RESTRAIN: Reinforcement learning-based secure framework for trigger-action IoT environment

Abstract

Click on the DOI link to access this article at the publishers website (may not be free).Internet of Things (IoT) platforms with trigger-action capability allow event conditions to trigger actions in IoT devices autonomously by creating a chain of interactions. Adversaries exploit this chain of interactions to maliciously inject fake event conditions into IoT hubs, triggering unauthorized actions on target IoT devices to implement remote injection attacks. Existing defense mechanisms focus mainly on the verification of event transactions using physical event fingerprints to enforce security policies to block unsafe event transactions. These approaches are designed to provide offline defense against injection attacks. The state-of-the-art online defense mechanisms offer real-time defense, but extensive dependency on the inference of attack impacts on the IoT network limits the generalization capability of these approaches. In this paper, we propose a platform-independent multi-agent online defense system, namely RESTRAIN, to counter remote injection attacks at runtime. RESTRAIN allows the defense agent to profile attack actions at runtime and leverages reinforcement learning to optimize a defense policy that complies with the security requirements of the IoT network. The experimental results show that the defense agent effectively takes real-time defense actions against complex and dynamic remote injection attacks and maximizes the security gain with minimal computational overhead. © 2025 IEEE.Army Research Laboratory, ARL; DoD Center of Excellence in AI; Coastal Virginia Center for Cyber Innovation; Machine Learning, (W911NF-20-2-0277); National Science Foundation, NSF, (2219742, 2131001); National Science Foundation, NSFThis work is supported in part by DoD Center of Excellence in AI and Machine Learning (CoE-AIML) under Contract Number W911NF-20-2-0277 with the U.S. Army Research Laboratory, National Science Foundation under Grant No. 2219742 and Grant No. 2131001. It is also supported in part by the Coastal Virginia Center for Cyber Innovation (CoVA CCI)

Similar works

Full text

thumbnail-image

SOAR: Shocker Open Access Repository (Wichita State Univ.)

redirect
Last time updated on 16/12/2025

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.