Skip to main content
Top

2016 | OriginalPaper | Chapter

Deducing User Presence from Inter-Message Intervals in Home Automation Systems

Authors : Frederik Möllers, Christoph Sorge

Published in: ICT Systems Security and Privacy Protection

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Privacy in Home Automation Systems is a topic of increasing importance, as the number of installed systems constantly grows. In this paper we investigate the ability of an outside observer to link sets of message timestamps together to predict user presence and absence. The question we try to answer is: If attacker Eve has captured 1 hour of traffic from victim Alice’s HAS and knows whether Alice was present at that time, can Eve deduce Alice’s state by capturing another hour of traffic? We apply different statistical tests and show that in certain situations, the attacker can infer the user’s presence state with absolute confidence.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
http://​www.​scipy.​org, accessed 2015-12-18.
 
2
http://​spon.​de/​aeDkn, accessed 2015-12-18.
 
Literature
1.
go back to reference Bagci, I.E., Roedig, U., Schulz, M., Hollick, M.: Gathering tamper evidence in Wi-Fi networks based on channel state information. In: Proceedings of ACM WiSec 2014, pp. 183–188. ACM, New York (2014) Bagci, I.E., Roedig, U., Schulz, M., Hollick, M.: Gathering tamper evidence in Wi-Fi networks based on channel state information. In: Proceedings of ACM WiSec 2014, pp. 183–188. ACM, New York (2014)
2.
go back to reference Bissias, G.D., Liberatore, M., Jensen, D., Levine, B.N.: Privacy vulnerabilities in encrypted HTTP streams. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 1–11. Springer, Heidelberg (2006)CrossRef Bissias, G.D., Liberatore, M., Jensen, D., Levine, B.N.: Privacy vulnerabilities in encrypted HTTP streams. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol. 3856, pp. 1–11. Springer, Heidelberg (2006)CrossRef
3.
go back to reference Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: Proceedings ACM MobiCom 2008, pp. 116–127. ACM, New York (2008) Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: Proceedings ACM MobiCom 2008, pp. 116–127. ACM, New York (2008)
4.
go back to reference Deng, J., Han, R., Mishra, S.: Counter measures against traffic analysis attacks in wireless sensor networks. In: Proceedings IEEE/CreateNet SecureComm 2005, pp. 113–126 (2005) Deng, J., Han, R., Mishra, S.: Counter measures against traffic analysis attacks in wireless sensor networks. In: Proceedings IEEE/CreateNet SecureComm 2005, pp. 113–126 (2005)
5.
go back to reference Denning, T., Kohno, T., Levy, H.M.: Computer security and the modern home. CACM 56(1), 94–103 (2013)CrossRef Denning, T., Kohno, T., Levy, H.M.: Computer security and the modern home. CACM 56(1), 94–103 (2013)CrossRef
6.
go back to reference Desmond, L.C.C., Yuan, C.C., Pheng, T.C., Lee, R.S.: Identifying unique devices through wireless fingerprinting. In: Proceedings ACM WiSec 2008. pp. 46–55. ACM, New York (2008) Desmond, L.C.C., Yuan, C.C., Pheng, T.C., Lee, R.S.: Identifying unique devices through wireless fingerprinting. In: Proceedings ACM WiSec 2008. pp. 46–55. ACM, New York (2008)
7.
go back to reference Fisher, R.A., Yates, F.: Statistical Tables for Biological, Agricultural and Medical Research, 6th edn. Oliver and Boyd, Edinburgh (1963)MATH Fisher, R.A., Yates, F.: Statistical Tables for Biological, Agricultural and Medical Research, 6th edn. Oliver and Boyd, Edinburgh (1963)MATH
8.
go back to reference Jacobsson, A., Boldt, M., Carlsson, B.: A risk analysis of a smart home automation system. Future Generation Computer Systems 56, 719–733 (2016)CrossRef Jacobsson, A., Boldt, M., Carlsson, B.: A risk analysis of a smart home automation system. Future Generation Computer Systems 56, 719–733 (2016)CrossRef
9.
go back to reference Kolmogorow, A.N.: Sulla determinazione empirica di una legge di distributione. Giornale dell’Istituto Italiano degli Attuari 4, 1–11 (1933) Kolmogorow, A.N.: Sulla determinazione empirica di una legge di distributione. Giornale dell’Istituto Italiano degli Attuari 4, 1–11 (1933)
10.
