The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
A automação residencial por meio de dispositivos de Internet das Coisas (IoT) apresenta desafios de segurança para proteger a segurança e a privacidade de seus habitantes. Apesar dos protocolos padrão de segurança de comunicação sem fio, um invasor dentro do alcance de comunicação sem fio da casa inteligente pode extrair identificadores e informações estatísticas, como o endereço MAC e comprimentos de pacotes, do tráfego sem fio criptografado de dispositivos IoT para fazer inferências sobre o privado. atividades do usuário. Neste artigo, para evitar essa violação de privacidade na LAN sem fio, realizamos os três itens a seguir. Primeiro, demonstramos que é necessário realizar modelagem de tráfego simultaneamente no nó de upload e download; segundo, demonstramos que a modelagem do tráfego pela geração aleatória de pacotes é impraticável devido à exigência excessiva de largura de banda; terceiro, propomos modelagem de tráfego por durações de preenchimento variáveis para reduzir o requisito de largura de banda para injetar tráfego fictício durante períodos de atividade e inatividade do usuário para diminuir a confiança do invasor local em identificar o tráfego genuíno da atividade do usuário. A partir de nossa avaliação de desempenho, diminuímos os dados gerados em vários dispositivos IoT habilitados para WiFi e ZigBee em mais de 15% por meio de nossa proposta de durações de preenchimento variáveis em comparação com o método convencional de durações de preenchimento fixas com baixa confiança do invasor.
Kiana DZIUBINSKI
the Faculty of Science and Technology at Sophia University
Masaki BANDAI
the Faculty of Science and Technology at Sophia University
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Kiana DZIUBINSKI, Masaki BANDAI, "Bandwidth Efficient IoT Traffic Shaping Technique for Protecting Smart Home Privacy from Data Breaches in Wireless LAN" in IEICE TRANSACTIONS on Communications,
vol. E104-B, no. 8, pp. 961-973, August 2021, doi: 10.1587/transcom.2020EBP3182.
Abstract: The automation of the home through Internet of Things (IoT) devices presents security challenges for protecting the safety and privacy of its inhabitants. In spite of standard wireless communication security protocols, an attacker inside the wireless communication range of the smart home can extract identifier and statistical information, such as the MAC address and packet lengths, from the encrypted wireless traffic of IoT devices to make inferences about the private activities of the user. In this paper, to prevent this breach on privacy in the wireless LAN, we accomplish the following three items. First, we demonstrate that performing traffic shaping simultaneously on the upload and download node is necessary; second, we demonstrate that traffic shaping by random packet generation is impracticable due to the excessive bandwidth requirement; third, we propose traffic shaping by variable padding durations to reduce the bandwidth requirement for injecting dummy traffic during periods of user activity and inactivity to decrease the confidence of the local attacker from identifying genuine user activity traffic. From our performance evaluation, we decreased the data generated on several WiFi and ZigBee-enabled IoT devices by over 15% by our proposal of variable padding durations compared to the conventional method of fixed padding durations at low attacker confidence.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.2020EBP3182/_p
Copiar
@ARTICLE{e104-b_8_961,
author={Kiana DZIUBINSKI, Masaki BANDAI, },
journal={IEICE TRANSACTIONS on Communications},
title={Bandwidth Efficient IoT Traffic Shaping Technique for Protecting Smart Home Privacy from Data Breaches in Wireless LAN},
year={2021},
volume={E104-B},
number={8},
pages={961-973},
abstract={The automation of the home through Internet of Things (IoT) devices presents security challenges for protecting the safety and privacy of its inhabitants. In spite of standard wireless communication security protocols, an attacker inside the wireless communication range of the smart home can extract identifier and statistical information, such as the MAC address and packet lengths, from the encrypted wireless traffic of IoT devices to make inferences about the private activities of the user. In this paper, to prevent this breach on privacy in the wireless LAN, we accomplish the following three items. First, we demonstrate that performing traffic shaping simultaneously on the upload and download node is necessary; second, we demonstrate that traffic shaping by random packet generation is impracticable due to the excessive bandwidth requirement; third, we propose traffic shaping by variable padding durations to reduce the bandwidth requirement for injecting dummy traffic during periods of user activity and inactivity to decrease the confidence of the local attacker from identifying genuine user activity traffic. From our performance evaluation, we decreased the data generated on several WiFi and ZigBee-enabled IoT devices by over 15% by our proposal of variable padding durations compared to the conventional method of fixed padding durations at low attacker confidence.},
keywords={},
doi={10.1587/transcom.2020EBP3182},
ISSN={1745-1345},
month={August},}
Copiar
TY - JOUR
TI - Bandwidth Efficient IoT Traffic Shaping Technique for Protecting Smart Home Privacy from Data Breaches in Wireless LAN
T2 - IEICE TRANSACTIONS on Communications
SP - 961
EP - 973
AU - Kiana DZIUBINSKI
AU - Masaki BANDAI
PY - 2021
DO - 10.1587/transcom.2020EBP3182
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E104-B
IS - 8
JA - IEICE TRANSACTIONS on Communications
Y1 - August 2021
AB - The automation of the home through Internet of Things (IoT) devices presents security challenges for protecting the safety and privacy of its inhabitants. In spite of standard wireless communication security protocols, an attacker inside the wireless communication range of the smart home can extract identifier and statistical information, such as the MAC address and packet lengths, from the encrypted wireless traffic of IoT devices to make inferences about the private activities of the user. In this paper, to prevent this breach on privacy in the wireless LAN, we accomplish the following three items. First, we demonstrate that performing traffic shaping simultaneously on the upload and download node is necessary; second, we demonstrate that traffic shaping by random packet generation is impracticable due to the excessive bandwidth requirement; third, we propose traffic shaping by variable padding durations to reduce the bandwidth requirement for injecting dummy traffic during periods of user activity and inactivity to decrease the confidence of the local attacker from identifying genuine user activity traffic. From our performance evaluation, we decreased the data generated on several WiFi and ZigBee-enabled IoT devices by over 15% by our proposal of variable padding durations compared to the conventional method of fixed padding durations at low attacker confidence.
ER -