SlideShare uma empresa Scribd logo
1 de 19
Verifiable Round-Robin Scheme
for Smart Homes
6/9/2019 1
Nisha Panwar, Shantanu Sharma, Guoxi Wang,
Sharad Mehrotra, Nalini Venkatasubramanian
Department of Computer Science
University of California Irvine
ACM Conference on Data and Application Security and
Privacy (CODASPY)
March 25-27, 2019
Smart home silhouette
6/9/2019 2
Continuum of control
6/9/2019 5
t1 t2 t3 t4 t5 t6 t7
t8 t9
d1
d2
d6
d7
d8
d9
d5
d4
d3
morning evening
Scheduled workflows
Synchronized workflows
Privacy challenges
• Wireless communication is vulnerable to
inference attacks
• Devices react immediately as a result of
channel ‘or’ other device activity
• Devices know the command much prior to
the execution time
• Wireless protected access in 802.11 ensures
 integrity and confidentiality Revealing
privacy via inference
• MAC address and DNS lookup queries
allow inferences regarding the workflows
 privacy violation
6/9/2019 6
Device activity  channel activity  user activity
04:33
04:34
04:35
04:36
04:37
04:38
04:39
04:40
04:41
04:42
04:43
04:44
Time
0
50
100
150
200
250
300
350
400
Throughput(KBytes/s)
CloudCam
Google Home
WeMo
User arrived at home
User issued voice
command to turn
on lamp
WeMo in
“ON” State
User issued
voice command
to turn off lamp
User moved around in home
User left home
Workflows:
Problem statement
workflow inferences
6/9/2019 7Upstream observer
Virtual
periphery
Physical
periphery
Problem statement:
workflow execution time
6/9/2019 8
D1
D2
D3
Sequential
operations
Execution length
Pre-scheduling
• Thought experiments: with spacetime diagram
• Twin paradox: going in future is not possible
• Grandfather paradox: going in past is not possible
• Logical marker for the future is possible  Scheduling
• Time is unidirectional  we can always lengthen the timeframe
until the marker arrives BUT cannot shrink it
9
Artificial delay
• Pre-scheduled workflows
• What should be the order of devices?
• When should the devices execute the commands?
• How to guarantee the “no earlier than” property?
• Resource-intensive deterministic delay
• All devices must wait for a prescribed amount of time
• This waiting period is guaranteed through time-consuming inherently
sequential operations
• Devices cannot skip or pre-compute these operations in order to pre-
pone the command execution
6/9/2019 10
Solution sketch
6/9/2019 11
Home owner
Capsule
command
Hub
t1
timing
analysis
t2
t3
t5
t6
t1
t3 t4 t5
Integer
Factorization
Solve puzzle
Verifiable delay protocol
• Owner-to-hub: signature based handshake
• Authenticate and send desired workflow to an initial device, i.e., hub
𝑆𝑐ℎ𝑒𝑑𝑢𝑙𝑒 = ( 𝐷1, 𝐷2 , (𝐷3, 𝐷4))
𝑂𝑟𝑑𝑒𝑟 = (𝑂𝑖𝑑, 𝐻𝑖𝑑, 𝑐𝑙, 𝑆𝑖𝑔𝑛(ℋ, 𝑂𝑆𝐾))
• Hub-to-device: anonymous trigger for command execution
𝒯 = 𝐸( 𝑐𝑙| 𝑑𝑎𝑡𝑎 𝑓𝑖𝑒𝑙𝑑 |𝑏𝑡 𝑜𝑔𝑔𝑙𝑒 , 𝑘𝑠)
• Device-to-device: command execution and verifiable ordering
• Decrypt the command and retrieve the time clock puzzle
𝒫 = (𝑛, 𝑎, 𝑡𝑖, 𝐸𝑧𝑖, 𝐸𝑘𝑖)
• Device-to-hub: anonymous response from devices to the hub
𝑏 𝑂 = 𝑏𝑟 ⨁ bg
6/9/2019 12
Example
6/9/2019 13
Hub
𝑡 𝑟𝑐𝑣
1 𝑡 𝑟𝑐𝑣
2
𝑡 𝑏𝑒𝑔
𝐻 𝑡 𝑟𝑐𝑣
𝑁
𝐷1 𝐷2 𝐷 𝑁
𝑡 𝑐𝑜𝑚
1
𝑡 𝑐𝑜𝑚
2
𝑡 𝑐𝑜𝑚
𝑁𝑡 𝑐𝑜𝑚
𝑁−1
