Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT

被引:33
作者
Chen, Dajiang [1 ,2 ]
Wang, Hao [1 ]
Zhang, Ning [3 ]
Nie, Xuyun [1 ,4 ]
Dai, Hong-Ning [5 ]
Zhang, Kuan [6 ]
Choo, Kim-Kwang Raymond [7 ]
机构
[1] Univ Elect Sci & Technol China, Network & Data Secur Key Lab Sichuan Prov, Chengdu 611731, Peoples R China
[2] Peng Cheng Lab, Network Commun Res Ctr, Shenzhen 518055, Peoples R China
[3] Univ Windsor, Dept Elect & Comp Engn, Windsor, ON N9B 3P4, Canada
[4] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[5] Lingnan Univ, Dept Comp & Decis Sci, Hong Kong, Peoples R China
[6] Univ Nebraska Lincoln, Dept ECE, Omaha, NE 68182 USA
[7] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
关键词
Encrypted traffic inspection; IoT security; privacy preserving; symmetric cryptographic techniques; CLASSIFICATION;
D O I
10.1109/JIOT.2022.3155355
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To ensure the security of Internet of Things (IoT) communications, one can use deep packet inspection (DPI) on network middleboxes to detect and mitigate anomalies and suspicious activities in network traffic of IoT, although doing so over encrypted traffic is challenging. Therefore, in this article, an efficient and privacy-preserving encrypted traffic detection scheme is proposed. The scheme uses only lightweight crypto-graphic operations (i.e., symmetric encryption, hash functions, and pseudorandom functions) to achieve both privacy and security within an inspection round. A dispute resolution mechanism is also designed to address potential disputes between client(s) and server(s). We also present the corresponding security proof and experimental evaluation, which demonstrate that our proposed scheme achieves strong security and privacy preservation and good performance.
引用
收藏
页码:17265 / 17279
页数:15
相关论文
共 36 条
[1]   Online Proactive Caching in Mobile Edge Computing Using Bidirectional Deep Recurrent Neural Network [J].
Ale, Laha ;
Zhang, Ning ;
Wu, Huici ;
Chen, Dajiang ;
Han, Tao .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (03) :5520-5530
[2]   Deciphering malware's use of TLS (without decryption) [J].
Anderson, Blake ;
Paul, Subharthi ;
McGrew, David .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2018, 14 (03) :195-211
[3]   Identifying Encrypted Malware Traffic with Contextual Flow Data [J].
Anderson, Blake ;
McGrew, David .
AISEC'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, 2016, :35-46
[4]  
Asharov G., 2013, P ACM CCS, P1
[5]  
Bazuhair W, 2020, 2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), P200, DOI [10.1109/CCWC47524.2020.9031116, 10.1109/ccwc47524.2020.9031116]
[6]   BlindIDS: Market-Compliant and Privacy-Friendly Intrusion Detection System over Encrypted Traffic [J].
Canard, Sebastien ;
Diop, Aida ;
Kheir, Nizar ;
Paindavoine, Marie ;
Sabt, Mohamed .
PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, :561-574
[7]   HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets [J].
Casino, Fran ;
Choo, Kim-Kwang Raymond ;
Patsakis, Constantinos .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (11) :2916-2926
[8]   MAGLeak: A Learning-Based Side-Channel Attack for Password Recognition With Multiple Sensors in IIoT Environment [J].
Chen, Dajiang ;
Zhao, Zihao ;
Qin, Xue ;
Luo, Yaohua ;
Cao, Mingsheng ;
Xu, Hua ;
Liu, Anfeng .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (01) :467-476
[9]   Physical Layer based Message Authentication with Secure Channel Codes [J].
Chen, Dajiang ;
Zhang, Ning ;
Cheng, Nan ;
Zhang, Kuan ;
Qin, Zhiguang ;
Shen, Xuemin .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (05) :1079-1093
[10]   Searchable symmetric encryption: Improved definitions and efficient constructions [J].
Curtmola, Reza ;
Garay, Juan ;
Kamara, Seny ;
Ostrovsky, Rafail .
JOURNAL OF COMPUTER SECURITY, 2011, 19 (05) :895-934