<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Empowering End-Users in the Specification of Security Rules</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>BernardoBreve</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>VincenzoDeufemia</string-name>
          <email>deufemia@unisa.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Salerno</institution>
          ,
          <addr-line>84084 Fisciano(SA)</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>With the rapid growth of Internet-of-Things (IoT) devices, especially in the context of smart homes, enduser programming is becoming increasingly common to easily create new functionalities by connecting IoT devices and online services using simple rules, suchevaesnt-condition-action (ECA) rules. Unfortunately, IoT devices and platforms are vulnerable under security terms, and the possible countermeasures to security threats are completely hidden to end-users. This position paper presents the idea of involving end-users in the management of security risks. In particular, we describe how existing ECA rules could be expanded to deal with security aspects, and possible strategies to support end-users in the definition and customization of security rules.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;End-user programming</kwd>
        <kwd>Security rules</kwd>
        <kwd>Internet of Things (IoT)</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Internet-of-Things (IoT) platforms and devices are being widely used in industrial and domestic
contexts. The platforms facilitate the interoperability between diferent smart devices and cloud
services, providing end-users with tools to easily program their interaction by means of simple
conditional rules1,[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>IoT platforms provide privileged access to a user’s online services and physical devices,
making them an attractive target for attackers. If they are compromised, both data and devices
belonging to a large number of users can be arbitrarily manipulated by the attackers to cause
damage. For example, the violation of an IFTTT rule allows an attacker to access sensitive
information, such as user locations, fitness information, the content of private files, or private
feed from social networks.</p>
      <p>
        Most attempts to date in IoT security aim to improve perimeter defenses that harden the
IoT infrastructure against attacks using firewall3s],[intrusion detection4[], access control
policies 5[], and software patches [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], or to execute the actions in decentralized fashio7]n. [
Unfortunately, end-users have a low-level awareness of security threats and usage of security
measures. Most of the users have little o no technical knowledge of the gravity of what a
security violation could represent. The security of an IoT platform can be improved involving
end-users in the security control and increasing their awareness of security8r]i.sks [
      </p>
      <p>This position paper presents the idea of involving end-users in the management of security
aspects. In particular, we describe how existing ECA rules could be expanded to deal with
security aspects, and possible strategies to support end-users in the definition and customization
of security rules.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Specification of Security Rules</title>
      <p>ECA rules represent a programming paradigm for the specification of a particular type of
behavior in active systems1[]. For instance, an ECA rule can define how a certain IoT device
should react at an external event generated by a sensor, an on-line service, or another IoT
device. In the following, we describe how these rules can be enhanced to allow end-users to
define countermeasures to security threats. For example, an end-user might want to define
an ECA rule for turning of an IP camera installed in its smart home when an intrusion is
detected. Also, in response to an external intrusion, s/he might want to temporally disable all
internet connectivity from all the devices within the environment. By doing so, s/he prevents
the intruder from spreading his/her control over the other IoT devices, waiting for reviewing
the whole network, looking for some security flaws.</p>
      <p>These rules require a Local Monitoring Service (LMS) that would oversee the network,
providing the triggers for such security events. In particular, the LMS analyzes all the interconnected
devices notifying any security threat happening in the smart environment. In fact, these types
of events cannot be recorded by the IoT devices themselves, since IoT devices are commonly
known to lack in performances, so it would be really dificult for them to perform monitoring
tasks alongside the operations they have been initially designed for. Moreover, the majority of
IoT devices are embedded systems, which means that their software capabilities are not meant
to be expanded or modified by others.</p>
      <p>Another important topic to discuss is the actual possibility for an end-user to understand
the risks related to the security threats, and to autonomously decide of defining rules aimed
at protecting the environment. In fact, the end-users’ limited technical knowledge makes it
hard for them to define behaviors for realizing security barriers. Thus, a valuable strategy for
guiding users into this task would be to suggest rules that have been considered particularly
suitable for defending the environment, perhaps by suggesting rules that have already been
defined and deployed by other users. Rules could be stored in centralized repositories which
can be organized and evaluated both automatically and manu9a]l. ly [</p>
      <p>To provide these suggestions in the most comfortable way, two types of strategies could be
applied. A set of security rules could be provided directly from the environment once the IoT
device is recognized, e.g., an IP camera, which basic functionalities are known, and generalized
over diferent types of brands and models. In this way, end-users can comfortably decide what
rules best suits the device installed in the smart environment. Alternatively, security rules could
be organized based on their defense capabilities against certain types of attacks. For example,
the environment might notify the end-user with all the security rules that could protect the IoT
device against external intrusions. In this way, users can enable all the rules available for each
device without having to singularly define each behavior from scratch.</p>
      <p>The development of the proposed approach relies on the implementation of a LMS able to
identify any network anomalies that might be associated with some ECA rule events. This
service can be executed on single-board computers (SBCs), among which the most famous on
the market appears to be the Raspberry Pi.</p>
      <p>Figure1 shows a simple schema of the architecture describing the logic of analysis and
communication between the LMS and the server responsible for storing and triggering the ECA
rules. The LMS acts as an intermediary between the smart devices and the router analyzing
any network packets exchanged from/to the home smart devices. When the LMS identifies
some anomalies in the network trafic, it will gather all the information about the anomalies
and pack them all in a certain event. This event is sent to the ECA rules’ server, which will
verify whether there exist any ECA rules having that event as a trigger condition. Thus, the
retrieved rules are triggered and the corresponding actions are executed.</p>
      <p>At the workshop, we will discuss how the security rules could be specified by end-users and
the challenges to be addressed for increasing the awareness of security threats.</p>
    </sec>
    <sec id="sec-3">
      <title>Acknowledgments</title>
      <p>This work has been supported by the Italian Ministry of Education, University and Research
(MIUR) under grant PRIN 2017 “EMPATHY: Empowering People in deAling with internet of
THings ecosYstems” (Progetti di Rilevante Interesse Nazionale – Bando 2017, Grant 2017MX9T7H).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>G.</given-names>
            <surname>Desolda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Ardito</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Matera</surname>
          </string-name>
          ,
          <article-title>Empowering end users to customize their smart environments: Model, composition paradigms, and domain-specific tools</article-title>
          ,
          <source>ACM Trans. Comput.- Hum. Interact</source>
          .
