Ghosh 2019
Ghosh 2019
fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2941767, IEEE Internet of
Things Journal
1
Abstract—The smart home is one of the most prominent HomeKit3 , and Google’s Android Things4 . These platforms are
applications in the paradigm of the Internet of Things (IoT). energy efficient, connect heterogeneous devices and protocols,
While, it has added a level of comfort and convenience to our allows remote control and actuation, and also support third-
everyday life, at the same time, it brings a unique security
challenge of mitigating insider threats, posed by legitimate users. party application development.
Such threats primarily arise due to sharing of IoT devices and Although home IoT solutions have added a level of con-
the presence of complex social and trust relationships among venience and comfort to our everyday life, the world of
the users. The state-of-the-art home IoT platforms manage IoT has witnessed many sophisticated attacks over the years
access control by deploying various multi-factor authentication
due to devices insecure software-engineering practices [2],
mechanisms. Nevertheless, such hard-security measures are in-
adequate to thwart insider threats, and there is a growing need unexpected information flows [12] and inherent difficulties
to integrate user behaviour and environmental contexts to make of patching networked devices [13]. Thus, security is still
intelligent authorization decisions. In this paper, we propose a one of the major concerns for widespread adoption of home
novel context-sensitive and behaviour-based security framework, IoT solutions, which has been further established by a recent
called SoftAuthZ, that incorporates soft-security mechanisms,
release of 184 requirements by the Internet of Things Ar-
such as belief, confidence, etc., to support authorization decisions.
Our framework integrates multiple IoT environment-specific chitecture (IoT-A), where 52 requirements (roughly 30%) are
attributes, such as environmental context, nature of the device, relevant to security [10]. Thus, if glitches in home IoT security
requested capabilities (actions), users’ trust levels concerning implementation exist, the adversary can not only leverage them
the home environment, and variability in device access requests to compromise or disable the connected devices but can also
into a linear regression model, and computes confidence related
affect the physical safety and security of the home.
to access requests. Such confidence scores can be used by the
home IoT platform to make authorization decisions. Extensive Recently, researchers have discovered over-privileging of
analysis and simulation-based performance evaluation validate the companion smartphone applications and insecure infor-
the efficacy of our framework, demonstrating that it can classify mation flow between the devices and the applications as
users based on their device usages, and also achieve higher rates the two prominent security loopholes in home IoTs [8] [5].
of successful authorization.
Nevertheless, one cannot rule out the threat posed by an
Index Terms—Internet of Things, Smart home, Authorization, ‘insider attack’, which is a malicious attack perpetrated on
Insider threat, Soft security, Unalikeability, Environmental con- a network or computer system by a person with authorized
texts
system access. In [1], the authors discussed such threat and
defined two factors that stimulate it are: (i) a single home IoT
I. I NTRODUCTION device is shared among multiple users and (ii) complicated
social trust relationship exists among the users of a home IoT
2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2941767, IEEE Internet of
Things Journal
2
Remote back-end clouds centrally manage the security in A. Contributions of this Paper
the state-of-the-art home IoT platforms. Home IoTs deploy As depicted in the motivating example, preventing insider
variants of two-factor authentication to enforce secure access attack is a non-trivial challenge as it needs tracking of request
of devices. We use the terminologies used in Samsung’s patterns of the users and eventually forecast future accesses
SmartThings to illustrate the two-factor mechanism: based on a behaviour-related metric. Traditionally, secured
access to a shared system is enforced by authentication and
• First factor: Home IoT owner uses a companion
authorization mechanisms. Authentication ensures validation
smartphone-based application (may or may not be third-
of the identity of the requester, while authorization guarantees
party-developed) to assign capabilities (privileges) on
legitimate access to the requested resource. Mitigation of
his/her device(s) for a user (requester) to whom s/he
insider threat does not need to consider authentication, as
intends to give access. Next, s/he sends the privilege
the perpetrator is an insider whose identity is already verified
information (first factor) to an authorization module of
and validated. In fact, mitigation measure is concerned with
the security server hosted in the cloud. On the other hand,
restricting anomalous/malicious usage of legitimate access
the server’s authentication module employs a capability-
rights using circumstantial evidence such as variability in
based access control (CapBAC) to issue token to the
past requests, environmental situation under which the request
requester on behalf of the device owner [15] [16]. The
is made, and so on. Therefore, the scope of this work is
token contains a multitude of information such as times-
to propose a novel authorization framework for home IoT,
tamp, identity, and access right information of potential
called SoftAuthZ, which is context-sensitive, behaviour-based
requester, a concept similar to OAuth 2.05 protocol.
