Energy-Efficient Dummy Traffic Generation for Home Automation Systems

Frederik Möllers 1
  • 1 Saarland University,

Abstract

Home and Building Automation Systems are becoming more and more popular these days. While they increase the comfort of living, they may also leak private information such as user presence to passive observers. In this paper we investigate approaches for the generation of dummy traffic in Home Automation Systems (HASs).We discuss fundamental requirements and their impact as well as two concrete dummy traffic generation algorithms.We measure the impact of Constant- Rate Dummy Traffic (CRDT) on the responsiveness and energy efficiency of Home Automation Systems. As an alternative, we present the Naive Exponential Dummies (NED) generation scheme in which the balance between privacy guarantees and energy efficiency can be arbitrarily moved. We formally prove its privacy guarantees and evaluate it against realistic sample data.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] Noah Apthorpe, Danny Yuxing Huang, Dillon Reisman, Arvind Narayanan, and Nick Feamster. Keeping the Smart Home Private with Smart (er) IoT Traffic Shaping.

  • [2] Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, and Francesco Regazzoni. Midori: A Block Cipher for Low Energy. In Tetsu Iwata and Jung Hee Cheon, editors, Advances in Cryptology – ASIACRYPT 2015. ASIACRYPT 2015, pages 411–436. Springer, Berlin, Heidelberg, nov 2015.

  • [3] Calum Benson, Adam Elman, and Seth Nickell. GNOME Human Interface Guidelines 2.2.3, 2012.

  • [4] Xiang Cai, Xin Cheng Zhang, Brijesh Joshi, and Rob Johnson. Touching from a Distance: Website Fingerprinting Attacksand Defenses. In Proceedings of the 2012 ACM conference on Computer and communications security - CCS ’12, page 605, New York, New York, USA, 2012. ACM Press.

  • [5] Haowen Chan and Adrian Perrig. Security and privacy in sensor networks. Computer, 36(10):103–105, oct 2003.

  • [6] Mauro Conti, Jeroen Willemsen, and Bruno Crispo. Providing Source Location Privacy in Wireless Sensor Networks: A Survey. IEEE Communications Surveys & Tutorials, 15(3):1238–1280, 2013.

  • [7] Bogdan Copos, Karl Levitt, Matt Bishop, and Jeff Rowe. Is Anybody Home? Inferring Activity From Smart Home Network Traffic. In 2016 IEEE Security and Privacy Workshops (SPW), pages 245–251. IEEE, may 2016.

  • [8] Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate. Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. In Proceedings - IEEE Symposium on Security and Privacy, 2018.

  • [9] Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: The second-generation onion router. Technical report, DTIC Document, 2004.

  • [10] Laura Marie Feeney and Martin Nilsson. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In Proceedings IEEE INFOCOM 2001 – Conference on Computer Communications – Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, volume 3, pages 1548–1557, Anchorage, Alaska, 2001. IEEE.

  • [11] Ben Greenstein, Tadayoshi Kohno, Damon McCoy, Srinivasan Seshan, Jeffrey Pang, and David Wetherall. Improving wireless privacy with an identifier-free link layer protocol. In MobiSys’08 - Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services, 2008.

  • [12] Csaba Kiraly, Simone Teofili, Giuseppe Bianchi, Renato Lo Cigno, Matteo Nardelli, and Emanuele Delzeri. Traffic Flow Confidentiality in IPsec: Protocol and Implementation. In The Future of Identity in the Information Society, pages 311–324. Springer US, Boston, MA, 2008.

  • [13] Patrick Leu, Aanjhan Ranganathan, Ivan Puddu, and Srdjan Capkun. I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks. In Proceedings of the 11th ACM Conference on Security \& Privacy in Wireless and Mobile Networks, pages 23–33, 2018.

  • [14] Alfredo Matos, Rui L. Aguiar, João Girao, and Frederik Armnecht. Toward dependable networking: secure location and privacy at the link layer. IEEE Wireless Communications, 15(5):30–36, oct 2008.

  • [15] Robert B. Miller. Response time in man-computer conversational transactions. In Proceedings of the December 9-11, 1968, fall joint computer conference, part I, pages 267–277, San Francisco, 1968. ACM New York.