𝑡 𝑟𝑐𝑣
1
𝑡 𝑟𝑐𝑣
2
𝑡 𝑏𝑒𝑔
𝐻 𝑡 𝑟𝑐𝑣
𝑁
𝑡 𝑐𝑜𝑚
1
𝑡 𝑐𝑜𝑚
2
𝑡 𝑐𝑜𝑚
𝑁
𝑡 𝑐𝑜𝑚
𝑁−1
Properties
• Authentication:
• During workflow release from homeowner to hub
• The key exchange for signature verification is part of setup phase
Pr (𝑂𝑆 𝐾, 𝑐𝑙) → 𝑆𝑖𝑔𝑛 ≥ 1 − 𝜖
• Anonymity:
• For consistent circulation of encrypted commands
• No channel activity correlates to device activity
Pr 𝒯(𝑚𝑖) − Pr 𝒯′(𝑚𝑗) < 𝜖
• No inferences on device generated data can be mapped to device activity
Pr 𝒯(𝑏 𝑟) − Pr 𝒯(𝑏 𝑜) < 𝜖
• Verifiable delay:
• No inferences on device activity before the device executes the command
Pr[𝑡 𝑐𝑜𝑚
𝐴 |state] ≅ Pr[𝑡 𝑐𝑜𝑚
𝐴 ]
6/9/2019 14
Experiment setup
6/9/2019 17
• Hub and IoT devices communicate in Wi-Fi Ad-hoc mode.
• A laptop with Wi-Fi interface working in monitor mode is deployed in the room next to
the the lab, acts as passive listener adversary
Mock-up testing IoT app:
IoT device awaits command
from Owner.
”SET”: change a local variable
“READ”: read variable, system
stats and send back to owner
Results
6/9/2019 18
• Impact of scheduling on channel to device activity decoupling
• Run the same workflow (D1:READ|D2:SET|D2:READ|D3:READ) in two
settings
0 10 20 30 40 50
Time (s)
0
250
500
750
1000
1250
1500
1750
Throughput(Bytes/s)
D1
D2
D3
Devices working in common IoT settings
(Wi-Fi infrastructure mode)
0 10 20 30 40 50 60
Time (s)
1000
1500
2000
2500
3000
3500
4000
Throughput(B/s)
D1
D2
D3
Devices working with our proposed system
Results
6/9/2019 19
• Impact of ring topology on the latency
• X-axis: The number of IoT devices in the ring topology
• Y-axis: Latency between Hub sends and receives the token
Previous work: traffic shaping
• A privacy-preserving traffic shaping scheme*
• The traffic is vulnerable to privacy threats at ISP level
• The original traffic rate variations must not be obvious to ISP (malicious)
• Fixed-rate leaky bucket generates cover traffic beyond the hub, regardless of any
activity within the LAN
• The authors proposed to mask channel activity through dummy traffic
• If [shaped traffic rate] < [device traffic] than packets must be queued
• If [shaped traffic rate] > [device traffic] than dummy packets must be added
• However, this scheme
• does not protect the mapping between wireless channel to device activity (inferences
on the incoming traffic)
• does not consider device level scheduling guarantees
6/9/2019
*Apthorpe et al “A Smart Home is No Castle:
Privacy Vulnerabilities of Encrypted IoT Traffic” arXiv:1705.06805v1 20
Previous work: comparison
Properties Kumar
et. al. [11]
Shen
et. al. [13]
Apthorpe
et. al. [6]
Our scheme
Upstream
direction
Downstream
direction
Verifiable
delay
Partial
ordering
Total
ordering
Privacy
Passive attack
resistance
Active attack
resistance
6/9/2019 21
Conclusion
• Workflows in smart homes are inherent and so does the
privacy centric inferences regarding those workflows
• Traffic shaping can avoid upstream inferences by the last
mile attacker BUT does not ensure secure device ordering
• Logical timelines enable decoupling from channel to device
or device to channel activity
6/9/2019 22
Nisha Panwar
(npanwar@uci.edu)
23

