ABSTRACT
The increasing complexity and ubiquity of using IoT devices exacerbate the existing programming challenges in smart environments such as smart homes, smart buildings, and smart cities. Recent works have focused on detecting conflicts for the safety and utility of IoT applications, but they usually do not emphasize any means for conflict resolution other than just reporting the conflict to the application user and blocking the conflicting behavior. We propose RemedIoT, a remedial action 1 framework for resolving Internet-of-Things conflicts. The RemedIoT framework uses state of the art techniques to detect if a conflict exists in a given set of distributed IoT applications with respect to a set of policies, i.e., rules that define the allowable and restricted state-space transitions of devices. For each identified conflict, RemedIoT will suggest a set of remedial actions to the user by leveraging RemedIoT's programming abstractions. These programming abstractions enable different realizations of an IoT module while safely providing the same level of utility, e.g., if an air-conditioner application that is used to implement a cooling module conflicts with a CO2 monitor application that requires ventilation at home, a non-conflicting smart fan application will be suggested to the user. We evaluate RemedIoT on Samsung SmartThings applications and IFTTT applets and show that for 102 detected conflicts across 74 sample applications with 11 policies, RemedIoT is able to remediate ~ 80% of the conflicts found in the environment, which would normally be blocked by prior solutions. We further demonstrate the efficacy and scalability of our approach for smart city environments.
- Apple. https://www.apple.com/ios/home/.Google Scholar
- Arjunan, P., Batra, N., Choi, H., Singh, A., Singh, P., and Srivastava, M. B. Sensoract: A privacy and security aware federated middleware for building management. BuildSys '12, pp. 80--87.Google Scholar
- Balaji, B., Verma, C., Narayanaswamy, B., and Agarwal, Y. Zodiac: Organizing large deployment of sensors to create reusable applications for buildings. BuildSys '15, ACM, pp. 13--22.Google Scholar
- Celik, Z. B., Fernandes, E., Pauley, E., Tan, G., and McDaniel, P. Program analysis of commodity iot applications for security and privacy: Challenges and opportunities. arXiv preprint arXiv:1809.06962 (2018).Google Scholar
- Celik, Z. B., McDaniel, P., and Tan, G. Soteria: Automated iot safety and security analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC 18) (Boston, MA, 2018), USENIX Association, pp. 147--158.Google Scholar
- Celik, Z. B., Tan, G., and McDaniel, P. D. Iotguard: Dynamic enforcement of security and safety policy in commodity iot.Google Scholar
- Dawson-Haggerty, S., Krioukov, A., Taneja, J., Karandikar, S., Fierro, G., Kitaev, N., and Culler, D. BOSS: Building operating system services. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13) (Lombard, IL, 2013), USENIX, pp. 443--457.Google Scholar
- Ding, W., and Hu, H. On the safety of iot device physical interaction control. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018), ACM, pp. 832--846.Google ScholarDigital Library
- Dixon, C., Mahajan, R., Agarwal, S., Brush, A. J., Lee, B., Saroiu, S., and Bahl, P. An operating system for the home. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (Berkeley, CA, USA, 2012), NSDI'12, USENIX Association, pp. 25--25.Google ScholarDigital Library
- Dixon, C., Mahajan, R., Agarwal, S., Brush, A.J., Lee, B., Saroiu, S., and Bahl, V. The home needs an operating system (and an app store). In Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks (New York, NY, USA, 2010), Hotnets-IX, ACM, pp. 18:1--18:6.Google ScholarDigital Library
- Fernandes, E., Paupore, J., Rahmati, A., Simionato, D., Conti, M., and Prakash, A. FlowFence: Practical data protection for emerging iot application frameworks. In 25th USENIX Security Symposium (2016), pp. 531--548.Google Scholar
- Hong, D., Ortiz, J., Whitehouse, K., and Culler, D. Towards automatic spatial verification of sensor placement in buildings. In Proceedings of the 5th ACM Workshop on Embedded Systems For Energy-Efficient Buildings (New York, NY, USA, 2013), BuildSys'13, ACM, pp. 13:1--13:8.Google ScholarDigital Library
- Liang, C.-J. M., Bu, L., Li, Z., Zhang, J., Han, S., Karlsson, B.F., Zhang, D., and Zhao, F. Systematically debugging iot control system correctness for building automation. In Proceedings of the 3rd ACM International Conference on Systems for Energy-Efficient Built Environments (New York, NY, USA, 2016), BuildSys '16, ACM, pp. 133--142.Google ScholarDigital Library
- Liang, C.-J. M., Karlsson, B. F., Lane, N. D., Zhao, F., Zhang, J., Pan, Z., Li, Z., and Yu, Y. Sift: building an internet of safe things. In Proceedings of the 14th International Conference on Information Processing in Sensor Networks (2015), ACM, pp. 298--309.Google ScholarDigital Library
- Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., and Zhao, W. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal 4, 5 (Oct 2017), 1125--1142.Google ScholarCross Ref
- Ma, M., Preum, S. M., and Stankovic, J. A. Cityguard: A watchdog for safety-aware conflict detection in smart cities. In Proceedings of the Second International Conference on Internet-of-Things Design and Implementation (New York, NY, USA, 2017), IoTDI '17, ACM, pp. 259--270.Google ScholarDigital Library
- Ma, M., Preum, S. M., Tarneberg, W., Ahmed, M., Ruiters, M., and Stankovic, J. Detection of runtime conflicts among services in smart cities. In 2016 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1--10.Google Scholar
- Ma, M., Stankovic, J. A., and Feng, L. Cityresolver: A decision support system for conflict resolution in smart cities. In Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems (Piscataway, NJ, USA, 2018), ICCPS '18, IEEE Press, pp. 55--64.Google ScholarDigital Library
- Microsoft. https://azure.microsoft.com/en-us/services/iot-edge/.Google Scholar
- Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.-R., and Tarkoma, S. Iot sentinel: Automated device-type identification for security enforcement in iot. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (2017), IEEE, pp. 2177--2184.Google ScholarCross Ref
- Mohsin, M., Anwar, Z., Husari, G., Al-Shaer, E., and Rahman, M. A. Iotsat: A formal framework for security analysis of the internet of things (iot). In 2016 IEEE Conference on Communications and Network Security (CNS) (Oct 2016), pp. 180--188.Google ScholarCross Ref
- Nacci, A. A., Rana, V., Balaji, B., Spoletini, P., Gupta, R., Sciuto, D., and Agarwal, Y. Buildingrules: A trigger-action-based system to manage complex commercial buildings. ACM Trans. Cyber-Phys. Syst. 2, 2 (May 2018), 13:1--13:22.Google ScholarDigital Library
- Noor, J., Tseng, H.-Y., Garcia, L., and Srivastava, M. Ddflow: visualized declarative programming for heterogeneous iot networks. In Proceedings of the International Conference on Internet of Things Design and Implementation (2019), ACM, pp. 172--177.Google ScholarDigital Library
- Piscitello, A., Paduano, F., Nacci, A. A., Noferi, D., Santambrogio, M. D., and Sciuto, D. Danger-system: Exploring new ways to manage occupants safety in smart building. In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT) (Dec 2015), pp. 675--680.Google ScholarDigital Library
- SamSung. https://www.smartthings.com/.Google Scholar
- Shen, C., Singh, R. P., Phanishayee, A., Kansal, A., and Mahajan, R. Beam: Ending monolithic applications for connected devices. In 2016 USENIX Annual Technical Conference (USENIX ATC 16) (Denver, CO, 2016), USENIX Association, pp. 143--157.Google Scholar
- Stankovic, J. A. Research directions for the internet of things. IEEE Internet of Things Journal 1, 1 (Feb 2014), 3--9.Google ScholarCross Ref
- Surbatovich, M., Aljuraidan, J., Bauer, L., Das, A., and Jia, L. Some recipes can do more than spoil your appetite: Analyzing the security and privacy risks of IFTTT recipes. In Proceedings of the 26th International Conference on World Wide Web (Perth, Australia, 2017), WWW '17, pp. 1501--1510.Google Scholar
- Surbatovich, M., Aljuraidan, J., Bauer, L., Das, A., and Jia, L. Some recipes can do more than spoil your appetite: Analyzing the security and privacy risks of ifttt recipes. In Proceedings of the 26th International Conference on World Wide Web (2017), WWW '17, pp. 1501--1510.Google Scholar
- Yahyazadeh, M., Podder, P., Hoque, E., and Chowdhury, O. Expat: Expectation-based policy analysis and enforcement for appified smart-home platforms. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (New York, NY, USA, 2019), SACMAT '19, ACM, pp. 61--72.Google Scholar
- Zapier. https://zapier.com/.Google Scholar
Index Terms
- RemedioT: Remedial Actions for Internet-of-Things Conflicts
Recommendations
Design and Development of Integrated, Secured and Intelligent Architecture for Internet of Things and Cloud Computing
FICLOUD '15: Proceedings of the 2015 3rd International Conference on Future Internet of Things and CloudInternet of Things (IoT) and Cloud Computing paradigm is a next wave in the era of computing and it has been identified as one of the emerging technologies in the field of Computer Science and Information Technology. It has been understood from the ...
A lightweight framework for secure life-logging in smart environments
AbstractAs the world becomes an interconnected network where objects and humans interact with each other, new challenges and threats appear in the ecosystem. In this interconnected world, smart objects have an important role in giving users ...
A magic lens for revealing device interactions in smart environments
SA '14: SIGGRAPH Asia 2014 Mobile Graphics and Interactive ApplicationsKeeping track of device interactions in smart environments is a challenging task for everyday users. Given the expected high number of communicating devices in future smart homes, it will become increasingly important to put users more in control of ...
Comments