Identifying Security and Privacy Violation Rules in Trigger-Action IoT Platforms With NLP Models

32Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Trigger-action platforms are systems that enable users to easily define, in terms of conditional rules, custom behaviors concerning Internet of Things (IoT) devices and Web services. Unfortunately, although these tools stimulate the creativity of users in building automation, they may also introduce serious risks for the users. Indeed, trigger-action rules can lead to the possibility of users harming themselves, for example, by unintentionally disclosing nonpublic information, or unwillingly exposing their smart environment to cyber-threats. In this article, we propose to use natural language processing (NLP) techniques to detect automation rules, defined within trigger-action IoT platforms, that potentially violate the security or privacy of the users. The proposed NLP-based models capture the semantic and contextual information of the trigger-action rules by applying classification techniques to different combinations of rule's features. We evaluate the proposed solution with the mainstream trigger-action platform, namely, If-This-Then-That, by training the NLP models with a data set of 76 741 rules labeled by using an ensemble of three semi-supervised learning techniques. The experimental results demonstrate that the model based on bidirectional encoder representations from transformers (BERTs) obtains the highest performances when trained on all features, achieving average Precision and Recall values between 88% and 93%. We also compare the achieved performances with those of a baseline system implementing information flow analysis.

References Powered by Scopus

GloVe: Global vectors for word representation

27212Citations
N/AReaders
Get full text

User perceptions of smart home IoT privacy

332Citations
N/AReaders
Get full text

IOTGUARD: Dynamic Enforcement of Security and Safety Policy in Commodity IoT

203Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Revolutionizing Cyber Threat Detection with Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices

60Citations
N/AReaders
Get full text

Estimating reference crop evapotranspiration using improved convolutional bidirectional long short-term memory network by multi-head attention mechanism in the four climatic zones of China

14Citations
N/AReaders
Get full text

Horizontal IoT Platform EMULSION

6Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Breve, B., Cimino, G., & Deufemia, V. (2023). Identifying Security and Privacy Violation Rules in Trigger-Action IoT Platforms With NLP Models. IEEE Internet of Things Journal, 10(6), 5607–5622. https://doi.org/10.1109/JIOT.2022.3222615

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 5

100%

Readers' Discipline

Tooltip

Computer Science 4

57%

Engineering 3

43%

Article Metrics

Tooltip
Mentions
News Mentions: 1

Save time finding and organizing research with Mendeley

Sign up for free