An Analysis of Home IoT Network Traffic and Behaviour
2018, ArXiv
Abstract
Internet-connected devices are increasingly present in our homes, and privacy breaches, data thefts, and security threats are becoming commonplace. In order to avoid these, we must first understand the behaviour of these devices. In this work, we analyse network traces from a testbed of common IoT devices, and describe general methods for fingerprinting their behavior. We then use the information and insights derived from this data to assess where privacy and security risks manifest themselves, as well as how device behavior affects bandwidth. We demonstrate simple measures that circumvent attempts at securing devices and protecting privacy.
References (10)
- M. Vanhoef and F. Piessens, "Key reinstallation attacks: Forcing nonce reuse in wpa2," in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017, pp. 1313-1328.
- K. Paterson, "Industry Concerns about TLS 1.3," https://www.ietf.org/ mail-archive/web/tls/current/msg21278.html, 2016, [Online; accessed 24-February-2018].
- M. Nottingham, "Internet protocols are changing," https://blog.apnic.net/ 2017/12/12/internet-protocols-changing/, 2017, [Online; accessed 24- February-2018].
- H. Haddadi, A. Chaudhry, J. Crowcroft, H. Howard, D. McAuley, A. Madhavapeddy, and R. Mortier, "Personal data: Thinking inside the box," in Proc. 5th Decennial ACM Aarhus Conference: Critical Alternatives, Aarhus, Denmark, Aug. 17-21 2015.
- Y. Amar, "Trace Analysis Scripts," https://github.com/yousefamar/ trace-analysis-scripts, 2018, [Online; accessed 24-February-2018].
- T. B. Project, "The Bro Network Security Monitor," https://www.bro. org/, 2014, [Online; accessed 24-February-2018].
- A. Brown, R. Mortier, and T. Rodden, "Multinet: reducing interaction overhead in domestic wireless networks," in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2013, pp. 1569-1578.
- M. Vanhoef, C. Matte, M. Cunche, L. S. Cardoso, and F. Piessens, "Why mac address randomization is not enough: An analysis of wi-fi network discovery mechanisms," in Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security. ACM, 2016, pp. 413-424.
- A. Conway, "Android getting "DNS over TLS" support to stop ISPs from knowing what websites you visit," https://www.xda-developers. com/android-dns-over-tls-website-privacy/, 2017, [Online; accessed 24- February-2018].
- E. Fernandes, J. Jung, and A. Prakash, "Security analysis of emerging smart home applications," in Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016, pp. 636-654.