Attacking and Protecting Tunneled Traffic of Smart Home Devices

被引:17
作者
Alshehri, Ahmed [1 ]
Granley, Jacob [1 ]
Yue, Chuan [1 ]
机构
[1] Colroado Sch Mines, Golden, CO 80401 USA
来源
PROCEEDINGS OF THE TENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2020 | 2020年
关键词
Internet of Things (IoT); Traffic Analysis (TA); Privacy; Differential Privacy; Smart Homes; Attacks; Defenses;
D O I
10.1145/3374664.3375723
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The number of smart home IoT (Internet of Things) devices has been growing fast in recent years. Along with the great benefits brought by smart home devices, new threats have appeared. One major threat to smart home users is the compromise of their privacy by traffic analysis (TA) attacks. Researchers have shown that TA attacks can be performed successfully on either plain or encrypted traffic to identify smart home devices and infer user activities. Tunneling traffic is a very strong countermeasure to existing TA attacks. However, in this work, we design a Signature based Tunneled Traffic Analysis (STTA) attack that can be effective even on tunneled traffic. Using a popular smart home traffic dataset, we demonstrate that our attack can achieve an 83% accuracy on identifying 14 smart home devices. We further design a simple defense mechanism based on adding uniform random noise to effectively protect against our TA attack without introducing too much overhead. We prove that our defense mechanism achieves approximate differential privacy.
引用
收藏
页码:259 / 270
页数:12
相关论文
共 40 条
[1]  
Acar A, 2020, Arxiv, DOI arXiv:1808.02741
[2]  
[Anonymous], DIFFERENTIAL PRIVACY
[3]  
[Anonymous], TCP DUMP
[4]  
[Anonymous], 2018, The 14 biggest announcements from Amazon's surprise hardware event
[5]  
[Anonymous], About us
[6]  
[Anonymous], 2017, There is No Place Like
[7]  
[Anonymous], 2018, The Connected Home Market
[8]  
[Anonymous], 2014, Net Neutrality
[9]  
[Anonymous], 2018, General data protection regulation (GDPR)
[10]  
[Anonymous], 1998, INTERNET PROTOCOL VE