Haunted house: physical smart home event verification in the presence of compromised sensors
<p>In this article, we verify physical events using data from an ensemble of smart home sensors. This approach both protects against event sensor faults and sophisticated attackers.</p> <p>To validate our system’s performance, we set up a “smart home” in an office environment. We...
Main Authors: | , , |
---|---|
Format: | Journal article |
Language: | English |
Published: |
Association for Computing Machinery
2022
|
_version_ | 1797107066412728320 |
---|---|
author | Birnbach, S Eberz, S Martinovic, I |
author_facet | Birnbach, S Eberz, S Martinovic, I |
author_sort | Birnbach, S |
collection | OXFORD |
description | <p>In this article, we verify physical events using data from an ensemble of smart home sensors. This approach both protects against event sensor faults and sophisticated attackers.</p>
<p>To validate our system’s performance, we set up a “smart home” in an office environment. We recognize 22 event types using 48 sensors over the course of two weeks. Using data from the physical sensors, we verify the event stream supplied by the event sensors to detect both masking and spoofing attacks.</p>
<p>We consider three threat models: a zero-effort attacker, an opportunistic attacker, and a sensor-compromise attacker who can arbitrarily modify live sensor data. For spoofed events, we achieve perfect classification for 9 out of 22 events and achieve a 0% false alarm rate at a detection rate exceeding 99.9% for 15 events. For 11 events the majority of masking attacks can be detected without causing any false alarms. We also show that even a strong opportunistic attacker is inherently limited to spoofing few select events and that doing so involves lengthy waiting periods. Finally, we demonstrate the vulnerability of a single-classifier system to compromised sensor data and introduce a more secure approach based on sensor fusion.</p> |
first_indexed | 2024-03-07T07:11:19Z |
format | Journal article |
id | oxford-uuid:c3aaa48e-b170-435c-962e-0764e5a98dcb |
institution | University of Oxford |
language | English |
last_indexed | 2024-03-07T07:11:19Z |
publishDate | 2022 |
publisher | Association for Computing Machinery |
record_format | dspace |
spelling | oxford-uuid:c3aaa48e-b170-435c-962e-0764e5a98dcb2022-06-23T09:54:00ZHaunted house: physical smart home event verification in the presence of compromised sensorsJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:c3aaa48e-b170-435c-962e-0764e5a98dcbEnglishSymplectic ElementsAssociation for Computing Machinery2022Birnbach, SEberz, SMartinovic, I<p>In this article, we verify physical events using data from an ensemble of smart home sensors. This approach both protects against event sensor faults and sophisticated attackers.</p> <p>To validate our system’s performance, we set up a “smart home” in an office environment. We recognize 22 event types using 48 sensors over the course of two weeks. Using data from the physical sensors, we verify the event stream supplied by the event sensors to detect both masking and spoofing attacks.</p> <p>We consider three threat models: a zero-effort attacker, an opportunistic attacker, and a sensor-compromise attacker who can arbitrarily modify live sensor data. For spoofed events, we achieve perfect classification for 9 out of 22 events and achieve a 0% false alarm rate at a detection rate exceeding 99.9% for 15 events. For 11 events the majority of masking attacks can be detected without causing any false alarms. We also show that even a strong opportunistic attacker is inherently limited to spoofing few select events and that doing so involves lengthy waiting periods. Finally, we demonstrate the vulnerability of a single-classifier system to compromised sensor data and introduce a more secure approach based on sensor fusion.</p> |
spellingShingle | Birnbach, S Eberz, S Martinovic, I Haunted house: physical smart home event verification in the presence of compromised sensors |
title | Haunted house: physical smart home event verification in the presence of compromised sensors |
title_full | Haunted house: physical smart home event verification in the presence of compromised sensors |
title_fullStr | Haunted house: physical smart home event verification in the presence of compromised sensors |
title_full_unstemmed | Haunted house: physical smart home event verification in the presence of compromised sensors |
title_short | Haunted house: physical smart home event verification in the presence of compromised sensors |
title_sort | haunted house physical smart home event verification in the presence of compromised sensors |
work_keys_str_mv | AT birnbachs hauntedhousephysicalsmarthomeeventverificationinthepresenceofcompromisedsensors AT eberzs hauntedhousephysicalsmarthomeeventverificationinthepresenceofcompromisedsensors AT martinovici hauntedhousephysicalsmarthomeeventverificationinthepresenceofcompromisedsensors |