Journal article
Haunted house: physical smart home event verification in the presence of compromised sensors
- Abstract:
-
In this article, we verify physical events using data from an ensemble of smart home sensors. This approach both protects against event sensor faults and sophisticated attackers.
To validate our system’s performance, we set up a “smart home” in an office environment. We recognize 22 event types using 48 sensors over the course of two weeks. Using data from the physical sensors, we verify the event stream supplied by the event sensors to detect both masking and spoofing attacks.
We consider three threat models: a zero-effort attacker, an opportunistic attacker, and a sensor-compromise attacker who can arbitrarily modify live sensor data. For spoofed events, we achieve perfect classification for 9 out of 22 events and achieve a 0% false alarm rate at a detection rate exceeding 99.9% for 15 events. For 11 events the majority of masking attacks can be detected without causing any false alarms. We also show that even a strong opportunistic attacker is inherently limited to spoofing few select events and that doing so involves lengthy waiting periods. Finally, we demonstrate the vulnerability of a single-classifier system to compromised sensor data and introduce a more secure approach based on sensor fusion.
- Publication status:
- Published
- Peer review status:
- Peer reviewed
Actions
Access Document
- Files:
-
-
(Preview, Accepted manuscript, 6.2MB, Terms of use)
-
- Publisher copy:
- 10.1145/3506859
Authors
- Publisher:
- Association for Computing Machinery
- Journal:
- ACM Transactions on Internet of Things More from this journal
- Volume:
- 3
- Issue:
- 3
- Article number:
- 18
- Publication date:
- 2022-04-11
- Acceptance date:
- 2021-12-01
- DOI:
- EISSN:
-
2577-6207
- Language:
-
English
- Keywords:
- Pubs id:
-
1226101
- Local pid:
-
pubs:1226101
- Deposit date:
-
2021-12-20
Terms of use
- Copyright holder:
- Birnbach et al.
- Copyright date:
- 2022
- Rights statement:
- © 2022 Copyright held by the owner/author(s). Publication rights licensed to ACM.
- Notes:
- This is the accepted manuscript version of the article. The final version is available online from the Association for Computing Machinery at: https://doi.org/10.1145/3506859
If you are the owner of this record, you can report an update to it here: Report update to this record