Verifiable Round-Robin Scheme for Smart Homes

Advances in sensing, networking, and actuation technologies have resulted in the IoT wave that is expected to revolutionize all aspects of modern society. This paper focuses on the new challenges of privacy that arise in IoT in the context of smart homes. Specifically, the paper focuses on preventing the user's privacy via inferences through channel and in-home device activities. We propose a method for securely scheduling the devices while decoupling the device and channels activities. The proposed solution avoids any attacks that may reveal the coordinated schedule of the devices, and hence, also, assures that inferences that may compromise individual's privacy are not leaked due to device and channel level activities. Our experiments also validate the proposed approach, and consequently, an adversary cannot infer device and channel activities by just observing the network traffic.

[1]  Simon Haykin,et al.  Smart Home: Cognitive Interactive People-Centric Internet of Things , 2017, IEEE Communications Magazine.

[2]  Dimitris N. Kalofonos,et al.  Intuisec: A Framework for Intuitive User Interaction with Smart Home Security using Mobile Devices , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[3]  Nick Feamster,et al.  Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic , 2017, ArXiv.

[4]  Andrei Gurtov,et al.  Anonymous Secure Framework in Connected Smart Home Environments , 2017, IEEE Transactions on Information Forensics and Security.

[5]  Ragunathan Rajkumar,et al.  Time-based Coordination in Geo-Distributed Cyber-Physical Systems , 2017, HotCloud.

[6]  Reihaneh Safavi-Naini,et al.  Towards a Resilient Smart Home , 2018, IoT S&P@SIGCOMM.

[7]  Nick Feamster,et al.  Closing the Blinds: Four Strategies for Protecting Smart Home Privacy from Network Observers , 2017, ArXiv.

[8]  Giuseppe Anastasi,et al.  Wi-fi in ad hoc mode: a measurement study , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[9]  Ronald L. Rivest,et al.  Time-lock Puzzles and Timed-release Crypto , 1996 .

[10]  Reihaneh Safavi-Naini,et al.  LoSt: location based storage , 2012, CCSW '12.

[11]  Jian Shen,et al.  Secure data uploading scheme for a smart home system , 2018, Inf. Sci..

[12]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .