4.8 Article

Preserving Contextual Privacy for Smart Home IoT Devices With Dynamic Traffic Shaping

期刊

IEEE INTERNET OF THINGS JOURNAL
卷 9, 期 13, 页码 11434-11441

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2021.3126453

关键词

Smart homes; Privacy; Object recognition; Internet of Things; Metadata; Information technology; Encryption; Contextual privacy; Internet of Things (IoT); smart devices; traffic shaping

向作者/读者索取更多资源

This study focuses on privacy concerns in IoT devices, particularly user activity inference attacks. By combining dummy packet generation with dynamic link padding, this study introduces a new defense mechanism that can reduce false positives for device state identification and decrease traffic overhead.
Internet of Things (IoT) enables physical devices embedded with sensors, software, and other technologies to interoperate and exchange data with other systems over the Internet. Privacy is a huge concern for IoT devices as personal information is constantly being shared through them. Though the best industrial standards like end-to-end encryption are being followed to ensure content-based privacy, contextual privacy concerns still exist. This study focuses on user activity inference attacks, where a passive network observer can infer the private in-home activity of a user by analyzing encrypted IoT traffic metadata. Most of the previous solutions addressing these attacks have either reduced the usability of the devices, increased data overhead, or failed against packet-level signature-based attack scenarios. This study introduces a new defense mechanism that combines dummy packet generation with dynamic link padding. This process makes it difficult for the adversary to avail contextual information about the state of the device (ON or OFF), along with the temporal information (time of state change) from encrypted IoT traffic metadata. We reverse the packet-level signature-based attacks to get device-specific signatures, which helps us generate dummy traffic for the duration of device-specific signatures. Consequently, this results in increased false positives for device state identifications and low traffic overhead. We simulate a state-of-the-art attack scenario to test and vindicate our solution over existing data sets.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据