Skip to main content
Top

2018 | OriginalPaper | Chapter

Modelling Traffic Analysis in Home Automation Systems

Authors : Frederik Möllers, Stephanie Vogelgesang, Jochen Krüger, Isao Echizen, Christoph Sorge

Published in: Cryptology and Network Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The threat of attacks on Home Automation Systems (HASs) is increasing. Research has shown that passive adversaries can detect user habits and interactions. Despite encryption and other measures becoming a standard, traffic analysis remains an unsolved problem. In this paper, we show that existing solutions from different research areas cannot be applied to this scenario. We establish a model for traffic analysis in Home Automation Systems which allows the analysis and comparison of attacks and countermeasures. We also take a look at legal aspects, highlighting problem areas and recent developments.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
This especially holds for questions regarding data retention.
 
Literature
1.
go back to reference Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36(10), 103–105 (2003)CrossRef Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36(10), 103–105 (2003)CrossRef
2.
go back to reference Conti, M., Willemsen, J., Crispo, B.: Providing source location privacy in wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 15(3), 1238–1280 (2013)CrossRef Conti, M., Willemsen, J., Crispo, B.: Providing source location privacy in wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials 15(3), 1238–1280 (2013)CrossRef
3.
go back to reference Matos, A., Aguiar, R.L., Girao, J., Armknecht, F.: Toward dependable networking: secure location and privacy at the link layer. IEEE Wirel. Commun. 15(5), 30–36 (2008)CrossRef Matos, A., Aguiar, R.L., Girao, J., Armknecht, F.: Toward dependable networking: secure location and privacy at the link layer. IEEE Wirel. Commun. 15(5), 30–36 (2008)CrossRef
4.
go back to reference Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: Proceedings of WiSec 2008, pp. 77–88. ACM (2008) Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In: Proceedings of WiSec 2008, pp. 77–88. ACM (2008)
5.
go back to reference Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. ACM TOSN 9(3), 34:1–34:23 (2008) Shao, M., Yang, Y., Zhu, S., Cao, G.: Towards statistically strong source anonymity for sensor networks. ACM TOSN 9(3), 34:1–34:23 (2008)
6.
10.
go back to reference Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: Proceedings of ACM STOC 2010, pp. 715–724. ACM (2010) Dwork, C., Naor, M., Pitassi, T., Rothblum, G.N.: Differential privacy under continual observation. In: Proceedings of ACM STOC 2010, pp. 715–724. ACM (2010)
11.
go back to reference Bash, B.A., Goeckel, D., Guha, S., Towsley, D.: Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12), 26–31 (2015)CrossRef Bash, B.A., Goeckel, D., Guha, S., Towsley, D.: Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12), 26–31 (2015)CrossRef
12.
go back to reference Möllers, F., Seitz, S., Hellmann, A., Sorge, C.: Extrapolation and prediction of user behaviour from wireless home automation communication. In: Proceedings of WiSec 2014, pp. 195–200. ACM (2014) Möllers, F., Seitz, S., Hellmann, A., Sorge, C.: Extrapolation and prediction of user behaviour from wireless home automation communication. In: Proceedings of WiSec 2014, pp. 195–200. ACM (2014)
13.
go back to reference Mundt, T., Dähn, A., Glock, H.W.: Forensic analysis of home automation systems. In: HotPETs (2014) Mundt, T., Dähn, A., Glock, H.W.: Forensic analysis of home automation systems. In: HotPETs (2014)
15.
go back to reference Bergstrom, P., Driscoll, K., Kimball, J.: Making home automation communications secure. Computer 34(10), 50–56 (2001)CrossRef Bergstrom, P., Driscoll, K., Kimball, J.: Making home automation communications secure. Computer 34(10), 50–56 (2001)CrossRef
16.
go back to reference Bratus, S., Cornelius, C., Kotz, D., Peebles, D.: Active behavioral fingerprinting of wireless devices. In: Proceedings of WiSec 2008, pp. 56–61. ACM (2008) Bratus, S., Cornelius, C., Kotz, D., Peebles, D.: Active behavioral fingerprinting of wireless devices. In: Proceedings of WiSec 2008, pp. 56–61. ACM (2008)
17.
go back to reference Toledo, R.R., Danezis, G., Goldberg, I.: Lower-cost \({\upvarepsilon }\)-private information retrieval. Proc. Priv. Enhancing Technol. 4, 184–201 (2016)CrossRef Toledo, R.R., Danezis, G., Goldberg, I.: Lower-cost \({\upvarepsilon }\)-private information retrieval. Proc. Priv. Enhancing Technol. 4, 184–201 (2016)CrossRef
18.
go back to reference Vogelgesang, S.: Datenspeicherung in modernen Fahrzeugen - wem “gehören” die im Fahrzeug gespeicherten Daten? juris - Die Monatszeitschrift 3(1), 2–8 (2016) Vogelgesang, S.: Datenspeicherung in modernen Fahrzeugen - wem “gehören” die im Fahrzeug gespeicherten Daten? juris - Die Monatszeitschrift 3(1), 2–8 (2016)
19.
go back to reference Fischer, T.: Strafgesetzbuch: StGB. 64 edn. C.H.BECK (2017) Fischer, T.: Strafgesetzbuch: StGB. 64 edn. C.H.BECK (2017)
Metadata
Title
Modelling Traffic Analysis in Home Automation Systems
Authors
Frederik Möllers
Stephanie Vogelgesang
Jochen Krüger
Isao Echizen
Christoph Sorge
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-02641-7_27

Premium Partner