iPET: Privacy Enhancing Traffic Perturbations for Secure IoT Communications

نویسندگان

چکیده

IoT devices constantly communicate with servers over the Internet, allowing an attacker to extract sensitive information by passively monitoring network traffic. Recent research works have shown that a trained machine learning (ML) model can accurately fingerprint learned from (encrypted) traffic flows of devices. Such fingerprinting attacks are capable revealing make and devices, which further be used detailed user activities. In this work, we develop propose iPET, novel adversarial perturbation-based modification system defends against attacks. iPET design employs GAN (Generative Adversarial Networks) in tuneable way, users specify maximum bandwidth overhead they willing tolerate for defense. A fundamental idea is deliberately introduce stochasticity between instances. This approach limits counter attack, as it inhibits recreating identical perturbation using fingerprinting. We evaluate effectiveness our defense state-of-the-art models three different capabilities. Our evaluations on synthetic real-world datasets demonstrate decreases accuracy even potent attackers. also show perturbations generated generalize well schemes may deploy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs

Vehicular ad hoc network (VANET) is an emerging type of networks which facilitates vehicles on roads to communicate for driving safety. The basic idea is to allow arbitrary vehicles to broadcast ad hoc messages (e.g. traffic accidents) to other vehicles. However, this raises the concern of security and privacy. Messages should be signed and verified before they are trusted while the real identi...

متن کامل

Effective Privacy Amplification for Secure Classical Communications

We study the practical effectiveness of privacy amplification for classical key-distribution schemes. We find that in contrast to quantum key distribution schemes, the high fidelity of the raw key generated in classical systems allow the users to always sift a secure shorter key if they have an upper bound on the eavesdropper probability to correctly guess the exchanged key-bits. The number of ...

متن کامل

Secure and privacy-preserving, timed vehicular communications

We consider the problem of privacy (anonymity) and security in vehicular (V2V) communication, in particular securing routine safety messages. Traditional public key mechanisms are not appropriate for such applications because of the large number of safety messages that have to be transmitted by each vehicle, typically one message every 100−300ms. We first show that a recently proposed V2V commu...

متن کامل

Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications

This paper introduces an efficient and spontaneous privacy-preserving protocol for vehicular ad-hoc networks based on revocable ring signature. The proposed protocol has three appealing characteristics: First, it offers conditional privacypreservation: while a receiver can verify that a message issuer is an authorized participant in the system only a trusted authority can reveal the true identi...

متن کامل

Secure log management for privacy assurance in electronic communications

In this paper we examine logging security in the environment of electronic communication providers. We review existing security threat models for system logging and we extend these to a new security model especially suited for communication network providers, which also considers internal modification attacks. We also propose a framework for secure log management in public communication network...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings on Privacy Enhancing Technologies

سال: 2023

ISSN: ['2299-0984']

DOI: https://doi.org/10.56553/popets-2023-0048