Smart City Gnosys

Smart city article details

Title Iotcom: Dissecting Interaction Threats In Iot Systems
ID_Doc 34134
Authors Alhanahnah M.; Stevens C.; Chen B.; Yan Q.; Bagheri H.
Year 2023
Published IEEE Transactions on Software Engineering, 49, 4
DOI http://dx.doi.org/10.1109/TSE.2022.3179294
Abstract Due to the growing presence of Internet of Things (IoT) apps and devices in smart homes and smart cities, there are more and more concerns about their security and privacy risks. IoT apps normally interact with each other and the physical world to offer utility to the users. In this paper, we investigate the safety and security risks brought by the interactive behaviors of IoT apps. Two major challenges ensue in identifying the interaction threats: i) how to discover the threats across both cyber and physical channels; and ii) how to ensure the scalability of the detection approach. To address these challenges, we first provide a taxonomy of interaction threats between IoT apps, which contains seven classes of coordination threats categorized based on their interaction behaviors. Then, we present IoTCom, a compositional threat detection system capable of automatically detecting and verifying unsafe interactions between IoT apps and devices. IoTCom applies static analysis to automatically infer relevant apps' behaviors, and uses a novel strategy to trim the extracted app's behaviors prior to translating them into analyzable formal specifications, mitigating the state explosion associated with formal analysis. Our experiments with numerous bundles of real-world IoT apps have corroborated IoTCom's ability to effectively identify a broad spectrum of interaction threats triggered through cyber and physical channels, many of which were previously unknown. Finally, IoTCom uses an automatic verifier to validate the discovered threats. Our experimental results show that IoTCom significantly outperforms the existing techniques in terms of the computational time, and maintains the capability to perform its analysis across different IoT platforms. © 1976-2012 IEEE.
Author Keywords formal verification; Interaction threats; IoT safety


Similar Articles


Id Similarity Authors Title Published
47990 View0.884Sharma R.; Arya R.Security Threats And Measures In The Internet Of Things For Smart City Infrastructure: A State Of ArtTransactions on Emerging Telecommunications Technologies, 34, 11 (2023)
47934 View0.877Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
44460 View0.877Hemalatha T.; Venkatakiran S.; Kaur M.; Manojkumar S.B.; Prasad V.V.; Ashreetha B.Real-Time Threat Detection And Countermeasures In Iot Environments7th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2023 - Proceedings (2023)
33886 View0.871Alauthman M.; Aldweesh A.; Al-Qerem A.Iot Security Challenges In Modern Smart Cities2nd International Conference on Cyber Resilience, ICCR 2024 (2024)
34135 View0.865Rattanalerdnusorn E.; Pattaranantakul M.; Thaenkaew P.; Vorakulpipat C.Iotdept: Detecting Security Threats And Pinpointing Anomalies In An Iot EnvironmentACM International Conference Proceeding Series (2020)
46683 View0.865Oser P.; Van Der Heijden R.W.; Lüders S.; Kargl F.Risk Prediction Of Iot Devices Based On Vulnerability AnalysisACM Transactions on Privacy and Security, 25, 2 (2022)
5283 View0.864Wei Z.; Wei Q.; Geng Y.; Yang Y.A Survey On Iot Security: Vulnerability Detection And ProtectionProceedings of 2024 International Conference on Artificial Intelligence of Things and Computing, AITC 2024 (2025)
46467 View0.864Chiba Z.; Abghour N.; Moussaid K.; Lifandali O.; Kinta R.Review Of Recent Intrusion Detection Systems And Intrusion Prevention Systems In Iot Networks2022 30th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2022 (2022)
4300 View0.864Abiodun O.I.; Abiodun E.O.; Alawida M.; Alkhawaldeh R.S.; Arshad H.A Review On The Security Of The Internet Of Things: Challenges And SolutionsWireless Personal Communications, 119, 3 (2021)
57293 View0.863Nejatifar A.; Hadavi M.A.Threat Extraction In Iot-Based Systems Focusing On Smart CitiesProceedings of 16th International ISC Conference on Information Security and Cryptology, ISCISC 2019 (2019)