IoT Traffic Obfuscation: Will it Guarantee the Privacy of Your Smart Home?

被引:0
|
作者
Perera, Yuvin [1 ]
Ahmed, Nadeem [1 ]
Kanhere, Salil [1 ]
Hu, Wen [1 ]
Jha, Sanjay [1 ]
机构
[1] Univ New South Wales, Sch Comp Sci & Engn, Sydney, NSW, Australia
关键词
IoT; machine learning; smart home; traffic analysis;
D O I
10.1109/ICC45855.2022.9839269
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Recent research has shown the efficacy of machine learning-based IoT network traffic analysis to infer attributes such as IoT device type, IoT device activity state and even user behaviours in smart home environments. Therefore, various traffic obfuscation techniques have been proposed to reduce the classification performance of these machine learning algorithms. However, most of the proposed traffic obfuscation techniques can only alter traffic originating from the IoT device, with the incoming traffic from the communicating servers largely unaffected. We show that IoT device activity can still be successfully inferred by only using incoming network traffic for analysis. Therefore, this research emphasizes the need for obfuscation techniques, which can alter network traffic in both directions between the IoT devices and their communicating servers.
引用
收藏
页码:2954 / 2959
页数:6
相关论文
共 50 条
  • [31] Review of Security and Privacy-Based IoT Smart Home Access Control Devices
    Uppuluri, Sirisha
    Lakshmeeswari, G.
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 137 (03) : 1601 - 1640
  • [32] Network-Level Security and Privacy Control for Smart-Home IoT Devices
    Sivaraman, Vijay
    Gharakheili, Hassan Habibi
    Vishwanath, Arun
    Boreli, Roksana
    Mehani, Olivier
    2015 IEEE 11TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2015, : 163 - 167
  • [33] Security and Privacy in IoT Smart Healthcare
    Karunarathne, Sivanarayani M.
    Saxena, Neetesh
    Khan, Muhammad Khurram
    IEEE INTERNET COMPUTING, 2021, 25 (04) : 37 - 48
  • [34] A Double Obfuscation Approach for Protecting the Privacy of IoT Location Based Applications
    Albouq, Sami Saad
    Sen, Adnan Ahmed Abi
    Namoun, Abdallah
    Bahbouh, Nour Mahmoud
    Alkhodre, Ahmad B.
    Alshanqiti, Abdullah
    IEEE ACCESS, 2020, 8 : 129415 - 129431
  • [35] Smart Home IoT System
    Patru, Irina-Ioana
    Carabas, Mihai
    Barbulescu, Mihai
    Gheorghe, Laura
    2016 15TH ROEDUNET CONFERENCE - NETWORKING IN EDUCATION AND RESEARCH, 2016,
  • [36] IoT smart home concept
    Vasicek, David
    Jalowiczor, Jakub
    Sevcik, Lukas
    Voznak, Miroslav
    2018 26TH TELECOMMUNICATIONS FORUM (TELFOR), 2018, : 53 - 56
  • [37] Data autonomy and privacy in the smart home: the case for a privacy smart home meta-assistant
    Orlowski, Alexander
    Loh, Wulf
    AI & SOCIETY, 2025,
  • [38] IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale
    Huang, Danny Yuxing
    Apthorpe, Noah
    Li, Frank
    Acar, Gunes
    Feamster, Nick
    PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2020, 4 (02):
  • [39] Self-Adaptive Traffic Anomaly Detection System for IoT Smart Home Environments
    Watanabe, Naoto
    Yamazaki, Taku
    Miyoshi, Takumi
    Yamamoto, Ryo
    Nakahara, Masataka
    Okui, Norihiro
    Kubota, Ayumu
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2025, E108B (03) : 230 - 242
  • [40] A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT
    Jia, Yizhen
    Xiao, Yinhao
    Yu, Jiguo
    Cheng, Xiuzhen
    Liang, Zhenkai
    Wan, Zhiguo
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1493 - 1501