Cargando…
Anomalous behavior detection-based approach for authenticating smart home system users
This paper presents Duenna, an authentication framework for smart home systems (SHSs). When using controlling apps (e.g., a smartphone app), Duenna makes sure that only legitimate SHS users are allowed to operate their Internet of things (IoT) devices. Duenna is built upon a behavioral anomaly detec...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer Berlin Heidelberg
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8605774/ https://www.ncbi.nlm.nih.gov/pubmed/34840546 http://dx.doi.org/10.1007/s10207-021-00571-6 |
_version_ | 1784602223822503936 |
---|---|
author | Amraoui, Noureddine Zouari, Belhassen |
author_facet | Amraoui, Noureddine Zouari, Belhassen |
author_sort | Amraoui, Noureddine |
collection | PubMed |
description | This paper presents Duenna, an authentication framework for smart home systems (SHSs). When using controlling apps (e.g., a smartphone app), Duenna makes sure that only legitimate SHS users are allowed to operate their Internet of things (IoT) devices. Duenna is built upon a behavioral anomaly detection (BAD)-based approach. In particular, we hypothesize that SHS users usually operate their home IoT devices in typical and distinctive patterns. Therefore, users that attempt to operate devices differently from such a regular behavior are considered malicious. Technically, Duenna operates in two modes. In an initialization operation, Duenna first collects and processes the historical cyber and physical activities of an SHS user in addition to the historical states of the SHS itself to build a set of incremental anomaly detection (AD) models. Then, in an interactive operation, the trained AD models are, then, used as a baseline from which anomalous commands (i.e., outliers) are detected and rejected, while regular commands (i.e., targets) are considered legitimate and allowed to be executed. Through an empirical evaluation conducted on real-world data, Duenna exhibits high authentication rates ensuring both security and user experience. The findings obtained from such evaluation show that a user behavior-based approach is a promising security scheme that could be integrated into existing SHS platforms. |
format | Online Article Text |
id | pubmed-8605774 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Springer Berlin Heidelberg |
record_format | MEDLINE/PubMed |
spelling | pubmed-86057742021-11-22 Anomalous behavior detection-based approach for authenticating smart home system users Amraoui, Noureddine Zouari, Belhassen Int J Inf Secur Regular Contribution This paper presents Duenna, an authentication framework for smart home systems (SHSs). When using controlling apps (e.g., a smartphone app), Duenna makes sure that only legitimate SHS users are allowed to operate their Internet of things (IoT) devices. Duenna is built upon a behavioral anomaly detection (BAD)-based approach. In particular, we hypothesize that SHS users usually operate their home IoT devices in typical and distinctive patterns. Therefore, users that attempt to operate devices differently from such a regular behavior are considered malicious. Technically, Duenna operates in two modes. In an initialization operation, Duenna first collects and processes the historical cyber and physical activities of an SHS user in addition to the historical states of the SHS itself to build a set of incremental anomaly detection (AD) models. Then, in an interactive operation, the trained AD models are, then, used as a baseline from which anomalous commands (i.e., outliers) are detected and rejected, while regular commands (i.e., targets) are considered legitimate and allowed to be executed. Through an empirical evaluation conducted on real-world data, Duenna exhibits high authentication rates ensuring both security and user experience. The findings obtained from such evaluation show that a user behavior-based approach is a promising security scheme that could be integrated into existing SHS platforms. Springer Berlin Heidelberg 2021-11-20 2022 /pmc/articles/PMC8605774/ /pubmed/34840546 http://dx.doi.org/10.1007/s10207-021-00571-6 Text en © The Author(s), under exclusive licence to Springer-Verlag GmbH, DE 2021 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Regular Contribution Amraoui, Noureddine Zouari, Belhassen Anomalous behavior detection-based approach for authenticating smart home system users |
title | Anomalous behavior detection-based approach for authenticating smart home system users |
title_full | Anomalous behavior detection-based approach for authenticating smart home system users |
title_fullStr | Anomalous behavior detection-based approach for authenticating smart home system users |
title_full_unstemmed | Anomalous behavior detection-based approach for authenticating smart home system users |
title_short | Anomalous behavior detection-based approach for authenticating smart home system users |
title_sort | anomalous behavior detection-based approach for authenticating smart home system users |
topic | Regular Contribution |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8605774/ https://www.ncbi.nlm.nih.gov/pubmed/34840546 http://dx.doi.org/10.1007/s10207-021-00571-6 |
work_keys_str_mv | AT amraouinoureddine anomalousbehaviordetectionbasedapproachforauthenticatingsmarthomesystemusers AT zouaribelhassen anomalousbehaviordetectionbasedapproachforauthenticatingsmarthomesystemusers |