and uses soft security mechanism (e.g., belief, confidence)
• Second factor: At the time of the actual device access
to thwart insider attacks. Our framework is generic, can
request, if the requester possesses a valid token, home
be integrated with existing token-based authorization as an
IoT platform further authenticates him/her using the same
additional security layer, and involves human interventions
smartphone app. In this step, the mode of authentication
only in setting the model parameters to adapt the home IoT
may be any one of password, or PIN, or fingerprint
platform’s risk tolerance attitude.
biometrics, or any other customized approach [1] [17],
We highlight the major contributions of the paper as follows:
constituting the second factor.
1) We model expected belief on a device access request
As evident, existing token-based authentication and autho- as a response variable in a weighted regression function
rization approach cannot prevent insider attacks as it neither consisting of two explanatory variables: belief on user’s
binds a requester to his/her past purported behaviours or past request patterns (weighed by his/her trust level)
actions, nor it predicts how the requester will behave between and the belief on context of the request (weighed by the
the time the token was issued and used. Authorization is done requested device’s accessibility).
strictly on the basis of the identity of the requester, validity 2) Next, we transform the expected belief to a measure
of the token issued for a particular session, and the predefined that captures the confidence on the request. The trans-
access policy. Either the requester’s token is accepted and the formation is achieved using the logit link function that
requested capabilities are granted, or the token is rejected and facilitates authorization decision making in the presence
the access is denied. Thus, there is no provision to determine of both normal and deceptive behaviours under varying
if any requester with valid a token and legitimate identity will contexts.
cause any security breach with the devices. It is imperative 3) We verified that the proposed approach successfully
to look beyond static policy-driven token-based access control classifies normal and anomalous behaviours, prevent
mechanisms to mitigate threats from malicious insiders. authorization of requests from anomalous users, and
On the contrary, addressing insider threat needs to consider authorizes more than 80% requests from normal users
the pervasive human behaviour, the environmental ‘contexts’ through simulation-based experiments on randomly syn-
under which the potential attack takes place, the extent of thesized access requests.
damage the given accesses can incur, and their interrelations. The rest of the paper is organized as follows. Section II
Hence, there is a need to incorporate soft security mechanisms reviews the existing works on authorization in home IoT
based on trust, risk, belief, confidence, etc., into the exist- environment and presents their limitations as far as addressing
ing home IoT security framework. The use of soft security insider attacks are concerned. Section III explains the system
mechanism renders adaptive feature to security models and and threat models of the proposed framework. In section IV,
makes them flexible, and its usage has already been seen we present the functional descriptions of different modules of
in a few works on IoT. In the TACIoT [14] model, access the SoftAuthZ framework for quantification of confidence on
control is assisted by trust values calculated upon factors like access requests in home IoT environment. Section V explains
quality of service (QoS), reputation and social relationships, the simulation environment and presents the experimental
and Tyche [9], a risk-based permission model, is developed for results. Finally, conclusions are drawn in Section VI.
home automation system.
II. R ELATED W ORKS
In this section, we review the authorization mechanisms
5 https://oauth.net/2/ currently implemented in commercial home IoT platforms, as
2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2941767, IEEE Internet of
Things Journal
3
well as the ones proposed by the research community. in participants desired access-control policies for different
capabilities within a single device, as well as based on
A. Proprietary/Commercial Home IoT Platforms who is using that capability. They identified capability, user
type, and context as the likely candidates to be included
As stated above, presently, the three most widely adopted for making an authorization decision. The SmartAuth frame-
proprietary/commercial home IoT solutions are Samsung’s work [5] performed consistency checks for the SmartThings
SmartThings, Apple’s HomeKit, and Google’s Android third-party apps in terms of their specified functionalities and
Things. The authorization mechanisms implemented in these the operations they perform. Such checks enable the user to
commercial solutions are as follows. generate and enforce security policies, thus ensuring secure
SmartThings: The SmartThings ecosystem consists of both cross-device, context-based, and automatic operations.
