[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article
Open access

CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes

Published: 30 December 2020 Publication History

Abstract

This article focuses on the new privacy challenges that arise in smart homes. Specifically, the article focuses on inferring the user’s activities—which may, in turn, lead to the user’s privacy—via inferences through device activities and network traffic analysis. We develop techniques that are based on a cryptographically secure token circulation in a ring network consisting of smart home devices to prevent inferences from device activities, via device workflow, i.e., inferences from a coordinated sequence of devices’ actuation. The solution hides the device activity and corresponding channel activities, thus preserving the individual’s activities. We also extend our solution to deal with a large number of devices and devices that produce large-sized data by implementing parallel rings. Our experiments also evaluate the performance in terms of communication overheads of the proposed approach and the obtained privacy.

References

[1]
[n.d.]. Retrieved on December 01, 2020 from https://www.prb.org/aging-unitedstates-fact-sheet/.
[2]
[n.d.]. Retrieved on December 01, 2020 from https://www.mylifesite.net/blog/post/pros-cons-55-active-adult-communities/.
[3]
[n.d.]. In Insight’ into Home Automation Reveals Vulnerability in Simple IoT Product. Retrieved on December 01, 2020 from https://www.mcafee.com/blogs/other-blogs/mcafee-labs/insight-into-home-automation-reveals-vulnerability-in-simple-iot-product/.
[4]
[n.d.]. In IEEE OUI (Organizationally Unique Identifier). Retrieved on December 01, 2020 from http://standards-oui.ieee.org/oui.txt.
[5]
[n.d.]. SmartThings Developers. Retrieved from on December 01, 2020 https://smartthings.developer.samsung.com/docs/smartapps/scheduling.html.
[6]
2019. Create home automations with the Home app. Apple Support . Retrieved September 2019 from https://support.apple.com/en-us/HT208940.
[7]
Abbas Acar et al. 2018. Peek-a-Boo: I see your smart home activities, even encrypted!CoRR abs/1808.02741 (2018). http://arxiv.org/abs/1808.02741
[8]
Nailah Saleh Alhassoun and other. 2019. Context-aware energy optimization for perpetual IoT-based safe communities. SUSCOM 22 (2019), 96--106.
[9]
Omar Alrawi et al. 2019. SoK: Security evaluation of home-based IoT deployments. In IEEE SP. 1362--1380.
[10]
Mahmoud Ammar et al. 2018. Internet of Things: A survey on the security of IoT frameworks. JISA 38 (2018), 8--27.
[11]
G. Anastasi et al. 2004. Wi-fi in ad hoc mode: A measurement study. In PerCom. 145--154.
[12]
Noah Apthorpe et al. 2017. Closing the blinds: Four strategies for protecting smart home privacy from network observers. CoRR abs/1705.06809 (2017).
[13]
Noah Apthorpe et al. 2017. Spying on the smart home: Privacy attacks and defenses on encrypted IoT traffic. CoRR abs/1708.05044 (2017).
[14]
Phillippa Carnemolla. 2018. Ageing in place and the Internet of Things—How smart home technologies, the built environment and caregiving intersect. Visualization in Engineering 6, 1 (2018), 7.
[15]
Tam Thanh Doan et al. 2018. Towards a resilient smart home. In IoT S8P. 15--21.
[16]
Ayyoob Hamza et al. 2018. Combining MUD policies with SDN for IoT intrusion detection. In IoT S8P. 1--7.
[17]
Khari Johnson. 2018. IFTTT raises $24 million, led by salesforce ventures. VentureBeat . Retrieved April 2018 from https://venturebeat.com/2018/04/26/ifttt-raises-24-million-led-by-salesforce-ventures/.
[18]
Pardeep Kumar et al. 2017. Anonymous secure framework in connected smart home environments. IEEE Trans. Information Forensics and Security 12, 4 (2017), 968--979.
[19]
