan N, Sadeghi A R, Tarkoma S. IoT sentinel: automated device-type identification for security enforcement in IoT. In: Proceedings of the 37th IEEE International Conference on Distributed Computing Systems (ICDCS). 2017, 2177−2184 |
| [49] |
|
| [50] |
|
| [51] |
|
| [52] |
|
| [53] |
Moore A, Zuev D, Crogan M. Discriminators for use in flow-based classification. Technical Report, 2013 |
| [54] |
Aksoy A, Gunes M H. Automated IoT device identification using network traffic. In: Proceedings of 2019 IEEE International Conference on Communications (ICC). 2019, 1−7 |
| [55] |
Fan L, Zhang S, Wu Y, Wang Z, Duan C, Li J, Yang J. An IoT device identification method based on semi-supervised learning. In: Proceedings of the 16th International Conference on Network and Service Management (CNSM). 2020, 1−7 |
| [56] |
|
| [57] |
Bai L, Yao L, Kanhere S S, Wang X, Yang Z. Automatic device classification from network traffic streams of internet of things. In: Proceedings of the 43rd IEEE Conference on Local Computer Networks (LCN). 2018, 1−9 |
| [58] |
|
| [59] |
|
| [60] |
|
| [61] |
|
| [62] |
|
| [63] |
|
| [64] |
|
| [65] |
|
| [66] |
|
| [67] |
|
| [68] |
|
| [69] |
|
| [70] |
|
| [71] |
|
| [72] |
|
| [73] |
|
| [74] |
Bremler-Barr A, Levy H, Yakhini Z. IoT or NoT: Identifying IoT devices in a short time scale. In: Proceedings of 2020 IEEE/IFIP Network Operations and Management Symposium. 2020, 1−9 |
| [75] |
|
| [76] |
|
| [77] |
Babun L, Aksu H, Ryan L, Akkaya K, Bentley E S, Uluagac A S. Z-IoT: passive device-class fingerprinting of ZigBee and Z-wave IoT devices. In: Proceedings of 2020 IEEE International Conference on Communications (ICC). 2020, 1−7 |
| [78] |
|
| [79] |
|
| [80] |
|
| [81] |
|
| [82] |
|
| [83] |
|
| [84] |
|
| [85] |
|
| [86] |
|
| [87] |
|
| [88] |
|
| [89] |
|
| [90] |
Wanode S S, Anand M, Mitra B. Optimal feature set selection for IoT device fingerprinting on edge infrastructure using machine intelligence. In: Proceedings of 2022 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 2022, 1−6 |
| [91] |
|
| [92] |
|
| [93] |
|
| [94] |
Ammar N, Noirie L, Tixeuil S. Autonomous identification of IoT device types based on a supervised classification. In: Proceedings of 2020 IEEE International Conference on Communications (ICC). 2020, 1−6 |
| [95] |
|
| [96] |
|
| [97] |
|
| [98] |
|
| [99] |
|
| [100] |
|
| [101] |
|
| [102] |
Charyyev B, Gunes M H. IoT event classification based on network traffic. In: Proceedings of 2020 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 2020, 854−859 |
| [103] |
|
| [104] |
|
| [105] |
|
| [106] |
|
| [107] |
Gu T, Fang Z, Abhishek A, Fu H, Hu P, Mohapatra P. IoTGaze: IoT security enforcement via wireless context analysis. In: Proceedings of 2020 IEEE Conference on Computer Communications. 2020, 884−893 |
| [108] |
|
| [109] |
|
| [110] |
Li H, He Y, Sun L, Cheng X, Yu J. Side-channel information leakage of encrypted video stream in video surveillance systems. In: Proceedings of the 35th Annual IEEE International Conference on Computer Communications. 2016, 1−9 |
| [111] |
Cheng Y, Ji X, Lu T, Xu W. DeWiCam: detecting hidden wireless cameras via smartphones. In: Proceedings of 2018 Asia Conference on Computer and Communications Security. 2018, 1−13 |
| [112] |
|
| [113] |
|
| [114] |
|
| [115] |
Felten E W, Schneider M A. Timing attacks on Web privacy. In: Proceedings of the 7th ACM Conference on Computer and Communications Security. 2000, 25−32 |
| [116] |
|
| [117] |
|
| [118] |
Wan Y, Xu K, Wang F, Xue G. IoTMosaic: inferring user activities from IoT network traffic in smart homes. In: Proceedings of 2022 IEEE Conference on Computer Communications. 2022, 370−379 |
| [119] |
Gu T, Fang Z, Abhishek A, Mohapatra P. IoTSpy: uncovering human privacy leakage in IoT networks via mining wireless context. In: Proceedings of the 1st IEEE Annual International Symposium on Personal, Indoor and Mobile Radio Communications. 2020, 1−7 |
| [120] |
|
| [121] |
|
| [122] |
|
| [123] |
|
| [124] |
|
| [125] |
|
| [126] |
Charyyev B, Gunes M H. Detecting anomalous IoT traffic flow with locality sensitive hashes. In: Proceedings of 2020 IEEE Global Communications Conference. 2020, 1−6 |
| [127] |
|
| [128] |
|
| [129] |
Pathak A K, Saguna S, Mitra K, Åhlund C. Anomaly detection using machine learning to discover sensor tampering in IoT systems. In: Proceedings of 2021 IEEE International Conference on Communications. 2021, 1−6 |
| [130] |
|
| [131] |
Wan Y, Xu K, Xue G, Wang F. IoTArgos: a multi-layer security monitoring system for internet-of-things in smart homes. In: Proceedings of 2020 IEEE Conference on Computer Communications. 2020, 874−883 |
