On the Safety Implications of Misordered Events and Commands in IoT Systems

05/03/2021
by   Furkan Goksel, et al.
0

IoT devices, equipped with embedded actuators and sensors, provide custom automation in the form of IoT apps. IoT apps subscribe to events and upon receipt, transmit actuation commands which trigger a set of actuators. Events and actuation commands follow paths in the IoT ecosystem such as sensor-to-edge, edge-to-cloud, and cloud-to-actuator, with different network and processing delays between these connections. Significant delays may occur especially when an IoT system cloud interacts with other clouds. Due to this variation in delays, the cloud may receive events in an incorrect order, and in turn, devices may receive and actuate misordered commands. In this paper, we first study eight major IoT platforms and show that they do not make strong guarantees on event orderings to address these issues. We then analyze the end-to-end interactions among IoT components, from the creation of an event to the invocation of a command. From this, we identify and formalize the root causes of misorderings in events and commands leading to undesired states. We deploy 23 apps in a simulated smart home containing 35 IoT devices to evaluate the misordering problem. Our experiments demonstrate a high number of misordered events and commands that occur through different interaction paths. Through this effort, we reveal the root and extent of the misordering problem and guide future work to ensure correct ordering in IoT systems.

READ FULL TEXT

page 1

page 5

research
10/22/2018

IoTSan: Fortifying the Safety of IoT Systems

Today's IoT systems include event-driven smart applications (apps) that ...
research
03/03/2022

A Survey of Analysis Methods for Security and Safety verification in IoT Systems

Internet of Things (IoT) has been rapidly growing in the past few years ...
research
10/27/2018

IoT Cloud Platforms: an Application Development Perspective

With the growing number of Internet of Things (IoT) devices, the data ge...
research
08/11/2022

Transparent and Tamper-Proof Event Ordering in the Internet of Things Platforms

Today, the audit and diagnosis of the causal relationships between the e...
research
04/26/2018

Enabling Trusted App Development @ The Edge

We present the Databox application development environment or SDK as a m...
research
02/09/2022

IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms

With the emergence and fast development of trigger-action platforms in I...
research
02/02/2023

MAVERICK: An App-independent and Platform-agnostic Approach to Enforce Policies in IoT Systems at Runtime

Safety and security issues in programmable IoT systems are still a press...

Please sign up or login with your details

Forgot password? Click here to reset