[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3360322.3360837acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbuildsysConference Proceedingsconference-collections
research-article
Open access

RemedioT: Remedial Actions for Internet-of-Things Conflicts

Published: 13 November 2019 Publication History

Abstract

The increasing complexity and ubiquity of using IoT devices exacerbate the existing programming challenges in smart environments such as smart homes, smart buildings, and smart cities. Recent works have focused on detecting conflicts for the safety and utility of IoT applications, but they usually do not emphasize any means for conflict resolution other than just reporting the conflict to the application user and blocking the conflicting behavior. We propose RemedIoT, a remedial action 1 framework for resolving Internet-of-Things conflicts. The RemedIoT framework uses state of the art techniques to detect if a conflict exists in a given set of distributed IoT applications with respect to a set of policies, i.e., rules that define the allowable and restricted state-space transitions of devices. For each identified conflict, RemedIoT will suggest a set of remedial actions to the user by leveraging RemedIoT's programming abstractions. These programming abstractions enable different realizations of an IoT module while safely providing the same level of utility, e.g., if an air-conditioner application that is used to implement a cooling module conflicts with a CO2 monitor application that requires ventilation at home, a non-conflicting smart fan application will be suggested to the user. We evaluate RemedIoT on Samsung SmartThings applications and IFTTT applets and show that for 102 detected conflicts across 74 sample applications with 11 policies, RemedIoT is able to remediate ~ 80% of the conflicts found in the environment, which would normally be blocked by prior solutions. We further demonstrate the efficacy and scalability of our approach for smart city environments.

