A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic

نویسندگان

  • Noah Apthorpe
  • Dillon Reisman
  • Nick Feamster
چکیده

The increasing popularity of specialized Internet-connected devices and appliances, dubbed the Internet-of-Things (IoT), promises both new conveniences and new privacy concerns. Unlike traditional web browsers, many IoT devices have al­ ways-on sensors that constantly monitor fine-grained details of users’ physical environments and influence the devices’ network communications. Passive network observers, such as Internet service providers, could potentially analyze IoT network traffic to infer sensitive details about users. Here, we examine four IoT smart home devices (a Sense sleep monitor, a Nest Cam Indoor security camera, a WeMo switch, and an Amazon Echo) and find that their network traffic rates can reveal potentially sensitive user interactions even when the traffic is encrypted. These results indicate that a techno­ logical solution is needed to protect IoT device owner pri­ vacy, and that IoT-specific concerns must be considered in the ongoing policy debate around ISP data collection and usage.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Poster: A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic

The increasing popularity of specialized Internetconnected devices and appliances, dubbed the Internet-of-Things (IoT), promises both new conveniences and new privacy concerns. Unlike traditional web browsers, many IoT devices have always-on sensors that constantly monitor fine-grained details of users’ physical environments and influence the devices’ network communications. Passive network obs...

متن کامل

Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic

The growing market for smart home IoT devices promises new conveniences for consumers while presenting new challenges for preserving privacy within the home. Many smart home devices have always-on sensors that capture users’ offline activities in their living spaces and transmit information about these activities on the Internet. In this paper, we demonstrate that an ISP or other network observ...

متن کامل

SPIN: a User-centric Security Extension for In-home Networks

We present our ongoing work on a system to curb the security risks that the Internet of Things (IoT) is widely expected to introduce in smart homes, such as exposing large numbers of vulnerable IoT devices that can be misused for massive DDoS attacks on core Internet systems. Our system for Security and Privacy for Inhome Networks (SPIN) extends a user’s home network with network-level function...

متن کامل

Closing the Blinds: Four Strategies for Protecting Smart Home Privacy from Network Observers

The growing market for smart home IoT devices promises new conveniences for consumers while presenting novel challenges for preserving privacy within the home. Specifically, Internet service providers or neighborhood WiFi eavesdroppers can measure Internet traffic rates from smart home devices and infer consumers’ private in-home behaviors. Here we propose four strategies that device manufactur...

متن کامل

A survey on RPL attacks and their countermeasures

RPL (Routing Protocol for Low Power and Lossy Networks) has been designed for low power networks with high packet loss. Generally, devices with low processing power and limited memory are used in this type of network. IoT (Internet of Things) is a typical example of low power lossy networks. In this technology, objects are interconnected through a network consisted of low-power circuits. Exampl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1705.06805  شماره 

صفحات  -

تاریخ انتشار 2016