skip to main content
10.1145/3360322.3360837acmotherconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article
Open Access

RemedioT: Remedial Actions for Internet-of-Things Conflicts

Published:13 November 2019Publication History

ABSTRACT

The increasing complexity and ubiquity of using IoT devices exacerbate the existing programming challenges in smart environments such as smart homes, smart buildings, and smart cities. Recent works have focused on detecting conflicts for the safety and utility of IoT applications, but they usually do not emphasize any means for conflict resolution other than just reporting the conflict to the application user and blocking the conflicting behavior. We propose RemedIoT, a remedial action 1 framework for resolving Internet-of-Things conflicts. The RemedIoT framework uses state of the art techniques to detect if a conflict exists in a given set of distributed IoT applications with respect to a set of policies, i.e., rules that define the allowable and restricted state-space transitions of devices. For each identified conflict, RemedIoT will suggest a set of remedial actions to the user by leveraging RemedIoT's programming abstractions. These programming abstractions enable different realizations of an IoT module while safely providing the same level of utility, e.g., if an air-conditioner application that is used to implement a cooling module conflicts with a CO2 monitor application that requires ventilation at home, a non-conflicting smart fan application will be suggested to the user. We evaluate RemedIoT on Samsung SmartThings applications and IFTTT applets and show that for 102 detected conflicts across 74 sample applications with 11 policies, RemedIoT is able to remediate ~ 80% of the conflicts found in the environment, which would normally be blocked by prior solutions. We further demonstrate the efficacy and scalability of our approach for smart city environments.