References

[1]
Apple. https://www.apple.com/ios/home/.
[2]
Arjunan, P., Batra, N., Choi, H., Singh, A., Singh, P., and Srivastava, M. B. Sensoract: A privacy and security aware federated middleware for building management. BuildSys '12, pp. 80--87.
[3]
Balaji, B., Verma, C., Narayanaswamy, B., and Agarwal, Y. Zodiac: Organizing large deployment of sensors to create reusable applications for buildings. BuildSys '15, ACM, pp. 13--22.
[4]
Celik, Z. B., Fernandes, E., Pauley, E., Tan, G., and McDaniel, P. Program analysis of commodity iot applications for security and privacy: Challenges and opportunities. arXiv preprint arXiv:1809.06962 (2018).
[5]
Celik, Z. B., McDaniel, P., and Tan, G. Soteria: Automated iot safety and security analysis. In 2018 USENIX Annual Technical Conference (USENIX ATC 18) (Boston, MA, 2018), USENIX Association, pp. 147--158.
[6]
Celik, Z. B., Tan, G., and McDaniel, P. D. Iotguard: Dynamic enforcement of security and safety policy in commodity iot.
[7]
Dawson-Haggerty, S., Krioukov, A., Taneja, J., Karandikar, S., Fierro, G., Kitaev, N., and Culler, D. BOSS: Building operating system services. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13) (Lombard, IL, 2013), USENIX, pp. 443--457.
[8]
Ding, W., and Hu, H. On the safety of iot device physical interaction control. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (2018), ACM, pp. 832--846.
[9]
Dixon, C., Mahajan, R., Agarwal, S., Brush, A. J., Lee, B., Saroiu, S., and Bahl, P. An operating system for the home. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (Berkeley, CA, USA, 2012), NSDI'12, USENIX Association, pp. 25--25.
[10]
Dixon, C., Mahajan, R., Agarwal, S., Brush, A.J., Lee, B., Saroiu, S., and Bahl, V. The home needs an operating system (and an app store). In Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks (New York, NY, USA, 2010), Hotnets-IX, ACM, pp. 18:1--18:6.
[11]
Fernandes, E., Paupore, J., Rahmati, A., Simionato, D., Conti, M., and Prakash, A. FlowFence: Practical data protection for emerging iot application frameworks. In 25th USENIX Security Symposium (2016), pp. 531--548.
[12]
Hong, D., Ortiz, J., Whitehouse, K., and Culler, D. Towards automatic spatial verification of sensor placement in buildings. In Proceedings of the 5th ACM Workshop on Embedded Systems For Energy-Efficient Buildings (New York, NY, USA, 2013), BuildSys'13, ACM, pp. 13:1--13:8.
[13]
Liang, C.-J. M., Bu, L., Li, Z., Zhang, J., Han, S., Karlsson, B.F., Zhang, D., and Zhao, F. Systematically debugging iot control system correctness for building automation. In Proceedings of the 3rd ACM International Conference on Systems for Energy-Efficient Built Environments (New York, NY, USA, 2016), BuildSys '16, ACM, pp. 133--142.
[14]
Liang, C.-J. M., Karlsson, B. F., Lane, N. D., Zhao, F., Zhang, J., Pan, Z., Li, Z., and Yu, Y. Sift: building an internet of safe things. In Proceedings of the 14th International Conference on Information Processing in Sensor Networks (2015), ACM, pp. 298--309.
[15]
Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., and Zhao, W. A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal 4, 5 (Oct 2017), 1125--1142.
[16]
Ma, M., Preum, S. M., and Stankovic, J. A. Cityguard: A watchdog for safety-aware conflict detection in smart cities. In Proceedings of the Second International Conference on Internet-of-Things Design and Implementation (New York, NY, USA, 2017), IoTDI '17, ACM, pp. 259--270.
[17]
Ma, M., Preum, S. M., Tarneberg, W., Ahmed, M., Ruiters, M., and Stankovic, J. Detection of runtime conflicts among services in smart cities. In 2016 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 1--10.
[18]
Ma, M., Stankovic, J. A., and Feng, L. Cityresolver: A decision support system for conflict resolution in smart cities. In Proceedings of the 9th ACM/IEEE International Conference on Cyber-Physical Systems (Piscataway, NJ, USA, 2018), ICCPS '18, IEEE Press, pp. 55--64.
[19]
Microsoft. https://azure.microsoft.com/en-us/services/iot-edge/.
[20]
Miettinen, M., Marchal, S., Hafeez, I., Asokan, N., Sadeghi, A.-R., and Tarkoma, S. Iot sentinel: Automated device-type identification for security enforcement in iot. In 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) (2017), IEEE, pp. 2177--2184.
[21]
Mohsin, M., Anwar, Z., Husari, G., Al-Shaer, E., and Rahman, M. A. Iotsat: A formal framework for security analysis of the internet of things (iot). In 2016 IEEE Conference on Communications and Network Security (CNS) (Oct 2016), pp. 180--188.
[22]
Nacci, A. A., Rana, V., Balaji, B., Spoletini, P., Gupta, R., Sciuto, D., and Agarwal, Y. Buildingrules: A trigger-action-based system to manage complex commercial buildings. ACM Trans. Cyber-Phys. Syst. 2, 2 (May 2018), 13:1--13:22.
[23]
Noor, J., Tseng, H.-Y., Garcia, L., and Srivastava, M. Ddflow: visualized declarative programming for heterogeneous iot networks. In Proceedings of the International Conference on Internet of Things Design and Implementation (2019), ACM, pp. 172--177.
[24]
Piscitello, A., Paduano, F., Nacci, A. A., Noferi, D., Santambrogio, M. D., and Sciuto, D. Danger-system: Exploring new ways to manage occupants safety in smart building. In 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT) (Dec 2015), pp. 675--680.
[25]
SamSung. https://www.smartthings.com/.
[26]
Shen, C., Singh, R. P., Phanishayee, A., Kansal, A., and Mahajan, R. Beam: Ending monolithic applications for connected devices. In 2016 USENIX Annual Technical Conference (USENIX ATC 16) (Denver, CO, 2016), USENIX Association, pp. 143--157.
[27]
Stankovic, J. A. Research directions for the internet of things. IEEE Internet of Things Journal 1, 1 (Feb 2014), 3--9.
[28]
Surbatovich, M., Aljuraidan, J., Bauer, L., Das, A., and Jia, L. Some recipes can do more than spoil your appetite: Analyzing the security and privacy risks of IFTTT recipes. In Proceedings of the 26th International Conference on World Wide Web (Perth, Australia, 2017), WWW '17, pp. 1501--1510.
[29]
Surbatovich, M., Aljuraidan, J., Bauer, L., Das, A., and Jia, L. Some recipes can do more than spoil your appetite: Analyzing the security and privacy risks of ifttt recipes. In Proceedings of the 26th International Conference on World Wide Web (2017), WWW '17, pp. 1501--1510.
[30]
Yahyazadeh, M., Podder, P., Hoque, E., and Chowdhury, O. Expat: Expectation-based policy analysis and enforcement for appified smart-home platforms. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (New York, NY, USA, 2019), SACMAT '19, ACM, pp. 61--72.
[31]
Zapier. https://zapier.com/.