Mais conteúdo relacionado

Semelhante a Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)

Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren NetzwerkverkehrSplunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren NetzwerkverkehrGeorg Knon
 
Lecture 2 - Asynchrnous and Synchronous Computation & Communication.pptx
Lecture 2 - Asynchrnous and Synchronous Computation & Communication.pptxLecture 2 - Asynchrnous and Synchronous Computation & Communication.pptx
Lecture 2 - Asynchrnous and Synchronous Computation & Communication.pptxIrsaAamir1
 
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire DataSplunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire DataSplunk
 
Splunk App for Stream
Splunk App for StreamSplunk App for Stream
Splunk App for StreamSplunk
 
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)Will Shen
 
Osi week10(1) [autosaved] by Gulshan K Maheshwari(QAU)
Osi week10(1) [autosaved] by Gulshan  K Maheshwari(QAU)Osi week10(1) [autosaved] by Gulshan  K Maheshwari(QAU)
Osi week10(1) [autosaved] by Gulshan K Maheshwari(QAU)GulshanKumar368
 
Indoor Wireless Localization - Zigbee
Indoor Wireless Localization - ZigbeeIndoor Wireless Localization - Zigbee
Indoor Wireless Localization - ZigbeeAlex Salim
 
"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013Ryan Koop
 
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...PROIDEA
 
Cisco connect winnipeg 2018 a look at network assurance in dna center
Cisco connect winnipeg 2018   a look at network assurance in dna centerCisco connect winnipeg 2018   a look at network assurance in dna center
Cisco connect winnipeg 2018 a look at network assurance in dna centerCisco Canada
 
5G-USA-Telemetry
5G-USA-Telemetry5G-USA-Telemetry
5G-USA-Telemetrysnrism
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-networklklokesh
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerAbdelkhalik Mosa
 
Leverage your network to improve asset management
Leverage your network to improve asset managementLeverage your network to improve asset management
Leverage your network to improve asset managementjmarkwort
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer networkTrinity Dwarka
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer networkTrinity Dwarka
 

Semelhante a Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019) (20)

Final project report
Final project reportFinal project report
Final project report
 
Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival
 
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren NetzwerkverkehrSplunk App for Stream - Einblicke in Ihren Netzwerkverkehr
Splunk App for Stream - Einblicke in Ihren Netzwerkverkehr
 
Lecture 2 - Asynchrnous and Synchronous Computation & Communication.pptx
Lecture 2 - Asynchrnous and Synchronous Computation & Communication.pptxLecture 2 - Asynchrnous and Synchronous Computation & Communication.pptx
Lecture 2 - Asynchrnous and Synchronous Computation & Communication.pptx
 
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire DataSplunk App for Stream for Enhanced Operational Intelligence from Wire Data
Splunk App for Stream for Enhanced Operational Intelligence from Wire Data
 
Splunk App for Stream
Splunk App for StreamSplunk App for Stream
Splunk App for Stream
 
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
20180717 Introduction of Seamless BLE Connection Migration System (SeamBlue)
 
Osi week10(1) [autosaved] by Gulshan K Maheshwari(QAU)
Osi week10(1) [autosaved] by Gulshan  K Maheshwari(QAU)Osi week10(1) [autosaved] by Gulshan  K Maheshwari(QAU)
Osi week10(1) [autosaved] by Gulshan K Maheshwari(QAU)
 
