[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3281411.3281440acmconferencesArticle/Chapter ViewAbstractPublication PagesconextConference Proceedingsconference-collections
research-article

IotSan: fortifying the safety of IoT systems

Published: 04 December 2018 Publication History

Abstract

Today's IoT systems include event-driven smart applications (apps) that interact with sensors and actuators. A problem specific to IoT systems is that buggy apps, unforeseen bad app interactions, or device/communication failures, can cause unsafe and dangerous physical states. Detecting flaws that lead to such states, requires a holistic view of installed apps, component devices, their configurations, and more importantly, how they interact. In this paper, we design IotSan, a novel practical system that uses model checking as a building block to reveal "interaction-level" flaws by identifying events that can lead the system to unsafe states. In building IotSan, we design novel techniques tailored to IoT systems, to alleviate the state explosion associated with model checking. IotSan also automatically translates IoT apps into a format amenable to model checking. Finally, to understand the root cause of a detected vulnerability, we design an attribution mechanism to identify problematic and potentially malicious apps. We evaluate IotSan on the Samsung SmartThings platform. From 76 manually configured systems, IotSan detects 147 vulnerabilities. We also evaluate IotSan with malicious SmartThings apps from a previous effort. IotSan detects the potential safety violations and also effectively attributes these apps as malicious.

Supplementary Material

MP4 File (p191-nguyen.mp4)

References

[1]
M. Ahmad. 2014. Reliability Models for the Internet of Things: A Paradigm Shift. In 2014 IEEE International Symposium on Software Reliability Engineering Workshops. 52--59.
[2]
R. Alena, R. Gilstrap, J. Baldwin, T. Stone, and P. Wilson. 2011. Fault tolerance in ZigBee wireless sensor networks. In 2011 Aerospace Conference. 1--15.
[3]
Amazon. 2018. Alexa. https://developer.amazon.com/alexa. (June 2018).
[4]
Apple. 2018. HomeKit. https://developer.apple.com/homekit/. (June 2018).
[5]
C. Baier and J. P. Katoen. 2008. Principles of Model Checking. The MIT Press, Cambridge, Massachusetts, London, England.
[6]
Brian Belleville, Patrick Biernat, Adam Cotenoff, Kevin Hock, Tanner Prynn, Sivaranjani Sankaralingam, Terry Sun, and Daniel Mayer. 2018. Internet of Things Security. https://www.nccgroup.trust/us/our-research/internet-of-things-security/. (2018).
[7]
Z. Berkay Celik, E. Fernandes, E. Pauley, G. Tan, and P. McDaniel. 2018. Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities. ArXiv e-prints (Sept. 2018). arXiv:cs.CR/1809.06962
[8]
Elisa Bertino, Kim-Kwang Raymond Choo, Dimitrios Georgakopolous, and Surya Nepal. 2016. Internet of Things (IoT): Smart and Secure Service Delivery. ACM Trans. Internet Technol. 16, 4 (Dec. 2016).
[9]
August Betzler, Carles Gomez, Ilker Demirkol, and Josep Paradells. 2014. A Holistic Approach to ZigBee Performance Enhancement for Home Automation Networks. Sensors 14, 8 (2014), 14932--14970.
[10]
Dirk Beyer and Thomas Lemberger. 2017. Software Verification: Testing vs. Model Checking. In Hardware and Software: Verification and Testing. Springer International Publishing, 99--114.
[11]
Armin Biere, Alessandro Cimatti, Edmund Clarke, and Yunshan Zhu. 1999. Symbolic Model Checking without BDDs. Springer, Heidelberg, 193--207.
[12]
Christoph Busold, Stephan Heuser, Jon Rios, Ahmad-Reza Sadeghi, and N. Asokan. 2015. Smart and secure cross-device apps for the internet of advanced things. In Proc. Financial Cryptography and Data Security. Puerto Rico, US.
[13]
T. Cattel. 1994. Modelization and verification of a multiprocessor realtime OS kernel. In Proc. 7th FORTE Conference. Bern, Switzerland, 35--51.
[14]
Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A. Selcuk Uluagac. 2018. Sensitive Information Tracking in Commodity IoT. In USENIX Security 18. Baltimore, MD.
[15]
Z. Berkay Celik, Patrick McDaniel, and Gang Tan. 2018. Soteria: Automated IoT Safety and Security Analysis. In USENIX ATC 18. Boston, MA.
[16]
H. Chandra, E. Anggadjaja, P. S. Wijaya, and E. Gunawan. 2016. Internet of Things: Over-the-Air (OTA) firmware update in Lightweight mesh network protocol for smart urban development. In APCC 16. 115--118.
[17]
J. Chaves. 1991. Formal methods at AT&T, an industrial usage report. In Proc. 4th FORTE Conference. Sydney, Australia, 83--90.
[18]
Yunja Choi. 2007. From NuSMV to SPIN: Experiences with model checking flight guidance systems. Springer Formal Methods in System Design 30, 3 (01 Jun 2007), 199--216.
[19]
Edmund M. Clarke, William Klieber, Miloš Nováček, and Paolo Zuliani. 2012. Tools for Practical Software Verification. Springer, Heidelberg. 1--30 pages.
[20]
SmartThings Community. 2018. Community Smart Apps. https://community.smartthings.com/c/smartapps. (Sept. 2018).
[21]
Lucas Cordeiro, Jeremy Morse, Denis Nicole, and Bernd Fischer. 2012. Context-Bounded Model Checking with ESBMC 1.17. Springer, Heidelberg, 534--537.
[22]
A. Costin, J. Zaddach, A. Francillon, and D. Balzarotti. 2014. A large-scale analysis of the security of embedded firmwares. In Proc. USENIX Security 14. San Diego, CA, USA, 95--110.
[23]
Jason Croft, Ratul Mahajan, Matthew Caesar, and Madan Musuvathi. 2015. Systematically Exploring the Behavior of Control Programs. In USENIX ATC 15. Santa Clara, CA, 165--176.
[24]
CropMetrics. 2018. Irrigation management. http://cropmetrics.com/. (2018).
[25]
