=Paper=
{{Paper
|id=Vol-2702/sample-11col
|storemode=property
|title=Empowering End-Users in the Specification of Security Rules
|pdfUrl=https://ceur-ws.org/Vol-2702/EMPATHY_2020_paper_11.pdf
|volume=Vol-2702
|authors=Bernardo Breve,Vincenzo Deufemia
|dblpUrl=https://dblp.org/rec/conf/avi/BreveD20
}}
==Empowering End-Users in the Specification of Security Rules==
Empowering End-Users in the Specification of Security Rules Bernardo Brevea , Vincenzo Deufemiaa a University of Salerno, 84084 Fisciano(SA), Italy Abstract With the rapid growth of Internet-of-Things (IoT) devices, especially in the context of smart homes, end- user programming is becoming increasingly common to easily create new functionalities by connecting IoT devices and online services using simple rules, such as event-condition-action (ECA) rules. Unfortu- nately, IoT devices and platforms are vulnerable under security terms, and the possible countermeasures to security threats are completely hidden to end-users. This position paper presents the idea of involving end-users in the management of security risks. In particular, we describe how existing ECA rules could be expanded to deal with security aspects, and possible strategies to support end-users in the definition and customization of security rules. Keywords End-user programming, Security rules, Internet of Things (IoT) 1. Introduction Internet-of-Things (IoT) platforms and devices are being widely used in industrial and domestic contexts. The platforms facilitate the interoperability between different smart devices and cloud services, providing end-users with tools to easily program their interaction by means of simple conditional rules [1, 2]. IoT platforms provide privileged access to a user’s online services and physical devices, making them an attractive target for attackers. If they are compromised, both data and devices belonging to a large number of users can be arbitrarily manipulated by the attackers to cause damage. For example, the violation of an IFTTT rule allows an attacker to access sensitive information, such as user locations, fitness information, the content of private files, or private feed from social networks. Most attempts to date in IoT security aim to improve perimeter defenses that harden the IoT infrastructure against attacks using firewalls [3], intrusion detection [4], access control policies [5], and software patches [6], or to execute the actions in decentralized fashion [7]. Unfortunately, end-users have a low-level awareness of security threats and usage of security measures. Most of the users have little o no technical knowledge of the gravity of what a EMPATHY: Empowering People in Dealing with Internet of Things Ecosystems. Workshop co-located with AVI 2020, Island of Ischia, Italy email: bbreve@unisa.it (B. Breve); deufemia@unisa.it (V. Deufemia) url: https://docenti.unisa.it/vincenzo.deufemia (V. Deufemia) orcid: 0000-0002-6711-3590 (V. Deufemia) © 2020 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org) security violation could represent. The security of an IoT platform can be improved involving end-users in the security control and increasing their awareness of security risks [8]. This position paper presents the idea of involving end-users in the management of security aspects. In particular, we describe how existing ECA rules could be expanded to deal with security aspects, and possible strategies to support end-users in the definition and customization of security rules. 2. Specification of Security Rules ECA rules represent a programming paradigm for the specification of a particular type of behavior in active systems [1]. For instance, an ECA rule can define how a certain IoT device should react at an external event generated by a sensor, an on-line service, or another IoT device. In the following, we describe how these rules can be enhanced to allow end-users to define countermeasures to security threats. For example, an end-user might want to define an ECA rule for turning off an IP camera installed in its smart home when an intrusion is detected. Also, in response to an external intrusion, s/he might want to temporally disable all internet connectivity from all the devices within the environment. By doing so, s/he prevents the intruder from spreading his/her control over the other IoT devices, waiting for reviewing the whole network, looking for some security flaws. These rules require a Local Monitoring Service (LMS) that would oversee the network, provid- ing the triggers for such security events. In particular, the LMS analyzes all the interconnected devices notifying any security threat happening in the smart environment. In fact, these types of events cannot be recorded by the IoT devices themselves, since IoT devices are commonly known to lack in performances, so it would be really difficult for them to perform monitoring tasks alongside the operations they have been initially designed for. Moreover, the majority of IoT devices are embedded systems, which means that their software capabilities are not meant to be expanded or modified by others. Another important topic to discuss is the actual