Cited By

View all
  • (2024)iConPAL: LLM-guided Policy Authoring Assistant for Configuring IoT Defenses2024 IEEE Secure Development Conference (SecDev)10.1109/SecDev61143.2024.00014(76-92)Online publication date: 7-Oct-2024
  • (2024)A Survey on Verification of Security and Safety in IoT SystemsIEEE Access10.1109/ACCESS.2024.341307112(138627-138645)Online publication date: 2024
  • (2023)A Survey on Conflict Detection in IoT-based Smart HomesACM Computing Surveys10.1145/362951756:5(1-40)Online publication date: 27-Nov-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
BuildSys '19: Proceedings of the 6th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation
November 2019
413 pages
ISBN:9781450370059
DOI:10.1145/3360322
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 November 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Environment safety
  2. IoT conflicts
  3. Smart Environment

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

BuildSys '19
Sponsor:

Acceptance Rates

BuildSys '19 Paper Acceptance Rate 40 of 131 submissions, 31%;
Overall Acceptance Rate 148 of 500 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)125
  • Downloads (Last 6 weeks)10
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)iConPAL: LLM-guided Policy Authoring Assistant for Configuring IoT Defenses2024 IEEE Secure Development Conference (SecDev)10.1109/SecDev61143.2024.00014(76-92)Online publication date: 7-Oct-2024
  • (2024)A Survey on Verification of Security and Safety in IoT SystemsIEEE Access10.1109/ACCESS.2024.341307112(138627-138645)Online publication date: 2024
  • (2023)A Survey on Conflict Detection in IoT-based Smart HomesACM Computing Surveys10.1145/362951756:5(1-40)Online publication date: 27-Nov-2023
  • (2023)Maverick: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at RuntimeProceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3558482.3590188(73-84)Online publication date: 29-May-2023
  • (2023)PlanIoT: A Framework for Adaptive Data Flow Management in IoT-enhanced Spaces2023 IEEE/ACM 18th Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)10.1109/SEAMS59076.2023.00029(157-168)Online publication date: May-2023
  • (2023)Detecting Smart Home Automation Application Interferences with Domain KnowledgeProceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering10.1109/ASE56229.2023.00070(1086-1097)Online publication date: 11-Nov-2023
  • (2023)On the Security of Smart Home Systems: A SurveyJournal of Computer Science and Technology10.1007/s11390-023-2488-338:2(228-247)Online publication date: 30-Mar-2023
  • (2022)Conflict Detection and Resolution in IoT Systems: A SurveyIoT10.3390/iot30100123:1(191-218)Online publication date: 28-Feb-2022
  • (2022)DeResolver: A Decentralized Conflict Resolution Framework with Autonomous Negotiation for Smart City ServicesACM Transactions on Cyber-Physical Systems10.1145/35290966:4(1-27)Online publication date: 5-Nov-2022
  • (2021)Towards Resolving Thermal Comfort Conflicts in Shared SpacesExtended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411763.3451512(1-5)Online publication date: 8-May-2021
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media