Cargando…

Anomalous behavior detection-based approach for authenticating smart home system users

This paper presents Duenna, an authentication framework for smart home systems (SHSs). When using controlling apps (e.g., a smartphone app), Duenna makes sure that only legitimate SHS users are allowed to operate their Internet of things (IoT) devices. Duenna is built upon a behavioral anomaly detec...

Descripción completa

Detalles Bibliográficos
Autores principales: Amraoui, Noureddine, Zouari, Belhassen
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Berlin Heidelberg 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8605774/
https://www.ncbi.nlm.nih.gov/pubmed/34840546
http://dx.doi.org/10.1007/s10207-021-00571-6
_version_ 1784602223822503936
author Amraoui, Noureddine
Zouari, Belhassen
author_facet Amraoui, Noureddine
Zouari, Belhassen
author_sort Amraoui, Noureddine
collection PubMed
description This paper presents Duenna, an authentication framework for smart home systems (SHSs). When using controlling apps (e.g., a smartphone app), Duenna makes sure that only legitimate SHS users are allowed to operate their Internet of things (IoT) devices. Duenna is built upon a behavioral anomaly detection (BAD)-based approach. In particular, we hypothesize that SHS users usually operate their home IoT devices in typical and distinctive patterns. Therefore, users that attempt to operate devices differently from such a regular behavior are considered malicious. Technically, Duenna operates in two modes. In an initialization operation, Duenna first collects and processes the historical cyber and physical activities of an SHS user in addition to the historical states of the SHS itself to build a set of incremental anomaly detection (AD) models. Then, in an interactive operation, the trained AD models are, then, used as a baseline from which anomalous commands (i.e., outliers) are detected and rejected, while regular commands (i.e., targets) are considered legitimate and allowed to be executed. Through an empirical evaluation conducted on real-world data, Duenna exhibits high authentication rates ensuring both security and user experience. The findings obtained from such evaluation show that a user behavior-based approach is a promising security scheme that could be integrated into existing SHS platforms.
format Online
Article
Text
id pubmed-8605774
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Springer Berlin Heidelberg
record_format MEDLINE/PubMed
spelling pubmed-86057742021-11-22 Anomalous behavior detection-based approach for authenticating smart home system users Amraoui, Noureddine Zouari, Belhassen Int J Inf Secur Regular Contribution This paper presents Duenna, an authentication framework for smart home systems (SHSs). When using controlling apps (e.g., a smartphone app), Duenna makes sure that only legitimate SHS users are allowed to operate their Internet of things (IoT) devices. Duenna is built upon a behavioral anomaly detection (BAD)-based approach. In particular, we hypothesize that SHS users usually operate their home IoT devices in typical and distinctive patterns. Therefore, users that attempt to operate devices differently from such a regular behavior are considered malicious. Technically, Duenna operates in two modes. In an initialization operation, Duenna first collects and processes the historical cyber and physical activities of an SHS user in addition to the historical states of the SHS itself to build a set of incremental anomaly detection (AD) models. Then, in an interactive operation, the trained AD models are, then, used as a baseline from which anomalous commands (i.e., outliers) are detected and rejected, while regular commands (i.e., targets) are considered legitimate and allowed to be executed. Through an empirical evaluation conducted on real-world data, Duenna exhibits high authentication rates ensuring both security and user experience. The findings obtained from such evaluation show that a user behavior-based approach is a promising security scheme that could be integrated into existing SHS platforms. Springer Berlin Heidelberg 2021-11-20 2022 /pmc/articles/PMC8605774/ /pubmed/34840546 http://dx.doi.org/10.1007/s10207-021-00571-6 Text en © The Author(s), under exclusive licence to Springer-Verlag GmbH, DE 2021 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Regular Contribution
Amraoui, Noureddine
Zouari, Belhassen
Anomalous behavior detection-based approach for authenticating smart home system users
title Anomalous behavior detection-based approach for authenticating smart home system users
title_full Anomalous behavior detection-based approach for authenticating smart home system users
title_fullStr Anomalous behavior detection-based approach for authenticating smart home system users
title_full_unstemmed Anomalous behavior detection-based approach for authenticating smart home system users
title_short Anomalous behavior detection-based approach for authenticating smart home system users
title_sort anomalous behavior detection-based approach for authenticating smart home system users
topic Regular Contribution
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8605774/
https://www.ncbi.nlm.nih.gov/pubmed/34840546
http://dx.doi.org/10.1007/s10207-021-00571-6
work_keys_str_mv AT amraouinoureddine anomalousbehaviordetectionbasedapproachforauthenticatingsmarthomesystemusers
AT zouaribelhassen anomalousbehaviordetectionbasedapproachforauthenticatingsmarthomesystemusers