A computer-implemented method includes registering a user device and an internet-of-things (IOT) device for use in a transaction-by-proxy service; collecting behavior-related data associated with a user of the user device and the first IOT device; and using the behavior-related data as part of the transaction-by-proxy service to generate a transaction-by-proxy at the IOT device on behalf of the user of the user device. The computer-implemented method further includes generating a transaction-by-proxy model using the behavior-related data associated with the user and training the transaction-by-proxy model to determine whether to request the transaction-by-proxy.