{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T05:06:57Z","timestamp":1769231217025,"version":"3.49.0"},"reference-count":98,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T00:00:00Z","timestamp":1684713600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"crossref","award":["2021ZD0110403"],"award-info":[{"award-number":["2021ZD0110403"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"China National Natural Science Foundation","doi-asserted-by":"crossref","award":["62102016"],"award-info":[{"award-number":["62102016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"S&T Program of Hebei","award":["20310101D"],"award-info":[{"award-number":["20310101D"]}]},{"name":"Opening Project of Shanghai Trusted Industrial Control Platform"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Web"],"published-print":{"date-parts":[[2023,8,31]]},"abstract":"<jats:p>\n            Device-level security has become a major concern in smart home systems. Detecting problems in smart home sytems strives to increase accuracy in near real time without hampering the regular tasks of the smart home. The current state of the art in detecting anomalies in smart home devices is mainly focused on the app level, which provides a basic level of security by assuming that the devices are functioning correctly. However, this approach is insufficient for ensuring the overall security of the system, as it overlooks the possibility of anomalies occurring at the lower layers such as the devices. In this article, we propose a novel notion,\n            <jats:italic>correlated graph<\/jats:italic>\n            , and with the aid of that, we develop our system to detect misbehaving devices without modifying the existing system. Our correlated graphs explicitly represent the contextual correlations among smart devices with little knowledge about the system. We further propose a linkage path model and a sensitivity ranking method to assist in detecting the abnormalities. We implement a semi-automatic prototype of our approach, evaluate it in real-world settings, and demonstrate its efficiency, which achieves an accuracy of around 90% in near real time.\n          <\/jats:p>","DOI":"10.1145\/3586073","type":"journal-article","created":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T12:03:39Z","timestamp":1677672219000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Niffler: Real-time Device-level Anomalies Detection in Smart Home"],"prefix":"10.1145","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8492-3990","authenticated-orcid":false,"given":"Haohua","family":"Du","sequence":"first","affiliation":[{"name":"Beihang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4603-3348","authenticated-orcid":false,"given":"Yue","family":"Wang","sequence":"additional","affiliation":[{"name":"Beihang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9235-9165","authenticated-orcid":false,"given":"Xiaoya","family":"Xu","sequence":"additional","affiliation":[{"name":"Beihang University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3850-360X","authenticated-orcid":false,"given":"Mingsheng","family":"Liu","sequence":"additional","affiliation":[{"name":"Shijiazhuang Institute of Railway Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,5,22]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"2013. Smart Building System Commissioning. Retrieved April. 30 2019 from http:\/\/greenlightiot.com\/2017\/07\/smart-building-system-commissioning\/."},{"key":"e_1_3_2_3_2","unstructured":"2016. Amazon Amazon Echo Description. Retrieved February 22 2019 from https:\/\/www.amazon.com\/Amazon-Echo-And-Alexa-Devices."},{"key":"e_1_3_2_4_2","unstructured":"2016. Ecobee Smart Thermostat. Retrieved April. 30 2019 from https:\/\/www.smartthings.com\/products\/ecobee-smartthermostat-with-voice-vontrol."},{"key":"e_1_3_2_5_2","unstructured":"2017. Home Awareness Simplified. Retrieved April 30 2019 from https:\/\/getnotion.com\/."},{"key":"e_1_3_2_6_2","unstructured":"2017. Insteon Power Meter. Retrieved April 30 2019 from https:\/\/www.insteon.com\/."},{"key":"e_1_3_2_7_2","unstructured":"2018. AV-Test Test: Fitness Wristbands Reveal Data. Retrieved February 22 2019 from https:\/\/www.av-test.org\/en\/news\/news-single-view\/test-fitness-wristbands-reveal-data\/."