Ruledger: Ensuring Execution Integrity in Trigger-Action IoT Platforms

被引:6
|
作者
Fan, Jingwen [1 ]
He, Yi [2 ,3 ,4 ]
Tang, Bo [1 ]
Li, Qi [2 ,3 ,4 ]
Sandhu, Ravi [5 ,6 ]
机构
[1] Sichuan Changhong Elect Co Ltd, Informat Secur Lab, Mianyang, Sichuan, Peoples R China
[2] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing, Peoples R China
[3] Tsinghua Univ, Dept Comp Sci, Beijing, Peoples R China
[4] BNRist, Beijing, Peoples R China
[5] Univ Texas San Antonio, Inst Cyber Secur, San Antonio, TX USA
[6] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX USA
基金
国家重点研发计划;
关键词
BLOCKCHAIN;
D O I
10.1109/INFOCOM42981.2021.9488687
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Smart home IoT systems utilize trigger-action platforms, e.g., IFTTT, to manage devices from various vendors. These platforms allow users to define rules for automatically triggering operations on devices. However, they may be abused by triggering malicious rule execution with forged IoT devices or events violating the execution integrity and the intentions of the users. To address this issue, we propose a ledger based IoT platform called Ruledger, which ensures the correct execution of rules by verifying the authenticity of the corresponding information. Ruledger utilizes smart contracts to enforce verifying the information associated with rule executions, e.g., the user and configuration information from users, device events, and triggers in the trigger-action platforms. In particular, we develop three algorithms to enable ledger-wallet based applications for Ruledger and guarantee that the records used for verification are stateful and correct. Thus, the execution integrity of rules is ensured even if devices and platforms in the smart home systems are compromised. We prototype Ruledger in a real IoT platform, i.e., IFTTT, and evaluate the performance with various settings. The experimental results demonstrate Ruledger incurs an average of 12.53% delay, which is acceptable for smart home systems.
引用
下载
收藏
页数:10
相关论文
共 50 条
  • [21] ChatIoT: Zero-code Generation of Trigger-action Based IoT Programs with ChatGPT
    Li, Fu
    Huang, Jiaming
    Gao, Yi
    Dong, Wei
    PROCEEDINGS OF THE 7TH ASIA-PACIFIC WORKSHOP ON NETWORKING, APNET 2023, 2023, : 219 - 220
  • [22] Nonnegative Matrix Factorization Based Heterogeneous Graph Embedding Method for Trigger-Action Programming in IoT
    Xing, Yongheng
    Hu, Liang
    Zhang, Xiaolu
    Wu, Gang
    Wang, Feng
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (02) : 1231 - 1239
  • [23] Helping Users Debug Trigger-Action Programs
    Zhang, Lefan
    Zhou, Cyrus
    Littman, Michael L.
    Ur, Blase
    Lu, Shan
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2022, 6 (04):
  • [24] A data fusion framework based on heterogeneous information network embedding for trigger-action programming in IoT
    Wu, Gang
    Hu, Liang
    Mao, Xuelin
    Xing, Yongheng
    Wang, Feng
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 235
  • [25] A scalable rule engine system for trigger-action application in large-scale IoT environment
    Luo, Xi
    Fu, Ye
    Yin, Lihua
    Xun, Hao
    Li, Yixin
    COMPUTER COMMUNICATIONS, 2021, 177 : 220 - 229
  • [26] Practical Trigger-Action Programming in the Smart Home
    Ur, Blase
    McManus, Elyse
    Ho, Melwyn Pak Yong
    Littman, Michael L.
    32ND ANNUAL ACM CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2014), 2014, : 803 - 812
  • [27] Trigger-Action Computing in Local Broadcast Beaconing Networks
    Kaerkkaeinen, Teemu
    Fuchsloch, L.
    Ott, Joerg
    PROCEEDINGS OF THE 1ST ACM CONEXT WORKSHOP ON EMERGING IN-NETWORK COMPUTING PARADIGMS (ENCP '19), 2019, : 48 - 55
  • [28] ImAtHome: Making trigger-action programming easy and fun
    Fogli, Daniela
    Peroni, Matteo
    Stefini, Claudia
    JOURNAL OF VISUAL LANGUAGES AND COMPUTING, 2017, 42 : 60 - 75
  • [29] Supporting Mental Model Accuracy in Trigger-Action Programming
    Huang, Justin
    Cakmak, Maya
    PROCEEDINGS OF THE 2015 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING (UBICOMP 2015), 2015, : 215 - 225
  • [30] A privacy-preserving federated graph learning framework for threat detection in IoT trigger-action programming
    Xing, Yongheng
    Hu, Liang
    Du, Xinqi
    Shen, Zhiqi
    Hu, Juncheng
    Wang, Feng
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 255