Indoor Wireless Localization - Zigbee
Indoor Wireless Localization - ZigbeeIndoor Wireless Localization - Zigbee
Indoor Wireless Localization - Zigbee
 
"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013"How overlay networks can make public clouds your global WAN" from LASCON 2013
"How overlay networks can make public clouds your global WAN" from LASCON 2013
 
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
 
Cisco connect winnipeg 2018 a look at network assurance in dna center
Cisco connect winnipeg 2018   a look at network assurance in dna centerCisco connect winnipeg 2018   a look at network assurance in dna center
Cisco connect winnipeg 2018 a look at network assurance in dna center
 
Network Security Lecture
Network Security LectureNetwork Security Lecture
Network Security Lecture
 
5G-USA-Telemetry
5G-USA-Telemetry5G-USA-Telemetry
5G-USA-Telemetry
 
76924356 synopsis-network
76924356 synopsis-network76924356 synopsis-network
76924356 synopsis-network
 
Network Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport LayerNetwork Fundamentals: Ch4 - Transport Layer
Network Fundamentals: Ch4 - Transport Layer
 
Leverage your network to improve asset management
Leverage your network to improve asset managementLeverage your network to improve asset management
Leverage your network to improve asset management
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 
Slick: A control plane for middleboxes
Slick: A control plane for middleboxesSlick: A control plane for middleboxes
Slick: A control plane for middleboxes
 
Advanced computer network
Advanced computer networkAdvanced computer network
Advanced computer network
 

Mais de Shantanu Sharma

Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingShantanu Sharma
 
OBSCURE: Information Theoretic Oblivious and Verifiable Aggregation Queries
OBSCURE: Information Theoretic Oblivious and Verifiable Aggregation QueriesOBSCURE: Information Theoretic Oblivious and Verifiable Aggregation Queries
OBSCURE: Information Theoretic Oblivious and Verifiable Aggregation QueriesShantanu Sharma
 
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...Shantanu Sharma
 
Private and secure secret shared map reduce
Private and secure secret shared map reducePrivate and secure secret shared map reduce
Private and secure secret shared map reduceShantanu Sharma
 
A Survey on 5G: The Next Generation of Mobile Communication
A Survey on 5G: The Next Generation of Mobile CommunicationA Survey on 5G: The Next Generation of Mobile Communication
A Survey on 5G: The Next Generation of Mobile CommunicationShantanu Sharma
 
Meta-MapReduce- A Technique for Reducing Communication in MapReduce Computations
Meta-MapReduce- A Technique for Reducing Communication in MapReduce ComputationsMeta-MapReduce- A Technique for Reducing Communication in MapReduce Computations
Meta-MapReduce- A Technique for Reducing Communication in MapReduce ComputationsShantanu Sharma
 
On Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio NetworksOn Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio NetworksShantanu Sharma
 
Bounds for overlapping interval join on MapReduce
Bounds for overlapping interval join on MapReduceBounds for overlapping interval join on MapReduce
Bounds for overlapping interval join on MapReduceShantanu Sharma
 
Assignment of Different-Sized Inputs in MapReduce
Assignment of Different-Sized Inputs in MapReduceAssignment of Different-Sized Inputs in MapReduce
Assignment of Different-Sized Inputs in MapReduceShantanu Sharma
 
Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...
Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...
Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...Shantanu Sharma
 

Mais de Shantanu Sharma (10)

Secure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data ProcessingSecure and Privacy-Preserving Big-Data Processing
Secure and Privacy-Preserving Big-Data Processing
 
OBSCURE: Information Theoretic Oblivious and Verifiable Aggregation Queries
OBSCURE: Information Theoretic Oblivious and Verifiable Aggregation QueriesOBSCURE: Information Theoretic Oblivious and Verifiable Aggregation Queries
OBSCURE: Information Theoretic Oblivious and Verifiable Aggregation Queries
 
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data -- I...
 