},{"key":"e_1_3_2_8_2","unstructured":"2018. Fibaro Motion Sensor. Retrieved April 30 2019 from http:\/\/www.fibaro.com\/us\/the-fibaro-system\/."},{"key":"e_1_3_2_9_2","unstructured":"2018. Nexia Schlage Motion Sensor. Retrieved April 30 2019 from https:\/\/www.nexiahome.com\/products_category\/sensors-main."},{"key":"e_1_3_2_10_2","unstructured":"2018. Samsung Smart Doorlock. Retrieved February 22 2019 from https:\/\/www.smartthings.com\/products\/danalock-v3-smart-lock."},{"key":"e_1_3_2_11_2","unstructured":"2018. Samsung Smart Light. Retrieved February 22 2019 from https:\/\/www.smartthings.com\/products\/smartthings-smart-bulb."},{"key":"e_1_3_2_12_2","unstructured":"2018. Samsung Smart Plug. Retrieved February 22 2019 from https:\/\/www.smartthings.com\/products\/smartthings-wifi-smart-plug."},{"key":"e_1_3_2_13_2","unstructured":"2018. Samsung Smart Shade. Retrieved February 22 2019 from https:\/\/www.smartthings.com\/products\/springs-window-fashions-bali-autoview-motorized-shades-rsz1."},{"key":"e_1_3_2_14_2","unstructured":"2018. Samsung Smart Siren. Retrieved February 22 2019 from https:\/\/www.smartthings.com\/products\/smartthings-siren."},{"key":"e_1_3_2_15_2","unstructured":"2018. Samsung Smart Switch. Retrieved February 22 2019 from https:\/\/www.smartthings.com\/products\/leviton-15a-switch."},{"key":"e_1_3_2_16_2","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P\u201919)","author":"Alrawi Omar","year":"2019","unstructured":"Omar Alrawi, Chaz Lever, Manos Antonakakis, and Fabian Monrose. 2019. Sok: Security evaluation of home-based iot deployments. In Proceedings of the IEEE Symposium on Security and Privacy (S&P\u201919)."},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.853430"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818028"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2009.2014932"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3013520"},{"key":"e_1_3_2_21_2","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1007\/978-3-540-73090-3_15","volume-title":"Proceedings of the International Conference on Distributed Computing in Sensor Systems","author":"Bettencourt Lu\u00eds M. A.","year":"2007","unstructured":"Lu\u00eds M. A. Bettencourt, Aric A. Hagberg, and Levi B. Larkey. 2007. Separating the wheat from the chaff: Practical anomaly detection schemes in ecological applications of distributed sensor networks. In Proceedings of the International Conference on Distributed Computing in Sensor Systems. Springer, 223\u2013239."},{"issue":"9","key":"e_1_3_2_22_2","first-page":"17","article-title":"EBK-means: A clustering technique based on elbow method and k-means in WSN","volume":"105","author":"Bholowalia Purnima","year":"2014","unstructured":"Purnima Bholowalia and Arvind Kumar. 2014. EBK-means: A clustering technique based on elbow method and k-means in WSN. Int. J. Comput. Appl. 105, 9 (2014), 17\u201324.","journal-title":"Int. J. Comput. Appl"},{"key":"e_1_3_2_23_2","first-page":"219","volume-title":"Proceedings of the International Conference on Foundations of Software Science and Computation Structures","author":"Bouyer Patricia","year":"2005","unstructured":"Patricia Bouyer, Fabrice Chevalier, and Deepak D\u2019Souza. 2005. Fault diagnosis using timed automata. In Proceedings of the International Conference on Foundations of Software Science and Computation Structures. Springer, 219\u2013233."},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0474-5"},{"key":"e_1_3_2_25_2","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1007\/978-3-662-47854-7_17","volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security","author":"Busold Christoph","year":"2015","unstructured":"Christoph Busold, Stephan Heuser, Jon Rios, Ahmad-Reza Sadeghi, and N. Asokan. 2015. Smart and secure cross-device apps for the internet of advanced things. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 272\u2013290."},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.conengprac.2010.12.010"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2012.06.042"},{"key":"e_1_3_2_28_2","first-page":"6941","volume-title":"Proceedings of the 48h IEEE Conference on Decision and Control (CDC\u201909) held jointly with the 28th Chinese Control Conference","author":"Cassez Franck","year":"2009","unstructured":"Franck Cassez. 2009. A note on fault diagnosis algorithms. In Proceedings of the 48h IEEE Conference on Decision and Control (CDC\u201909) held jointly with the 28th Chinese Control Conference. IEEE, 6941\u20136946."},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2012.2183169"},{"issue":"8","key":"e_1_3_2_30_2","doi-asserted-by":"crossref","first-page":"1545","DOI":"10.3182\/20090630-4-ES-2003.00252","article-title":"Monitoring and active diagnosis for discrete-event systems","volume":"42","author":"Chanthery Elodie","year":"2009","unstructured":"Elodie Chanthery and Yannick Pencol\u00e9. 2009. Monitoring and active diagnosis for discrete-event systems. IFAC Proc. Vol. 42, 8 (2009), 1545\u20131550.","journal-title":"IFAC Proc. Vol."},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.21"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2873587.2873600"},{"key":"e_1_3_2_33_2","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1145\/3098243.3098251","volume-title":"Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks","author":"Demetriou Soteris","year":"2017","unstructured":"Soteris Demetriou, Nan Zhang, Yeonjoon Lee, XiaoFeng Wang, Carl A. Gunter, Xiaoyong Zhou, and Michael Grace. 2017. HanGuard: SDN-driven protection of smart home WiFi devices from malicious mobile apps. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks. ACM, 122\u2013133."},{"key":"e_1_3_2_34_2","first-page":"902","volume-title":"Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies","volume":"2","author":"Ding Min","year":"2005","unstructured":"Min Ding, Dechang Chen, Kai Xing, and Xiuzhen Cheng. 2005. Localized fault-tolerant event boundary detection in sensor networks. In Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 2. IEEE, 902\u2013913."},{"issue":"2","key":"e_1_3_2_35_2","doi-asserted-by":"crossref","first-page":"6554","DOI":"10.3182\/20080706-5-KR-1001.01105","article-title":"Fault detection of discrete event systems using Petri nets and integer linear programming","volume":"41","author":"Dotoli M.","year":"2008","unstructured":"M. Dotoli, M. P. Fanti, and A. M. Mangini. 2008. Fault detection of discrete event systems using Petri nets and integer linear programming. IFAC Proc. Vol. 41, 2 (2008), 6554\u20136559.","journal-title":"IFAC Proc. Vol."},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2008.2005601"},{"issue":"12","key":"e_1_3_2_37_2","doi-asserted-by":"crossref","first-page":"229","DOI":"10.3182\/20100830-3-DE-4013.00039","article-title":"On the construction of probabilistic diagnosers","volume":"43","author":"Fabre Eric","year":"2010","unstructured":"Eric Fabre and Lo\u00efg Jezequel. 2010. On the construction of probabilistic diagnosers. IFAC Proc. Vol. 43, 12 (2010), 229\u2013234.","journal-title":"IFAC Proc. Vol."},{"key":"e_1_3_2_38_2","first-page":"636","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201916)","author":"Fernandes Earlence","year":"2016","unstructured":"Earlence Fernandes, Jaeyeon Jung, and Atul Prakash. 2016. Security analysis of emerging smart home applications. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201916). IEEE, 636\u2013654."},{"key":"e_1_3_2_39_2","first-page":"531","volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security\u201916)","author":"Fernandes Earlence","year":"2016","unstructured":"Earlence Fernandes, Justin Paupore, Amir Rahmati, Daniel Simionato, Mauro Conti, and Atul Prakash. 2016. Flowfence: Practical data protection for emerging iot application frameworks. In Proceedings of the 25th USENIX Security Symposium (USENIX Security\u201916). 531\u2013548."},{"key":"e_1_3_2_40_2","first-page":"1","article-title":"Security evaluation of the Z-Wave wireless protocol","volume":"24","author":"Fouladi Behrang","year":"2013","unstructured":"Behrang Fouladi and Sahand Ghanoun. 2013. Security evaluation of the Z-Wave wireless protocol. Black Hat USA 24 (2013), 1\u20132.","journal-title":"Black Hat USA"},{"key":"e_1_3_2_41_2","first-page":"17","volume-title":"Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201912)","author":"Gonzalez Joseph E.","year":"2012","unstructured":"Joseph E. Gonzalez, Yucheng Low, Haijie Gu, Danny Bickson, and Carlos Guestrin. 