Poster Abstract: “Sensing” the IoT Network: Ethical Capture of Domestic IoT Network Traffic

Proceedings of the 17th Conference on Embedded Networked Sensor Systems(2019)

引用 0|浏览44
暂无评分
摘要
As more and more devices are connected to the Internet-of-Things, often made by non-specialist companies or short-lived startups, the likelihood that these devices will be hacked and used for nefarious activity online increases. We seek to support non-expert users in managing the network behaviour of their IoT devices, and assisting them in handling the cases where those devices are hacked. To do so, wewish to enable anomaly detection at the network level, determining when a device starts behaving unusually. This requires capturing data about how devices behave in a diverse range of real deployments, not just lab environments. To that end, we present IoTCrowdsourcery, a toolset for capturing traffic data from real-world IoT deployments. Participants collect packet traces from their IoT devices through our software, and provide them via a crowdsourcing infrastructure. The key challenges to overcome are tomake the process straightforward enough for non-expert participants to carry out, and to ensure that legal (notably GDPR) and ethical issues are carefully handled by ensuring that participants understand what they are doing, and are provided with various means to exercise agency in participating, and ultimately to withdraw their participation if they wish. We envisage the captured traces being analysed to develop behavioural models of IoT devices which will be used for anomaly detection, improving the security of our smart homes and more generally of the Internet. ACM Reference Format: Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Roman Kolcun, Anna-MariaMandalari, HamedHaddadi, DerekMcAuley, and RichardMortier. 2019. Poster Abstract: “Sensing” the IoT Network: Ethical Capture of Domestic IoT Network Traffic . In Proceedings of ACM Conference. ACM, New York, NY, USA, 2 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACMmust be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org.
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要