A Novel Traffic Obfuscation Technology for Smart Home
-
Published:2023-08-17
Issue:16
Volume:12
Page:3477
-
ISSN:2079-9292
-
Container-title:Electronics
-
language:en
-
Short-container-title:Electronics
Author:
Zhang Shuo1, Shen Fangyu1, Liu Yaping1, Yang Zhikai1, Lv Xinyu1
Affiliation:
1. Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China
Abstract
With the widespread popularity of smart home devices and the emergence of smart home integration platforms such as Google, Amazon, and Xiaomi, the smart home industry is in a stage of vigorous development. While smart homes provide users with convenient and intelligent living, the problem of smart home devices leaking user privacy has become increasingly prominent. Smart home devices give users the ability to remotely control home devices, but they also reflect user home activities in traffic data, which brings the risk of privacy leaks. Potential attackers can use traffic classification technology to analyze traffic characteristics during traffic transmission (e.g., at the traffic exit of a smart home gateway) and infer users’ private information, such as their home activities, causing serious consequences of privacy leaks. To address the above problems, this paper focuses on research on privacy protection technology based on traffic obfuscation. By using traffic obfuscation technology to obscure the true traffic of smart home devices, it can prevent malicious traffic listeners from analyzing user privacy information based on traffic characteristics. We propose an enhanced smart home traffic obfuscation method called SHTObfuscator (Smart Home Traffic Obfuscator) based on the virtual user technology concept and a virtual user behavior construction method based on logical integrity. By injecting traffic fingerprints of different device activities into the real traffic environment of smart homes as obfuscating traffic, attackers cannot distinguish between the real device working status and user behavior privacy in the current home, effectively reducing the effect of traffic classification attack models. The protection level can be manually or automatically adjusted, achieving a balance between privacy protection and bandwidth overhead. The experimental results show that under the highest obfuscation level, the obfuscation method proposed in this paper can effectively reduce the classification effect of the attack model from 95% to 25%.
Funder
The Major Key Project of PCL ey-Area Research and Development Program of Guangdong Province
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference35 articles.
1. Cisco, U. (2020). Cisco Annual Internet Report (2018–2023) White Paper, Cisco. 2. Acar, A., Fereidooni, H., Abera, T., Sikder, A.K., Miettinen, M., Aksu, H., Conti, M., Sadeghi, A.R., and Uluagac, S. (2020, January 8). Peek-a-Boo: I See Your Smart Home Activities, Even Encrypted!. Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Linz, Austria. 3. A Review on Machine Learning Based Approaches for Internet Traffic Classification;Salman;Ann. Telecommun.,2020 4. Alshehri, A., Granley, J., and Yue, C. (2020, January 16–18). Attacking and Protecting Tunneled Traffic of Smart Home Devices. Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, New Orleans, LA, USA. 5. Trimananda, R., Varmarken, J., and Markopoulou, A. (2020, January 23–26). Packet-Level Fingerprints for Smart Home Devices. Proceedings of the 2020 Network and Distributed System Security Symposium, San Diego, CA, USA.
|
|