16
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Peek-a-Boo: I see your smart home activities, even encrypted!

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them and facilitate their living styles. However, an attacker inside or near a smart home environment can potentially exploit the innate wireless medium used by these devices to exfiltrate sensitive information about the users and their activities, invading user privacy. With this in mind, in this work, we introduce a novel multi-stage privacy attack against user privacy in a smart environment. It is realized utilizing state-of-the-art machine-learning approaches for detecting and identifying particular types of IoT devices, their actions, states, and ongoing user activities in a cascading style by only observing passively the wireless traffic from smart home devices. The attack effectively works on both encrypted and unencrypted communications. We evaluate the efficiency of the attack with real measurements from an extensive set of popular off-the-shelf smart home IoT devices utilizing a set of diverse network protocols like WiFi, ZigBee, and BLE. Our results show that an adversary passively sniffing the network traffic can achieve very high accuracy (above 90%) in identifying the state and actions of targeted smart home devices and their users. In contrast to earlier straightforward approaches, our multi-stage privacy attack can perform activity detection and identification automatically without extensive background knowledge or specifications of the analyzed protocols. This allows an adversary to efficiently aggregate extensive behavior profiles of targeted users. To protect against this privacy leakage, we also propose a countermeasure based on generating spoofed network traffic to hide the real activities of the devices. We also demonstrate that the provided solution provides better protection than existing solutions.

          Related collections

          Most cited references11

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Inferring the source of encrypted HTTP connections

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Analyzing Android Encrypted Network Traffic to Identify User Actions

                Bookmark

                Author and article information

                Journal
                08 August 2018
                Article
                1808.02741
                beac678f-ed09-46b1-b8a4-cf0480e03093

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                14 pages, 6 figures
                cs.CR

                Security & Cryptology
                Security & Cryptology

                Comments

                Comment on this article