Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3359789.3359840acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article
Public Access

Aegis: a context-aware security framework for smart home systems

Published: 09 December 2019 Publication History

Abstract

Our everyday lives are expanding fast with the introduction of new Smart Home Systems (SHSs). Today, a myriad of SHS devices and applications are widely available to users and have already started to re-define our modern lives. Smart home users utilize the apps to control and automate such devices. Users can develop their own apps or easily download and install them from vendor-specific app markets. App-based SHSs offer many tangible benefits to our lives, but also unfold diverse security risks. Several attacks have already been reported for SHSs. However, current security solutions consider smart home devices and apps individually to detect malicious actions rather than the context of the SHS as a whole. The existing mechanisms cannot capture user activities and sensor-device-user interactions in a holistic fashion. To address these issues, in this paper, we introduce Aegis, a novel context-aware security framework to detect malicious behavior in a SHS. Specifically, Aegis observes the states of the connected smart home entities (sensors and devices) for different user activities and usage patterns in a SHS and builds a contextual model to differentiate between malicious and benign behavior. We evaluated the efficacy and performance of Aegis in multiple smart home settings (i.e., single bedroom, double bedroom, duplex) with real-life users performing day-to-day activities and real SHS devices. We also measured the performance of Aegis against five different malicious behaviors. Our detailed evaluation shows that Aegis can detect malicious behavior in SHS with high accuracy (over 95%) and secure the SHS regardless of the smart home layout, device configuration, installed apps, and enforced user policies. Finally, Aegis achieves minimum overhead in detecting malicious behavior in SHS, ensuring easy deployability in real-life smart environments.

References

[1]
Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, and A Selcuk Uluagac. 2018. Peek-a-Boo: I see your smart home activities, even encrypted! arXiv preprint arXiv:1808.02741 (2018).
[2]
Devdatta Akhawe and Adrienne Porter Felt. 2013. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness. In USENIX Security Symposium.
[3]
Amazon AWS. 2019. Splitting the Data into Training and Evaluation Data. https://docs.aws.amazon.com/machine-learning/latest/dg/splitting-the-data-into-training-and-evaluation-data.html
[4]
Leonardo Babun, Amit Kumar Sikder, Abbas Acar, and A Selcuk Uluagac. 2018. IoTDots: A Digital Forensics Framework for Smart Environments. arXiv preprint arXiv:1809.00745 (2018).
[5]
Joseph Bugeja, Andreas Jacobsson, and Paul Davidsson. 2016. On Privacy and Security Challenges in Smart Connected Homes. In IEEE European Intelligence and Security Informatics Conference (EISIC),.
[6]
Z. Berkay Celik, Leonardo Babun, Amit Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A. Selcuk Uluagac. 2018. Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium.
[7]
Antorweep Chakravorty, Tomasz Wlodarczyk, and Chunming Rong. 2013. Privacy preserving data analytics for smart homes. In IEEE Security and Privacy Workshops (SPW).
[8]
Haotian Chi, Qiang Zeng, Xiaojiang Du, and Jiaping Yu. 2018. Cross-App Threats in Smart Homes: Categorization, Detection and Handling. arXiv preprint arXiv:1808.02125 (2018).
[9]
Sudhir Chitnis, Neha Deshpande, and Arvind Shaligram. 2016. An investigative study for smart home security: Issues, challenges and countermeasures. In Wireless Sensor Network.
[10]
Tamara Denning, Tadayoshi Kohno, and Henry M. Levy. 2013. Computer Security and the Modern Home. In Commun. ACM.
[11]
Earlence Fernandes, Jaeyeon Jung, and Atul Prakash. 2016. Security analysis of emerging smart home applications. In IEEE Symposium on Security and Privacy (SP).
[12]
Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, and Atul Prakash. 2017. Security implications of permission models in smart-home application frameworks. In IEEE Security & Privacy.
[13]
Behrang Fouladi and Sahand Ghanoun. 2013. Honey, I'm Home!!, Hacking ZWave Home Automation Systems. In Black Hat.
[14]
Google. 2019. Cloud AutoML. https://cloud.google.com/automl/
[15]
Rachel Gunter. 2017. Making Sense of Samsung's SmartThings Initiative. https://marketrealist.com/2017/12/making-sense-samsungs-smartthings-initiative
[16]
Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, and David Wagner. 2016. Smart locks: Lessons for securing commodity internet of things devices. In Proceedings of the 11th ACM on Asia conference on computer and communications security.
[17]
IoTBench. 2017. https://github.com/IoTBench. [Online; accessed 09-October-2018].
[18]
Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Z Morley Mao, Atul Prakash, and Shanghai JiaoTong Unviersity. 2017. ContexIoT: Towards providing contextual integrity to appified IoT platforms. In Proceedings of The Network and Distributed System Security Symposium.
[19]
Julian Keilson. 2012. Markov chain models---rarity and exponentiality. Vol. 28. Springer Science & Business Media.
[20]
Changmin Lee, Luca Zappaterra, Kwanghee Choi, and Hyeong-Ah Choi. 2014. Securing smart home: Technologies, security challenges, and security requirements. In IEEE Conference on Communications and Network Security (CNS).
[21]
Byungho Min and Vijay Varadharajan. 2015. Design and evaluation of feature distributed malware attacks against the Internet of Things (IoT). In 20th International Conference on Engineering of Complex Computer Systems (ICECCS). IEEE.
[22]
Mujahid Mohsin, Zahid Anwar, Ghaith Husari, Ehab Al-Shaer, and Mohammad Ashiqur Rahman. 2016. IoTSAT: A formal framework for security analysis of the internet of things (IoT). In IEEE Conference on Communications and Network Security (CNS).
[23]
Sukhvir Notra, Muhammad Siddiqi, Hassan Habibi Gharakheili, Vijay Sivaraman, and Roksana Boreli. 2014. An experimental study of security and privacy risks with emerging household appliances. In IEEE Conference on Communications and Network Security (CNS).
[24]
Charith Perera, Arkady Zaslavsky, Peter Christen, and Dimitrios Georgakopoulos. 2014. Context aware computing for the internet of things: A survey. IEEE communications surveys & tutorials 16, 1 (2014), 414--454.
[25]
Michael Schiefer. 2015. Smart home definition and security threats. In Ninth International Conference on IT Security Incident Management & IT Forensics (IMF). IEEE.
[26]
Tara Seals. 2015. BlackHat: Critical ZigBee Flaw Compromises Smart Homes. https://www.infosecurity-magazine.com/news/blackhatcritical-zigbee-flaw-smart/
[27]
Amit Kumar Sikder, Hidayet Aksu, and A. Selcuk Uluagac. 2017. 6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices. In 26th USENIX Security Symposium.
[28]
Amit Kumar Sikder, Hidayet Aksu, and A Selcuk Uluagac. 2019. A Context-aware Framework for Detecting Sensor-based Threats on Smart Devices. In IEEE Transactions on Mobile Computing.
[29]
Amit Kumar Sikder, Hidayet Aksu, and A Selcuk Uluagac. 2019. Context-aware intrusion detection method for smart devices with sensors. US Patent App. 15/729,092.
[30]
Vijay Sivaraman, Dominic Chan, Dylan Earl, and Roksana Boreli. 2016. Smartphones attacking smart-homes. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks.
[31]
Vijay Sivaraman, Hassan Habibi Gharakheili, Arun Vishwanath, Roksana Boreli, and Olivier Mehani. 2015. Network-level security and privacy control for smart-home IoT devices. In 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE.
[32]
Statista. 2018. Installed base of home automation/smart home systems in the United States from 2012 to 2017 (in millions). https://www.statista.com/statistics/286813/installed-base-of-smart-home-systems-us/
[33]
Biljana L Risteska Stojkoska and Kire V Trivodaliev. 2017. A review of Internet of Things for smart home: Challenges and solutions. Elsevier.
[34]
Darlene Storm. 2016. Hackers demonstrated first ransomware for IoT thermostats at DEF CON. https://www.computerworld.com/article/3105001/security/hackers-demonstrated-first-ransomware-for-iot-thermostats-at-def-con.html
[35]
Yuan Tian, Nan Zhang, Yueh-Hsun Lin, XiaoFeng Wang, Blase Ur, XianZheng Guo, and Patrick Tague. 2017. SmartAuth: User-Centered Authorization for the Internet of Things. In 26th USENIX Security Symposium.
[36]
Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl Gunter. 2018. Fear and Logging in the Internet of Things. In ISOC NDSS.
[37]
Nong Ye et al. [n.d.]. A markov chain model of temporal behavior for anomaly detection. In Proceedings of the 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, Vol. 166. West Point, NY, 169.
[38]
Amit Kumar Sikder Z. Berkay Celik, Leonardo Babun. 2018. A micro-benchmark suite to assess the effectiveness of tools designed for IoT apps. https://github.com/IoTBench/

Cited By

View all
  • (2024)How to Keep Balance between Interaction and Automation? Toward User Overall Positive Experience of IoT-Based Smart Home DesignElectronics10.3390/electronics1307137513:7(1375)Online publication date: 5-Apr-2024
  • (2024)IMPROVING SECURITY OF IOT DEVICE COMMUNICATION USING MODIFIED HASHING SOLUTIONShodhKosh: Journal of Visual and Performing Arts10.29121/shodhkosh.v5.i5.2024.18855:5Online publication date: 31-May-2024
  • (2024)IMPLEMENTING TOKEN-BASED AUTHENTICATION AND MODIFIED HASHING FOR IOT SECURITYShodhKosh: Journal of Visual and Performing Arts10.29121/shodhkosh.v5.i1.2024.18805:1Online publication date: 31-Jan-2024
  • Show More Cited By

Index Terms

  1. Aegis: a context-aware security framework for smart home systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ACSAC '19: Proceedings of the 35th Annual Computer Security Applications Conference
    December 2019
    821 pages
    ISBN:9781450376280
    DOI:10.1145/3359789
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 December 2019

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. IoT security
    2. context-awareness
    3. intrusion detection
    4. malware analysis
    5. smart home platforms

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    ACSAC '19
    ACSAC '19: 2019 Annual Computer Security Applications Conference
    December 9 - 13, 2019
    Puerto Rico, San Juan, USA

    Acceptance Rates

    ACSAC '19 Paper Acceptance Rate 60 of 266 submissions, 23%;
    Overall Acceptance Rate 104 of 497 submissions, 21%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)295
    • Downloads (Last 6 weeks)36
    Reflects downloads up to 03 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)How to Keep Balance between Interaction and Automation? Toward User Overall Positive Experience of IoT-Based Smart Home DesignElectronics10.3390/electronics1307137513:7(1375)Online publication date: 5-Apr-2024
    • (2024)IMPROVING SECURITY OF IOT DEVICE COMMUNICATION USING MODIFIED HASHING SOLUTIONShodhKosh: Journal of Visual and Performing Arts10.29121/shodhkosh.v5.i5.2024.18855:5Online publication date: 31-May-2024
    • (2024)IMPLEMENTING TOKEN-BASED AUTHENTICATION AND MODIFIED HASHING FOR IOT SECURITYShodhKosh: Journal of Visual and Performing Arts10.29121/shodhkosh.v5.i1.2024.18805:1Online publication date: 31-Jan-2024
    • (2024)Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT EventsProceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3643833.3656124(101-112)Online publication date: 27-May-2024
    • (2024)Make Your Home Safe: Time-aware Unsupervised User Behavior Anomaly Detection in Smart Homes via Loss-guided MaskProceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining10.1145/3637528.3671708(3551-3562)Online publication date: 25-Aug-2024
    • (2024)The Rocky Road to Sustainable SecurityIEEE Security and Privacy10.1109/MSEC.2024.342988822:5(82-86)Online publication date: 1-Sep-2024
    • (2024)Kalis2.0—A SECaaS-Based Context-Aware Self-Adaptive Intrusion Detection System for IoTIEEE Internet of Things Journal10.1109/JIOT.2023.333394811:7(12579-12601)Online publication date: 1-Apr-2024
    • (2024)IoT-AD: A Framework to Detect Anomalies Among Interconnected IoT DevicesIEEE Internet of Things Journal10.1109/JIOT.2023.328571411:1(478-489)Online publication date: 1-Jan-2024
    • (2024)Enhancing Intrusion Detection in IIoT Environments: A Scalable and Economical Approach with Metric Active Learning2024 Second International Conference on Intelligent Cyber Physical Systems and Internet of Things (ICoICI)10.1109/ICoICI62503.2024.10696440(1-6)Online publication date: 28-Aug-2024
    • (2024)Real Time Monitoring and Configuration Interface for Smart Home Device Management Using Streamlit and Pygame2024 International Conference on Advances in Data Engineering and Intelligent Computing Systems (ADICS)10.1109/ADICS58448.2024.10533557(1-7)Online publication date: 18-Apr-2024
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media