Dolly Das and Bobby Sharma. 2016. General Survey on Security Issues on Internet of Things. International Journal of Computer Applications 139, 2 (2016).
[26]
Yifei Dong, Xiaoqun Du, Y. S. Ramakrishna, C. R. Ramakrishnan, I. V. Ramakrishnan, Scott A. Smolka, Oleg Sokolsky, Eugene W. Stark, and David S. Warren. 1999. Fighting Livelock in the i-Protocol: A Comparative Study of Verification Tools. Springer, Heidelberg, 74--88.
[27]
Roya Ensafi, Jong Chun Park, Deepak Kapur, and Jedidiah R. Crandall. 2010. Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking. In USENIX Security 10. USA.
[28]
E. Fernandes, J. Jung, and A. Prakash. 2016. Security Analysis of Emerging Smart Home Applications. In Proc. IEEE Symposium on Security and Privacy. San Jose, CA, USA, 636--654.
[29]
E. Fernandes, J. Paupore, A. Rahmati, D. Simionato, M. Conti, and A. Prakash. 2016. FlowFence: Practical Data Protection for Emerging IoT Application Frameworks. In USENIX Security 16. USA, 531--548.
[30]
Joe Filippello. 2018. SmartSense Presence Sensor Failure. https://community.smartthings.com/t/smartsense-presence-sensor-failure/16644/9. (June 2018).
[31]
D. Fisher. 2018. Pair of Bugs Open Honeywell Home Controllers Up to Easy Hacks. https://threatpost.com/pair-of-bugs-open-honeywell-home-controllers-up-to-easy-hacks/113965/. (June 2018).
[32]
B. Fouladi and S. Ghanoun. 2013. Honey, I'm home!! - hacking z-wave home automation systems. Black Hat, Las Vegas, NV, USA.
[33]
Patrice Godefroid and Koushik Sen. 2018. Combining Model Checking and Testing. Springer International Publishing, 613--649.
[34]
Dorset Gray. 2018. Devices Offline and Unavailable. https://community.smartthings.com/t/devices-offline-and-unavailable/100248. (June 2018).
[35]
Alex Groce, Klaus Havelund, Gerard Holzmann, Rajeev Joshi, and Ru-Gang Xu. 2014. Establishing flight software reliability: testing, model checking, constraint-solving, monitoring and learning. Annals of Mathematics and Artificial Intelligence (2014), 315--349.
[36]
Amy Groden-Morrison. 2018. How the Internet of Things will Drive Mobile App Development. https://www.alphasoftware.com/blog/internet-of-things-will-drive-mobile-app-development/. (June 2018).
[37]
Groovy. 2018. Type checking extensions. http://docs.groovy-lang.org/next/html/documentation/type-checking-extensions.html. (June 2018).
[38]
John Hatcliff and Matthew Dwyer. 2001. Using the Bandera Tool Set to Model-Check Properties of Concurrent Java Software. Springer, Heidelberg, 39--58.
[39]
John Hatcliff and Matthew Dwyer. 2018. About Bandera. http://bandera.projects.cs.ksu.edu/. (June 2018).
[40]
A. Hesseldahl. 2018. A Hacker's-Eye View of the Internet of Things. https://www.recode.net/2015/4/7/11561182/a-hackers-eye-view-of-the-internet-of-things. (June 2018).
[41]
G. Ho, D. Leung, P. Mishra, A. Hosseini, D. Song, and D. Wagner. 2016. Smart locks: Lessons for securing commodity internet of things devices. In ACM ASIACCS 16. China, 461--472.
[42]
G. J. Holzmann. 1994. Proving the value of formal methods. In Proc. 7th FORTE Conference. Bern, Switzerland, 385--396.
[43]
G.J. Holzmann. 1994. The theory and practice of a formal method: NewCoRe. In 13th IFIP World Computer Congress. Germany.
[44]
G. J. Holzmann. 1997. The Model Checker Spin. In IEEE Transaction on Software Engineering. Vol. 23. 279--295.
[45]
G. J. Holzmann. 1998. An Analysis of Bitstate Hashing. In Formal Methods in System Design, Vol. 13. 289--307.
[46]
IBM. 2018. IBM IoT for manufacturing. https://www.ibm.com/internet-of-things/industries/iot-manufacturing. (2018).
[47]
IFTTT. 2018. IFTTT Homepage. https://ifttt.com/. (June 2018).
[48]
Texas Instruments. 2018. EZSync CC2531 Evaluation Module USB Dongle. http://www.ti.com/tool/CC2531EMK. (June 2018).
[49]
Intel. 2018. Smart Buildings. https://www.intel.com/content/www/us/en/internet-of-things/smart-building-solutions.html. (June 2018).
[50]
