Is anybody home? inferring activity from smart home network traffic
As smart home devices are introduced into our homes, security and privacy concerns are
being raised. Smart home devices collect, exchange, and transmit various data about the …
being raised. Smart home devices collect, exchange, and transmit various data about the …
Keeping the smart home private with smart (er) iot traffic shaping
The proliferation of smart home Internet of Things (IoT) devices presents unprecedented
challenges for preserving privacy within the home. In this paper, we demonstrate that a …
challenges for preserving privacy within the home. In this paper, we demonstrate that a …
Overcoming invasion of privacy in smart home environment with synthetic packet injection
K Yoshigoe, W Dai, M Abramson… - 2015 TRON Symposium …, 2015 - ieeexplore.ieee.org
We live in an increasingly connected world where not only can we open our garage doors
with sensors, but from a remote location we can also lock our doors, or turn off our lights …
with sensors, but from a remote location we can also lock our doors, or turn off our lights …
Attacking and protecting tunneled traffic of smart home devices
The number of smart home IoT (Internet of Things) devices has been growing fast in recent
years. Along with the great benefits brought by smart home devices, new threats have …
years. Along with the great benefits brought by smart home devices, new threats have …
Protecting IoT-environments against traffic analysis attacks with traffic morphing
I Hafeez, M Antikainen… - 2019 IEEE international …, 2019 - ieeexplore.ieee.org
Traffic analysis attacks allow an attacker to infer sensitive information about users by
analyzing network traffic of user devices. These attacks are passive in nature and are difficult …
analyzing network traffic of user devices. These attacks are passive in nature and are difficult …
PingPong: Packet-level signatures for smart home device events
Smart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
Peek-a-boo: I see your smart home activities, even encrypted!
A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment
allow users to easily control the physical world around them and facilitate their living styles …
allow users to easily control the physical world around them and facilitate their living styles …
Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic
The growing market for smart home IoT devices promises new conveniences for consumers
while presenting new challenges for preserving privacy within the home. Many smart home …
while presenting new challenges for preserving privacy within the home. Many smart home …
Packet-level signatures for smart home devices
mart home devices are vulnerable to passive inference attacks based on network traffic,
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
even in the presence of encryption. In this paper, we present PINGPONG, a tool that can …
Homonit: Monitoring smart home apps from encrypted traffic
Smart home is an emerging technology for intelligently connecting a large variety of smart
sensors and devices to facilitate automation of home appliances, lighting, heating and …
sensors and devices to facilitate automation of home appliances, lighting, heating and …