Skip to main content

Modelling Traffic Analysis in Home Automation Systems

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11261))

Abstract

The threat of attacks on Home Automation Systems (HASs) is increasing. Research has shown that passive adversaries can detect user habits and interactions. Despite encryption and other measures becoming a standard, traffic analysis remains an unsolved problem. In this paper, we show that existing solutions from different research areas cannot be applied to this scenario. We establish a model for traffic analysis in Home Automation Systems which allows the analysis and comparison of attacks and countermeasures. We also take a look at legal aspects, highlighting problem areas and recent developments.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    This especially holds for questions regarding data retention.

  2. 2.

    https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures, last accessed 10 July 2017.

References

  1. Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36(10), 103–105 (2003)

    Article  Google Scholar 

  2. Conti, M., Willemsen, J., Crispo, B.: Providing source location privacy in wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 15(3), 1238–1280 (2013)

    Article  Google Scholar 

  3. Matos, A., Aguiar, R.L., Girao, J., Armknecht, F.: Toward dependable networking: secure location and privacy at the link layer. IEEE Wirel. Commun. 15(5), 30–36 (2008)

    Article  Google Scholar 

  4. Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: Proceedings of WiSec 2008, pp. 77–88. ACM (2008)

    Google Scholar 

  5. Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. ACM TOSN 9(3), 34:1–34:23 (2008)

    Google Scholar 

  6. Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-mixes: untraceable communication with very small bandwidth overhead. In: Effelsberg, W., Meuer, H.W., Müller, G. (eds.) Kommunikation in verteilten Systemen. Informatik-Fachberichte, vol. 267, pp. 451–463. Springer, Heidelberg (1991). https://doi.org/10.1007/978-3-642-76462-2_32

    Chapter  Google Scholar 

  7. Levine, B.N., Reiter, M.K., Wang, C., Wright, M.: Timing attacks in low-latency mix systems. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 251–265. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-27809-2_25

    Chapter  Google Scholar 

  8. Shmatikov, V., Wang, M.-H.: Timing analysis in low-latency mix networks: attacks and defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 18–33. Springer, Heidelberg (2006). https://doi.org/10.1007/11863908_2

    Chapter  Google Scholar 

  9. Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). https://doi.org/10.1007/11787006_1

    Chapter  Google Scholar 

  10. Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: Proceedings of ACM STOC 2010, pp. 715–724. ACM (2010)

    Google Scholar 

  11. Bash, B.A., Goeckel, D., Guha, S., Towsley, D.: Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12), 26–31 (2015)

    Article  Google Scholar 

  12. Möllers, F., Seitz, S., Hellmann, A., Sorge, C.: Extrapolation and prediction of user behaviour from wireless home automation communication. In: Proceedings of WiSec 2014, pp. 195–200. ACM (2014)

    Google Scholar 

  13. Mundt, T., Dähn, A., Glock, H.W.: Forensic analysis of home automation systems. In: HotPETs (2014)

    Google Scholar 

  14. Möllers, F., Sorge, C.: Deducing user presence from inter-message intervals in home automation systems. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 369–383. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33630-5_25

    Chapter  Google Scholar 

  15. Bergstrom, P., Driscoll, K., Kimball, J.: Making home automation communications secure. Computer 34(10), 50–56 (2001)

    Article  Google Scholar 

  16. Bratus, S., Cornelius, C., Kotz, D., Peebles, D.: Active behavioral fingerprinting of wireless devices. In: Proceedings of WiSec 2008, pp. 56–61. ACM (2008)

    Google Scholar 

  17. Toledo, R.R., Danezis, G., Goldberg, I.: Lower-cost \({\upvarepsilon }\)-private information retrieval. Proc. Priv. Enhancing Technol. 4, 184–201 (2016)

    Article  Google Scholar 

  18. Vogelgesang, S.: Datenspeicherung in modernen Fahrzeugen - wem “gehören” die im Fahrzeug gespeicherten Daten? juris - Die Monatszeitschrift 3(1), 2–8 (2016)

    Google Scholar 

  19. Fischer, T.: Strafgesetzbuch: StGB. 64 edn. C.H.BECK (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Frederik Möllers .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Möllers, F., Vogelgesang, S., Krüger, J., Echizen, I., Sorge, C. (2018). Modelling Traffic Analysis in Home Automation Systems. In: Capkun, S., Chow, S. (eds) Cryptology and Network Security. CANS 2017. Lecture Notes in Computer Science(), vol 11261. Springer, Cham. https://doi.org/10.1007/978-3-030-02641-7_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02641-7_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02640-0

  • Online ISBN: 978-3-030-02641-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics