{"title":"使用填充策略对抗机器学习方法确保物联网隐私","authors":"Ahmet Emre Ergun, Özgü Can","doi":"10.36287/ijmsit.6.2.193","DOIUrl":null,"url":null,"abstract":"– The widespread usage of Internet of Things (IoT) devices is increasing by the recent advances in embedded systems, cloud computing, artificial intelligence, and wireless communications. Besides, a huge amount of data is transmitted between IoT devices over insecure networks. The transferred data can be sensitive and confidential. On the other hand, these transmitted data may not appear to be sensitive or confidential data. However, machine learning techniques are used on these non-confidential data (such as packet length) to obtain data such as the type of the IoT device. An observer can monitor traffic to infer sensitive data by using machine learning techniques to analyze the generated encrypted traffic. For this purpose, padding can be added to the packets to ensure traffic privacy. This paper presents privacy problems that are caused by the traffic generated during the communication of IoT devices. Also, security and privacy measures that should be taken against the related privacy problems are explained. For this purpose, the current studies are examined by considering the attacker and the defender models.","PeriodicalId":166049,"journal":{"name":"International Journal of Multidisciplinary Studies and Innovative Technologies","volume":"118 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Ensuring IoT Privacy using Padding Strategies against Machine Learning Approaches\",\"authors\":\"Ahmet Emre Ergun, Özgü Can\",\"doi\":\"10.36287/ijmsit.6.2.193\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"– The widespread usage of Internet of Things (IoT) devices is increasing by the recent advances in embedded systems, cloud computing, artificial intelligence, and wireless communications. Besides, a huge amount of data is transmitted between IoT devices over insecure networks. The transferred data can be sensitive and confidential. On the other hand, these transmitted data may not appear to be sensitive or confidential data. However, machine learning techniques are used on these non-confidential data (such as packet length) to obtain data such as the type of the IoT device. An observer can monitor traffic to infer sensitive data by using machine learning techniques to analyze the generated encrypted traffic. For this purpose, padding can be added to the packets to ensure traffic privacy. This paper presents privacy problems that are caused by the traffic generated during the communication of IoT devices. Also, security and privacy measures that should be taken against the related privacy problems are explained. For this purpose, the current studies are examined by considering the attacker and the defender models.\",\"PeriodicalId\":166049,\"journal\":{\"name\":\"International Journal of Multidisciplinary Studies and Innovative Technologies\",\"volume\":\"118 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Multidisciplinary Studies and Innovative Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.36287/ijmsit.6.2.193\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Multidisciplinary Studies and Innovative Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36287/ijmsit.6.2.193","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Ensuring IoT Privacy using Padding Strategies against Machine Learning Approaches
– The widespread usage of Internet of Things (IoT) devices is increasing by the recent advances in embedded systems, cloud computing, artificial intelligence, and wireless communications. Besides, a huge amount of data is transmitted between IoT devices over insecure networks. The transferred data can be sensitive and confidential. On the other hand, these transmitted data may not appear to be sensitive or confidential data. However, machine learning techniques are used on these non-confidential data (such as packet length) to obtain data such as the type of the IoT device. An observer can monitor traffic to infer sensitive data by using machine learning techniques to analyze the generated encrypted traffic. For this purpose, padding can be added to the packets to ensure traffic privacy. This paper presents privacy problems that are caused by the traffic generated during the communication of IoT devices. Also, security and privacy measures that should be taken against the related privacy problems are explained. For this purpose, the current studies are examined by considering the attacker and the defender models.