Visible to the public ComplexIoT: Behavior-Based Trust For IoT Networks

TitleComplexIoT: Behavior-Based Trust For IoT Networks
Publication TypeConference Paper
Year of Publication2019
AuthorsHaefner, Kyle, Ray, Indrakshi
Conference Name2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)
KeywordsAccess Control, access control decisions, anomaly detection, anomaly detection algorithm, authorisation, behavior-based trust, behavioral framework, behavioral model, complex general purpose devices, ComplexIoT, complexity measure, Complexity theory, composability, compositionality, computer network security, Computer Theory and Trust, device complexity, false trust, generalized decision boundary, Internet of Things, Internet-of-Things, IoT devices, IoT networks, machine learning, network traffic, Object recognition, policy-based governance, Policy-Governed Secure Collaboration, pubcrawl, resilience, Resiliency, Scalability, Sensors, software defined networking, telecommunication traffic, trust score ranking

This work takes a novel approach to classifying the behavior of devices by exploiting the single-purpose nature of IoT devices and analyzing the complexity and variance of their network traffic. We develop a formalized measurement of complexity for IoT devices, and use this measurement to precisely tune an anomaly detection algorithm for each device. We postulate that IoT devices with low complexity lead to a high confidence in their behavioral model and have a correspondingly more precise decision boundary on their predicted behavior. Conversely, complex general purpose devices have lower confidence and a more generalized decision boundary. We show that there is a positive correlation to our complexity measure and the number of outliers found by an anomaly detection algorithm. By tuning this decision boundary based on device complexity we are able to build a behavioral framework for each device that reduces false positive outliers. Finally, we propose an architecture that can use this tuned behavioral model to rank each flow on the network and calculate a trust score ranking of all traffic to and from a device which allows the network to autonomously make access control decisions on a per-flow basis.

Citation Keyhaefner_complexiot_2019