Private and secure secret shared map reduce
Private and secure secret shared map reducePrivate and secure secret shared map reduce
Private and secure secret shared map reduce
 
A Survey on 5G: The Next Generation of Mobile Communication
A Survey on 5G: The Next Generation of Mobile CommunicationA Survey on 5G: The Next Generation of Mobile Communication
A Survey on 5G: The Next Generation of Mobile Communication
 
Meta-MapReduce- A Technique for Reducing Communication in MapReduce Computations
Meta-MapReduce- A Technique for Reducing Communication in MapReduce ComputationsMeta-MapReduce- A Technique for Reducing Communication in MapReduce Computations
Meta-MapReduce- A Technique for Reducing Communication in MapReduce Computations
 
On Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio NetworksOn Detecting Termination in Cognitive Radio Networks
On Detecting Termination in Cognitive Radio Networks
 
Bounds for overlapping interval join on MapReduce
Bounds for overlapping interval join on MapReduceBounds for overlapping interval join on MapReduce
Bounds for overlapping interval join on MapReduce
 
Assignment of Different-Sized Inputs in MapReduce
Assignment of Different-Sized Inputs in MapReduceAssignment of Different-Sized Inputs in MapReduce
Assignment of Different-Sized Inputs in MapReduce
 
Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...
Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...
Self-Stabilizing End-to-End Communication in Bounded Capacity, Omitting, D...
 

Último

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 

Último (20)

How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Verifiable Round-Robin Scheme for Smart Homes (CODASPY 2019)

