Skip to main content
Erschienen in:
Buchtitelbild

2023 | OriginalPaper | Buchkapitel

1. Introduction

verfasst von : Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen

Erschienen in: Security in Smart Home Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The smart home network, as a typical IoT application, is becoming a popular lifestyle and has been widely deployed. In this chapter, we first introduce the smart home components following the logic of “terminal device—user interface—application platform.” Then, we elaborate on the security and privacy challenges of each component of the smart home network. Finally, we summarize the key research problems studied in this monograph.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
6.
Zurück zum Zitat Blue, L., Vargas, L., Traynor, P.: Hello, is it me you’re looking for? Differentiating between human and electronic speakers for voice interface security. In: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 123–133. ACM (2018) Blue, L., Vargas, L., Traynor, P.: Hello, is it me you’re looking for? Differentiating between human and electronic speakers for voice interface security. In: Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp. 123–133. ACM (2018)
7.
Zurück zum Zitat Carlini, N., Mishra, P., Vaidya, T., Zhang, Y., Sherr, M., Shields, C., Wagner, D., Zhou, W.: Hidden voice commands. In: Proceedings of USENIX Security Symposium (USENIX Security), pp. 513–530 (2016) Carlini, N., Mishra, P., Vaidya, T., Zhang, Y., Sherr, M., Shields, C., Wagner, D., Zhou, W.: Hidden voice commands. In: Proceedings of USENIX Security Symposium (USENIX Security), pp. 513–530 (2016)
9.
Zurück zum Zitat Chen, S., Ren, K., Piao, S., Wang, C., Wang, Q., Weng, J., Su, L., Mohaisen, A.: You can hear but you cannot steal: Defending against voice impersonation attacks on smartphones. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 183–195 (2017). https://doi.org/10.1109/ICDCS.2017.133 Chen, S., Ren, K., Piao, S., Wang, C., Wang, Q., Weng, J., Su, L., Mohaisen, A.: You can hear but you cannot steal: Defending against voice impersonation attacks on smartphones. In: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), pp. 183–195 (2017). https://​doi.​org/​10.​1109/​ICDCS.​2017.​133
10.
Zurück zum Zitat Chen, Y., Sun, J., Jin, X., Li, T., Zhang, R., Zhang, Y.: Your face your heart: secure mobile face authentication with photoplethysmograms. In: Proceedings of IEEE Conference on Computer Communications (INFOCOM), pp. 1–9 (2017) Chen, Y., Sun, J., Jin, X., Li, T., Zhang, R., Zhang, Y.: Your face your heart: secure mobile face authentication with photoplethysmograms. In: Proceedings of IEEE Conference on Computer Communications (INFOCOM), pp. 1–9 (2017)
11.
Zurück zum Zitat Choi, K., Son, Y., Noh, J., Shin, H., Choi, J., Kim, Y.: Dissecting customized protocols: automatic analysis for customized protocols based on IEEE 802.15.4. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec ’16, pp. 183–193. ACM, New York (2016). https://doi.org/10.1145/2939918.2939921 Choi, K., Son, Y., Noh, J., Shin, H., Choi, J., Kim, Y.: Dissecting customized protocols: automatic analysis for customized protocols based on IEEE 802.15.4. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec ’16, pp. 183–193. ACM, New York (2016). https://​doi.​org/​10.​1145/​2939918.​2939921
12.
Zurück zum Zitat Diao, W., Liu, X., Zhou, Z., Zhang, K.: Your voice assistant is mine: how to abuse speakers to steal information and control your phone. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (SPSM), pp. 63–74 (2014). https://doi.org/10.1145/2666620.2666623 Diao, W., Liu, X., Zhou, Z., Zhang, K.: Your voice assistant is mine: how to abuse speakers to steal information and control your phone. In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (SPSM), pp. 63–74 (2014). https://​doi.​org/​10.​1145/​2666620.​2666623
15.
Zurück zum Zitat Fernandes, E., Paupore, J., Rahmati, A., Simionato, D., Conti, M., Prakash, A.: FlowFence: Practical data protection for emerging IoT application frameworks. In: USENIX Security Symposium (USENIX Security) (2016) Fernandes, E., Paupore, J., Rahmati, A., Simionato, D., Conti, M., Prakash, A.: FlowFence: Practical data protection for emerging IoT application frameworks. In: USENIX Security Symposium (USENIX Security) (2016)
16.
Zurück zum Zitat Jia, Y.J., Chen, Q.A., Wang, S., Rahmati, A., Fernandes, E., Mao, Z.M., Prakash, A.: ContexIoT: Towards providing contextual integrity to appified IoT platforms. In: The Network and Distributed System Security Symposium (NDSS) (2017) Jia, Y.J., Chen, Q.A., Wang, S., Rahmati, A., Fernandes, E., Mao, Z.M., Prakash, A.: ContexIoT: Towards providing contextual integrity to appified IoT platforms. In: The Network and Distributed System Security Symposium (NDSS) (2017)
17.
Zurück zum Zitat Li, H., Xu, Z., Zhu, H., Ma, D., Li, S., Xing, K.: Demographics inference through wi-fi network traffic analysis. In: IEEE International Conference on Computer Communications (INFOCOM) (2016) Li, H., Xu, Z., Zhu, H., Ma, D., Li, S., Xing, K.: Demographics inference through wi-fi network traffic analysis. In: IEEE International Conference on Computer Communications (INFOCOM) (2016)
19.