proprietary and third-party applications (SmartApps), and the Fernandes et al. [8] performed an in-depth static source code
IoT device handlers (SmartDevices). The authorization is analysis to detect problems of over-privileging in SmartThings
based on a capability model, where a capability on a device apps, which is mostly due to the coarse-grained nature of the
includes the commands (actions to be performed) and its capability model. As a result, the apps gain full access to
associated attributes (state/properties). The SmartApps, written devices even if they require limited accesses. Furthermore, the
in Groovy6 programming language, run either on cloud back- asynchronous communication between the SmartApps and the
end or on a controller device, called SmartHub. They need to devices is not protected, leading to the disclosure of sensitive
obtain permissions from the home IoT platform before using information (e.g., lock code). In [9], the authors performed
the capabilities offered by the SmartDevices [6]. The Smart- a user study to observe risk-asymmetry in device operations,
Things environment uses Kohsuke sandboxing technique7 to supported by the SmartThings platform. The over-privileged
isolate untrusted codes and allows only predefined method apps, getting access to mixed-risk operations, increases the
calls. Third-party developers are prevented from creating their potential attack surface many-folds. Thus, a risk-based per-
own classes or bundling external libraries, and once they mission model, called Tyche, has been proposed to group
publish a SmartApp or a SmartDevice handler, a private, operations of similar risk and enable users to decide if a
isolated datastore is assigned. particular app can access their devices.
HomeKit: HomeKit has recently opened its platform for inte- In [10], Lee et al. analyzed the SmartThings framework
gration of third-party applications. The apps have to explicitly to discover over-privileging (due to coarse-grained access
obtain user’s permissions to get access to their home IoT control) and a higher likelihood of Denial-of-Service attack
devices. It also uses the sandboxing technique to ensure that (due to lack of resource isolation). The paper proposed a
an app can access its own data only, stored in a unique home functionality-centric approach to manage IoT devices, called
directory, hosted on the platform. This directory is assigned FACT, which has two design goals, namely, to enforce the
randomly during the installation process of the application [6]. principle of least privilege and isolate the device functionality
Moreover, iOS system data is isolated from third-party apps, to enhance availability. ContexIoT [11], a context-based per-
and users have no privilege to modify them. Address Space mission system, was proposed to restore contextual integrity
Layout Randomization (ASLR) technique [7] is applied to in appified IoT platforms. The context information used here
prevent buffer overflow memory-based attacks. is at the inter-procedure control and data flow level and is
Android Things: Formerly known as Weave and Brillo, this obtained by identifying the fine-grained context for sensitive
framework uses a combination of Linux-based access control actions. Furthermore, it also provides an automatic app patch-
module, called SELinux (Secured Enhanced Linux), and sand- ing mechanism to convert unmodified commodity SmartApps
boxing technique to implement its authorization mechanism. to ContexIoT compatible SmartApps. Thus, it is clear from
The SELinux module enables the owner of an IoT device to the above literature review that no work in the literature has
assign different levels of access rights (read, write, execute) for focused on mitigating threats due to insider attacks in home
each user or a group of user. Again, as this platform is Linux- IoT environment.
based, sandboxing technique is applied with regards to UID In [18], authors propose an extension of the role-based
(User Id) and GID (Group Id) [6]. It ensures the separation of access control (RBAC) model by introducing contextual con-
information based on confidentiality and integrity requirements straints collected from the environment of the physical envi-
for each profile. ronment to make authorization decisions. The functionalities
It is evident from the above discussion that the commercial of IoT devices are modeled as web services which become
home IoT platforms have not yet focused on addressing the the target of the request. However, the authors have not
issues related to insider attacks. elaborated either the mapping of physical objects into one
or more web services or the mechanism by which contextual
B. Research Community information will be collected in real-time from the physical
environment. Jindou et al. [19] adopted a web of things (WoT)
In [1], the authors focused on re-envisioning home IoT
by the integration of RBAC with social network services
access control due to its multi-user device-sharing nature.
