Abstract
Abstract
Home and Building Automation Systems are becoming more and more popular these days. While they increase the comfort of living, they may also leak private information such as user presence to passive observers. In this paper we investigate approaches for the generation of dummy traffic in Home Automation Systems (HASs).We discuss fundamental requirements and their impact as well as two concrete dummy traffic generation algorithms.We measure the impact of Constant- Rate Dummy Traffic (CRDT) on the responsiveness and energy efficiency of Home Automation Systems. As an alternative, we present the Naive Exponential Dummies (NED) generation scheme in which the balance between privacy guarantees and energy efficiency can be arbitrarily moved. We formally prove its privacy guarantees and evaluate it against realistic sample data.
Reference31 articles.
1. [1] Noah Apthorpe, Danny Yuxing Huang, Dillon Reisman, Arvind Narayanan, and Nick Feamster. Keeping the Smart Home Private with Smart (er) IoT Traffic Shaping.
2. [2] Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, and Francesco Regazzoni. Midori: A Block Cipher for Low Energy. In Tetsu Iwata and Jung Hee Cheon, editors, Advances in Cryptology – ASIACRYPT 2015. ASIACRYPT 2015, pages 411–436. Springer, Berlin, Heidelberg, nov 2015.
3. [3] Calum Benson, Adam Elman, and Seth Nickell. GNOME Human Interface Guidelines 2.2.3, 2012.
4. [4] Xiang Cai, Xin Cheng Zhang, Brijesh Joshi, and Rob Johnson. Touching from a Distance: Website Fingerprinting Attacksand Defenses. In Proceedings of the 2012 ACM conference on Computer and communications security - CCS ’12, page 605, New York, New York, USA, 2012. ACM Press.
5. [5] Haowen Chan and Adrian Perrig. Security and privacy in sensor networks. Computer, 36(10):103–105, oct 2003.