Jeremy Martin et al. 2017. A study of MAC address randomization in mobile devices and when it fails. PoPETs 2017, 4 (2017), 365--383.
[20]
Jorge Ortiz et al. 2019. DeviceMien: Network device behavior modeling for identifying unknown IoT devices. In IoTDI. 106--117.
[21]
Nisha Panwar et al. 2019. Verifiable round-robin scheme for smart homes. In Proceedings of the 9th ACM Conference on Data and Application Security and Privacy, CODASPY. 49--60.
[22]
Ronald L. Rivest et al. 1996. Time-lock Puzzles and Timed-release Crypto. Technical Report. MIT/LCS/TR-684, MIT Lab for Computer Science.
[23]
Robinsh. [n.d.]. Understand Azure IoT hub jobs. Understand Azure IoT Hub Jobs, Microsoft Docs ([n.d.]). Retrieved from https://docs.microsoft.com/en-us/azure/iot-hub/iot-hub-devguide-jobs.
[24]
Jian Shen et al. 2018. Secure data uploading scheme for a smart home system. Information Sciences 453 (2018), 186--197.
[25]
Shachar Siboni et al. 2019. Security testbed for Internet-of-Things devices. IEEE Transactions on Reliability 68, 1 (2019), 23--44.
[26]
Arunan Sivanathan et al. 2017. Characterizing and classifying IoT traffic in smart cities and campuses. In INFOCOM WKSHPS. 559--564.
[27]
Arunan Sivanathan et al. 2019. Classifying IoT devices in smart environments using network traffic characteristics. IEEE Transactions on Mobile Computing 18, 8 (2019), 1745--1759.
[28]
David Stites and Katie Skinner. 2014. User privacy on iOS and OS X. The Apple Worldwide Developers Conference.
[29]
Rahmadi Trimananda et al. 2019. PingPong: Packet-level signatures for smart home device events. CoRR abs/1907.11797 (2019). http://arxiv.org/abs/1907.11797
[30]
Md. Yusuf Sarwar Uddin et al. 2016. The Scale2 multi-network architecture for IoT-based resilient communities. In SMARTCOMP. 1--8.
[31]
Mathy Vanhoef et al. 2016. Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms. In AsiaCCS. 413--424.
[32]
Peter Waher et al. 2016. Using the AWS IoT jobs APIs. Amazon . Retrieved from https://docs.aws.amazon.com/iot/latest/developerguide/jobs-api.html.
[33]
Gaven J. Watson et al. 2012. LoSt: Location based storage. In ACM Workshop on Cloud Computing Security. 59--70.
[34]
Lu Zhou et al. 2019. A lightweight cryptographic protocol with certificateless signature for the Internet of Things. ACM Transactions on Embedded Computing Systems 18, 3 (2019), 28:1–28:10.
[35]
Yifeng Zhu. 2017. Embedded Systems with Arm Cortex-m Microcontrollers in Assembly Language and c. E-Man Press Llc.

Cited By

View all
  • (2022)Classification of Encrypted IoT Traffic despite Padding and ShapingProceedings of the 21st Workshop on Privacy in the Electronic Society10.1145/3559613.3563191(1-13)Online publication date: 7-Nov-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Cyber-Physical Systems
ACM Transactions on Cyber-Physical Systems  Volume 5, Issue 1
Special Issue on Security and Privacy for Connected CPS
January 2021
266 pages
ISSN:2378-962X
EISSN:2378-9638
DOI:10.1145/3446431
  • Editor:
  • Tei-Wei Kuo
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 30 December 2020
Online AM: 07 May 2020
Accepted: 01 March 2020
Revised: 01 January 2020
Received: 01 July 2019
Published in TCPS Volume 5, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Internet of Things
  2. channel and device activity
  3. inference attacks
  4. smart homes
  5. user privacy

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)197
  • Downloads (Last 6 weeks)19
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Classification of Encrypted IoT Traffic despite Padding and ShapingProceedings of the 21st Workshop on Privacy in the Electronic Society10.1145/3559613.3563191(1-13)Online publication date: 7-Nov-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Full Access

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media