Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms

被引:6
|
作者
Fan, Jingwen [1 ]
He, Yi [2 ,3 ,4 ]
Tang, Bo [1 ]
Li, Qi [2 ,3 ,4 ]
Sandhu, Ravi [5 ,6 ]
机构
[1] Sichuan Changhong Elect Co Ltd, Informat Secur Lab, Mianyang, Sichuan, Peoples R China
[2] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing, Peoples R China
[3] Tsinghua Univ, Dept Comp Sci, Beijing, Peoples R China
[4] BNRist, Beijing, Peoples R China
[5] Univ Texas San Antonio, Inst Cyber Secur, San Antonio, TX USA
[6] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX USA
基金
国家重点研发计划;
关键词
BLOCKCHAIN;
D O I
10.1109/INFOCOM42981.2021.9488687
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Smart home IoT systems utilize trigger-action platforms, e.g., IFTTT, to manage devices from various vendors. These platforms allow users to define rules for automatically triggering operations on devices. However, they may be abused by triggering malicious rule execution with forged IoT devices or events violating the execution integrity and the intentions of the users. To address this issue, we propose a ledger based IoT platform called Ruledger, which ensures the correct execution of rules by verifying the authenticity of the corresponding information. Ruledger utilizes smart contracts to enforce verifying the information associated with rule executions, e.g., the user and configuration information from users, device events, and triggers in the trigger-action platforms. In particular, we develop three algorithms to enable ledger-wallet based applications for Ruledger and guarantee that the records used for verification are stateful and correct. Thus, the execution integrity of rules is ensured even if devices and platforms in the smart home systems are compromised. We prototype Ruledger in a real IoT platform, i.e., IFTTT, and evaluate the performance with various settings. The experimental results demonstrate Ruledger incurs an average of 12.53% delay, which is acceptable for smart home systems.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Decentralized Action Integrity for Trigger-Action IoT Platforms
    Fernandes, Earlence
    Rahmati, Amir
    Jung, Jaeyeon
    Prakash, Atul
    [J]. 25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
  • [2] Charting the Attack Surface of Trigger-Action IoT Platforms
    Wang, Qi
    Datta, Pubali
    Yang, Wei
    Liu, Si
    Bates, Adam
    Gunter, Carl A.
    [J]. PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1439 - 1453
  • [3] Cascading Threat Analysis of IoT Devices in Trigger-Action Platforms
    Li, Ke
    Wang, Haining
    Zhou, Ming
    Zhu, Hongsong
    Sun, Limin
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12240 - 12251
  • [4] On the Privacy Risks of Compromised Trigger-Action Platforms
    Chiang, Yu-Hsi
    Hsiao, Hsu-Chun
    Yu, Chia-Mu
    Kim, Tiffany Hyun-Jin
    [J]. COMPUTER SECURITY - ESORICS 2020, PT II, 2020, 12309 : 250 - 270
  • [5] Identifying Security and Privacy Violation Rules in Trigger-Action IoT Platforms With NLP Models
    Breve, Bernardo
    Cimino, Gaetano
    Deufemia, Vincenzo
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (06) : 5607 - 5622
  • [6] IoTHaven: An Online Defense System to Mitigate Remote Injection Attacks in Trigger-action IoT Platforms
    Alam, Md Morshed
    Rahman, A. B. M. Mohaimenur
    Wang, Weichao
    [J]. 2024 IEEE 30TH INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS, LANMAN 2024, 2024, : 15 - 20
  • [7] Practical Data Access Minimization in Trigger-Action Platforms
    Chen, Yunang
    Alhanahnah, Mohannad
    Sabeljeld, Andrei
    Chatterjee, Rahul
    Fernandes, Earlence
    [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 2929 - 2945
  • [8] Reducing End-to-End Latency of Trigger-Action IoT Programs on Containerized Edge Platforms
    Zhang, Wenzhao
    Teng, Yixiao
    Gao, Yi
    Dong, Wei
    [J]. IEEE Transactions on Mobile Computing, 2024, 23 (12) : 13979 - 13990
  • [9] TAESim: A Testbed for IoT Security Analysis of Trigger-Action Environment
    Ban, Xinbo
    Ding, Ming
    Liu, Shigang
    Chen, Chao
    Zhang, Jun
    Xiang, Yang
    [J]. COMPUTER SECURITY: ESORICS 2021 INTERNATIONAL WORKSHOPS, 2022, 13106 : 218 - 237
  • [10] A Semantic Web Approach to Simplifying Trigger-Action Programming in the IoT
    Corno, Fulvio
    De Russis, Luigi
    Roffarello, Alberto Monge
    [J]. COMPUTER, 2017, 50 (11) : 18 - 24