iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications
نویسندگان
چکیده
IoT devices constantly communicate with servers over the Internet, allowing an attacker to extract sensitive information by passively monitoring network traffic. Recent research works have shown that a trained machine learning (ML) model can accurately fingerprint learned from (encrypted) traffic flows of devices. Such fingerprinting attacks are capable revealing make and devices, which further be used detailed user activities. In this work, we develop propose iPET, novel adversarial perturbation-based modification system defends against attacks. iPET design employs GAN (Generative Adversarial Networks) in tuneable way, users specify maximum bandwidth overhead they willing tolerate for defense. A fundamental idea is deliberately introduce stochasticity between instances. This approach limits counter attack, as it inhibits recreating identical perturbation using fingerprinting. We evaluate effectiveness our defense state-of-the-art models three different capabilities. Our evaluations on synthetic real-world datasets demonstrate decreases accuracy even potent attackers. also show perturbations generated generalize well schemes may deploy.
منابع مشابه
SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs
Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identi...
متن کاملEffective Privacy Amplification for Secure Classical Communications
We study the practical effectiveness of privacy amplification for classical key-distribution schemes. We find that in contrast to quantum key distribution schemes, the high fidelity of the raw key generated in classical systems allow the users to always sift a secure shorter key if they have an upper bound on the eavesdropper probability to correctly guess the exchanged key-bits. The number of ...
متن کاملSecure and privacy-preserving, timed vehicular communications
We consider the problem of privacy (anonymity) and security in vehicular (V2V) communication, in particular securing routine safety messages. Traditional public key mechanisms are not appropriate for such applications because of the large number of safety messages that have to be transmitted by each vehicle, typically one message every 100−300ms. We first show that a recently proposed V2V commu...
متن کاملEfficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications
This paper introduces an efficient and spontaneous privacy-preserving protocol for vehicular ad-hoc networks based on revocable ring signature. The proposed protocol has three appealing characteristics: First, it offers conditional privacypreservation: while a receiver can verify that a message issuer is an authorized participant in the system only a trusted authority can reveal the true identi...
متن کاملSecure log management for privacy assurance in electronic communications
In this paper we examine logging security in the environment of electronic communication providers. We review existing security threat models for system logging and we extend these to a new security model especially suited for communication network providers, which also considers internal modification attacks. We also propose a framework for secure log management in public communication network...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings on Privacy Enhancing Technologies
سال: 2023
ISSN: ['2299-0984']
DOI: https://doi.org/10.56553/popets-2023-0048