  • 1. Verifiable Round-Robin Scheme for Smart Homes 6/9/2019 1 Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian Department of Computer Science University of California Irvine ACM Conference on Data and Application Security and Privacy (CODASPY) March 25-27, 2019
  • 3. Continuum of control 6/9/2019 5 t1 t2 t3 t4 t5 t6 t7 t8 t9 d1 d2 d6 d7 d8 d9 d5 d4 d3 morning evening Scheduled workflows Synchronized workflows
  • 4. Privacy challenges • Wireless communication is vulnerable to inference attacks • Devices react immediately as a result of channel ‘or’ other device activity • Devices know the command much prior to the execution time • Wireless protected access in 802.11 ensures  integrity and confidentiality Revealing privacy via inference • MAC address and DNS lookup queries allow inferences regarding the workflows  privacy violation 6/9/2019 6 Device activity  channel activity  user activity 04:33 04:34 04:35 04:36 04:37 04:38 04:39 04:40 04:41 04:42 04:43 04:44 Time 0 50 100 150 200 250 300 350 400 Throughput(KBytes/s) CloudCam Google Home WeMo User arrived at home User issued voice command to turn on lamp WeMo in “ON” State User issued voice command to turn off lamp User moved around in home User left home Workflows:
  • 5. Problem statement workflow inferences 6/9/2019 7Upstream observer Virtual periphery Physical periphery
  • 6. Problem statement: workflow execution time 6/9/2019 8 D1 D2 D3 Sequential operations Execution length
  • 7. Pre-scheduling • Thought experiments: with spacetime diagram • Twin paradox: going in future is not possible • Grandfather paradox: going in past is not possible • Logical marker for the future is possible  Scheduling • Time is unidirectional  we can always lengthen the timeframe until the marker arrives BUT cannot shrink it 9
  • 8. Artificial delay • Pre-scheduled workflows • What should be the order of devices? • When should the devices execute the commands? • How to guarantee the “no earlier than” property? • Resource-intensive deterministic delay • All devices must wait for a prescribed amount of time • This waiting period is guaranteed through time-consuming inherently sequential operations • Devices cannot skip or pre-compute these operations in order to pre- pone the command execution 6/9/2019 10
  • 9. Solution sketch 6/9/2019 11 Home owner Capsule command Hub t1 timing analysis t2 t3 t5 t6 t1 t3 t4 t5 Integer Factorization Solve puzzle
  • 10. Verifiable delay protocol • Owner-to-hub: signature based handshake • Authenticate and send desired workflow to an initial device, i.e., hub 𝑆𝑐ℎ𝑒𝑑𝑢𝑙𝑒 = ( 𝐷1, 𝐷2 , (𝐷3, 𝐷4)) 𝑂𝑟𝑑𝑒𝑟 = (𝑂𝑖𝑑, 𝐻𝑖𝑑, 𝑐𝑙, 𝑆𝑖𝑔𝑛(ℋ, 𝑂𝑆𝐾)) • Hub-to-device: anonymous trigger for command execution 𝒯 = 𝐸( 𝑐𝑙| 𝑑𝑎𝑡𝑎 𝑓𝑖𝑒𝑙𝑑 |𝑏𝑡 𝑜𝑔𝑔𝑙𝑒 , 𝑘𝑠) • Device-to-device: command execution and verifiable ordering • Decrypt the command and retrieve the time clock puzzle 𝒫 = (𝑛, 𝑎, 𝑡𝑖, 𝐸𝑧𝑖, 𝐸𝑘𝑖) • Device-to-hub: anonymous response from devices to the hub 𝑏 𝑂 = 𝑏𝑟 ⨁ bg 6/9/2019 12
  • 11. Example 6/9/2019 13 Hub 𝑡 𝑟𝑐𝑣 1 𝑡 𝑟𝑐𝑣 2 𝑡 𝑏𝑒𝑔 𝐻 𝑡 𝑟𝑐𝑣 𝑁 𝐷1 𝐷2 𝐷 𝑁 𝑡 𝑐𝑜𝑚 1 𝑡 𝑐𝑜𝑚 2 𝑡 𝑐𝑜𝑚 𝑁𝑡 𝑐𝑜𝑚 𝑁−1 𝑡 𝑟𝑐𝑣 1 𝑡 𝑟𝑐𝑣 2 𝑡 𝑏𝑒𝑔 𝐻 𝑡 𝑟𝑐𝑣 𝑁 𝑡 𝑐𝑜𝑚 1 𝑡 𝑐𝑜𝑚 2 𝑡 𝑐𝑜𝑚 𝑁 𝑡 𝑐𝑜𝑚 𝑁−1
  • 12. Properties • Authentication: • During workflow release from homeowner to hub • The key exchange for signature verification is part of setup phase Pr (𝑂𝑆 𝐾, 𝑐𝑙) → 𝑆𝑖𝑔𝑛 ≥ 1 − 𝜖 • Anonymity: • For consistent circulation of encrypted commands • No channel activity correlates to device activity Pr 𝒯(𝑚𝑖) − Pr 𝒯′(𝑚𝑗) < 𝜖 • No inferences on device generated data can be mapped to device activity Pr 𝒯(𝑏 𝑟) − Pr 𝒯(𝑏 𝑜) < 𝜖 • Verifiable delay: • No inferences on device activity before the device executes the command Pr[𝑡 𝑐𝑜𝑚 𝐴 |state] ≅ Pr[𝑡 𝑐𝑜𝑚 𝐴 ] 6/9/2019 14
  • 13. Experiment setup 6/9/2019 17 • Hub and IoT devices communicate in Wi-Fi Ad-hoc mode. • A laptop with Wi-Fi interface working in monitor mode is deployed in the room next to the the lab, acts as passive listener adversary Mock-up testing IoT app: IoT device awaits command from Owner. ”SET”: change a local variable “READ”: read variable, system stats and send back to owner
  • 14. Results 6/9/2019 18 • Impact of scheduling on channel to device activity decoupling • Run the same workflow (D1:READ|D2:SET|D2:READ|D3:READ) in two settings 0 10 20 30 40 50 Time (s) 0 250 500 750 1000 1250 1500 1750 Throughput(Bytes/s) D1 D2 D3 Devices working in common IoT settings (Wi-Fi infrastructure mode) 0 10 20 30 40 50 60 Time (s) 1000 1500 2000 2500 3000 3500 4000 Throughput(B/s) D1 D2 D3 Devices working with our proposed system
  • 15. Results 6/9/2019 19 • Impact of ring topology on the latency • X-axis: The number of IoT devices in the ring topology • Y-axis: Latency between Hub sends and receives the token
  • 16. Previous work: traffic shaping • A privacy-preserving traffic shaping scheme* • The traffic is vulnerable to privacy threats at ISP level • The original traffic rate variations must not be obvious to ISP (malicious) • Fixed-rate leaky bucket generates cover traffic beyond the hub, regardless of any activity within the LAN • The authors proposed to mask channel activity through dummy traffic • If [shaped traffic rate] < [device traffic] than packets must be queued • If [shaped traffic rate] > [device traffic] than dummy packets must be added • However, this scheme • does not protect the mapping between wireless channel to device activity (inferences on the incoming traffic) • does not consider device level scheduling guarantees 6/9/2019 *Apthorpe et al “A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic” arXiv:1705.06805v1 20
  • 17. Previous work: comparison Properties Kumar et. al. [11] Shen et. al. [13] Apthorpe et. al. [6] Our scheme Upstream direction Downstream direction Verifiable delay Partial ordering Total ordering Privacy Passive attack resistance Active attack resistance 6/9/2019 21
  • 18. Conclusion • Workflows in smart homes are inherent and so does the privacy centric inferences regarding those workflows • Traffic shaping can avoid upstream inferences by the last mile attacker BUT does not ensure secure device ordering • Logical timelines enable decoupling from channel to device or device to channel activity 6/9/2019 22

