Abstract
The threat of attacks on Home Automation Systems (HASs) is increasing. Research has shown that passive adversaries can detect user habits and interactions. Despite encryption and other measures becoming a standard, traffic analysis remains an unsolved problem. In this paper, we show that existing solutions from different research areas cannot be applied to this scenario. We establish a model for traffic analysis in Home Automation Systems which allows the analysis and comparison of attacks and countermeasures. We also take a look at legal aspects, highlighting problem areas and recent developments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
This especially holds for questions regarding data retention.
- 2.
https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures, last accessed 10 July 2017.
References
Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36(10), 103–105 (2003)
Conti, M., Willemsen, J., Crispo, B.: Providing source location privacy in wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 15(3), 1238–1280 (2013)
Matos, A., Aguiar, R.L., Girao, J., Armknecht, F.: Toward dependable networking: secure location and privacy at the link layer. IEEE Wirel. Commun. 15(5), 30–36 (2008)
Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: Proceedings of WiSec 2008, pp. 77–88. ACM (2008)
Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. ACM TOSN 9(3), 34:1–34:23 (2008)
Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-mixes: untraceable communication with very small bandwidth overhead. In: Effelsberg, W., Meuer, H.W., Müller, G. (eds.) Kommunikation in verteilten Systemen. Informatik-Fachberichte, vol. 267, pp. 451–463. Springer, Heidelberg (1991). https://doi.org/10.1007/978-3-642-76462-2_32
Levine, B.N., Reiter, M.K., Wang, C., Wright, M.: Timing attacks in low-latency mix systems. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 251–265. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-27809-2_25
Shmatikov, V., Wang, M.-H.: Timing analysis in low-latency mix networks: attacks and defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 18–33. Springer, Heidelberg (2006). https://doi.org/10.1007/11863908_2
Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). https://doi.org/10.1007/11787006_1
Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: Proceedings of ACM STOC 2010, pp. 715–724. ACM (2010)
Bash, B.A., Goeckel, D., Guha, S., Towsley, D.: Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12), 26–31 (2015)
Möllers, F., Seitz, S., Hellmann, A., Sorge, C.: Extrapolation and prediction of user behaviour from wireless home automation communication. In: Proceedings of WiSec 2014, pp. 195–200. ACM (2014)
Mundt, T., Dähn, A., Glock, H.W.: Forensic analysis of home automation systems. In: HotPETs (2014)
Möllers, F., Sorge, C.: Deducing user presence from inter-message intervals in home automation systems. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 369–383. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33630-5_25
Bergstrom, P., Driscoll, K., Kimball, J.: Making home automation communications secure. Computer 34(10), 50–56 (2001)
Bratus, S., Cornelius, C., Kotz, D., Peebles, D.: Active behavioral fingerprinting of wireless devices. In: Proceedings of WiSec 2008, pp. 56–61. ACM (2008)
Toledo, R.R., Danezis, G., Goldberg, I.: Lower-cost \({\upvarepsilon }\)-private information retrieval. Proc. Priv. Enhancing Technol. 4, 184–201 (2016)
Vogelgesang, S.: Datenspeicherung in modernen Fahrzeugen - wem “gehören” die im Fahrzeug gespeicherten Daten? juris - Die Monatszeitschrift 3(1), 2–8 (2016)
Fischer, T.: Strafgesetzbuch: StGB. 64 edn. C.H.BECK (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Möllers, F., Vogelgesang, S., Krüger, J., Echizen, I., Sorge, C. (2018). Modelling Traffic Analysis in Home Automation Systems. In: Capkun, S., Chow, S. (eds) Cryptology and Network Security. CANS 2017. Lecture Notes in Computer Science(), vol 11261. Springer, Cham. https://doi.org/10.1007/978-3-030-02641-7_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-02641-7_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02640-0
Online ISBN: 978-3-030-02641-7
eBook Packages: Computer ScienceComputer Science (R0)