possibility for an end-user to understand the risks related to the security threats, and to autonomously decide of defining rules aimed at protecting the environment. In fact, the end-users’ limited technical knowledge makes it hard for them to define behaviors for realizing security barriers. Thus, a valuable strategy for guiding users into this task would be to suggest rules that have been considered particularly suitable for defending the environment, perhaps by suggesting rules that have already been defined and deployed by other users. Rules could be stored in centralized repositories which can be organized and evaluated both automatically and manually [9]. To provide these suggestions in the most comfortable way, two types of strategies could be applied. A set of security rules could be provided directly from the environment once the IoT device is recognized, e.g., an IP camera, which basic functionalities are known, and generalized over different types of brands and models. In this way, end-users can comfortably decide what rules best suits the device installed in the smart environment. Alternatively, security rules could be organized based on their defense capabilities against certain types of attacks. For example, the environment might notify the end-user with all the security rules that could protect the IoT device against external intrusions. In this way, users can enable all the rules available for each Figure 1: An LMS-based architecture for executing security rules. device without having to singularly define each behavior from scratch. The development of the proposed approach relies on the implementation of a LMS able to identify any network anomalies that might be associated with some ECA rule events. This service can be executed on single-board computers (SBCs), among which the most famous on the market appears to be the Raspberry Pi. Figure 1 shows a simple schema of the architecture describing the logic of analysis and communication between the LMS and the server responsible for storing and triggering the ECA rules. The LMS acts as an intermediary between the smart devices and the router analyzing any network packets exchanged from/to the home smart devices. When the LMS identifies some anomalies in the network traffic, it will gather all the information about the anomalies and pack them all in a certain event. This event is sent to the ECA rules’ server, which will verify whether there exist any ECA rules having that event as a trigger condition. Thus, the retrieved rules are triggered and the corresponding actions are executed. At the workshop, we will discuss how the security rules could be specified by end-users and the challenges to be addressed for increasing the awareness of security threats. Acknowledgments This work has been supported by the Italian Ministry of Education, University and Research (MIUR) under grant PRIN 2017 “EMPATHY: Empowering People in deAling with internet of THings ecosYstems” (Progetti di Rilevante Interesse Nazionale – Bando 2017, Grant 2017MX9T7H). References [1] G. Desolda, C. Ardito, M. Matera, Empowering end users to customize their smart environ- ments: Model, composition paradigms, and domain-specific tools, ACM Trans. Comput.- Hum. Interact. 24 (2017). doi:1 0 . 1 1 4 5 / 3 0 5 7 8 5 9 . [2] G. Ghiani, M. Manca, F. Paternò, C. Santoro, Personalization of context-dependent ap- plications through trigger-action rules, ACM Trans. Comput.-Hum. Interact. 24 (2017). doi:1 0 . 1 1 4 5 / 3 0 5 7 8 6 1 . [3] S. Kubler, K. Främling, A. Buda, A standardized approach to deal with firewall and mobility policies in the IoT, Pervasive and Mobile Computing 20 (2015) 100 – 114. doi:h t t p s : / / d o i . org/10.1016/j.pmcj.2014.09.005. [4] B. B. Zarpelão, R. S. Miani, C. T. Kawakani, S. C. de Alvarenga, A survey of intrusion detection in internet of things, Journal of Network and Computer Applications 84 (2017) 25 – 37. doi:h t t p s : / / d o i . o r g / 1 0 . 1 0 1 6 / j . j n c a . 2 0 1 7 . 0 2 . 0 0 9 . [5] W. He, M. Golla, R. Padhi, J. Ofek, M. Dürmuth, E. Fernandes, B. Ur, Rethinking access control and authentication for the home internet of things (IoT), in: Proceedings of the 27th USENIX Conference on Security Symposium, SEC’18, USENIX Association, USA, 2018, p. 255–272. [6] O. Leiba, R. Bitton, Y. Yitzchak, A. Nadler, D. Kashi, A. Shabtai, IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution, Pervasive and Mobile Computing 58 (2019) 101019. doi:h t t p s : / / d o i . o r g / 1 0 . 1 0 1 6 / j . p m c j . 2 0 1 9 . 0 4 . 0 1 0 . [7] E. Fernandes, A. Rahmati, J. Jung, A. Prakash, Decentralized action integrity for trigger- action IoT platforms, in: Proceedings of the 22nd Network and Distributed Security Symposium (NDSS 2018), 2018. [8] U. H. R. Xavier, B. P. Pati, Study of internet security threats among home users, in: Proceedings of the Fourth International Conference on Computational Aspects of Social Networks (CASoN), 2012, pp. 217–221. [9] O. Alrawi, C. Lever, M. Antonakakis, F. Monrose, SoK: Security evaluation of home-based IoT deployments, in: Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP), 2019, pp. 1362–1380.