2012. \\(\\lbrace\\) PowerGraph \\(\\rbrace\\) : Distributed \\(\\lbrace\\) Graph-Parallel \\(\\rbrace\\) computation on natural graphs. In Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201912). 17\u201330."},{"key":"e_1_3_2_42_2","first-page":"599","volume-title":"Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914)","author":"Gonzalez Joseph E.","year":"2014","unstructured":"Joseph E. Gonzalez, Reynold S. Xin, Ankur Dave, Daniel Crankshaw, Michael J. Franklin, and Ion Stoica. 2014. \\(\\lbrace\\) GraphX \\(\\rbrace\\) : Graph processing in a distributed dataflow framework. In Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI\u201914). 599\u2013613."},{"key":"e_1_3_2_43_2","first-page":"275","volume-title":"Proceedings of the 23rd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems","author":"Greenwald Michael B.","year":"2004","unstructured":"Michael B. Greenwald and Sanjeev Khanna. 2004. Power-conserving computation of order-statistics over sensor networks. In Proceedings of the 23rd ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. ACM, 275\u2013285."},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_45_2","first-page":"836","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201918)","author":"Han Jun","year":"2018","unstructured":"Jun Han, Albert Jin Chung, Manal Kumar Sinha, Madhumitha Harishankar, Shijia Pan, Hae Young Noh, Pei Zhang, and Patrick Tague. 2018. Do you feel what I hear? Enabling autonomous IoT device pairing using different sensor types. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201918). IEEE, 836\u2013852."},{"key":"e_1_3_2_46_2","first-page":"174","volume-title":"Proceedings of the 3rd International Workshop on Dependable Control of Discrete Systems","author":"Hernandez-Flores E.","year":"2011","unstructured":"E. Hernandez-Flores, E. Lopez-Mellado, and A. Ramirez-Trevino. 2011. Diagnosability analysis of partially observable deadlock-free Petri Nets. In Proceedings of the 3rd International Workshop on Dependable Control of Discrete Systems. IEEE, 174\u2013179."},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897886"},{"key":"e_1_3_2_48_2","first-page":"63","volume-title":"Proceedings of the 43rd IEEE Conference on Decision and Control (CDC\u201904)","volume":"1","author":"Idghamishi Abdolrasul Mohammadi","year":"2004","unstructured":"Abdolrasul Mohammadi Idghamishi and S. Hashtrudi Zad. 2004. Fault diagnosis in hierarchical discrete-event systems. In Proceedings of the 43rd IEEE Conference on Decision and Control (CDC\u201904), Vol. 1. IEEE, 63\u201368."},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345920"},{"issue":"2","key":"e_1_3_2_50_2","doi-asserted-by":"crossref","first-page":"537","DOI":"10.3182\/20080706-5-KR-1001.00091","article-title":"Predictability of sequence patterns in discrete event systems","volume":"41","author":"J\u00e9ron Thierry","year":"2008","unstructured":"Thierry J\u00e9ron, Herv\u00e9 Marchand, Sahika Genc, and St\u00e9phane Lafortune. 2008. Predictability of sequence patterns in discrete event systems. IFAC Proc. Vol. 41, 2 (2008), 537\u2013543.","journal-title":"IFAC Proc. Vol."},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23051"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/9.940942"},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10626-007-0036-x"},{"key":"e_1_3_2_54_2","volume-title":"Markov Chain Models\u2013Rarity and Exponentiality.","author":"Keilson Julian","year":"1974","unstructured":"Julian Keilson. 1974. Markov Chain Models\u2013Rarity and Exponentiality.Technical Report. University of California\u2014Berkeley Operations Research Center."},{"key":"e_1_3_2_55_2","first-page":"206","volume-title":"Proceedings of the 8th International Conference on Intelligent Environments","author":"Kim Ji Eun","year":"2012","unstructured":"Ji Eun Kim, George Boulos, John Yackovich, Tassilo Barth, Christian Beckel, and Daniel Mosse. 2012. Seamless integration of heterogeneous devices and access control in smart homes. In Proceedings of the 8th International Conference on Intelligent Environments. IEEE, 206\u2013213."},{"key":"e_1_3_2_56_2","volume-title":"Proceedings of the USENIX Summit on Hot Topics in Security (HotSec\u201910)","author":"Kim Tiffany Hyun-Jin","year":"2010","unstructured":"Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, and Jesse Walker. 2010. Challenges in access right assignment for secure home networks. In Proceedings of the USENIX Summit on Hot Topics in Security (HotSec\u201910)."},{"key":"e_1_3_2_57_2","first-page":"707","volume-title":"Soviet physics doklady","author":"Levenshtein Vladimir I.","year":"1966","unstructured":"Vladimir I. Levenshtein et\u00a0al. 1966. Binary codes capable of correcting deletions, insertions, and reversals. In Soviet physics doklady, Vol. 10. Soviet Union, 707\u2013710."},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844142"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/1061318.1061322"},{"key":"e_1_3_2_60_2","first-page":"187","volume-title":"Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications","author":"Mahalle Parikshit N.","year":"2012","unstructured":"Parikshit N. Mahalle, Bayu Anggorojati, Neeli Rashmi Prasad, and Ramjee Prasad. 2012. Identity establishment and capability based access control (iecac) scheme for internet of things. In Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications. IEEE, 187\u2013191."},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1800100"},{"key":"e_1_3_2_62_2","first-page":"1144","volume-title":"Proceedings of the IEEE 11th Consumer Communications and Networking Conference (CCNC\u201914)","author":"Michele Benjamin","year":"2014","unstructured":"Benjamin Michele and Andrew Karpow. 2014. Using malicious media files to compromise the security and privacy of smart TVs. In Proceedings of the IEEE 11th Consumer Communications and Networking Conference (CCNC\u201914). IEEE, 1144\u20131145."},{"key":"e_1_3_2_63_2","unstructured":"Y. Hida P. Huang and R. Nishtala. 2004. Aggregation query under uncertainty in sensor networks. Department of Electrical Engineering and Computer Science. University of California Berkeley Tech. Rep."},{"key":"e_1_3_2_64_2","first-page":"79","volume-title":"Proceedings of the IEEE Conference on Communications and Network Security","author":"Notra Sukhvir","year":"2014","unstructured":"Sukhvir Notra, Muhammad Siddiqi, Hassan Habibi Gharakheili, Vijay Sivaraman, and Roksana Boreli. 2014. An experimental study of security and privacy risks with emerging household appliances. In Proceedings of the IEEE Conference on Communications and Network Security. IEEE, 79\u201384."},{"key":"e_1_3_2_65_2","first-page":"13","volume-title":"Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER\u201913)","author":"Oluwafemi Temitope","year":"2013","unstructured":"Temitope Oluwafemi, Tadayoshi Kohno, Sidhant Gupta, and Shwetak Patel. 2013. Experimental security analyses of non-networked compact fluorescent lamps: A case study of home automation security. In Proceedings of the Workshop on Learning from Authoritative Security Experiment Results (LASER\u201913). 13\u201324."},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/959060.959074"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/2699343.2699364"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"e_1_3_2_69_2","first-page":"1","volume-title":"Proceedings of the International Conference on Parallel and Distributed Systems","author":"Probst Matthew J.","year":"2007","unstructured":"Matthew J. Probst and Sneha Kumar Kasera. 2007. Statistical trust establishment in wireless sensor networks. In Proceedings of the International Conference on Parallel and Distributed Systems. IEEE, 1\u20138."},{"key":"e_1_3_2_70_2","first-page":"1","volume-title":"Proceedings of the 10th IEEE Singapore International Conference on Communication Systems","author":"Rajasegarar Sutharshan","year":"2006","unstructured":"Sutharshan Rajasegarar, Christopher Leckie, Marimuthu Palaniswami, and James C. Bezdek. 2006. Distributed anomaly detection in wireless sensor networks. In Proceedings of the 10th IEEE Singapore International Conference on Communication Systems. IEEE, 1\u20135."},{"key":"e_1_3_2_71_2","first-page":"3","volume-title":"Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P\u201916)","author":"Ronen Eyal","year":"2016","unstructured":"Eyal Ronen and Adi Shamir. 