Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

9 Citations (Scopus)

Abstract

Traffic analysis attacks allow an attacker to infer sensitive information about users by analyzing network traffic of user devices. These attacks are passive in nature and are difficult to detect. In this paper, we demonstrate that an adversary, with access to upstream traffic from a smart home network, can identify the device types and user interactions with IoT devices, with significant confidence. These attacks are practical even when device traffic is encrypted because they only utilize statistical properties, such as traffic rates, for analysis. In order to mitigate the privacy implications of traffic analysis attacks, we propose a traffic morphing technique, which shapes network traffic thus making it more difficult to identify IoT devices and their activities. Our evaluation shows that the proposed technique provides protection against traffic analysis attacks and prevent privacy leakages for smart home users.

Original languageEnglish
Title of host publication2019 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019
PublisherIEEE
Pages196-201
Number of pages6
ISBN (Electronic)9781538691519
DOIs
Publication statusPublished - Mar 2019
MoE publication typeA4 Article in a conference publication
EventIEEE International Conference on Pervasive Computing and Communications Workshops - Kyoto, Japan
Duration: 11 Mar 201915 Mar 2019

Publication series

Name2019 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2019

Conference

ConferenceIEEE International Conference on Pervasive Computing and Communications Workshops
Abbreviated titlePerCom Workshops
Country/TerritoryJapan
CityKyoto
Period11/03/201915/03/2019

Fingerprint

Dive into the research topics of 'Protecting IoT-environments against Traffic Analysis Attacks with Traffic Morphing'. Together they form a unique fingerprint.

Cite this