Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic

N Apthorpe, D Reisman, S Sundaresan… - arXiv preprint arXiv …, 2017 - arxiv.org
transport layer encryption, smart home traffic metadata is sufficient for a passive network
adversary to infer sensitive in-homeprivacy from traffic analysis attacks on smart home devices? …

Attacking and protecting tunneled traffic of smart home devices

A Alshehri, J Granley, C Yue - … Data and Application Security and Privacy, 2020 - dl.acm.org
… Using a popular smart home traffic dataset, we demonstrate that our attack can achieve an …
Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. In CoRR, abs/…

Peek-a-boo: I see your smart home activities, even encrypted!

A Acar, H Fereidooni, T Abera, AK Sikder… - … on Security and Privacy …, 2020 - dl.acm.org
… , the wireless network traffic from smart home devices is open to the eavesdropping attacks. …
Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. arXiv …

Keeping the smart home private with smart (er) iot traffic shaping

N Apthorpe, DY Huang, D Reisman… - arXiv preprint arXiv …, 2018 - arxiv.org
attack on user privacy using metadata from smart home devices that is effective even when
devices use encryptiondefenses against traffic analysis attacks in terms of privacy protection, …

Preserving contextual privacy for smart home IoT devices with dynamic traffic shaping

J Brahma, D Sadhya - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
attacks, where a passive network observer can infer the private in-home activity of a user by
analyzing encrypted IoT traffic … , “Spying on the smart home: Privacy attacks and defenses on …

Your smart home can't keep a secret: Towards automated fingerprinting of iot traffic

S Dong, Z Li, D Tang, J Chen, M Sun… - … Communications Security, 2020 - dl.acm.org
… ’ privacy, even when they are protected by encryption and … As such, new privacy protection
methods on IoT traffic need to … Defense against traffic fingerprinting attack. Experimental re…

Your smart home can't keep a secret: Towards automated fingerprinting of iot traffic with neural networks

S Dong, Z Li, D Tang, J Chen, M Sun… - arXiv preprint arXiv …, 2019 - arxiv.org
encryption and traffic fusion. We believe more research should be done to better understand
the privacy issues in smart homeSpying on the Smart Home: Privacy Attacks and Defenses

Iotbeholder: A privacy snooping attack on user habitual behaviors from smart home wi-fi traffic

Q Zou, Q Li, R Li, Y Huang, G Tyson, J Xiao… - Proceedings of the ACM …, 2023 - dl.acm.org
… can more effectively leak the privacy of users’ behavior habits … the privacy threats introduced
by smart home devices. … use encrypted traffic to analyze user behavior in smart home

Your neighbor knows what you're doing: Defending smart home IoT device traffic from privacy LAN attacks

K Dziubinski, M Bandai - … and Network Applications: Proceedings of the …, 2020 - Springer
… Despite encrypting wireless communication traffic by … defense method to protect user privacy
in the smart home with … wireless communication range of the smart home. As future work, …

Detecting Smart Home Device Activities Using Packet-Level Signatures from Encrypted Traffic

MS Ahsan, MS Islam, MS Hossain… - … Dependable and Secure …, 2024 - ieeexplore.ieee.org
IoT device activities from real smart home network traffic logs. The experimental evaluations,
covering a diverse range of IoTSpying on the smart home: privacy attacks and defenses on …