(SNS) such as Facebook. It enables owners to leverage existing
Through a survey, it was discovered that there are differences
user-profiles and social links to design customized access
6 http://groovy-lang.org/ policies for secure and trusted sharing of their devices. While
7 http://groovy-sandbox.kohsuke.org/ this integration characterizes high usability and user-driven
2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2941767, IEEE Internet of
Things Journal
4
2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2941767, IEEE Internet of
Things Journal
5
and security purpose. Examples include lock, camera, the home IoT environment, the platform tends to have
doorbell, motion sensors, etc. lower confidence as the risk (of potential device misuse)
Capabilities: A capability or permission cki is defined as an perception magnifies.
action k (switching ON/OFF) that can be performed on a • Time of request (T ): It denotes the time at which the
particular device type i (general-purpose devices such as smart request is made. We consider two time windows for
bulb, thermostat, etc.). Summarizing the recent survey done device accesses, such as, conventional (6am to midnight)
on home IoT users [1], we consider the following capabilities and odd (otherwise). The belief weights assigned to the
compatible with our custom device types: time windows are T = 1 and T = 0, respectively.
• Availability of users around the requester (U ): Insider
• General purpose: ON/OFF, ADD/DELETE RULE
attacks in the home environment can take place in the
• Controller: ON/OFF, ADD/DELETE USER,
presence or absence of other users. Although subversion
ADD/DELETE DEVICE
of home IoT environment can take place in the presence
• Safety and Security: ON/OFF, ADD/DELETE RULE,
of users, however, in their complete absence, the plat-
VIEW LOG/STATE, DELETE LOG.
form experiences less confidence in actual usage of the
Requester: A requester rl is any user of the home IoT environ- requested capability. Thus, we assign weights U = 1 and
ment. We interchangeably use the terms ‘requester’ and ‘user’ U = 0, depending on if people are around or not.
in this paper. The user needs to obtain an access token from • Requester’s age (A): As the home IoT environment may
the remote cloud back-end server to initiate device access (step consist of users from multiple age groups, we classify
2). Furthermore, rl needs to attach this token with the request them into three ordered categories: Adult Teenage
to access device dji , as allowed by owner O (step 4). The Child. Like previously, we assign belief weights of
requester rl can access device if the server grants the access A = 3, A = 2, and A = 1 corresponding to an adult,
token, validates the request concerning the policies designed a teenager, and a child requester, respectively. Thus, a
by the owner, and also finds that the confidence on the request request to access the camera from a child (0-12 years
is above a threshold (step 9). A requesting user is liable to age group) or a teenage member (13-19 years age group)
have a trust level depending on his/her social relationship generates lesser confidence to the platform, than if an
with respect to the home environment. In this work, we adult requests it.
organize requesters into five hierarchical membership classes,
SoftAuthZ Framework: This is the proposed framework which
each having a predefined trust relationship score from the
can be either a part of the home IoT platform or implemented
viewpoint of the home IoT. We assign trust levels (τ ) 1-5
as a separate Web service to reduce the overhead. It can be
to such membership classes which are given as: Owner (5)
invoked as a service by the authentication and authorization
Spouse (4) Family (3) Children (2) Guest (1). Higher
server at the time of ascertaining confidence score of device
the membership level of the user, the more trusted it is to the
access requests to make the authorization decision (steps 5 and
home IoT platform.
