簡易檢索 / 詳目顯示

研究生: 黃妤婷
Huang, Yu-Ting
論文名稱: 降低具CAI和CMAI威脅之物聯網互動中的使用者操作負擔
Mitigating User-Effort in IoT Interaction with CAI and CMAI Threats
指導教授: 涂嘉恆
Tu, Chia-Heng
蔡孟勳
Tsai, Meng-Hsun
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2024
畢業學年度: 112
語文別: 英文
論文頁數: 56
中文關鍵詞: 物聯網智慧家庭
外文關鍵詞: IoT, Smart Home
相關次數: 點閱:44下載:5
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 物聯網 (IoT) 技術的快速普及徹底改變了我們與家中設備互動的方式,提供了很大的便利性和自動化。然而,這種整合也帶來了複雜的安全挑戰,特別是跨應用互動 (CAI) 和跨手動控制及自動化互動 (CMAI) 威脅,這些威脅可能導致危險結果。本論文提出了一種綜合方案來減輕這些威脅。我們的方法在靜態階段新增規則時預先通知使用者潛在的風險,並提供重寫或保留規則的建議。同時,它在運行時動態檢測威脅、提供相應的解決方案、評估不同選項的風險,並優先執行低風險選項。所提出的方案減少了實際威脅的發生,降低了使用者的負擔,最大限度地減少了干擾,處理使用者不回應的情況,並增強了智慧家庭環境的整體安全性。實驗評估表明,我們的方案在威脅偵測、風險排名和使用者體驗方面顯著優於現有方法。

    The rapid proliferation of Internet of Things (IoT) technology has fundamentally transformed the way we interact with home devices, offering unparalleled convenience and automation. However, this integration also brings complex security challenges, particularly Cross-App Interaction (CAI) and Cross Manual-control and Automation Interaction (CMAI) threats, which can lead to hazardous outcomes. This paper proposes a comprehensive scheme to mitigate these threats. Our method preemptively notifies users of potential risks when new rules are added in the static stage and provides suggestions for rewriting or retaining rules. Simultaneously, it dynamically detects threats during runtime, provides corresponding solutions, assesses the risks of different options, and prioritizes low-risk options. The proposed scheme reduces the occurrence of actual threats, lowers user effort, minimizes disruptions, handles situations where users do not respond, and enhances overall security in smart home environments. Experimental evaluations demonstrate that our scheme significantly outperforms existing methods in threat detection, risk ranking, and user experience.

    中文摘要 i Abstract ii Acknowledgements iii Contents iv List of Tables vi List of Figures vii 1 Introduction 1 2 Background and Related Work 6 2.1 Related Work 6 2.2 IoTMEDIATOR 8 2.3 HomeGuard 9 3 Proposed Scheme 11 3.1 System Architecture 11 3.2 Static Stage 12 3.2.1 CAI/CMAI Threat Identifying 15 3.2.2 Risk Ranking 18 3.2.3 Rule Checking 22 3.3 Dynamic Stage 25 3.3.1 Threat Checking 28 3.3.2 Options Looking Up and Risk Calculating 29 3.3.3 User Disruption Minimization 30 4 Performance Evaluation 32 4.1 Experimental Background 32 4.2 Experiment of Static Stage 36 4.3 Experiment of Dynamic Stage 39 4.4 Latency in Experimental Design 42 5 Conclusions and Future Work 43 5.1 Conclusions 43 5.2 Future Works 44 References 45

    [1] H. Chi, Q. Zeng, and X. Du, “Detecting and handling IoT interaction threats in Multi-Platform Multi-Control-Channel smart homes,” in 32nd USENIX Security Symposium (USENIX Security 23), (Anaheim, CA), pp. 1559–1576, USENIX Association, Aug. 2023.
    [2] H. Chi, Q. Zeng, X. Du, and J. Yu, “Cross-app interference threats in smart homes: Categorization, detection and handling,” in 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 411–423, IEEE, 2020.
    [3] W. Ding and H. Hu, “On the safety of iot device physical interaction control,” in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 832–846, 2018.
    [4] W. Ding, H. Hu, and L. Cheng, “Iotsafe: Enforcing safety and security policy withreal iot physical interaction discovery,” in Network and Distributed System Security Symposium, 2021.
    [5] Z. B. Celik, G. Tan, and P. D. McDaniel, “Iotguard: Dynamic enforcement of security and safety policy in commodity iot.,” in NDSS, 2019.
    [6] F. Saeed, A. Paul, A. Rehman, W. H. Hong, and H. Seo, “Iot-based intelligent modeling of smart home environment for fire prevention and safety,” Journal of Sensor and Actuator Networks, vol. 7, no. 1, p. 11, 2018.
    [7] C. Reports, “Home security system buying guide,” July 1 2022. Accessed: (13/04/2024).
    [8] SmartThings, “Smartthings public repository,” 2015. Accessed: (14/04/2024).
    [9] N. F. P. Association, NFPA 70: National electrical code. NationalFireProtectionAssoc, 2007.
    [10] U. Hunkeler, H. L. Truong, and A. Stanford-Clark, “Mqtt-s—a publish/subscribe protocol for wireless sensor networks,” in 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE’08), pp. 791–798, IEEE, 2008.

    下載圖示 校內:立即公開
    校外:立即公開
    QR CODE