Supervising Smart Home Device Interactions: A Profile-Based Firewall Approach
Abstract
Despite their ubiquity, the security of Internet of Things devices is unsatisfactory, as demonstrated by several attacks. The IETF’s MUD standard aims to simplify and automate the secure deployment of network devices. A MUD file specifies a device-specific description of allowed network activities (e.g., allowed IP ports or host addresses) and can be used to configure for example a firewall. A major weakness of MUD is that it is not expressive enough to describe device interactions, which often occur between devices in modern Smart Home platforms. In this article, we present a new language for describing such traffic patterns. The language allows writing device profiles that are more expressive than MUD files and can describe complex traffic patterns. We show how these profiles can be translated to efficient code for a lightweight firewall. We evaluate our approach on traffic generated by various Smart Home devices, and show that our system can accurately block unwanted traffic while inducing negligible latency.
Publication Details
- Publication Type
- Conference Paper
- Publication Date
- June 2024
- Published In
- Proceedings of the 2024 IFIP Networking Conference
- External Link
- https://dial.uclouvain.be/pr/boreal/object/boreal:…
BibTeX Citation
@inproceedings{DeKeersmaeker2024,
title = {Supervising Smart Home Device Interactions: A Profile-Based Firewall Approach},
author = {De Keersmaeker, François and Sadre, Ramin and Pelsser, Cristel},
year = 2024,
month = jun,
booktitle = {Proceedings of the 2024 {IFIP} Networking Conference},
url = {https://dial.uclouvain.be/pr/boreal/object/boreal:288456},
abstract = {Despite their ubiquity, the security of Internet of Things devices is unsatisfactory, as demonstrated by several attacks. The IETF’s MUD standard aims to simplify and automate the secure deployment of network devices. A MUD file specifies a device-specific description of allowed network activities (e.g., allowed IP ports or host addresses) and can be used to configure for example a firewall. A major weakness of MUD is that it is not expressive enough to describe device interactions, which often occur between devices in modern Smart Home platforms. In this article, we present a new language for describing such traffic patterns. The language allows writing device profiles that are more expressive than MUD files and can describe complex traffic patterns. We show how these profiles can be translated to efficient code for a lightweight firewall. We evaluate our approach on traffic generated by various Smart Home devices, and show that our system can accurately block unwanted traffic while inducing negligible latency.},
groups = {International Conferences},
keywords = {IoT, smart home, security, firewall, device profiling, home automation}
}
Related publications
Supervising Smart Home Device Interactions: A Profile-Based Firewall Approach
De Keersmaeker, François, Ramin Sadre, and Cristel Pelsser
Network Traffic Measurement and Analysis Conference 2024 TMA, 2024
The Forest Behind the Tree: Revealing Hidden Smart Home Communication Patterns
François De Keersmaeker, Rémi Van Boxem, and Cristel Pelsser, et al.
Proceedings of the 33rd IEEE International Conference on Network Protocols (ICNP '25), 2025
Towards Secure and Leak-Free Workflows Using Microservice Isolation
Loïc Miller, Pascal Mérindol, and Antoine Gallais, et al.
IEEE International Conference on High Perfor- mance Switching and Routing Conference (HPSR), 2021
BGP Communities: Even more Worms in the Routing Can
Florian Streibelt, Franziska Lichtblau, and Robert Beverly, et al.
Proceedings of the Internet Measurement Conference 2018, IMC 2018, 2018