7). The framework obtains various context information about
However, it is not guaranteed that a user belonging to a
the requester from the different trackers hosted in the cloud
higher trust level will never misuse the requested capabilities
platform (step 6b).
on devices. Depending on variability of historical requests,
It is clear that ‘request’ is the central aspect of our system
we classify the users into two profiles: normal and anomalous
model and it essentially constitutes the capability to be per-
(refer to Section III-B for details).
formed against a particular device. We define device request
Authentication and Authorization server: The authentication
(or request) as follows.
and authorization server is managed in the remote cloud
Definition 1: (request). A device request qm is defined as
platform. It enables the owner O to set predefined policies
a tuple hdji , cki i, where dji is device j of type i and cki is the
on device dji (step 1). Moreover, the server is responsible for
k th capability requested on device type i.
granting or denying both access token and access request to
Since the home IoT consists of multiple users with a plethora
the requester (steps 3 and 8).
of shared devices, we assume that while making an access
Context Tracker: The home IoT cloud platform also manages
request, the requester’s identity, his/her trust level, and the
the context tracker. After the platform receives a request, the
contextual factors should also be taken into consideration. We
tracker invokes system calls and location service to collect the
redefine a device access request as follows.
contextual information regarding the requester (step 6a). We
Definition 2: (Access request). An access request am is
used the survey done in [1] to determine the set of contextual
defined as a four-tuple hrlID , τ, X , qm i, where rlID is the
factors (X ) give below:
identity of a requesting user and τ is the requester’s trust level
• Location of the requester (L): Owing to pervasive nature (assigned by the home IoT owner), X is the set of contextual
of IoT devices, a requester can send an access request factors, and qm is the actual request on the device.
from inside the home, or from its premises (e.g., garden,
lawn, terrace, etc.), or outside the home. We classify the
requester’s location into three hierarchical classes: Home B. Threat Model
Premise Outside. Further, we assign belief weights We stated earlier that the devices in a home IoT environ-
to these classes as L = 3, L = 2, and L = 1, respectively. ment are shared among a closed group of users and we are
The intuition is if the request is coming from outside concerned with the security threats coming from the insiders,
2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2941767, IEEE Internet of
Things Journal
6
2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2941767, IEEE Internet of
Things Journal
7
people in the vicinity, etc.) under which the current access bh = 1 − C0 · e−C1 ·e (2)
request has been made is favourable or not unusual (bx ). where the input µ gives unalikeability score (expressed in
We model the response variable, expected belief (Bam ), as a terms of percentage) generated from previous requests for any
weighted linear regression of the explanatory variables given requester. C0 is the upper asymptote to decide the maximum
by: value belief can attend (for our case C0 = 1), C1 is positive
Bam = τ · (bh ) + δ · (bx ) (1) constant which controls the displacement of maximum belief
Where, τ and δ are the coefficients to the explanatory variables score along the X-axis, and C2 adjusts the decay rate.
and termed as the requester’s trust level and device’s accessi- Fig. 3a illustrates the effect of parameter C1 on the initial
bility, respectively. If any requester with lower trust level is a value of the belief before the latter enters into the exponential
potential perpetrator, and the device s/he has requested is not decay phase. For a fixed decay rate (considered to be C2
of regular access, our model magnifies the threat perception = 0.45), this parameter acts as a discounting factor to the
resulting in low belief measure. This is comprehensible, as maximum belief score. The choice of its value depends upon
guest users (belonging to lower trust level), who are occasional if the home IoT platform is risk-seeking (corresponds to high
visitors to the home IoT environment, are not expected to C1 ) or risk-averse (corresponds to low C1 ).
taint rarely accessible devices (like lock, camera, etc.) under Parameter C2 is the growth parameter which controls the
unusual contexts (like odd hours, no one at home, etc). rate of decay of the belief scores, lower bounded by 0, as
1) Modeling Belief on Requester’s Usage History: The shown in Fig. 3b. We considered C1 = 10 to study the
expected belief in requester’s device usage needs to consider varying effects of the growth parameter. For higher values
the variability in past requests, quantified by the unalikeability of C2 , the belief score drops rapidly with relatively low
score (µ). Intuitively, lesser µ implies that the user is of unalikeability score. For a less-restrictive home IoT platform,
normal profile and it should generate higher belief bh . At the administrator can choose a smaller C2 . Such system
the same time, the home IoT platform should avoid the tolerates a more substantial degree of request variability before
‘cold-start’ problem by allowing the requested access to any the user belief drops significantly.
