Affiliation:
1. North Carolina State University
2. Lahore University of Management Sciences (LUMS)
Abstract
Abstract
In recent years, we have seen rapid growth in the use and adoption of Internet of Things (IoT) devices. However, some loT devices are sensitive in nature, and simply knowing what devices a user owns can have security and privacy implications. Researchers have, therefore, looked at fingerprinting loT devices and their activities from encrypted network traffic. In this paper, we analyze the feasibility of fingerprinting IoT devices and evaluate the robustness of such fingerprinting approach across multiple independent datasets — collected under different settings. We show that not only is it possible to effectively fingerprint 188 loT devices (with over 97% accuracy), but also to do so even with multiple instances of the same make-and-model device. We also analyze the extent to which temporal, spatial and data-collection-methodology differences impact fingerprinting accuracy. Our analysis sheds light on features that are more robust against varying conditions. Lastly, we comprehensively analyze the performance of our approach under an open-world setting and propose ways in which an adversary can enhance their odds of inferring additional information about unseen devices (e.g., similar devices manufactured by the same company).
Publisher
Privacy Enhancing Technologies Symposium Advisory Board
Reference62 articles.
1. [1] Smarthomedb. https://www.smarthomedb.com/. Accessed: 2021-12-02.
2. [2] OpenWrt Project, 2020. https://openwrt.org/.
3. [3] A. Acar, H. Fereidooni, T. Abera, A. K. Sikder, M. Miettinen, H. Aksu, M. Conti, A. Sadeghi, and A. S. Uluagac. Peek-a-boo: I see your smart home activities, even encrypted! CoRR, abs/1808.02741, 2018.
4. [4] G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. Gürses, F. Piessens, and B. Preneel. Fpdetective: dusting the web for fingerprinters. In Proceedings of the 20th ACM SIGSAC conference on Computer and Communications Security (CCS), pages 1129–1140, 2013.10.1145/2508859.2516674
5. [5] O. Alrawi, C. Lever, M. Antonakakis, and F. Monrose. Sok: Security evaluation of home-based IoT deployments. In Proceedings of the 40th IEEE Symposium on Security and Privacy (SP), pages 1362–1380, 2019.10.1109/SP.2019.00013
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献