  • [16] Frederik Möllers, Sebastian Seitz, Andreas Hellmann, and Christoph Sorge. Extrapolation and Prediction of User Behaviour from Wireless Home Automation Communication. In Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless & Mobile Networks - WiSec ’14, pages 195–200, New York, New York, jul 2014. ACM Press.

  • [17] Frederik Möllers and Christoph Sorge. Deducing User Presence from Inter-Message Intervals in Home Automation Systems. In Jaap-Henk Hoepman and Stefan Katzenbeisser, editors, ICT Systems Security and Privacy Protection: 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings, pages 369–383, Cham, 2016. Springer International Publishing.

  • [18] Frederik Möllers, Stephanie Vogelgesang, Jochen Krüger, Isao Echizen, and Christoph Sorge. Modelling Traffic Analysis in Home Automation Systems. In Srdjan Capkun and Sherman S. M. Chow, editors, Cryptology and Network Security: 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papers, pages 526–536. Springer International Publishing, 2017.

  • [19] Thomas Mundt, Andreas Dähn, and Hans-Walter Glock. Forensic analysis of home automation systems. In 7th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2014), 2014.

  • [20] Jakob Nielsen. Usability engineering. Morgan Kaufmann, 1 edition, 1993.

  • [21] Simon Oya, Carmela Troncoso, and Fernando Pérez-González. Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications. In Emiliano De Cristofaro and StevenJ. Murdoch, editors, Privacy Enhancing Technologies SE - 11, volume 8555 of Lecture Notes in Computer Science, pages 204–223. Springer International Publishing, 2014.

  • [22] Andriy Panchenko, Lukas Niessen, Andreas Zinnen, and Thomas Engel. Website Fingerprinting in Onion Routing BasedAnonymization Networks. In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society - WPES ’11, page 103, New York, New York, USA, 2011. ACM Press.

  • [23] Andreas Pfitzmann, Birgit Pfitzmann, and Michael Waidner. ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead. In Wolfgang Effelsberg, Hans W. Meuer, and Günter Müller, editors, Kommunikation in verteilten Systemen – Grundlagen, Anwendungen, Betrieb GI/ITG-Fachtagung, Mannheim, 20.–22. Februar 1991, Proceedings, volume 267 of Informatik-Fachberichte, pages 451–463. Springer-Verlag Berlin Heidelberg, 1991.

  • [24] Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis. The Loopix Anonymity System. In Proceedings of the 26th USENIX Security Symposium, pages 1199–1216, Vancouver, BC, Canada, 2017. USENIX Association.

  • [25] Joseph Polastre, Robert Szewczyk, and David Culler. Telos: enabling ultra-low power wireless research. In IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005., pages 364–369, Boise, ID, 2005. IEEE.

  • [26] Min Shao, Yi Yang, Sencun Zhu, and Guohong Cao. Towards Statistically Strong Source Anonymity for Sensor Networks. ACM Transactions on Sensor Networks (TOSN), 9(3):34:1–34:23, apr 2008.

  • [27] Vitaly Shmatikov and Ming-Hsiu Wang. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. In Dieter Gollmann, Jan Meier, and Andrei Sabelfeld, editors, Computer Security – ESORICS 2006 – 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, volume 4189 of Security and Cryptology, pages 18–33, Hamburg, 2006. Springer-Verlag Berlin Heidelberg.

  • [28] Raphael R. Toledo, George Danezis, and Ian Goldberg. Lower-Cost ɛ-Private Information Retrieval. Proceedings on Privacy Enhancing Technologies, 2016(4):184–201, 2016.

  • [29] Tijs van Dam and Koen Langendoen. An Adaptive Energyefficient MAC Protocol for Wireless Sensor Networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, pages 171–180, Los Angeles, California, 2003. ACM.

  • [30] Arvinderpal S. Wander, Nils Gura, Hans Eberle, Vipul Gupta, and Sheueling Chang Shantz. Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. In Third IEEE International Conference on Pervasive Computing and Communications, pages 324–328. IEEE, 2005.

  • [31] Yi Yang, Min Shao, Sencun Zhu, Bhuvan Urgaonkar, and Guohong Cao. Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks. In Proceedings of the first ACM conference on Wireless network security - WiSec ’08, pages 77–88, New York, New York, 2008. ACM Press.

OPEN ACCESS

Journal + Issues

Search