Abstract
The threat of attacks on Home Automation Systems (HASs) is increasing. Research has shown that passive adversaries can detect user habits and interactions. Despite encryption and other measures becoming a standard, traffic analysis remains an unsolved problem. In this paper, we show that existing solutions from different research areas cannot be applied to this scenario. We establish a model for traffic analysis in Home Automation Systems which allows the analysis and comparison of attacks and countermeasures. We also take a look at legal aspects, highlighting problem areas and recent developments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
This especially holds for questions regarding data retention.
- 2.
https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures, last accessed 10 July 2017.
References
Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36(10), 103–105 (2003)
Conti, M., Willemsen, J., Crispo, B.: Providing source location privacy in wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 15(3), 1238–1280 (2013)
Matos, A., Aguiar, R.L., Girao, J., Armknecht, F.: Toward dependable networking: secure location and privacy at the link layer. IEEE Wirel. Commun. 15(5), 30–36 (2008)
Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: Proceedings of WiSec 2008, pp. 77–88. ACM (2008)
Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. ACM TOSN 9(3), 34:1–34:23 (2008)
Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-mixes: untraceable communication with very small bandwidth overhead. In: Effelsberg, W., Meuer, H.W., Müller, G. (eds.) Kommunikation in verteilten Systemen. Informatik-Fachberichte, vol. 267, pp. 451–463. Springer, Heidelberg (1991). https://doi.org/10.1007/978-3-642-76462-2_32
Levine, B.N., Reiter, M.K., Wang, C., Wright, M.: Timing attacks in low-latency mix systems. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 251–265. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-27809-2_25
Shmatikov, V., Wang, M.-H.: Timing analysis in low-latency mix networks: attacks and defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 18–33. Springer, Heidelberg (2006). https://doi.org/10.1007/11863908_2
Dwork, C.: Differential Privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006). https://doi.org/10.1007/11787006_1
Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: Proceedings of ACM STOC 2010, pp. 715–724. ACM (2010)
Bash, B.A., Goeckel, D., Guha, S., Towsley, D.: Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12), 26–31 (2015)
Möllers, F., Seitz, S., Hellmann, A., Sorge, C.: Extrapolation and prediction of user behaviour from wireless home automation communication. In: Proceedings of WiSec 2014, pp. 195–200. ACM (2014)
Mundt, T., Dähn, A., Glock, H.W.: Forensic analysis of home automation systems. In: HotPETs (2014)
Möllers, F., Sorge, C.: Deducing user presence from inter-message intervals in home automation systems. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 369–383. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33630-5_25
Bergstrom, P., Driscoll, K., Kimball, J.: Making home automation communications secure. Computer 34(10), 50–56 (2001)
Bratus, S., Cornelius, C., Kotz, D., Peebles, D.: Active behavioral fingerprinting of wireless devices. In: Proceedings of WiSec 2008, pp. 56–61. ACM (2008)
Toledo, R.R., Danezis, G., Goldberg, I.: Lower-cost \({\upvarepsilon }\)-private information retrieval. Proc. Priv. Enhancing Technol. 4, 184–201 (2016)
Vogelgesang, S.: Datenspeicherung in modernen Fahrzeugen - wem “gehören” die im Fahrzeug gespeicherten Daten? juris - Die Monatszeitschrift 3(1), 2–8 (2016)
Fischer, T.: Strafgesetzbuch: StGB. 64 edn. C.H.BECK (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Möllers, F., Vogelgesang, S., Krüger, J., Echizen, I., Sorge, C. (2018). Modelling Traffic Analysis in Home Automation Systems. In: Capkun, S., Chow, S. (eds) Cryptology and Network Security. CANS 2017. Lecture Notes in Computer Science(), vol 11261. Springer, Cham. https://doi.org/10.1007/978-3-030-02641-7_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-02641-7_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02640-0
Online ISBN: 978-3-030-02641-7
eBook Packages: Computer ScienceComputer Science (R0)