new but legitimate (access granted by the owner) requester. 2) Computation of the Unalikeability Score: As evident
For the new user, her/her unalikeability score µ is set to 0, from Definition 2, the access requests are of categorical data
which gets updated as new requests are made over time. With type and consists of multiple attributes viz., device type,
each incoming request, the framework computes its degree of capability, and contexts. Each of these attributes again has mul-
variability with the historical request set and uses the latter tiple categories and sub-categories, such as general purpose,
to re-compute the unalikeability score. Thus, the platform controller, and safety and security, under the device type
should tend to trust him/her by believing that s/he will not (refer to Section III-A). Owing to the categorical nature of
attempt to subvert the home IoT environment. However, during access requests, variability among them needs to focus on
subsequent interactions, if the requester is found to deviate ‘how often’ the attribute values differ, rather than by ‘how
significantly from previous access requests (defined in Section much’. Moreover, as our objective is to study the variability of
2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2941767, IEEE Internet of
Things Journal
8
requests made by a particular requester, static attributes, such TABLE I: Impact of Capabilities on Security Attributes
as his/her identity, trust level, and age, which are also part of No. Capability Device Type P C I A
the access request, are not considered. To this end, we adopt 1 ON/OFF General purpose 0 0 0 1
2 ON/OFF Controller 0 0 0 1
the principle given in [22] to compute the degree of variability 3 ON/OFF Safety and Security 1 1 0 1
in request patterns, termed as the coefficient of unalikeability 4 ADD/DEL RULE General purpose 0 0 1 0
(µ). Therefore, given a historical request set of size N for 5 ADD/DEL RULE Safety and Security 1 1 1 0
6 ADD/DEL USER Controller 0 1 1 0
any requester rl , we first compute the unalikeability score for
7 ADD/DEL DEVICE Controller 1 1 0 1
each of the request attributes in the set, and then combine them 8 VIEW LOG/STATE Safety and Security 0 1 0 0
to obtain the requester’s cumulative unalikeability score. The 9 DEL LOG Safety and Security 1 1 1 1
generalized form to compute the unalikeability score for the
v th attribute in rl ’s historical request set is as follows [22]: normalize the belief weights of the contexts in the interval [0,
X 1] and define:
µvrl = 1 − p2n (3)
n Fam = wL · L + wT · T + wU · U + wA · A (5)
where, pn is the proportion of requests having the nth category where, Fam is the context favourability related to the current
of that attribute, given as pn = gNn such that, gn is the number device access request am , and wL + wT + wU + wA = 1.0 are
of requests with the nth category, and N is the total number the coefficients for the aforementioned contexts, respectively.
of historical requests. For ease of understanding, we denote Apart from the favourability of the available contextual
the unalikeability score of device attribute as µdev
rl
information, the expected belief on the context, weighed by de-
Similarly, for the capability attribute, occurrences of ca- vice’s accessibility, needs to consider the impact of a requested
pabilities related to different requested device categories are capability on both physical as well as information security, the
individually considered, and the unalikeability score (µcap CIA tenets describe the latter: confidentiality, integrity, and
rl )
is computed using Eqn. (3). The unalikeability score for the availability. To quantify the damage that is expected to be
context attribute (µcon caused by misuse of the capabilities, we model their impacts
rl ) is computed considering the location,
time, and availability of users around the requester as the on various device types in terms of effects on four attributes:
categories. We discard the age from unalikeability computation physical (P), confidentiality (C), integrity (I), and availability
as it is a property of the requester and remains static during (A). Table I presents nine scenarios to illustrate the impacts of
consecutive request generation. Now, each of the three cate- misusing different capabilities, where 1 means the capability
gories (location, time, availability of users around) again has has an impact on the considered attribute, and 0 otherwise.
multiple sub-categories such as home, premise, outside for the As evident, the first scenario depicts ON/OFF capability
location category, conventional and odd for time category, and on general-purpose devices, abusing, which only affects the
so on. Thus, individual unalikeability scores for each category availability of that device. The sixth scenario shows ADD/DEL
is computed from the historical request set, and the mean is USER on controller devices which results in impacting the
taken to generate µcon confidentiality as well as the integrity of the home IoT
rl .
Finally, as given in Eqn.(4), we take a weighted sum of the environment. Similarly, the ninth scenario illustrates that if the
three unalikeability scores to obtain a cumulative score for DEL LOG capability is misused, it can affect all four security
requester rl : attributes of the environment.