2016. Extended functionality attacks on IoT devices: The case of smart lights. In Proceedings of the IEEE European Symposium on Security and Privacy (EuroS&P\u201916). IEEE, 3\u201312."},{"key":"e_1_3_2_72_2","volume-title":"Space-filling Curves","author":"Sagan Hans","year":"2012","unstructured":"Hans Sagan. 2012. Space-filling Curves. Springer Science & Business Media."},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/9.412626"},{"key":"e_1_3_2_74_2","unstructured":"Samsung. 2017. Samsung SmartThings. Multipurpose Sensor. Retrieved April 30 2019 from https:\/\/support.smartthings.com\/hc\/en-us\/articles\/213496343."},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288137"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031524"},{"key":"e_1_3_2_77_2","first-page":"397","volume-title":"Proceedings of the 26th USENIX Security Symposium (USENIX Security\u201917)","author":"Sikder Amit Kumar","year":"2017","unstructured":"Amit Kumar Sikder, Hidayet Aksu, and A Selcuk Uluagac. 2017. 6thsense: A context-aware sensor-based attack detector for smart devices. In Proceedings of the 26th USENIX Security Symposium (USENIX Security\u201917). 397\u2013414."},{"key":"e_1_3_2_78_2","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1145\/1142473.1142493","volume-title":"Proceedings of the ACM SIGMOD International Conference on Management of Data","author":"Silberstein Adam","year":"2006","unstructured":"Adam Silberstein, Kamesh Munagala, and Jun Yang. 2006. Energy-efficient monitoring of extreme values in sensor networks. In Proceedings of the ACM SIGMOD International Conference on Management of Data. ACM, 169\u2013180."},{"key":"e_1_3_2_79_2","first-page":"551","volume-title":"Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops\u201917)","author":"Simpson Anna Kornfeld","year":"2017","unstructured":"Anna Kornfeld Simpson, Franziska Roesner, and Tadayoshi Kohno. 2017. Securing vulnerable home IoT devices with an in-hub security manager. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops\u201917). IEEE, 551\u2013556."},{"key":"e_1_3_2_80_2","first-page":"163","volume-title":"Proceedings of the IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob\u201915)","author":"Sivaraman Vijay","year":"2015","unstructured":"Vijay Sivaraman, Hassan Habibi Gharakheili, Arun Vishwanath, Roksana Boreli, and Olivier Mehani. 2015. Network-level security and privacy control for smart-home IoT devices. In Proceedings of the IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob\u201915). IEEE, 163\u2013167."},{"key":"e_1_3_2_81_2","volume-title":"Modelling and Diagnosis of Timed Discrete Event Systems","author":"Supavatanakul Peerasan","year":"2004","unstructured":"Peerasan Supavatanakul. 2004. Modelling and Diagnosis of Timed Discrete Event Systems. Shaker."},{"key":"e_1_3_2_82_2","first-page":"1158","volume-title":"Proceedings of the American Control Conference","author":"Thorsley David","year":"2008","unstructured":"David Thorsley, Tae-Sic Yoo, and Humberto E. Garcia. 2008. Diagnosability of stochastic discrete-event systems under unreliable observations. In Proceedings of the American Control Conference. IEEE, 1158\u20131165."},{"key":"e_1_3_2_83_2","first-page":"361","volume-title":"Proceedings of the 26th USENIX Security Symposium (USENIX Security\u201917)","author":"Tian Yuan","year":"2017","unstructured":"Yuan Tian, Nan Zhang, Yueh-Hsun Lin, XiaoFeng Wang, Blase Ur, Xianzheng Guo, and Patrick Tague. 2017. Smartauth: User-centered authorization for the internet of things. In Proceedings of the 26th USENIX Security Symposium (USENIX Security\u201917). 361\u2013378."},{"key":"e_1_3_2_84_2","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/3-540-45739-9_14","volume-title":"Proceedings of the International Symposium on Formal Techniques in Real-Time and Fault-tolerant Systems","author":"Tripakis Stavros","year":"2002","unstructured":"Stavros Tripakis. 2002. Fault diagnosis for timed automata. In Proceedings of the International Symposium on Formal Techniques in Real-Time and Fault-tolerant Systems. Springer, 205\u2013221."},{"key":"e_1_3_2_85_2","volume-title":"Proceedings of the 15th World Conference on Earthquake Engineering","author":"Ulusoy Hasan S.","year":"2012","unstructured":"Hasan S. Ulusoy, Erol Kalkan, Jon Peter B. Fletcher, Paul A. Friberg, W. K. Leith, and Krishna Banga. 