Peek-a-Boo: I see your smart home activities, even encrypted!

08/08/2018
by   Abbas Acar, et al.
0

A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them and facilitate their living styles. However, an attacker inside or near a smart home environment can potentially exploit the innate wireless medium used by these devices to exfiltrate sensitive information about the users and their activities, invading user privacy. With this in mind, in this work, we introduce a novel multi-stage privacy attack against user privacy in a smart environment. It is realized utilizing state-of-the-art machine-learning approaches for detecting and identifying particular types of IoT devices, their actions, states, and ongoing user activities in a cascading style by only observing passively the wireless traffic from smart home devices. The attack effectively works on both encrypted and unencrypted communications. We evaluate the efficiency of the attack with real measurements from an extensive set of popular off-the-shelf smart home IoT devices utilizing a set of diverse network protocols like WiFi, ZigBee, and BLE. Our results show that an adversary passively sniffing the network traffic can achieve very high accuracy (above 90 their users. In contrast to earlier straightforward approaches, our multi-stage privacy attack can perform activity detection and identification automatically without extensive background knowledge or specifications of the analyzed protocols. This allows an adversary to efficiently aggregate extensive behavior profiles of targeted users. To protect against this privacy leakage, we also propose a countermeasure based on generating spoofed network traffic to hide the real activities of the devices. We also demonstrate that the provided solution provides better protection than existing solutions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/03/2018

Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping

The proliferation of smart home Internet of Things (IoT) devices present...
research
01/22/2020

Characterizing Smart Home IoT Traffic in the Wild

As the smart home IoT ecosystem flourishes, it is imperative to gain a b...
research
02/25/2021

Deep Adversarial Learning on Google Home devices

Smart speakers and voice-based virtual assistants are core components fo...
research
11/13/2020

A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment

The proliferation of smart, connected, always listening devices have int...
research
01/06/2023

Watching your call: Breaking VoLTE Privacy in LTE/5G Networks

Voice over LTE (VoLTE) and Voice over NR (VoNR) are two similar technolo...
research
08/31/2019

Your Smart Home Can't Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks

The IoT (Internet of Things) technology has been widely adopted in recen...
research
01/24/2019

Verifiable Round-Robin Scheme for Smart Homes

Advances in sensing, networking, and actuation technologies have resulte...

Please sign up or login with your details

Forgot password? Click here to reset