          <volume>24</volume>
          (
          <year>2017</year>
          ).
          <source>doi1:0 . 1 1</source>
          <volume>4 5 / 3 0 5 7 8 5 9 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>G.</given-names>
            <surname>Ghiani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Manca</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Paternò</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Santoro</surname>
          </string-name>
          ,
          <article-title>Personalization of context-dependent applications through trigger-action rules</article-title>
          ,
          <source>ACM Trans. Comput.-Hum. Interact</source>
          .
          <volume>24</volume>
          (
          <year>2017</year>
          ).
          <source>doi:1 0 . 1 1</source>
          <volume>4 5 / 3 0 5 7 8 6 1 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Kubler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Främling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Buda</surname>
          </string-name>
          ,
          <article-title>A standardized approach to deal with firewall and mobility policies in the IoT</article-title>
          ,
          <source>Pervasive and Mobile Computing</source>
          <volume>20</volume>
          (
          <year>2015</year>
          )
          <fpage>100</fpage>
          -
          <lpage>114</lpage>
          . dh otti:p s : / / d o i .
          <source>o r g / 1 0 . 1 0</source>
          <volume>1 6</volume>
          / j . p
          <source>m c j . 2 0 1 4 . 0 9 . 0 0 5 .</source>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>B. B.</given-names>
            <surname>Zarpelão</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. S.</given-names>
            <surname>Miani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. T.</given-names>
            <surname>Kawakani</surname>
          </string-name>
          , S. C. de Alvarenga,
          <article-title>A survey of intrusion detection in internet of things</article-title>
          ,
          <source>Journal of Network and Computer Applications</source>
          <volume>84</volume>
          (
          <year>2017</year>
          )
          <fpage>25</fpage>
          -
          <lpage>37</lpage>
          . doi:h t t p s : / / d o i .
          <source>o r g / 1 0 . 1 0 1 6 / j . j n c a . 2 0 1 7 . 0 2 . 0 0 9 .</source>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>W.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Golla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Padhi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ofek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dürmuth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Fernandes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ur</surname>
          </string-name>
          ,
          <article-title>Rethinking access control and authentication for the home internet of things (IoT)</article-title>
          ,
          <source>in: Proceedings of the 27th USENIX Conference on Security Symposium</source>
          , SEC'18,
          <string-name>
            <given-names>USENIX</given-names>
            <surname>Association</surname>
          </string-name>
          , USA,
          <year>2018</year>
          , p.
          <fpage>255</fpage>
          -
          <lpage>272</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>O.</given-names>
            <surname>Leiba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Bitton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yitzchak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nadler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kashi</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Shabtai,
          <article-title>IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution</article-title>
          ,
          <source>Pervasive and Mobile Computing</source>
          <volume>58</volume>
          (
          <year>2019</year>
          )
          <article-title>101019</article-title>
          . doih:t t p s : / / d o i .
          <source>o r g / 1 0 . 1 0</source>
          <volume>1 6</volume>
          / j . p
          <source>m c j . 2 0 1 9 . 0 4 . 0 1 0 .</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>E.</given-names>
            <surname>Fernandes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rahmati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jung</surname>
          </string-name>
          ,
          <string-name>
            <surname>A. Prakash,</surname>
          </string-name>
          <article-title>Decentralized action integrity for triggeraction IoT platforms</article-title>
          ,
          <source>in: Proceedings of the 22nd Network and Distributed Security Symposium (NDSS</source>
          <year>2018</year>
          ),
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>U. H. R.</given-names>
            <surname>Xavier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. P.</given-names>
            <surname>Pati</surname>
          </string-name>
          ,
          <article-title>Study of internet security threats among home users</article-title>
          ,
          <source>in: Proceedings of the Fourth International Conference on Computational Aspects of Social Networks (CASoN)</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>217</fpage>
          -
          <lpage>221</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>O.</given-names>
            <surname>Alrawi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lever</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Antonakakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Monrose</surname>
          </string-name>
          ,
          <article-title>SoK: Security evaluation of home-based IoT deployments</article-title>
          ,
          <source>in: Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>1362</fpage>
          -
          <lpage>1380</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>