The Dark (and Bright) Side of IoT: Attacks and Countermeasures to Identification of Smart Home Devices and Services

09/16/2020
by   Ahmed Mohamed Hussain, et al.
0

We present a new machine learning-based attack that exploits network patterns to detect the presence of smart IoT devices and running services in the WiFi radio spectrum. We perform an extensive measurement campaign of data collection, and we build up a model describing the traffic patterns characterizing three popular IoT smart home devices, i.e., Google Nest, Google Chromecast, Amazon Echo, and Amazon Echo Dot. We prove that it is possible to detect and identify with overwhelming probability their presence and the services running by the aforementioned devices in a crowded WiFi scenario. This work proves that standard encryption techniques alone are not sufficient to protect the privacy of the end-user, since the network traffic itself exposes the presence of both the device and the associated service. While more work is required to prevent non-trusted third parties to detect and identify the user's devices, we introduce "Eclipse", a technique to mitigate these types of attacks, which reshapes the traffic making the identification of the devices and the associated services similar to the random classification baseline.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/22/2020

Characterizing Smart Home IoT Traffic in the Wild

As the smart home IoT ecosystem flourishes, it is imperative to gain a b...
research
08/06/2018

Piping Botnet - Turning Green Technology into a Water Disaster

The current generation of IoT devices is being used by clients and consu...
research
07/26/2019

PingPong: Packet-Level Signatures for Smart Home Device Events

Smart home devices are vulnerable to passive inference attacks based on ...
research
12/03/2018

Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping

The proliferation of smart home Internet of Things (IoT) devices present...
research
05/31/2019

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup

Today, telecommunication service providers (telcos) are exposed to cyber...
research
04/01/2021

Securing Smart Homes via Software-Defined Networking and Low-Cost Traffic Classification

IoT devices have become popular targets for various network attacks due ...
research
02/25/2021

Deep Adversarial Learning on Google Home devices

Smart speakers and voice-based virtual assistants are core components fo...

Please sign up or login with your details

Forgot password? Click here to reset