BI Intelligence. 2018. Here's how the Internet of Things will Explode by 2020. http://www.businessinsider.com/iot-ecosystem-internet-of-things-forecasts-and-business-opportunities/2016-2. (June 2018).
[51]
Ranjit Jhala and Rupak Majumdar. 2009. Software model checking. ACM Computing Surveys (CSUR) 41, 4 (2009), 21.
[52]
Y. J. Jia, Q. A. Chen, S. Wangy, A. Rahmati, E. Fernandes, Z. M. Mao, and A. Prakash. 2017. ContexIoT: Towards Providing Contextual Integrity to Appified IoT Platforms. In NDSS'17. USA.
[53]
Daniel Kroening and Michael Tautschnig. 2014. CBMC - C Bounded Model Checker. Springer, Heidelberg, 389--391.
[54]
J. S. Lee, Yuan-Ming Wang, and C. C. Shen. 2012. Performance evaluation of ZigBee-based sensor networks using empirical measurements. In IEEE CYBER 12. 58--63.
[55]
Flavio Lerda, Nishant Sinha, and Michael Theobald. 2003. Symbolic Model Checking of Software. Elsevier Electronic Notes in Theoretical Computer Science 89 (Sept. 2003), 480--498.
[56]
Chieh-Jan Mike Liang, Börje F. Karlsson, Nicholas D. Lane, Feng Zhao, Junbei Zhang, Zheyi Pan, Zhao Li, and Yong Yu. 2015. SIFT: Building an Internet of Safe Things. In ACM IPSN '15. USA, 298--309.
[57]
Logitech. 2018. Harmony Hub. https://www.logitech.com/en-us/product/harmony-hub. (June 2018).
[58]
N. Lomas. 2018. Critical Flaw IDed In ZigBee Smart Home Devices. https://techcrunch.com/2015/08/07/critical-flaw-ided-in-zigbee-smart-home-devices/. (June 2018).
[59]
Medria Solution. 2018. Livestock monitoring. http\protect\kern+.2222em\relax//www.medria.fr/en/solutions/. (2018).
[60]
M. U. Memon, L. X. Zhang, and B. Shaikh. 2012. Packet loss ratio evaluation of the impact of interference on ZigBee network caused by Wi-Fi (IEEE 802.11b/g) in e-health environment. In 2012 IEEE 14th International Conference on e-Health Networking, Applications and Services (Healthcom). 462--465.
[61]
Andrew Meola. 2018. How the Internet of Things will affect security & privacy. http://www.businessinsider.com/internet-of-things-security-privacy-2016-8. (June 2018).
[62]
Florian Merz, Stephan Falke, and Carsten Sinz. 2012. LLBMC: Bounded Model Checking of C and C++ Programs Using a Compiler IR. Springer Berlin Heidelberg, Berlin, Heidelberg, 146--161.
[63]
Xianghang Mi, Feng Qian, Ying Zhang, and XiaoFeng Wang. 2017. An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance. In ACM IMC '17. USA, 398--404.
[64]
Microsoft. 2018. Azure IoT. https://azure.microsoft.com/en-us/services/iot-hub/. (June 2018).
[65]
Microsoft. 2018. Microsoft IoT for manufacturing. https://www.microsoft.com/en-us/internet-of-things/manufacturing. (2018).
[66]
M. Mohsin, Z. Anwar, G. Husari, E. Al-Shaer, and M. A. Rahman. 2016. IoTSAT: A formal framework for security analysis of the Internet of Things (IoT). In IEEE CNS 16. USA, 180--188.
[67]
M Mohsin, Z. Anwar, Farhat Zaman, and Ehab Al-Shaer. 2017. IoTChecker: A data-driven framework for security analytics of Internet of Things configurations. Elsevier Computer and Security 70 (Sept. 2017), 199--223.
[68]
M Mohsin, MU Sardar, O. Hasan, and Z. Anwar. 2017. IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things. IEEE Acess 5 (April 2017), 5494--5505.
[69]
Julie L. Newcomb, Satish Chandra, Jean-Baptiste Jeannin, Cole Schlesinger, and Manu Sridharan. 2017. IOTA: A Calculus for Internet of Things Automation. In Proceedings of the 2017 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (Onward! 2017). 119--133.
[70]
K. Pelechrinis, M. Iliofotou, and S. V. Krishnamurthy. 2011. Denial of Service Attacks in Wireless Networks: The Case of Jammers. IEEE Communications Surveys Tutorials 13, 2 (Second 2011), 245--257.
[71]
Eyal Ronen, Colin O'Flynny, Adi Shamir, and Achi-Or Weingarten. 2017. IoT Goes Nuclear: Creating a ZigBee Chain Reaction. In Proc. IEEE Symposium on Security and Privacy. San Jose, CA, USA, 195--212.
[72]
E. Ronen and A. Shamir. 2016. Extended functionality attacks on IoT devices: The case of smart lights. In Proc. 2016 IEEE European Symposium on Security and Privacy. Germany, 3--12.
[73]
J. E. Giral Sala, R. Morales Caporal, E. Bonilla Huerta, J. J. Rodriguez Rivas, and J. d. J. Rangel Magdaleno. 2016. A Smart Switch to Connect and Disconnect Electrical Devices at Home by Using Internet. IEEE Latin America Transactions 14, 4 (April 2016), 1575--1581.
[74]
Samsung. 2018. SmartThings. https://www.smartthings.com/. (June 2018).
[75]
Letian Sha, Fu Xiao, Wei Chen, and Jing Sun. 2017. IIoT-SIDefender: Detecting and defense against the sensitive information leakage in industry IoT. World Wide Web (Apr 2017), 1--30.
[76]
Muhammad K Shahzad, Dang Tu Nguyen, Vyacheslav Zalyubovskiy, and Hyunseung Choo. 2018. LNDIR: A lightweight non-increasing delivery-latency interval-based routing for duty-cycled sensor networks. International Journal of Distributed Sensor Networks 14, 4 (2018).
[77]
Natarajan Shankar. 2018. Combining Model Checking and Deduction. Springer International Publishing, 651--684.
[78]
Hocheol Shin, Yunmok Son, Young-Seok Park, Yujin Kwon, and Yongdae Kim. 2016. Sampling Race: Bypassing Timing-Based Analog Active Sensor Spoofing Detection on Analog-Digital Systems. In USENIX Workshop on Offensive Technologies.
[79]
SmartThings. 2018. SmartThings Community on GitHub. https://github.com/SmartThingsCommunity/SmartThingsPublic/tree/master/smartapps. (Sept. 2018).
[80]
SmartThings. 2018. SmartThings management page. https://graph-na02-useast1.api.smartthings.com/. (June 2018).
[81]
Yunmok Son, Hocheol Shin, Dongkwan Kim, Young-Seok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, Yongdae Kim, et al. 2015. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors. In USENIX Security 15. 881--896.
[82]
Spin. 2018. What is Spin? http://spinroot.com/spin/whatispin.html. (June 2018).
[83]
A. Tekeoglu and A. S. Tosun. 2016. A Testbed for Security and Privacy Analysis of IoT Devices. In IEEE MASS 16. 343--348.
[84]
Bent Thomsen, Kasper Søe Luckow, Lone Leth, and Thomas Bøgholm. 2015. From Safety Critical Java Programs to Timed Process Models. Springer International Publishing, 319--338.
[85]
Yuan Tian, Nan Zhang, Yueh-Hsun Lin, XiaoFeng Wang, Blase Ur, Xianzheng Guo, and Patrick Tague. 2017. SmartAuth: User-Centered Authorization for the Internet of Things. In USENIX Security 17. Vancouver, BC, 361--378.
[86]
Blase Ur, Melwyn Pak Yong Ho, Stephen Brawner, Jiyun Lee, Sarah Mennicken, Noah Picard, Diane Schulze, and Michael L. Littman. 2016. Trigger-Action Programming in the Wild: An Analysis of 200,000 IFTTT Recipes. In ACM CHI Conference on Human Factors in Computing Systems. USA, 3227--3231.
[87]
Vera. 2018. Smart Home Controller. http://getvera.com/controllers/vera3/. (June 2018).
[88]
Amauri Viguera. 2018. More unavailable devices. https://community.smartthings.com/t/more-unavailable-devices/98584. (June 2018).
[89]
Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl Gunter. 2018. Fear and Logging in the Internet of Things. In NDSS'18. USA.
[90]
Evan Wilkins. 2018. Devices showing up as 'This device is unavailable at the moment'. https://community.smartthings.com/t/devices-showing-up-as-this-device-is-unavailable-at-the-moment/94724. (June 2018).
[91]
Judson Wilson, Dan Boneh, Riad S. Wahby, Philip Levis, Henry Corrigan-Gibbs, and Keith Winstein. 2017. Trust but Verify: Auditing the Secure Internet of Things. In ACM MobiSys '17. USA, 464--474.
[92]
F. Xiao, L. T. Sha, Z. P. Yuan, and R. C. Wang. 2017. VulHunter: A Discovery for unknown Bugs based on Analysis for known patches in Industry Internet of Things. IEEE Transactions on Emerging Topics in Computing PP, 99 (2017), 1--1.
[93]
Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li, and Hongbin Zhao. 2017. A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet of Things Journal PP (April 2017), 1--10.