Notas do Editor

  1. Sterigrip self cleansing door handles, Unico smartbrush, Sensus metering systems… Interconnected devices in a home: capture, process, store, share data Amazon echo, Alexa, Apple Homekit, Phillips-Hue, Belkin Wemo, etc
  2. Sterigrip self cleansing door handles, Unico smartbrush, Sensus metering systems…
  3. Monotonous ordering sans user defined ordering. Lets assume user want to go home (i.e., schedule hybrid car to home location) also to put lights and HVAC system to a preset mode by the time user arrives at home. Along with the arrival at home user might want to schedule a few more home appliances in parallel such as coffee machine, washing machine and microwave. Now, in case of a device failure (e.g., washing machine) user might want to reschedule. Therefore, a user must be able to securely re-schedule devices while being at a remote location.
  4. Its not reverse DNS query mapping. MAC address has first 3 bytes which is publicly accessible in OUI dataset
  5. Virtual periphery of home  does it have inference –leakage or not? Scheduling from problem statement perspective challenge Example 2. Passive learning: Let us assume an owner is leaving for a vacation and on the contrary, a neighbor have been eyeing the pattern regarding device actuation for a long time. Clearly, a neighbor turning into adversary might just recall this monotonous wireless radio communication pattern and compare it with the original wireless radio communication available at that time. An adversary can possibly infer that owner is on vacation (even when owner has not personally disclosed any true facts). Example 3. Active intrusion: Let us assume an encrypted communication channel between the devices (here, the secure key distribution via third party or authenticated key exchange for every round, can be used in a preprocessing phase). Now in case the secret key is revealed (e.g., through a brute force attack) to an adversary, the adversary can manipulate the original commands dispatched for any device.
  6. Grandfathers paradox: inconsistencies may arise by changing things in the past Minkowski diagrams: According to the theory of relativity, time dilation is a difference in the elapsed time measured by two observers, either due to a velocity difference relative to each other,
  7. Ring topology is a static version of anonymous TOR which incurs a high PKI overhead
  8. Check paper for incoming traffic  they establish VPN endpoints which distinguish real vs dummy packets; in case of downstream data the only requirement is that adversary is upstream with respect to shaped traffic which means if ISP hosts the adversary then VPN must have a different service provider than smart home.
  9. Various IoT frameworks exist such as Apple HomeKit, Smart-Thing, Brillo/Weave by Google, Calvin by Ericsson BUT no secure scheduling