go back to reference Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Netw. 7(8), 1501–1514 (2009)CrossRef Li, N., Zhang, N., Das, S.K., Thuraisingham, B.: Privacy preservation in wireless sensor networks: A state-of-the-art survey. Ad Hoc Netw. 7(8), 1501–1514 (2009)CrossRef
11.
go back to reference Li, Y., Ren, J.: Source-location privacy through dynamic routing in wireless sensor networks. In: Proceedings IEEE INFOCOM, pp. 1–9 (2010) Li, Y., Ren, J.: Source-location privacy through dynamic routing in wireless sensor networks. In: Proceedings IEEE INFOCOM, pp. 1–9 (2010)
12.
go back to reference Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: Proceedings ACM SIGMETRICS 2005, pp. 50–60. ACM, New York (2005) Moore, A.W., Zuev, D.: Internet traffic classification using bayesian analysis techniques. In: Proceedings ACM SIGMETRICS 2005, pp. 50–60. ACM, New York (2005)
13.
go back to reference Mundt, T., Dähn, A., Glock, H.W.: Forensic analysis of home automation systems. In: HotPETs 2014 (2014) Mundt, T., Dähn, A., Glock, H.W.: Forensic analysis of home automation systems. In: HotPETs 2014 (2014)
14.
go back to reference Mundt, T., Kruger, F., Wollenberg, T.: Who refuses to wash hands? Privacy issues in modern house installation networks. In: IEEE BWCCA 2012, pp. 271–277 (2012) Mundt, T., Kruger, F., Wollenberg, T.: Who refuses to wash hands? Privacy issues in modern house installation networks. In: IEEE BWCCA 2012, pp. 271–277 (2012)
15.
go back to reference Pearson, K.: On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. In: Kotz, S., Johnson, N. (eds.) Breakthroughs in Statistics, pp. 11–28. Springer Series in Statistics, Springer New York (1992)CrossRef Pearson, K.: On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling. In: Kotz, S., Johnson, N. (eds.) Breakthroughs in Statistics, pp. 11–28. Springer Series in Statistics, Springer New York (1992)CrossRef
16.
go back to reference Möllers, F., Sorge, C.: Hausautomationssysteme im Datenschutzrecht. In: Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015, pp. 553–558. Österreichische Computer Gesellschaft, German (2015) Möllers, F., Sorge, C.: Hausautomationssysteme im Datenschutzrecht. In: Co-operation: Proceedings of the 18th Legal Informatics Symposium IRIS 2015, pp. 553–558. Österreichische Computer Gesellschaft, German (2015)
17.
go back to reference Möllers, F., Seitz, S., Hellmann, A., Sorge, C.: Extrapolation and prediction of user behaviour from wireless home automation communication. In: Proceedings of ACM WiSec 2014, pp. 195–200. ACM, New York (2014) Möllers, F., Seitz, S., Hellmann, A., Sorge, C.: Extrapolation and prediction of user behaviour from wireless home automation communication. In: Proceedings of ACM WiSec 2014, pp. 195–200. ACM, New York (2014)
18.
go back to reference Čeleda, P., Krejčí, R., Krmíček, V.: Flow-based security issue detection in building automation and control networks. In: Szabó, R., Vidács, A. (eds.) EUNICE 2012. LNCS, vol. 7479, pp. 64–75. Springer, Heidelberg (2012)CrossRef Čeleda, P., Krejčí, R., Krmíček, V.: Flow-based security issue detection in building automation and control networks. In: Szabó, R., Vidács, A. (eds.) EUNICE 2012. LNCS, vol. 7479, pp. 64–75. Springer, Heidelberg (2012)CrossRef
19.
go back to reference Wendzel, S., Kahler, B., Rist, T.: Covert channels and their prevention in building automation protocols: a prototype exemplified using bacnet. Proc. IEEE GreenCom 2012, 731–736 (2012) Wendzel, S., Kahler, B., Rist, T.: Covert channels and their prevention in building automation protocols: a prototype exemplified using bacnet. Proc. IEEE GreenCom 2012, 731–736 (2012)
20.
go back to reference Yao, L., Kang, L., Shang, P., Wu, G.: Protecting the sink location privacy in wireless sensor networks. Personal and Ubiquitous Comput. 17(5), 883–893 (2013)CrossRef Yao, L., Kang, L., Shang, P., Wu, G.: Protecting the sink location privacy in wireless sensor networks. Personal and Ubiquitous Comput. 17(5), 883–893 (2013)CrossRef
Metadata
Title
Deducing User Presence from Inter-Message Intervals in Home Automation Systems
Authors
Frederik Möllers
Christoph Sorge
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-33630-5_25

Premium Partner