For computing the confidence on a request, the SoftAuthZ
µrl = wdev · µdev cap con
am + wcap · µam + wcon · µam (4) framework needs to quantify the damage it (request) is ex-
pected to inflict (for the home IoT) through misuse of the
where, µrl is the cumulative unalikeability score for the allowed capability. The expected damage ∆ must combine the
requester rl based on historical request pattern, wdev , wcap , probability of occurrence of the corresponding capability from
and wcon are the importance factors attached to device type, the historical data and its impact on the security attributes of
capability, and context attributes respectively, such that wdev + the home IoT (as depicted in Table I). Thus, it is given as:
wcap + wcon = 1. It is to mentioned that the cumulative
unalikeability score gets updated with each new incoming ∆am = (P · ρki ) + (C · ρki ) + (I · ρki ) + (A · ρki ) (6)
requests, and is also given as input as a percentage score to where ρki is the probability of occurrence of requests involving
the inverse gompertz function to estimate the belief on the device type i and capability k.
requester’s device usage history. Intuitively, the belief in context should boost up with higher
3) Modeling Belief on Context: As mentioned in Section contextual favourability. However, rapid growth in belief is
III-A, we consider four contextual factors, viz., location of limited by the knowledge of the expected damage, ∆am
the requester (L), time of request (T ), availability of users associated with the requested capability. Lesser the ∆am ,
around the requester (U ), and the age of the requester (A), in the higher is the home IoT platform’s belief and vice-versa.
the proposed framework. To determine if the contexts are in Additionally, the belief likely to be gained also depends on
favour of the requested access or not, we need to quantify them the risk perception of the platform. To model this nonlinear
into a single metric score. The problem is modelled similar to a nature, we use the following function:
weighted regression approach where contexts are explanatory F
− ∆am
variables and their ‘favourability’ is the response variable. We bx = 1 − e a m (7)
2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2941767, IEEE Internet of
Things Journal
9
2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2941767, IEEE Internet of
Things Journal
10
B. Authorization Rate
In Section V-A, we mentioned about the low and high
confidence classes, used to label the requests generated by Fig. 7: User Classification
2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2941767, IEEE Internet of
Things Journal
11
2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2019.2941767, IEEE Internet of
Things Journal
12
that SoftAuthZ can classify different user behaviours and [20] E. Barka, S. S. Mathew, and Y. Atif. “Securing the Web of Things
achieves higher authorization rates for normal users. with Role-based Access Control”, Springer International Conference on
Codes, Cryptology, and Information Security, pp. 14-26, 2015.
As a part of the future work, we aim to implement a [21] N. Ye, Y. Zhu, R. C. Wang, R. Malekian, and L. Qiao-Min. “An Efficient
real, multi-user home IoT environment to gather user-centric Authentication and Access Control Scheme for Perception Layer of
request data and validate the proposed framework in terms of Internet of Things”, Applied Mathematics & Information Sciences, 8:4,
pp. 1617-1624, 2014.
detection of anomalous requests made by the insiders. [22] G. D. Kader and M. Perry. “Variability for Categorical Variables”,
Journal of Statistics Education, 15:2, 2007.
R EFERENCES
[1] W. He, M. Golla, R. Padhi, J. Ofek, M. Drmuth, E. Fernandes, and
B. Ur. “Rethinking Access Control and Authentication for the Home
Internet of Things (IoT)”. 27th USENIX Security Symposium (USENIX
Security 18), pp. 255-272, 2018.
[2] M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J.
Cochran, Z. Durumeric et al. “Understanding the Mirai Botnet”. 26th
USENIX Security Symposium (USENIX Security 17), pp. 1093-1110.
2017.
[3] B. Gompertz, “On the Nature of the Function Expressive of the Law
of Human Mortality, and on a New Mode of Determining the Value of
Life Contingencies”, Philosophical Transactions of the Royal Society of
London, 115, 513-583, 1825.