| [132] |
|
| [133] |
|
| [134] |
|
| [135] |
|
| [136] |
|
| [137] |
|
| [138] |
|
| [139] |
|
| [140] |
|
| [141] |
Kim J, Sim A, Kim J, Wu K. Botnet detection using Recurrent Variational Autoencoder. In: Proceedings of 2020 IEEE Global Communications Conference. 2020, 1−6 |
| [142] |
Nguyen T D, Marchal S, Miettinen M, Fereidooni H, Asokan N, Sadeghi A R. DÏoT: a federated self-learning anomaly detection system for IoT. In: Proceedings of the 39th IEEE International Conference on Distributed Computing Systems (ICDCS). 2019, 756−767 |
| [143] |
Nishio T, Nakahara M, Okui N, Kubota A, Kobayashi Y, Sugiyama K, Shinkuma R. Anomaly traffic detection with federated learning toward network-based malware detection in IoT. In: Proceedings of 2022 IEEE Global Communications Conference. 2022, 299−304 |
| [144] |
Zhao R, Yang L, Wang Y, Xue Z, Gui G, Ohtsuki T. A semi-supervised federated learning scheme via knowledge distillation for intrusion detection. In: Proceedings of 2022 IEEE International Conference on Communications. 2022, 2688−2693 |
| [145] |
|
| [146] |
Zhang J, Liang S, Ye F, Hu R Q, Qian Y. Towards detection of zero-day botnet attack in IoT networks using federated learning. In: Proceedings of 2023 IEEE International Conference on Communications. 2023, 7−12 |
| [147] |
|
| [148] |
Luo Y, Chen X, Ge N, Feng W, Lu J. Transformer-based malicious traffic detection for internet of things. In: Proceedings of 2022 IEEE International Conference on Communications. 2022, 4187−4192 |
| [149] |
Bovenzi G, Aceto G, Ciuonzo D, Persico V, Pescapé A. A hierarchical hybrid intrusion detection approach in IoT scenarios. In: Proceedings of 2020 IEEE Global Communications Conference. 2020, 1−7 |
| [150] |
Zixu T, Liyanage K S K, Gurusamy M. Generative adversarial network and auto encoder based anomaly detection in distributed IoT networks. In: Proceedings of 2020 IEEE Global Communications Conference. 2020, 1−7 |
| [151] |
|
| [152] |
|
| [153] |
Baby R, Pooranian Z, Shojafar M, Tafazolli R. A heterogenous IoT attack detection through deep reinforcement learning: a dynamic ml approach. In: Proceedings of 2023 IEEE International Conference on Communications. 2023, 479−484 |
| [154] |
|
| [155] |
|
| [156] |
|
| [157] |
|
| [158] |
|
| [159] |
|
| [160] |
Hasan N, Chen Z, Zhao C, Zhu Y, Liu C. IoT botnet detection framework from network behavior based on extreme learning machine. In: Proceedings of 2022 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 2022, 1−6 |
| [161] |
|
| [162] |
|
| [163] |
|
| [164] |
Zhou K, Lin X, Wu J, Bashir A K, Li J, Imran M. Metric learning-based few-shot malicious node detection for IoT backhaul/fronthaul networks. In: Proceedings of 2022 IEEE Global Communications Conference. 2022, 5777−5782 |
| [165] |
|
| [166] |
|
| [167] |
Almazarqi H A, Woodyard M, Mursch T, Pezaros D, Marnerides A K. Macroscopic analysis of IoT botnets. In: Proceedings of 2022 IEEE Global Communications Conference. 2022, 2674−2679 |
| [168] |
|
| [169] |
Li J, Li Z, Tyson G, Xie G. Your privilege gives your privacy away: an analysis of a home security camera service. In: Proceedings of 2020 IEEE Conference on Computer Communications. 2020, 387−396 |
| [170] |
|
| [171] |
|
| [172] |
|
| [173] |
|
| [174] |
|
| [175] |
|
| [176] |
|
| [177] |
|
| [178] |
|
| [179] |
|
| [180] |
|
| [181] |
|
| [182] |
|
| [183] |
|
| [184] |
|
| [185] |
|
| [186] |
Catillo M, Pecchia A, Villano U. Machine learning on public intrusion datasets: academic hype or concrete advances in NIDS? In: Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S). 2023, 132−136 |
| [187] |
|
| [188] |
|
| [189] |
|
| [190] |
|
| [191] |
|
| [192] |
|
| [193] |
|
| [194] |
Guastalla M, Li Y, Hekmati A, Krishnamachari B. Application of large language models to DDoS attack detection. In: Proceedings of the 1st EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles. 2023, 83−99 |
| [195] |
|
| [196] |
|
| [197] |
|
| [198] |
|
| [199] |
|
| [200] |
|
| [201] |
|
| [202] |
|
| [203] |
Jia Y, Xiao Y, Yu J, Cheng X, Liang Z, Wan Z. A novel graph-based mechanism for identifying traffic vulnerabilities in smart home IoT. In: Proceedings of 2018 IEEE Conference on Computer Communications. 2018, 1493−1501 |
| [204] |
|
| [205] |
|
| [206] |
Chen J, Lan X, Zhang Q, Ma W, Fang W, He J. Defending against apt attacks in cloud computing environments using grouped multi-agent deep reinforcement learning. IEEE Internet of Things Journal, 2025 |
Higher Education Press
/
| 〈 |
|
〉 |