Abstract
In recent years, with the rapid development of the Internet of Things (IoT), the information technology has been widely used in smart home applications. On the other hand, smart home technology closely related to people’s privacy, which is not much considered by smart home vendors, making the privacy protection of smart home a hot research topic. Traditional encryption methods can ensure the security of the transmission process, but it can hardly resist the side channel attacks. Adversaries can analyze the radio frequency signals of wireless sensors and timestamp series to acquire the Activity of Daily Living (ADL). The most simple and efficient way to counter side channel attacks is to add noise into the transmitted data sequence. In this paper, we propose an improved method based on Logistic Regression (LR), which can be adapted to network status to protect the privacy of residents in smart home environments. Compared with other similar approaches, our method has the advantage of low energy consumption, low latency, strong adaptability and good effect of privacy protection.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Theoharidou, M., Tsalis, N., Gritzalis, D.: Smart Home Solutions: Privacy Issues. Handbook of Smart Homes, Health Care and Well-Being, pp. 1–14. Springer, Cham (2014)
Alami, A., Benhlima, L., Bah, S.: An overview of privacy preserving techniques in smart home wireless sensor networks. In: 10th International Conference on Intelligent Systems: Theories and Applications, pp. 1–4. IEEE Press, Rabat (2015)
Sanchez, I., Satta, R., Fovino, I.N., Baldini, G.: Privacy leakages in smart home wireless technologies. In: International Carnahan Conference on Security Technology, pp. 1–6. IEEE Press, Rome (2014)
Srinivasan, V., Stankovic, J., Whitehouse, K.: Protecting your daily in-home activity information from a wireless snooping attack. In: International Conference on Ubiquitous Computing, pp. 202–211. ACM Press, Seoul (2008)
Park, H., Park, T., Sang, H.S.: A comparative study of privacy protection methods for smart home environments. Int. J. Smart Home 7, 1–12 (2013)
Park, H., Basaran, C., Park, T., Son, S.H.: Energy-efficient privacy protection for smart home environments using behavioral semantics. J. Sens. 14, 16235–16257 (2014)
Yang, Y., Shao, M., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. In: 27th Conference on Computer Communications. pp. 51–55. IEEE INFOCOM, Phoenix (2008)
Van Kasteren, T., Noulas, A., Englebienne, G.: Accurate activity recognition in a home setting. In: International Conference on Ubiquitous Computing, pp. 1–9. ACM Press, Seoul (2008)
Song, Y., Cai, Q., Nie, F., Zhang, C.: Semi-supervised additive logistic regression: a gradient descent solution. J. Tsinghua Sci. Technol. 12, 638–646 (2007)
Acknowledgement
The work in this paper has been supported by Beijing Natural Science Foundation (4142008), National Nature Science Foundation of China (61272500) and National High-tech R&D Program (863 Program) (2015AA017204).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
He, J., Xiao, Q., Pathan, M.S. (2018). A Method for Countering Snooping-Based Side Channel Attacks in Smart Home Applications. In: Chen, Q., Meng, W., Zhao, L. (eds) Communications and Networking. ChinaCom 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 209. Springer, Cham. https://doi.org/10.1007/978-3-319-66625-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-66625-9_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-66624-2
Online ISBN: 978-3-319-66625-9
eBook Packages: Computer ScienceComputer Science (R0)