{"title":"使用基于行为分析的身份验证方法保护智能家居","authors":"Noureddine Houcine Amraoui, Amine Besrour, Riadh Ksantini, Belhassen Zouari","doi":"10.1109/ComNet47917.2020.9306081","DOIUrl":null,"url":null,"abstract":"This paper presents TRICA, a security framework for smart homes. When using controlling apps (e.g., smartphone app), TRICA makes sure that only legitimate users are allowed to control their Internet of Things (IoT) devices. Leveraging User Behavior Analytics (UBA) and Anomaly Detection (AD) techniques, TRI CA collects and processes the historical cyber and physical activities of the user in addition to the historical states of the smart home system to build a One Class Support Vector Machines (OCSVM) model. This model is then used as a baseline from which anomalous commands (i.e., outliers) should be detected and rejected, while normal commands (i.e., targets) should be considered as legitimate and allowed to be executed. Experiments conducted on adapted real-world data properly show the feasibility of such user behavior-based authentication approach. TRICA exhibits low false accept and false reject rates ensuring both security and user convenience, respectively.","PeriodicalId":351664,"journal":{"name":"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)","volume":"259 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Securing Smart Homes using a Behavior Analysis based Authentication Approach\",\"authors\":\"Noureddine Houcine Amraoui, Amine Besrour, Riadh Ksantini, Belhassen Zouari\",\"doi\":\"10.1109/ComNet47917.2020.9306081\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents TRICA, a security framework for smart homes. When using controlling apps (e.g., smartphone app), TRICA makes sure that only legitimate users are allowed to control their Internet of Things (IoT) devices. Leveraging User Behavior Analytics (UBA) and Anomaly Detection (AD) techniques, TRI CA collects and processes the historical cyber and physical activities of the user in addition to the historical states of the smart home system to build a One Class Support Vector Machines (OCSVM) model. This model is then used as a baseline from which anomalous commands (i.e., outliers) should be detected and rejected, while normal commands (i.e., targets) should be considered as legitimate and allowed to be executed. Experiments conducted on adapted real-world data properly show the feasibility of such user behavior-based authentication approach. TRICA exhibits low false accept and false reject rates ensuring both security and user convenience, respectively.\",\"PeriodicalId\":351664,\"journal\":{\"name\":\"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)\",\"volume\":\"259 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-10-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ComNet47917.2020.9306081\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE Eighth International Conference on Communications and Networking (ComNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ComNet47917.2020.9306081","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing Smart Homes using a Behavior Analysis based Authentication Approach
This paper presents TRICA, a security framework for smart homes. When using controlling apps (e.g., smartphone app), TRICA makes sure that only legitimate users are allowed to control their Internet of Things (IoT) devices. Leveraging User Behavior Analytics (UBA) and Anomaly Detection (AD) techniques, TRI CA collects and processes the historical cyber and physical activities of the user in addition to the historical states of the smart home system to build a One Class Support Vector Machines (OCSVM) model. This model is then used as a baseline from which anomalous commands (i.e., outliers) should be detected and rejected, while normal commands (i.e., targets) should be considered as legitimate and allowed to be executed. Experiments conducted on adapted real-world data properly show the feasibility of such user behavior-based authentication approach. TRICA exhibits low false accept and false reject rates ensuring both security and user convenience, respectively.