TY - GEN
T1 - SniffMislead
T2 - 24th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2021
AU - Liu, Xuanyu
AU - Zeng, Qiang
AU - Du, Xiaojiang
AU - Valluru, Siva Likitha
AU - Fu, Chenglong
AU - Fu, Xiao
AU - Luo, Bin
N1 - Publisher Copyright:
© 2021 ACM.
PY - 2021/10/6
Y1 - 2021/10/6
N2 - With the booming deployment of smart homes, concerns about user privacy keep growing. Recent research has shown that encrypted wireless traffic of IoT devices can be exploited by packet-sniffing attacks to reveal users' privacy-sensitive information (e.g., the time when residents leave their home and go to work), which may be used to launch further attacks (e.g., a break-in). To address the growing concerns, we propose SniffMislead, a non-intrusive (i.e., without modifying IoT devices, hubs, or platforms) privacy-protecting approach, based on packet injection, against wireless packet sniffers. Instead of randomly injecting packets, which is ineffective against a smarter attacker, SniffMislead proposes the notion of phantom users, "people"who do not exist in the physical world. From an attacker's perspective, however, they are perceived as real users. SniffMislead places multiple phantom users in a smart home, which can effectively prevent an attacker from inferring useful information. We design a top-down approach to synthesize phantom users' behaviors, construct the sequence of decoy device events and commands, and then inject corresponding packets into the home. We show how SniffMislead ensures logical integrity and contextual consistency of injected packets, as well as how it makes a phantom user indistinguishable from a real user. Our evaluation results from a smart home testbed demonstrate that SniffMislead significantly reduces an attacker's privacy-inferring capabilities, bringing the accuracy from 94.8% down to 3.5%.
AB - With the booming deployment of smart homes, concerns about user privacy keep growing. Recent research has shown that encrypted wireless traffic of IoT devices can be exploited by packet-sniffing attacks to reveal users' privacy-sensitive information (e.g., the time when residents leave their home and go to work), which may be used to launch further attacks (e.g., a break-in). To address the growing concerns, we propose SniffMislead, a non-intrusive (i.e., without modifying IoT devices, hubs, or platforms) privacy-protecting approach, based on packet injection, against wireless packet sniffers. Instead of randomly injecting packets, which is ineffective against a smarter attacker, SniffMislead proposes the notion of phantom users, "people"who do not exist in the physical world. From an attacker's perspective, however, they are perceived as real users. SniffMislead places multiple phantom users in a smart home, which can effectively prevent an attacker from inferring useful information. We design a top-down approach to synthesize phantom users' behaviors, construct the sequence of decoy device events and commands, and then inject corresponding packets into the home. We show how SniffMislead ensures logical integrity and contextual consistency of injected packets, as well as how it makes a phantom user indistinguishable from a real user. Our evaluation results from a smart home testbed demonstrate that SniffMislead significantly reduces an attacker's privacy-inferring capabilities, bringing the accuracy from 94.8% down to 3.5%.
KW - IoT device
KW - Smart home
KW - packet-sniffing attack
KW - privacy
KW - wireless network
UR - http://www.scopus.com/inward/record.url?scp=85117711136&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85117711136&partnerID=8YFLogxK
U2 - 10.1145/3471621.3471856
DO - 10.1145/3471621.3471856
M3 - Conference contribution
AN - SCOPUS:85117711136
T3 - ACM International Conference Proceeding Series
SP - 33
EP - 47
BT - Proceedings of 2021 24th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2021
Y2 - 6 October 2021 through 8 October 2021
ER -