Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping

@article{Apthorpe2019KeepingTS,
  title={Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping},
  author={Noah Apthorpe and D. Huang and Dillon Reisman and A. Narayanan and N. Feamster},
  journal={Proceedings on Privacy Enhancing Technologies},
  year={2019},
  volume={2019},
  pages={128 - 148}
}
  • Noah Apthorpe, D. Huang, +2 authors N. Feamster
  • Published 2019
  • Computer Science
  • Proceedings on Privacy Enhancing Technologies
  • Abstract The proliferation of smart home Internet of things (IoT) devices presents unprecedented challenges for preserving privacy within the home. In this paper, we demonstrate that a passive network observer (e.g., an Internet service provider) can infer private in-home activities by analyzing Internet traffic from commercially available smart home devices even when the devices use end-to-end transport-layer encryption. We evaluate common approaches for defending against these types of… CONTINUE READING
    25 Citations
    Characterizing Smart Home IoT Traffic in the Wild
    • M. Mazhar, Zubair Shafiq
    • Computer Science
    • 2020 IEEE/ACM Fifth International Conference on Internet-of-Things Design and Implementation (IoTDI)
    • 2020
    • 8
    • PDF
    Peek-a-boo: i see your smart home activities, even encrypted!
    • 48
    • PDF
    A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild
    • 1
    • PDF
    Packet-Level Signatures for Smart Home Devices
    • 7
    • Highly Influenced
    • PDF
    Smart Home, security concerns of IoT
    IoT Inspector
    • 2
    IoT Inspector: Crowdsourcing Labeled Network Traffic from Smart Home Devices at Scale
    • 19
    • PDF
    PingPong: Packet-Level Signatures for Smart Home Device Events
    • 7
    • Highly Influenced
    • PDF

    References

    SHOWING 1-10 OF 48 REFERENCES
    Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic
    • 114
    • PDF
    EPIC: A Differential Privacy Framework to Defend Smart Homes Against Internet Traffic Analysis
    • 53
    A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic
    • 155
    • PDF
    A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation
    • 11
    • PDF
    Energy-Efficient Privacy Protection for Smart Home Environments Using Behavioral Semantics
    • 17
    Is Anybody Home? Inferring Activity From Smart Home Network Traffic
    • 55
    • PDF
    IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT
    • 216
    • PDF
    Low-cost traffic analysis of Tor
    • 587
    • PDF