PEEVES: Physical Event Verification in Smart Homes

被引:54
作者
Birnbach, Simon [1 ]
Eberz, Simon [1 ]
Martinovic, Ivan [1 ]
机构
[1] Univ Oxford, Dept Comp Sci, Oxford, England
来源
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19) | 2019年
基金
英国工程与自然科学研究理事会;
关键词
Internet of things; smart home; event verification;
D O I
10.1145/3319535.3354254
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rising availability of smart devices (e.g., smart thermostats, lights, locks, etc.), they are increasingly combined into "smart homes". A key component of smart homes are event sensors that report physical events (such as doors opening or the light turning on) which can be triggered automatically by the system or manually by the user. However, data from these sensors are not always trustworthy. Both faults in the event sensors and involvement of active attackers can lead to reporting of events that did not physically happen (event spoofing). This is particularly critical, as smart homes can trigger event chains (e.g., turning the radiator offwhen a window is opened) without involvement of the user. The goal of this paper is to verify physical events using data from an ensemble of sensors (such as accelerometers or air pressure sensors) that are commonly found in smart homes. This approach both protects against event sensor faults and sophisticated attackers. In order to validate our system's performance, we set up a "smart home" in an office environment. We recognize 22 event types using 48 sensors over the course of two weeks. Using data from the physical sensors, we verify the event stream supplied by the event sensors. We consider two threat models: a zero-effort attacker who spoofs events at arbitrary times and an opportunistic attacker who has access to alive stream of sensor data to better time their attack. We achieve perfect classification for 9 out of 22 events and achieve a 0% false alarm rate at a detection rate exceeding 99.9% for 15 events. We also show that even a strong opportunistic attacker is inherently limited to spoofing few select events and that doing so involves lengthy waiting periods.
引用
收藏
页码:1455 / 1467
页数:13
相关论文
共 33 条
  • [1] Acar Abbas, 2018, ABS180802741 CORR
  • [2] [Anonymous], P 24 ANN NETW DISTR
  • [3] [Anonymous], 2017, P 3 ACM INT WORKSH I, DOI DOI 10.1145/3055245.3055253
  • [4] Apple Inc, 2019, APPL HOMEKIT YOUR HO
  • [5] Apthorpe N. J., 2017, ABS170805044 CORR
  • [6] Ben-Netanel Raz, 2018, ABS180103074 CORR
  • [7] Berkay Celik Z, 2019, P 26 ANN NETW DISTR
  • [8] Securing Home IoT Environments with Attribute-Based Access Control
    Bezawada, Bruhadeshwar
    Haefner, Kyle
    Ray, Indrakshi
    [J]. PROCEEDINGS OF THE THIRD ACM WORKSHOP ON ATTRIBUTE-BASED ACCESS CONTROL (ABAC'18), 2018, : 43 - 53
  • [9] Celik ZB, 2018, PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, P147
  • [10] Chen Qi Alfred, 2017, P 24 ANN NETW DISTR