Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243820
|View full text |Cite
|
Sign up to set email alerts
|

HoMonit

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
40
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 152 publications
(40 citation statements)
references
References 26 publications
0
40
0
Order By: Relevance
“…Acar et al inferred user activities by creating traffic profiles and relying on traffic rate variations to detect device state changes [1]. Zhang et al extracted fingerprints for several event types in order to detect misbehaving smart home applications [41]. Trimananda et al were able to infer events related to Zigbee devices by identifying packet-level signatures from the Wi-Fi and Ethernet traffic that the smartphone and smart hub generated in order to communicate with cloud servers [35].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Acar et al inferred user activities by creating traffic profiles and relying on traffic rate variations to detect device state changes [1]. Zhang et al extracted fingerprints for several event types in order to detect misbehaving smart home applications [41]. Trimananda et al were able to infer events related to Zigbee devices by identifying packet-level signatures from the Wi-Fi and Ethernet traffic that the smartphone and smart hub generated in order to communicate with cloud servers [35].…”
Section: Related Workmentioning
confidence: 99%
“…To add to the challenge, there is a lack of robust security analysis tools for Zigbee networks, commercial Zigbee devices use closed-source software, and certain specification documents have not been released to the public. Previous studies that incorporate centralized Zigbee networks largely demonstrate information leakage from encrypted traffic [1,17,35,41], such as the identification of triggered events, without exploring how an attacker may use this information to disrupt the operation of centralized Zigbee networks. While several command injection attacks have been demonstrated against centralized Zigbee networks [8,21,49], these attacks require knowledge of the network key.…”
Section: Introductionmentioning
confidence: 99%
“…The purposed system used a microcontroller to provide the necessary data to the algorithm in order to detect the occurrence of fire and the sensors used in the purposed model include CO, temperature and smog sensor [30]. Muhammad Salihin et al presented a mechanism to detect fire using smoke sensors and also provided a monitoring system so that in case of a fire the system could provide the monitoring mechanism to display wirelessly to help firefighters to pinpoint the location of fire, helping in the rescue process [31,32].…”
Section: Related Workmentioning
confidence: 99%
“…Wireless traffic analysis systems and Intrusion Detection Systems have a long and rich history [2,4,6,11,12,16,23,25,26,29,33,35,39,48,55,58]. Generally speaking, wireless traffic analysis systems and Intrusion Detection Systems (IDS) continually monitor computers or networks, collecting data (e.g., system calls, network communication), extracting quantifiable features from this data, and applying a variety of techniques to analyze the data in search of signs of anomalies or compromise.…”
Section: Intrusion Detection Systems (Ids)mentioning
confidence: 99%