Peek-a-boo: i see your smart home activities, even encrypted!

Abbas Acar, H. Fereidooni, Tigist Abera, A. Sikder, Markus Miettinen, Hidayet Aksu, M. Conti, A. Sadeghi, Selcuk Uluagac
{"title":"Peek-a-boo: i see your smart home activities, even encrypted!","authors":"Abbas Acar, H. Fereidooni, Tigist Abera, A. Sikder, Markus Miettinen, Hidayet Aksu, M. Conti, A. Sadeghi, Selcuk Uluagac","doi":"10.1145/3395351.3399421","DOIUrl":null,"url":null,"abstract":"A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them and facilitate their living styles through the sensors already embedded in these devices. Sensor data contains a lot of sensitive information about the user and devices. However, an attacker inside or near a smart home environment can potentially exploit the innate wireless medium used by these devices to exfiltrate sensitive information from the encrypted payload (i.e., sensor data) about the users and their activities, invading user privacy. With this in mind, in this work, we introduce a novel multi-stage privacy attack against user privacy in a smart environment. It is realized utilizing state-of-the-art machine-learning approaches for detecting and identifying the types of IoT devices, their states, and ongoing user activities in a cascading style by only passively sniffing the network traffic from smart home devices and sensors. The attack effectively works on both encrypted and unencrypted communications. We evaluate the efficiency of the attack with real measurements from an extensive set of popular off-the-shelf smart home IoT devices utilizing a set of diverse network protocols like WiFi, ZigBee, and BLE. Our results show that an adversary passively sniffing the traffic can achieve very high accuracy (above 90%) in identifying the state and actions of targeted smart home devices and their users. To protect against this privacy leakage, we also propose a countermeasure based on generating spoofed traffic to hide the device states and demonstrate that it provides better protection than existing solutions.","PeriodicalId":165929,"journal":{"name":"Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"207","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3395351.3399421","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 207

Abstract

A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them and facilitate their living styles through the sensors already embedded in these devices. Sensor data contains a lot of sensitive information about the user and devices. However, an attacker inside or near a smart home environment can potentially exploit the innate wireless medium used by these devices to exfiltrate sensitive information from the encrypted payload (i.e., sensor data) about the users and their activities, invading user privacy. With this in mind, in this work, we introduce a novel multi-stage privacy attack against user privacy in a smart environment. It is realized utilizing state-of-the-art machine-learning approaches for detecting and identifying the types of IoT devices, their states, and ongoing user activities in a cascading style by only passively sniffing the network traffic from smart home devices and sensors. The attack effectively works on both encrypted and unencrypted communications. We evaluate the efficiency of the attack with real measurements from an extensive set of popular off-the-shelf smart home IoT devices utilizing a set of diverse network protocols like WiFi, ZigBee, and BLE. Our results show that an adversary passively sniffing the traffic can achieve very high accuracy (above 90%) in identifying the state and actions of targeted smart home devices and their users. To protect against this privacy leakage, we also propose a countermeasure based on generating spoofed traffic to hide the device states and demonstrate that it provides better protection than existing solutions.
躲猫猫:我看到你的智能家居活动,甚至加密!
智能家居环境中的灯泡、开关、扬声器等无数物联网设备允许用户轻松控制周围的物理世界,并通过这些设备中已经嵌入的传感器促进他们的生活方式。传感器数据包含大量关于用户和设备的敏感信息。然而,智能家居环境内部或附近的攻击者可能会利用这些设备使用的固有无线介质从加密有效载荷(即传感器数据)中窃取有关用户及其活动的敏感信息,从而侵犯用户隐私。考虑到这一点,在这项工作中,我们在智能环境中引入了一种针对用户隐私的新型多阶段隐私攻击。它利用最先进的机器学习方法来检测和识别物联网设备的类型、状态和正在进行的用户活动,通过被动地嗅探来自智能家居设备和传感器的网络流量,以级联的方式实现。这种攻击对加密和未加密的通信都有效。我们利用一组不同的网络协议(如WiFi、ZigBee和BLE),对一组流行的现成智能家居物联网设备进行了实际测量,以评估攻击的效率。我们的研究结果表明,攻击者被动地嗅探流量可以在识别目标智能家居设备及其用户的状态和行为方面达到非常高的准确性(90%以上)。为了防止这种隐私泄露,我们还提出了一种基于生成欺骗流量来隐藏设备状态的对策,并证明它提供了比现有解决方案更好的保护。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信