[4] H. Mousa, S. B. Mokhtar, O. Hasan, O. Younes, M. Hadhoud, and
L. Brunie, “Trust Management and Reputation Systems in Mobile
Participatory Sensing Applications: A survey”, Computer Networks
(Elsevier), 90, 49-73, 2015.
[5] Y. Tian, Z. Nan, L. Yueh-Hsun, W. XiaoFeng, B. Ur, X. Guo, and
T. Patrick. “Smartauth: User-centered Authorization for the Internet of
Things”. 26th USENIX Security Symposium (USENIX Security 17), pp.
361-378, 2017.
[6] M. Ammar, G. Russello, and B. Crispo. “Internet of Things: A Survey
on the Security of IoT Frameworks”. Journal of Information Security
and Applications (Elsevier), 38:8-27, 2018.
[7] K. Z. Snow, F. Monrose, L. Davi, A. Dmitrienko, C. Liebchen, and A.
Sadeghi. “Just-in-time Code Reuse: On the Effectiveness of Fine-grained
Address Space Layout Randomization”. IEEE Symposium on Security
and Privacy (S&P), pp. 574-588, 2013.
[8] E. Fernandes, J. Jung, and A. Prakash. “Security Analysis of Emerging
Smart Home Applications”. IEEE Symposium on Security and Privacy
(SP), pp. 636-654, 2016.
[9] A. Rahmati, E. Fernandes, K. Eykholt, and A. Prakash. “Tyche: A
Risk-Based Permission Model for Smart Homes”. IEEE Cybersecurity
Development (SecDev), pp. 29-36, 2018.
[10] S. Lee, J. Choi, J. Kim, B. Cho, S. Lee, H. Kim, and J. Kim.
“FACT: Functionality-centric Access Control System for IoT Program-
ming Frameworks.” ACM Symposium on Access Control Models and
Technologies (SACMAT), pp. 43-54, 2017.
[11] Y. J. Jia, Q. A. Chen, S. Wang, A. Rahmati, E. Fernandes, Z. M. Mao,
and A. Prakash. “ContexloT: Towards Providing Contextual Integrity to
Appified IoT Platforms.” NDSS Symposium, 2017.
[12] Q. Wang, W. U. Hassan, A. Bates, and C. Gunter. “Fear and Logging
in the Internet of Things”. NDSS Symposium, 2018.
[13] T. Yu, V. Sekar, S. Seshan, Y. Agarwal, and C. Xu. “Handling a Trillion
(Unfixable) Flaws on a Billion Devices: Rethinking Network Security for
the Internet-of-Things”. 14th ACM Workshop on Hot Topics in Networks,
2015.
[14] J. B. Bernabe, J. L. Hernandez-Ramos, and A. F. Skarmeta Gomez.
“TACIoT: Multidimensional Trust-aware Access Control System for the
Internet of Things”. Soft Computing 20(5), pp. 1763-1779, 2016.
[15] A. Ouaddah, H. Mousannif, A. A. Elkalam, and A. A. Ouahman.
“Access Control in the Internet of Things: Big Challenges and New
Opportunities”. Computer Networks, 112, pp. 237-262, 2017.
[16] J. L. Hernandez-Ramos, M. P. Pawlowski, A. J. Jara, A. F. Skarmeta,
and L. Ladid. “Toward a Lightweight Authentication and Authorization
Framework for Smart Objects.” IEEE Journal on Selected Areas in
Communications, 33:4, pp. 690-702, 2015.
[17] J. Bonneau, H. Cormac, P. C. Van Oorschot, and F. Stajano. “The Quest
to Replace Passwords: A Framework for Comparative Evaluation of Web
Authentication Schemes.” IEEE Symposium on Security and Privacy
(SP), pp. 553-567, 2012.
[18] G. Zhang and J. Tian. “An Extended Role based Access Control
Model for the Internet of Things”, IEEE International Conference on
Information, Networking and Automation (ICINA), 1, pp. V1-319, 2010.
[19] J. Jindou, Q. Xiaofeng, and C. Cheng. “Access Control Method for Web
of Things based on Role and SNS”, IEEE International Conference on
Computer and Information Technology, pp. 316-321, 2012.
2327-4662 (c) 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.