References

  1. Apple. https://www.apple.com/ios/home/.Google ScholarGoogle Scholar
  2. Arjunan, P., Batra, N., Choi, H., Singh, A., Singh, P., and Srivastava, M. B. Sensoract: A privacy and security aware federated middleware for building management. BuildSys '12, pp. 80--87.Google ScholarGoogle Scholar
  3. Balaji, B., Verma, C., Narayanaswamy, B., and Agarwal, Y. Zodiac: Organizing large deployment of sensors to create reusable applications for buildings. BuildSys '15, ACM, pp. 13--22.Google ScholarGoogle Scholar
  4. Celik, Z. B., Fernandes, E., Pauley, E., Tan, G., and McDaniel, P. Program analysis of commodity iot applications for security and privacy: Challenges and opportunities. arXiv preprint arXiv:1809.06962 (2018).Google ScholarGoogle Scholar
  5. Celik, Z. B., McDaniel, P., and Tan, G. Soteria: Automated iot safety and security analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC 18) (Boston, MA, 2018), USENIX Association, pp. 147--158.Google ScholarGoogle Scholar
  6. Celik, Z. B., Tan, G., and McDaniel, P. D. Iotguard: Dynamic enforcement of security and safety policy in commodity iot.Google ScholarGoogle Scholar
  7. Dawson-Haggerty, S., Krioukov, A., Taneja, J., Karandikar, S., Fierro, G., Kitaev, N., and Culler, D. BOSS: Building operating system services. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13) (Lombard, IL, 2013), USENIX, pp. 443--457.Google ScholarGoogle Scholar
  8. Ding, W., and Hu, H. On the safety of iot device physical interaction control. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018), ACM, pp. 832--846.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Dixon, C., Mahajan, R., Agarwal, S., Brush, A. J., Lee, B., Saroiu, S., and Bahl, P. An operating system for the home. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (Berkeley, CA, USA, 2012), NSDI'12, USENIX Association, pp. 25--25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Dixon, C., Mahajan, R., Agarwal, S., Brush, A.J., Lee, B., Saroiu, S., and Bahl, V. The home needs an operating system (and an app store). In Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks (New York, NY, USA, 2010), Hotnets-IX, ACM, pp. 18:1--18:6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Fernandes, E., Paupore, J., Rahmati, A., Simionato, D., Conti, M., and Prakash, A. FlowFence: Practical data protection for emerging iot application frameworks. In 25th USENIX Security Symposium (2016), pp. 531--548.Google ScholarGoogle Scholar
  12. Hong, D., Ortiz, J., Whitehouse, K., and Culler, D. Towards automatic spatial verification of sensor placement in buildings. In Proceedings of the 5th ACM Workshop on Embedded Systems For Energy-Efficient Buildings (New York, NY, USA, 2013), BuildSys'13, ACM, pp. 13:1--13:8.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Liang, C.-J. M., Bu, L., Li, Z., Zhang, J., Han, S., Karlsson, B.F., Zhang, D., and Zhao, F. Systematically debugging iot control system correctness for building automation. In Proceedings of the 3rd ACM International Conference on Systems for Energy-Efficient Built Environments (New York, NY, USA, 2016), BuildSys '16, ACM, pp. 133--142.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Liang, C.-J. M., Karlsson, B. F., Lane, N. D., Zhao, F., Zhang, J., Pan, Z., Li, Z., and Yu, Y. Sift: building an internet of safe things. In Proceedings of the 14th International Conference on Information Processing in Sensor Networks (2015), ACM, pp. 298--309.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., and Zhao, W. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal 4, 5 (Oct 2017), 1125--1142.Google ScholarGoogle ScholarCross RefCross Ref
  16. Ma, M., Preum, S. M., and Stankovic, J. A. Cityguard: A watchdog for safety-aware conflict detection in smart cities. In Proceedings of the Second International Conference on Internet-of-Things Design and Implementation (New York, NY, USA, 2017), IoTDI '17, ACM, pp. 259--270.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Ma, M., Preum, S. M., Tarneberg, W., Ahmed, M., Ruiters, M., and Stankovic, J. Detection of runtime conflicts among services in smart cities. In 2016 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1--10.Google ScholarGoogle Scholar
  18. Ma, M., Stankovic, J. A., and Feng, L. Cityresolver: A decision support system for conflict resolution in smart cities. In Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems (Piscataway, NJ, USA, 2018), ICCPS '18, IEEE Press, pp. 55--64.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Microsoft. https://azure.microsoft.com/en-us/services/iot-edge/.Google ScholarGoogle Scholar
  20. Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.-R., and Tarkoma, S. Iot sentinel: Automated device-type identification for security enforcement in iot. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (2017), IEEE, pp. 2177--2184.Google ScholarGoogle ScholarCross RefCross Ref
  21. Mohsin, M., Anwar, Z., Husari, G., Al-Shaer, E., and Rahman, M. A. Iotsat: A formal framework for security analysis of the internet of things (iot). In 2016 IEEE Conference on Communications and Network Security (CNS) (Oct 2016), pp. 180--188.Google ScholarGoogle ScholarCross RefCross Ref
  22. Nacci, A. A., Rana, V., Balaji, B., Spoletini, P., Gupta, R., Sciuto, D., and Agarwal, Y. Buildingrules: A trigger-action-based system to manage complex commercial buildings. ACM Trans. Cyber-Phys. Syst. 2, 2 (May 2018), 13:1--13:22.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Noor, J., Tseng, H.-Y., Garcia, L., and Srivastava, M. Ddflow: visualized declarative programming for heterogeneous iot networks. In Proceedings of the International Conference on Internet of Things Design and Implementation (2019), ACM, pp. 172--177.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Piscitello, A., Paduano, F., Nacci, A. A., Noferi, D., Santambrogio, M. D., and Sciuto, D. Danger-system: Exploring new ways to manage occupants safety in smart building. In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT) (Dec 2015), pp. 675--680.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. SamSung. https://www.smartthings.com/.Google ScholarGoogle Scholar
  26. Shen, C., Singh, R. P., Phanishayee, A., Kansal, A., and Mahajan, R. Beam: Ending monolithic applications for connected devices. In 2016 USENIX Annual Technical Conference (USENIX ATC 16) (Denver, CO, 2016), USENIX Association, pp. 143--157.Google ScholarGoogle Scholar
  27. Stankovic, J. A. Research directions for the internet of things. IEEE Internet of Things Journal 1, 1 (Feb 2014), 3--9.Google ScholarGoogle ScholarCross RefCross Ref
  28. Surbatovich, M., Aljuraidan, J., Bauer, L., Das, A., and Jia, L. Some recipes can do more than spoil your appetite: Analyzing the security and privacy risks of IFTTT recipes. In Proceedings of the 26th International Conference on World Wide Web (Perth, Australia, 2017), WWW '17, pp. 1501--1510.Google ScholarGoogle Scholar
  29. Surbatovich, M., Aljuraidan, J., Bauer, L., Das, A., and Jia, L. Some recipes can do more than spoil your appetite: Analyzing the security and privacy risks of ifttt recipes. In Proceedings of the 26th International Conference on World Wide Web (2017), WWW '17, pp. 1501--1510.Google ScholarGoogle Scholar
  30. Yahyazadeh, M., Podder, P., Hoque, E., and Chowdhury, O. Expat: Expectation-based policy analysis and enforcement for appified smart-home platforms. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (New York, NY, USA, 2019), SACMAT '19, ACM, pp. 61--72.Google ScholarGoogle Scholar
  31. Zapier. https://zapier.com/.Google ScholarGoogle Scholar

Index Terms

  1. RemedioT: Remedial Actions for Internet-of-Things Conflicts

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        BuildSys '19: Proceedings of the 6th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation
        November 2019
        413 pages
        ISBN:9781450370059
        DOI:10.1145/3360322

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 November 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        BuildSys '19 Paper Acceptance Rate40of131submissions,31%Overall Acceptance Rate148of500submissions,30%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader