Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Niffler: Real-time Device-level Anomalies Detection in Smart Home

Published: 22 May 2023 Publication History
  • Get Citation Alerts
  • Abstract

    Device-level security has become a major concern in smart home systems. Detecting problems in smart home sytems strives to increase accuracy in near real time without hampering the regular tasks of the smart home. The current state of the art in detecting anomalies in smart home devices is mainly focused on the app level, which provides a basic level of security by assuming that the devices are functioning correctly. However, this approach is insufficient for ensuring the overall security of the system, as it overlooks the possibility of anomalies occurring at the lower layers such as the devices. In this article, we propose a novel notion, correlated graph, and with the aid of that, we develop our system to detect misbehaving devices without modifying the existing system. Our correlated graphs explicitly represent the contextual correlations among smart devices with little knowledge about the system. We further propose a linkage path model and a sensitivity ranking method to assist in detecting the abnormalities. We implement a semi-automatic prototype of our approach, evaluate it in real-world settings, and demonstrate its efficiency, which achieves an accuracy of around 90% in near real time.

    References

    [1]
    2013. Smart Building System Commissioning. Retrieved April. 30, 2019 from http://greenlightiot.com/2017/07/smart-building-system-commissioning/.
    [2]
    2016. Amazon, Amazon Echo Description. Retrieved February 22, 2019 from https://www.amazon.com/Amazon-Echo-And-Alexa-Devices.
    [3]
    2016. Ecobee Smart Thermostat. Retrieved April. 30, 2019 from https://www.smartthings.com/products/ecobee-smartthermostat-with-voice-vontrol.
    [4]
    2017. Home Awareness Simplified. Retrieved April 30, 2019 from https://getnotion.com/.
    [5]
    2017. Insteon Power Meter. Retrieved April 30 2019 from https://www.insteon.com/.
    [6]
    2018. AV-Test, Test: Fitness Wristbands Reveal Data. Retrieved February 22, 2019 from https://www.av-test.org/en/news/news-single-view/test-fitness-wristbands-reveal-data/.
    [7]
    2018. Fibaro Motion Sensor. Retrieved April 30, 2019 from http://www.fibaro.com/us/the-fibaro-system/.
    [8]
    2018. Nexia Schlage Motion Sensor. Retrieved April 30, 2019 from https://www.nexiahome.com/products_category/sensors-main.
    [9]
    2018. Samsung, Smart Doorlock. Retrieved February 22, 2019 from https://www.smartthings.com/products/danalock-v3-smart-lock.
    [10]
    2018. Samsung, Smart Light. Retrieved February 22, 2019 from https://www.smartthings.com/products/smartthings-smart-bulb.
    [11]
    2018. Samsung, Smart Plug. Retrieved February 22, 2019 from https://www.smartthings.com/products/smartthings-wifi-smart-plug.
    [13]
    2018. Samsung, Smart Siren. Retrieved February 22, 2019 from https://www.smartthings.com/products/smartthings-siren.
    [14]
    2018. Samsung, Smart Switch. Retrieved February 22, 2019 from https://www.smartthings.com/products/leviton-15a-switch.
    [15]
    Omar Alrawi, Chaz Lever, Manos Antonakakis, and Fabian Monrose. 2019. Sok: Security evaluation of home-based iot deployments. In Proceedings of the IEEE Symposium on Security and Privacy (S&P’19).
    [16]
    Eleftheria Athanasopoulou and Christoforos N. Hadjicostis. 2005. Probabilistic approaches to fault detection in networked discrete event systems. IEEE Trans. Neural Netw. 16, 5 (2005), 1042–1052.
    [17]
    Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz, and Matthias Hollick. 2015. Using channel state information for tamper detection in the internet of things. In Proceedings of the 31st Annual Computer Security Applications Conference. ACM, 131–140.
    [18]
    Francesco Basile, Pasquale Chiacchio, and Gianmaria De Tommasi. 2009. An efficient approach for online diagnosis of discrete event systems. IEEE Trans. Automat. Contr. 54, 4 (2009), 748–759.
    [19]
    Elisa Bertino, Kim-Kwang, Raymond Choo, Dimitrios Georgakopolous, and Surya Nepal. 2016. Internet of Things (IoT): Smart and secure service delivery. ACM Trans. Internet Technol. 16, 4 (2016), 1–7.
    [20]
    Luís M. A. Bettencourt, Aric A. Hagberg, and Levi B. Larkey. 2007. Separating the wheat from the chaff: Practical anomaly detection schemes in ecological applications of distributed sensor networks. In Proceedings of the International Conference on Distributed Computing in Sensor Systems. Springer, 223–239.
    [21]
    Purnima Bholowalia and Arvind Kumar. 2014. EBK-means: A clustering technique based on elbow method and k-means in WSN. Int. J. Comput. Appl. 105, 9 (2014), 17–24.
    [22]
    Patricia Bouyer, Fabrice Chevalier, and Deepak D’Souza. 2005. Fault diagnosis using timed automata. In Proceedings of the International Conference on Foundations of Software Science and Computation Structures. Springer, 219–233.
    [23]
    Joel W. Branch, Chris Giannella, Boleslaw Szymanski, Ran Wolff, and Hillol Kargupta. 2013. In-network outlier detection in wireless sensor networks. Knowl. Inf. Syst. 34, 1 (2013), 23–54.
    [24]
    Christoph Busold, Stephan Heuser, Jon Rios, Ahmad-Reza Sadeghi, and N. Asokan. 2015. Smart and secure cross-device apps for the internet of advanced things. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 272–290.
    [25]
    Maria Paola Cabasino, Alessandro Giua, Marco Pocci, and Carla Seatzu. 2011. Discrete event diagnosis using labeled Petri nets. An application to manufacturing systems. Contr. Eng. Pract. 19, 9 (2011), 989–1001.
    [26]
    Lilian K. Carvalho, João C. Basilio, and Marcos V. Moreira. 2012. Robust diagnosis of discrete event systems against intermittent loss of observations. Automatica 48, 9 (2012), 2068–2078.
    [27]
    Franck Cassez. 2009. A note on fault diagnosis algorithms. In Proceedings of the 48h IEEE Conference on Decision and Control (CDC’09) held jointly with the 28th Chinese Control Conference. IEEE, 6941–6946.
    [28]
    Franck Cassez. 2012. The complexity of codiagnosability for discrete event and timed systems. IEEE Trans. Automat. Contr. 57, 7 (2012), 1752–1764.
    [29]
    Elodie Chanthery and Yannick Pencolé. 2009. Monitoring and active diagnosis for discrete-event systems. IFAC Proc. Vol. 42, 8 (2009), 1545–1550.
    [30]
    David Chu, Amol Deshpande, Joseph M. Hellerstein, and Wei Hong. 2006. Approximate data collection in sensor networks using probabilistic models. In Proceedings of the 22nd International Conference on Data Engineering (ICDE’06). IEEE, 48–48.
    [31]
    Nigel Davies, Nina Taft, Mahadev Satyanarayanan, Sarah Clinch, and Brandon Amos. 2016. Privacy mediators: Helping IoT cross the chasm. In Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications. ACM, 39–44.
    [32]
    Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiaoyong Zhou, and Michael Grace. 2017. HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 122–133.
    [33]
    Min Ding, Dechang Chen, Kai Xing, and Xiuzhen Cheng. 2005. Localized fault-tolerant event boundary detection in sensor networks. In Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 2. IEEE, 902–913.
    [34]
    M. Dotoli, M. P. Fanti, and A. M. Mangini. 2008. Fault detection of discrete event systems using Petri nets and integer linear programming. IFAC Proc. Vol. 41, 2 (2008), 6554–6559.
    [35]
    Pablo A. Estévez, Michel Tesmer, Claudio A. Perez, and Jacek M. Zurada. 2009. Normalized mutual information feature selection. IEEE Trans. Neural Netw. 20, 2 (2009), 189–201.
    [36]
    Eric Fabre and Loïg Jezequel. 2010. On the construction of probabilistic diagnosers. IFAC Proc. Vol. 43, 12 (2010), 229–234.
    [37]
    Earlence Fernandes, Jaeyeon Jung, and Atul Prakash. 2016. Security analysis of emerging smart home applications. In Proceedings of the IEEE Symposium on Security and Privacy (SP’16). IEEE, 636–654.
    [38]
    Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, and Atul Prakash. 2016. Flowfence: Practical data protection for emerging iot application frameworks. In Proceedings of the 25th USENIX Security Symposium (USENIX Security’16). 531–548.
    [39]
    Behrang Fouladi and Sahand Ghanoun. 2013. Security evaluation of the Z-Wave wireless protocol. Black Hat USA 24 (2013), 1–2.
    [40]
    Joseph E. Gonzalez, Yucheng Low, Haijie Gu, Danny Bickson, and Carlos Guestrin. 2012. \(\lbrace\) PowerGraph \(\rbrace\) : Distributed \(\lbrace\) Graph-Parallel \(\rbrace\) computation on natural graphs. In Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI’12). 17–30.
    [41]
    Joseph E. Gonzalez, Reynold S. Xin, Ankur Dave, Daniel Crankshaw, Michael J. Franklin, and Ion Stoica. 2014. \(\lbrace\) GraphX \(\rbrace\) : Graph processing in a distributed dataflow framework. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI’14). 599–613.
    [42]
    Michael B. Greenwald and Sanjeev Khanna. 2004. Power-conserving computation of order-statistics over sensor networks. In Proceedings of the 23rd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. ACM, 275–285.
    [43]
    Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable feature learning for networks. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 855–864.
    [44]
    Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, and Patrick Tague. 2018. Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. In Proceedings of the IEEE Symposium on Security and Privacy (SP’18). IEEE, 836–852.
    [45]
    E. Hernandez-Flores, E. Lopez-Mellado, and A. Ramirez-Trevino. 2011. Diagnosability analysis of partially observable deadlock-free Petri Nets. In Proceedings of the 3rd International Workshop on Dependable Control of Discrete Systems. IEEE, 174–179.
    [46]
    Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, and David Wagner. 2016. Smart locks: Lessons for securing commodity internet of things devices. In Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, 461–472.
    [47]
    Abdolrasul Mohammadi Idghamishi and S. Hashtrudi Zad. 2004. Fault diagnosis in hierarchical discrete-event systems. In Proceedings of the 43rd IEEE Conference on Decision and Control (CDC’04), Vol. 1. IEEE, 63–68.
    [48]
    Chalermek Intanagonwiwat, Ramesh Govindan, and Deborah Estrin. 2000. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. ACM, 56–67.
    [49]
    Thierry Jéron, Hervé Marchand, Sahika Genc, and Stéphane Lafortune. 2008. Predictability of sequence patterns in discrete event systems. IFAC Proc. Vol. 41, 2 (2008), 537–543.
    [50]
    Yunhan Jack Jia, Qi Alfred Chen, Shiqi Wang, Amir Rahmati, Earlence Fernandes, Zhuoqing Morley Mao, Atul Prakash, and Shanghai JiaoTong Unviersity. 2017. ContexloT: Towards providing contextual integrity to appified IoT platforms. In Proceedings of the Network and Distributed System Security Symposium (NDSS’17).
    [51]
    Shengbing Jiang, Zhongdong Huang, Vigyan Chandra, and Ratnesh Kumar. 2001. A polynomial algorithm for testing diagnosability of discrete-event systems. IEEE Trans. Automat. Contr. 46, 8 (2001), 1318–1321.
    [52]
    George Jiroveanu, René K. Boel, and Behzad Bordbar. 2008. On-line monitoring of large Petri net models under partial observation. Discr. Event Dynam. Syst. 18, 3 (2008), 323–354.
    [53]
    Julian Keilson. 1974. Markov Chain Models–Rarity and Exponentiality.Technical Report. University of California—Berkeley Operations Research Center.
    [54]
    Ji Eun Kim, George Boulos, John Yackovich, Tassilo Barth, Christian Beckel, and Daniel Mosse. 2012. Seamless integration of heterogeneous devices and access control in smart homes. In Proceedings of the 8th International Conference on Intelligent Environments. IEEE, 206–213.
    [55]
    Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, and Jesse Walker. 2010. Challenges in access right assignment for secure home networks. In Proceedings of the USENIX Summit on Hot Topics in Security (HotSec’10).
    [56]
    Vladimir I. Levenshtein et al. 1966. Binary codes capable of correcting deletions, insertions, and reversals. In Soviet physics doklady, Vol. 10. Soviet Union, 707–710.
    [57]
    Samuel Madden, Michael J. Franklin, Joseph M. Hellerstein, and Wei Hong. 2002. TAG: A tiny aggregation service for ad-hoc sensor networks. ACM SIGOPS Operat. Syst. Rev. 36, SI (2002), 131–146.
    [58]
    Samuel R. Madden, Michael J. Franklin, Joseph M. Hellerstein, and Wei Hong. 2005. TinyDB: An acquisitional query processing system for sensor networks. ACM Trans. Datab. Syst. 30, 1 (2005), 122–173.
    [59]
    Parikshit N. Mahalle, Bayu Anggorojati, Neeli Rashmi Prasad, and Ramjee Prasad. 2012. Identity establishment and capability based access control (iecac) scheme for internet of things. In Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications. IEEE, 187–191.
    [60]
    Yan Meng, Wei Zhang, Haojin Zhu, and Xuemin Sherman Shen. 2018. Securing consumer IoT in the smart home: Architecture, challenges, and countermeasures. IEEE Wireless Commun. 25, 6 (2018), 53–59.
    [61]
    Benjamin Michele and Andrew Karpow. 2014. Using malicious media files to compromise the security and privacy of smart TVs. In Proceedings of the IEEE 11th Consumer Communications and Networking Conference (CCNC’14). IEEE, 1144–1145.
    [62]
    Y. Hida, P. Huang, and R. Nishtala. 2004. Aggregation query under uncertainty in sensor networks. Department of Electrical Engineering and Computer Science. University of California, Berkeley, Tech. Rep.
    [63]
    Sukhvir Notra, Muhammad Siddiqi, Hassan Habibi Gharakheili, Vijay Sivaraman, and Roksana Boreli. 2014. An experimental study of security and privacy risks with emerging household appliances. In Proceedings of the IEEE Conference on Communications and Network Security. IEEE, 79–84.
    [64]
    Temitope Oluwafemi, Tadayoshi Kohno, Sidhant Gupta, and Shwetak Patel. 2013. Experimental security analyses of non-networked compact fluorescent lamps: A case study of home automation security. In Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER’13). 13–24.
    [65]
    Themistoklis Palpanas, Dimitris Papadopoulos, Vana Kalogeraki, and Dimitrios Gunopulos. 2003. Distributed deviation detection in sensor networks. ACM SIGMOD Rec. 32, 4 (2003), 77–82.
    [66]
    Shijia Pan, Ningning Wang, Yuqiu Qian, Irem Velibeyoglu, Hae Young Noh, and Pei Zhang. 2015. Indoor person identification through footstep induced structural vibration. In Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications. ACM, 81–86.
    [67]
    Hanchuan Peng, Fuhui Long, and Chris Ding. 2005. Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy. IEEE Trans. Pattern Anal. Mach. Intell. 27, 8 (2005), 1226–1238.
    [68]
    Matthew J. Probst and Sneha Kumar Kasera. 2007. Statistical trust establishment in wireless sensor networks. In Proceedings of the International Conference on Parallel and Distributed Systems. IEEE, 1–8.
    [69]
    Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami, and James C. Bezdek. 2006. Distributed anomaly detection in wireless sensor networks. In Proceedings of the 10th IEEE Singapore International Conference on Communication Systems. IEEE, 1–5.
    [70]
    Eyal Ronen and Adi Shamir. 2016. Extended functionality attacks on IoT devices: The case of smart lights. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P’16). IEEE, 3–12.
    [71]
    Hans Sagan. 2012. Space-filling Curves. Springer Science & Business Media.
    [72]
    Meera Sampath, Raja Sengupta, Stéphane Lafortune, Kasim Sinnamohideen, and Demosthenis Teneketzis. 1995. Diagnosability of discrete-event systems. IEEE Trans. Autom. Contr. 40, 9 (1995), 1555–1575.
    [73]
    Samsung. 2017. Samsung SmartThings. Multipurpose Sensor. Retrieved April 30, 2019 from https://support.smartthings.com/hc/en-us/articles/213496343.
    [74]
    Bo Sheng, Qun Li, Weizhen Mao, and Wen Jin. 2007. Outlier detection in sensor networks. In Proceedings of the 8th ACM International Symposium on Mobile ad hoc Networking and Computing. ACM, 219–228.
    [75]
    Nisheeth Shrivastava, Chiranjeeb Buragohain, Divyakant Agrawal, and Subhash Suri. 2004. Medians and beyond: New aggregation techniques for sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems. ACM, 239–249.
    [76]
    Amit Kumar Sikder, Hidayet Aksu, and A Selcuk Uluagac. 2017. 6thsense: A context-aware sensor-based attack detector for smart devices. In Proceedings of the 26th USENIX Security Symposium (USENIX Security’17). 397–414.
    [77]
    Adam Silberstein, Kamesh Munagala, and Jun Yang. 2006. Energy-efficient monitoring of extreme values in sensor networks. In Proceedings of the ACM SIGMOD International Conference on Management of Data. ACM, 169–180.
    [78]
    Anna Kornfeld Simpson, Franziska Roesner, and Tadayoshi Kohno. 2017. Securing vulnerable home IoT devices with an in-hub security manager. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops’17). IEEE, 551–556.
    [79]
    Vijay Sivaraman, Hassan Habibi Gharakheili, Arun Vishwanath, Roksana Boreli, and Olivier Mehani. 2015. Network-level security and privacy control for smart-home IoT devices. In Proceedings of the IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob’15). IEEE, 163–167.
    [80]
    Peerasan Supavatanakul. 2004. Modelling and Diagnosis of Timed Discrete Event Systems. Shaker.
    [81]
    David Thorsley, Tae-Sic Yoo, and Humberto E. Garcia. 2008. Diagnosability of stochastic discrete-event systems under unreliable observations. In Proceedings of the American Control Conference. IEEE, 1158–1165.
    [82]
    Yuan Tian, Nan Zhang, Yueh-Hsun Lin, XiaoFeng Wang, Blase Ur, Xianzheng Guo, and Patrick Tague. 2017. Smartauth: User-centered authorization for the internet of things. In Proceedings of the 26th USENIX Security Symposium (USENIX Security’17). 361–378.
    [83]
    Stavros Tripakis. 2002. Fault diagnosis for timed automata. In Proceedings of the International Symposium on Formal Techniques in Real-Time and Fault-tolerant Systems. Springer, 205–221.
    [84]
    Hasan S. Ulusoy, Erol Kalkan, Jon Peter B. Fletcher, Paul A. Friberg, W. K. Leith, and Krishna Banga. 2012. Design and implementation of a structural health monitoring and alerting system for hospital buildings in the United States. In Proceedings of the 15th World Conference on Earthquake Engineering.
    [85]
    Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2013. The current state of access control for smart devices in homes. In Proceedings of the Workshop on Home Usable Privacy and Security (HUPS’13).
    [86]
    Junia Valente and Alvaro A. Cárdenas. 2015. Using visual challenges to verify the integrity of security cameras. In Proceedings of the 31st Annual Computer Security Applications Conference, 141–150.
    [87]
    Xi Wang, Ishanu Chattopadhyay, and Asok Ray. 2004. Probabilistic fault diagnosis in discrete event systems. In Proceedings of the 43rd IEEE Conference on Decision and Control (CDC’04), Vol. 5. IEEE, 4794–4799.
    [88]
    Judson Wilson, Riad S. Wahby, Henry Corrigan-Gibbs, Dan Boneh, Philip Levis, and Keith Winstein. 2017. Trust but verify: Auditing the secure internet of things. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 464–474.
    [89]
    Weili Wu, Xiuzhen Cheng, Min Ding, Kai Xing, Fang Liu, and Ping Deng. 2007. Localized outlying and boundary data detection in sensor networks. IEEE Trans. Knowl. Data Eng. 19, 8 (2007), 1145–1157.
    [90]
    Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li, and Hongbin Zhao. 2017. A survey on security and privacy issues in Internet-of-Things. IEEE IoT J. 4, 5 (2017), 1250–1258.
    [91]
    Tae-Sic Yoo and Stéphane Lafortune. 2002. Polynomial-time verification of diagnosability of partially observed discrete-event systems. IEEE Trans. Autom. Contr. 47, 9 (2002), 1491–1495.
    [92]
    Mengjie Yu, Hala Mokhtar, and Madjid Merabti. 2007. Fault management in wireless sensor networks. IEEE Wireless Commun. 14, 6 (2007), 13–19.
    [93]
    S Hashtrudi Zad, Raymond H. Kwong, and Walter Murray Wonham. 2003. Fault diagnosis in discrete-event systems: Framework and model reduction. IEEE Trans. Automat. Contr. 48, 7 (2003), 1199–1212.
    [94]
    Janan Zaytoon and Stéphane Lafortune. 2013. Overview of fault diagnosis methods for discrete event systems. Annu. Rev. Contr. 37, 2 (2013), 308–320.
    [95]
    Demetrios Zeinalipour-Yazti, Zografoula Vagena, Dimitrios Gunopulos, Vana Kalogeraki, V. Tsotras, Michail Vlachos, Nick Koudas, and Divesh Srivastava. 2005. The threshold join algorithm for top-k queries in distributed sensor networks. In Proceedings of the 2nd International Workshop on Data Management for Sensor Networks. ACM, 61–66.
    [96]
    Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, and Haojin Zhu. 2018. HoMonit: Monitoring smart home apps from encrypted traffic. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 1074–1088.
    [97]
    Yang Zhang, Nirvana Meratnia, and Paul J. M. Havinga. 2010. Outlier detection techniques for wireless sensor networks: A survey. IEEE Commun. Surv. Tutor. 12, 2 (2010), 159–170.
    [98]
    T. Zillner. 2015. Zigbee exploited—the Good, the Bad and the Ugly. Available online: https://www.blackhat.com/docs/us-15/materials/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly.pdf.

    Index Terms

    1. Niffler: Real-time Device-level Anomalies Detection in Smart Home

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on the Web
      ACM Transactions on the Web  Volume 17, Issue 3
      August 2023
      302 pages
      ISSN:1559-1131
      EISSN:1559-114X
      DOI:10.1145/3597636
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 22 May 2023
      Online AM: 01 March 2023
      Accepted: 20 October 2022
      Revised: 31 August 2022
      Received: 31 January 2022
      Published in TWEB Volume 17, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Misbehaving device detection
      2. streaming graphs
      3. smart homes

      Qualifiers

      • Research-article

      Funding Sources

      • National Key R&D Program of China
      • China National Natural Science Foundation
      • S&T Program of Hebei
      • Opening Project of Shanghai Trusted Industrial Control Platform

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 297
        Total Downloads
      • Downloads (Last 12 months)186
      • Downloads (Last 6 weeks)24
      Reflects downloads up to 27 Jul 2024

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media