A Device-Centric Policy Conflict in IoT

Policy-based management provides Web of Things (WoT) system with the ability to describe its requirements and functionality, so that desired service goals are achieved. This requires WoT system provisioning smart things which can work under the guidance of policies. However, policy makers with less awareness of specific safety constraints of smart things may create harmful policies, which make smart things work in unexpected situations and cause safety issues. From the view of smart things, the notion of safety issues is two-fold: First, devices themselves work in an unsound and unsecure state, second, devices are influenced by other devices with same or contradict function. We identify these safety issues as device-centric modality conflicts and interest conflicts, and then define a specific conflict detection approach for these conflicts. In this paper, we demonstrate the use of the conflict detection approach to detect device-centric conflicts in two cases. Finally, we conduct three experiments to evaluate the accuracy and time performance of the detection approach.

[1]  Ehab Al-Shaer,et al.  Taxonomy of conflicts in network security policies , 2006, IEEE Communications Magazine.

[2]  Emil C. Lupu,et al.  A Survey of Policy Specification Approaches , 2002 .

[3]  Cataldo Basile,et al.  Network-Level Access Control Policy Analysis and Transformation , 2012, IEEE/ACM Transactions on Networking.

[4]  Limin Jia,et al.  FSR: Formal Analysis and Implementation Toolkit for Safe Interdomain Routing , 2011, IEEE/ACM Transactions on Networking.

[5]  Wouter Joosen,et al.  Policy Analysis Using a Hybrid Semantic Reasoning Engine , 2007, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07).

[6]  Brendan Jennings,et al.  On harnessing information models and ontologies for policy conflict analysis , 2009, 2009 IFIP/IEEE International Symposium on Integrated Network Management.

[7]  Paris Flegkas,et al.  Policy conflict analysis for diffserv quality of service management , 2009, IEEE Transactions on Network and Service Management.

[8]  Roy H. Campbell,et al.  An ECA-P policy-based framework for managing ubiquitous computing environments , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[9]  Alessandra Russo,et al.  Using event calculus to formalise policy specification and analysis , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[10]  Brendan Jennings,et al.  The policy continuum-Policy authoring and conflict analysis , 2008, Comput. Commun..

[11]  Sumi Helal,et al.  A device-centric approach to a safer internet of things , 2011, NoME-IoT '11.

[12]  Brendan Jennings,et al.  Efficient Policy Conflict Analysis for Autonomic Network Management , 2008, Fifth IEEE Workshop on Engineering of Autonomic and Autonomous Systems (ease 2008).

[13]  Emil C. Lupu,et al.  Conflicts in Policy-Based Distributed Systems Management , 1999, IEEE Trans. Software Eng..

[14]  Jorge Lobo,et al.  Expressive policy analysis with enhanced system dynamicity , 2009, ASIACCS '09.

[15]  James J. Buckley,et al.  From RFID to the Internet of Things: Pervasive Networked Systems , 2006 .

[16]  Lei Jing,et al.  A SMART-GATE BASED COMPOSITION METHOD TO PROVIDE SERVICES BY SOLVING CONFLICT USING DYNAMIC USER PRIORITY AND COMPROMISE POLICY , 2011 .

[17]  Antonio F. Gómez-Skarmeta,et al.  Detection of semantic conflicts in ontology and rule-based information systems , 2010, Data Knowl. Eng..

[18]  Ari Juels,et al.  RFID security and privacy: a research survey , 2006, IEEE Journal on Selected Areas in Communications.

[19]  Zhai Haoliang Research on Consistency of Security Policy Based on Logic and Argument , 2012 .

[20]  Brendan Jennings,et al.  Application domain independent policy conflict analysis using information models , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.

[21]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[22]  Panganamala Ramana Kumar,et al.  A cautionary perspective on cross-layer design , 2005, IEEE Wireless Communications.

[23]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[24]  Cataldo Basile,et al.  Towards an algebraic approach to solve policy conflicts , 2004 .

[25]  David B. Resnik,et al.  Conflict of Interest in Medical Research, Education, and Practice , 2010, Environmental Health Perspectives.