2012. Design and implementation of a structural health monitoring and alerting system for hospital buildings in the United States. In Proceedings of the 15th World Conference on Earthquake Engineering."},{"key":"e_1_3_2_86_2","volume-title":"Proceedings of the Workshop on Home Usable Privacy and Security (HUPS\u201913)","author":"Ur Blase","year":"2013","unstructured":"Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2013. The current state of access control for smart devices in homes. In Proceedings of the Workshop on Home Usable Privacy and Security (HUPS\u201913)."},{"key":"e_1_3_2_87_2","doi-asserted-by":"crossref","unstructured":"Junia Valente and Alvaro A. C\u00e1rdenas. 2015. Using visual challenges to verify the integrity of security cameras. In Proceedings of the 31st Annual Computer Security Applications Conference 141\u2013150.","DOI":"10.1145\/2818000.2818045"},{"key":"e_1_3_2_88_2","first-page":"4794","volume-title":"Proceedings of the 43rd IEEE Conference on Decision and Control (CDC\u201904)","volume":"5","author":"Wang Xi","year":"2004","unstructured":"Xi Wang, Ishanu Chattopadhyay, and Asok Ray. 2004. Probabilistic fault diagnosis in discrete event systems. In Proceedings of the 43rd IEEE Conference on Decision and Control (CDC\u201904), Vol. 5. IEEE, 4794\u20134799."},{"key":"e_1_3_2_89_2","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1145\/3081333.3081342","volume-title":"Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services","author":"Wilson Judson","year":"2017","unstructured":"Judson Wilson, Riad S. Wahby, Henry Corrigan-Gibbs, Dan Boneh, Philip Levis, and Keith Winstein. 2017. Trust but verify: Auditing the secure internet of things. In Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. ACM, 464\u2013474."},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1062"},{"issue":"5","key":"e_1_3_2_91_2","first-page":"1250","article-title":"A survey on security and privacy issues in Internet-of-Things","volume":"4","author":"Yang Yuchen","year":"2017","unstructured":"Yuchen Yang, Longfei Wu, Guisheng Yin, Lijie Li, and Hongbin Zhao. 2017. A survey on security and privacy issues in Internet-of-Things. IEEE IoT J. 4, 5 (2017), 1250\u20131258.","journal-title":"IEEE IoT J."},{"key":"e_1_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2002.802763"},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4407222"},{"key":"e_1_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2003.814099"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2013.09.009"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/1080885.1080896"},{"key":"e_1_3_2_97_2","first-page":"1074","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Zhang Wei","year":"2018","unstructured":"Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, and Haojin Zhu. 2018. HoMonit: Monitoring smart home apps from encrypted traffic. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 1074\u20131088."},{"key":"e_1_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.021510.00088"},{"key":"e_1_3_2_99_2","unstructured":"T. Zillner. 2015. Zigbee exploited\u2014the Good the Bad and the Ugly. Available online: https:\/\/www.blackhat.com\/docs\/us-15\/materials\/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly.pdf."}],"container-title":["ACM Transactions on the Web"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3586073","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3586073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:11Z","timestamp":1750183691000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3586073"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,22]]},"references-count":98,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,8,31]]}},"alternative-id":["10.1145\/3586073"],"URL":"https:\/\/doi.org\/10.1145\/3586073","relation":{},"ISSN":["1559-1131","1559-114X"],"issn-type":[{"value":"1559-1131","type":"print"},{"value":"1559-114X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,22]]},"assertion":[{"value":"2022-01-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-10-20","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-05-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}