Zurück zum Zitat Ma, D., Lan, G., Hassan, M., Hu, W., Upama, M.B., Uddin, A., Youssef, M.: Solargest: Ubiquitous and battery-free gesture recognition using solar cells. In: The 25th Annual International Conference on Mobile Computing and Networking, MobiCom ’19. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3300061.3300129 Ma, D., Lan, G., Hassan, M., Hu, W., Upama, M.B., Uddin, A., Youssef, M.: Solargest: Ubiquitous and battery-free gesture recognition using solar cells. In: The 25th Annual International Conference on Mobile Computing and Networking, MobiCom ’19. Association for Computing Machinery, New York (2019). https://​doi.​org/​10.​1145/​3300061.​3300129
22.
Zurück zum Zitat Panchenko, A., Lanze, F., Pennekamp, J., Engel, T., Zinnen, A., Henze, M., Wehrle, K.: Website fingerprinting at internet scale. In: NDSS (2016) Panchenko, A., Lanze, F., Pennekamp, J., Engel, T., Zinnen, A., Henze, M., Wehrle, K.: Website fingerprinting at internet scale. In: NDSS (2016)
24.
Zurück zum Zitat Roy, N., Hassanieh, H., Roy Choudhury, R.: Backdoor: Making microphones hear inaudible sounds. In: Proceedings of the 15th ACM Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 2–14 (2017). https://doi.org/10.1145/3081333.3081366 Roy, N., Hassanieh, H., Roy Choudhury, R.: Backdoor: Making microphones hear inaudible sounds. In: Proceedings of the 15th ACM Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 2–14 (2017). https://​doi.​org/​10.​1145/​3081333.​3081366
26.
Zurück zum Zitat Shiota, S., Villavicencio, F., Yamagishi, J., Ono, N., Echizen, I., Matsui, T.: Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification. In: Sixteenth Annual Conference of the International Speech Communication Association (2015) Shiota, S., Villavicencio, F., Yamagishi, J., Ono, N., Echizen, I., Matsui, T.: Voice liveness detection algorithms based on pop noise caused by human breath for automatic speaker verification. In: Sixteenth Annual Conference of the International Speech Communication Association (2015)
27.
Zurück zum Zitat Tian, Y., Zhang, N., Lin, Y.H., Wang, X., Ur, B., Guo, X., Tague, P.: SmartAuth: user-centered authorization for the internet of things. In: USENIX Security Symposium (USENIX Security) (2017) Tian, Y., Zhang, N., Lin, Y.H., Wang, X., Ur, B., Guo, X., Tague, P.: SmartAuth: user-centered authorization for the internet of things. In: USENIX Security Symposium (USENIX Security) (2017)
29.
Zurück zum Zitat Wang, Q., Lin, X., Zhou, M., Chen, Y., Wang, C., Li, Q., Luo, X.: VoicePop: a pop noise based anti-spoofing system for voice authentication on smartphones. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 2062–2070. IEEE (2019) Wang, Q., Lin, X., Zhou, M., Chen, Y., Wang, C., Li, Q., Luo, X.: VoicePop: a pop noise based anti-spoofing system for voice authentication on smartphones. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 2062–2070. IEEE (2019)
30.
Zurück zum Zitat Wang, S., Cao, J., He, X., Sun, K., Li, Q.: When the differences in frequency domain are compensated: Understanding and defeating modulated replay attacks on automatic speech recognition. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, CCS ’20, pp. 1103–1119. Association for Computing Machinery (2020). https://doi.org/10.1145/3372297.3417254 Wang, S., Cao, J., He, X., Sun, K., Li, Q.: When the differences in frequency domain are compensated: Understanding and defeating modulated replay attacks on automatic speech recognition. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, CCS ’20, pp. 1103–1119. Association for Computing Machinery (2020). https://​doi.​org/​10.​1145/​3372297.​3417254
31.
Zurück zum Zitat Wang, W., Liu, A.X., Shahzad, M., Ling, K., Lu, S.: Understanding and modeling of WiFi signal based human activity recognition. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, pp. 65–76 (2015) Wang, W., Liu, A.X., Shahzad, M., Ling, K., Lu, S.: Understanding and modeling of WiFi signal based human activity recognition. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, pp. 65–76 (2015)
32.
Zurück zum Zitat Yan, C., Long, Y., Ji, X., Xu, W.: The catcher in the field: a fieldprint based spoofing detection for text-independent speaker verification. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS ’19, pp. 1215–1229. Association for Computing Machinery (2019). https://doi.org/10.1145/3319535.3354248 Yan, C., Long, Y., Ji, X., Xu, W.: The catcher in the field: a fieldprint based spoofing detection for text-independent speaker verification. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS ’19, pp. 1215–1229. Association for Computing Machinery (2019). https://​doi.​org/​10.​1145/​3319535.​3354248
34.
36.
Zurück zum Zitat Zhang, L., Tan, S., Yang, J.: Hearing your voice is not enough: an articulatory gesture based liveness detection for voice authentication. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 57–71 (2017). https://doi.org/10.1145/3133956.3133962 Zhang, L., Tan, S., Yang, J.: Hearing your voice is not enough: an articulatory gesture based liveness detection for voice authentication. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 57–71 (2017). https://​doi.​org/​10.​1145/​3133956.​3133962
Metadaten
Titel
Introduction
verfasst von
Yan Meng
Haojin Zhu
Xuemin (Sherman) Shen
Copyright-Jahr
2023
DOI
https://doi.org/10.1007/978-3-031-24185-7_1

Neuer Inhalt