2019
DOI: 10.2478/popets-2019-0040
|View full text |Cite
|
Sign up to set email alerts
|

Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping

Abstract: The proliferation of smart home Internet of things (IoT) devices presents unprecedented challenges for preserving privacy within the home. In this paper, we demonstrate that a passive network observer (e.g., an Internet service provider) can infer private in-home activities by analyzing Internet traffic from commercially available smart home devices even when the devices use end-to-end transport-layer encryption. We evaluate common approaches for defending against these types of traffic analysis attacks, inclu… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
138
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 161 publications
(139 citation statements)
references
References 38 publications
0
138
0
1
Order By: Relevance
“…In [40], the authors used the application source code to correlate Zigbee traffic and device events. Finally, as far as we know, the Wi-Fi sniffer threat model has not been widely studied: it has only been presented in [19] and [8].…”
Section: Related Workmentioning
confidence: 99%
“…In [40], the authors used the application source code to correlate Zigbee traffic and device events. Finally, as far as we know, the Wi-Fi sniffer threat model has not been widely studied: it has only been presented in [19] and [8].…”
Section: Related Workmentioning
confidence: 99%
“…We used SHA-128 as the hashing algorithm. 9 OIT distributed the desired security keys to the desired entities, as mentioned in §5. After executing the control phase, the desired encrypted data (as mentioned in §5.1) is outsourced to a cloud machine of 8 cores and 32 GB RAM.…”
Section: Resultsmentioning
confidence: 99%
“…Step 2: Deleting sensor reading (Lines [1][2][3][4][5][6][7][8][9][10][11][12][13][14]. Suppose that in an epoch T i , n sensor records are needed to be deleted.…”
Section: State Transition Phasementioning
confidence: 99%
See 1 more Smart Citation
“…The Raspberry's WiFi interface was used to connect the instrumented access point to the Internet and allow the IA devices to send data to their cloud services. This setup is similar to the one described by Apthorpe et al…”
Section: Case Of Study: Intelligent Voice Assistantsmentioning
confidence: 98%