Vtome.ru - электронная библиотека

Security in Smart Home Networks

  • Добавил: literator
  • Дата: 20-01-2023, 19:11
  • Комментариев: 0
Security in Smart Home NetworksНазвание: Security in Smart Home Networks
Автор: Yan Meng, Haojin Zhu, Xuemin (Sherman) Shen
Издательство: Springer
Год: 2023
Страниц: 177
Язык: английский
Формат: pdf (true), epub
Размер: 29.9 MB

This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures; 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing; 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.

As a typical application of the Internet of things (IoT), the smart home system is widely deployed and plays an important role in our lifestyle. In the smart home environment, smart devices are connected through wireless networks, provide users with non-contact interfaces such as the voice interface, and are managed uniformly through smart applications. Smart terminal devices (e.g., smartphones, tablets, smart sensing devices) provide users with richer functions and can sense the environmental changes of the smart home in real time. With the popularization of the voice interface, users can interact with the smart home system without contact. Smart applications can automatically control devices and adjust the status of the smart home system.

However, current researches show that the smart home network still faces a wide range of security threats. Firstly, although the wireless communication technology adopted by the terminal devices speeds up the network communication rate and expands the network range, it also increases the privacy risks of users when encountering side-channel attacks. Secondly, due to the open nature of the voice channel, the voice interface faces various voice spoofing attacks. Lastly, the smart application platform suffers from the abnormal behavior of smart applications. To ensure the security and privacy of a smart home network, in this monograph, we study the corresponding key technologies following the logic of “terminal device—user interface—application platform.”

In Chap. 1, we first introduce the growth trend and architecture of the smart home network. Especially we clearly describe three different components of the smart home and their functionalities. In Chap. 2, we review existing literature about security and privacy issues faced by three components of the smart home. More specifically, we introduce the side-channel attacks faced by the terminal device, the voice spoofing attacks and countermeasures in the voice interface, and the misbehavior and defense mechanism for the application platform. In Chap. 3, at the layer of the terminal device, we study the side-channel privacy threats caused by the side-channel attack aiming at the wireless communication protocol and propose an obfuscation-based countermeasure mechanism. In Chap. 4, at the layer of voice interface, we propose a liveness detection scheme named WSVA via leveraging the Wi-Fi signal, which is ubiquitous in the smart home environment. WSVA uses the wireless Wi-Fi signal to characterize the user’s mouth movement and then determines whether the voice command received by the voice interface is an authentic voice command or a spoofing command by judging the consistency between the user’s mouth movement and the voice signal. Then, in Chap. 5, to further improve the universality of liveness detection, we propose the passive liveness detection scheme named ArrayID that only depends on the collected voice signal. ArrayID uses the microphone array commonly equipped by smart speakers to achieve more robust liveness detection performance. In Chap. 6, at the layer of the smart application platform, to solve the threat of application misbehavior, we propose a third-party anomaly detection system HoMonit. By analyzing the side-channel information of wireless communication traffic, HoMonit can accurately detect the application’s misbehavior. Finally, in Chap. 7, we summarize the main context of this monograph and introduce the possible future research directions.

Скачать Security in Smart Home Networks



ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!











ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.