ComplexIoT: Behavior-Based Trust For IoT Networks
Title | ComplexIoT: Behavior-Based Trust For IoT Networks |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Haefner, Kyle, Ray, Indrakshi |
Conference Name | 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA) |
Keywords | Access Control, access control decisions, anomaly detection, anomaly detection algorithm, authorisation, behavior-based trust, behavioral framework, behavioral model, complex general purpose devices, ComplexIoT, complexity measure, Complexity theory, composability, compositionality, computer network security, Computer Theory and Trust, device complexity, false trust, generalized decision boundary, Internet of Things, Internet-of-Things, IoT devices, IoT networks, machine learning, network traffic, Object recognition, policy-based governance, Policy-Governed Secure Collaboration, pubcrawl, resilience, Resiliency, Scalability, Sensors, software defined networking, telecommunication traffic, trust score ranking |
Abstract | This work takes a novel approach to classifying the behavior of devices by exploiting the single-purpose nature of IoT devices and analyzing the complexity and variance of their network traffic. We develop a formalized measurement of complexity for IoT devices, and use this measurement to precisely tune an anomaly detection algorithm for each device. We postulate that IoT devices with low complexity lead to a high confidence in their behavioral model and have a correspondingly more precise decision boundary on their predicted behavior. Conversely, complex general purpose devices have lower confidence and a more generalized decision boundary. We show that there is a positive correlation to our complexity measure and the number of outliers found by an anomaly detection algorithm. By tuning this decision boundary based on device complexity we are able to build a behavioral framework for each device that reduces false positive outliers. Finally, we propose an architecture that can use this tuned behavioral model to rank each flow on the network and calculate a trust score ranking of all traffic to and from a device which allows the network to autonomously make access control decisions on a per-flow basis. |
DOI | 10.1109/TPS-ISA48467.2019.00016 |
Citation Key | haefner_complexiot_2019 |
- Policy-Governed Secure Collaboration
- Internet of Things
- Internet-of-Things
- IoT devices
- IoT networks
- machine learning
- network traffic
- Object recognition
- policy-based governance
- generalized decision boundary
- pubcrawl
- resilience
- Resiliency
- Scalability
- sensors
- software defined networking
- telecommunication traffic
- trust score ranking
- behavioral framework
- composability
- Computer Theory and Trust
- Access Control
- access control decisions
- Anomaly Detection
- anomaly detection algorithm
- authorisation
- behavior-based trust
- Compositionality
- behavioral model
- complex general purpose devices
- ComplexIoT
- complexity measure
- Complexity theory
- computer network security
- device complexity
- false trust