Cited By

View all
  • (2024)Safety Assurance in IoT-Based Smart HomesEdge Computing Architecture - Architecture and Applications for Smart Cities10.5772/intechopen.1005492Online publication date: 2-Jul-2024
  • (2024)Practical Integrity Validation in the Smart Home with HomeEndorserProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656116(207-218)Online publication date: 27-May-2024
  • (2024)iConPAL: LLM-guided Policy Authoring Assistant for Configuring IoT Defenses2024 IEEE Secure Development Conference (SecDev)10.1109/SecDev61143.2024.00014(76-92)Online publication date: 7-Oct-2024
  • Show More Cited By

Index Terms

  1. IotSan: fortifying the safety of IoT systems

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CoNEXT '18: Proceedings of the 14th International Conference on emerging Networking EXperiments and Technologies
    December 2018
    408 pages
    ISBN:9781450360807
    DOI:10.1145/3281411
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 December 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Conference

    CoNEXT '18
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 198 of 789 submissions, 25%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)72
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 03 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Safety Assurance in IoT-Based Smart HomesEdge Computing Architecture - Architecture and Applications for Smart Cities10.5772/intechopen.1005492Online publication date: 2-Jul-2024
    • (2024)Practical Integrity Validation in the Smart Home with HomeEndorserProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656116(207-218)Online publication date: 27-May-2024
    • (2024)iConPAL: LLM-guided Policy Authoring Assistant for Configuring IoT Defenses2024 IEEE Secure Development Conference (SecDev)10.1109/SecDev61143.2024.00014(76-92)Online publication date: 7-Oct-2024
    • (2024)TapChecker: A Lightweight SMT-Based Conflict Analysis for Trigger-Action ProgrammingIEEE Internet of Things Journal10.1109/JIOT.2024.337455611:12(21411-21426)Online publication date: 15-Jun-2024
    • (2024)Threat Detection in Trigger-Action Programming Rules of Smart Home With Heterogeneous Information Network ModelIEEE Internet of Things Journal10.1109/JIOT.2024.336295011:10(18320-18334)Online publication date: 15-May-2024
    • (2024)Cascading Threat Analysis of IoT Devices in Trigger-Action PlatformsIEEE Internet of Things Journal10.1109/JIOT.2023.333527911:7(12240-12251)Online publication date: 1-Apr-2024
    • (2024)IoTFuzz: Automated Discovery of Violations in Smart Homes With Real EnvironmentIEEE Internet of Things Journal10.1109/JIOT.2023.332585111:6(10183-10196)Online publication date: 15-Mar-2024
    • (2024)SmartTracer: Anomaly-Driven Provenance Analysis Based on Device Correlation in Smart Home SystemsIEEE Internet of Things Journal10.1109/JIOT.2023.330808911:4(5731-5744)Online publication date: 15-Feb-2024
    • (2024)Ontology-Based Classification and Detection of the Smart Home Automation Rules ConflictsIEEE Access10.1109/ACCESS.2024.341563212(85072-85088)Online publication date: 2024
    • (2024)A Survey on Verification of Security and Safety in IoT SystemsIEEE Access10.1109/ACCESS.2024.341307112(138627-138645)Online publication date: 2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media