Show simple item record

dc.contributor.authorZou, Q
dc.contributor.authorLi, Q
dc.contributor.authorLi, R
dc.contributor.authorHuang, Y
dc.contributor.authorTyson, G
dc.contributor.authorXiao, J
dc.contributor.authorJiang, Y
dc.date.accessioned2023-09-29T11:00:04Z
dc.date.available2023-09-29T11:00:04Z
dc.date.issued2023-03-28
dc.identifier.urihttps://qmro.qmul.ac.uk/xmlui/handle/123456789/91029
dc.description.abstractWith the deployment of a growing number of smart home IoT devices, privacy leakage has become a growing concern. Prior work on privacy-invasive device localization, classification, and activity identification have proven the existence of various privacy leakage risks in smart home environments. However, they only demonstrate limited threats in real world due to many impractical assumptions, such as having privileged access to the user's home network. In this paper, we identify a new end-to-end attack surface using IoTBeholder, a system that performs device localization, classification, and user activity identification. IoTBeholder can be easily run and replicated on commercial off-the-shelf (COTS) devices such as mobile phones or personal computers, enabling attackers to infer user's habitual behaviors from smart home Wi-Fi traffic alone. We set up a testbed with 23 IoT devices for evaluation in the real world. The result shows that IoTBeholder has good device classification and device activity identification performance. In addition, IoTBeholder can infer the users' habitual behaviors and automation rules with high accuracy and interpretability. It can even accurately predict the users' future actions, highlighting a significant threat to user privacy that IoT vendors and users should highly concern.en_US
dc.publisherAssociation for Computing Machineryen_US
dc.relation.ispartofProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
dc.rightsThis is a pre-copyedited, author-produced version accepted for publication in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies following peer review. The version of record is available at https://dl.acm.org/doi/10.1145/3580890
dc.titleIoTBeholder: A Privacy Snooping Attack on User Habitual Behaviors from Smart Home Wi-Fi Trafficen_US
dc.typeArticleen_US
dc.rights.holder© 2023 ACM
dc.identifier.doi10.1145/3580890
pubs.issue1en_US
pubs.notesNot knownen_US
pubs.publication-statusPublisheden_US
pubs.volume7en_US
rioxxterms.funderDefault funderen_US
rioxxterms.identifier.projectDefault projecten_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record