Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Enhancing Source-Location Privacy in Sensor Network Routing
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Towards event source unobservability with minimum network traffic in sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Devices that tell on you: privacy trends in consumer ubiquitous computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Unsupervised activity recognition using automatically mined common sense
AAAI'05 Proceedings of the 20th national conference on Artificial intelligence - Volume 1
A long-term evaluation of sensing modalities for activity recognition
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Electromagnetic eavesdropping risks of flat-panel displays
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Smart meeting systems: A survey of state-of-the-art and open issues
ACM Computing Surveys (CSUR)
Challenges in resource monitoring for residential spaces
Proceedings of the First ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings
The self-programming thermostat: optimizing setback schedules based on home occupancy patterns
Proceedings of the First ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings
Wireless sensor networks for healthcare: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
The smart thermostat: using occupancy sensors to save energy in homes
Proceedings of the 8th ACM Conference on Embedded Networked Sensor Systems
Inferring users' online activities through traffic analysis
Proceedings of the fourth ACM conference on Wireless network security
Living in a glass house: a survey of private moments in the home
Proceedings of the 13th international conference on Ubiquitous computing
The hitchhiker's guide to successful residential sensing deployments
Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems
Information flow security in cyber-physical systems
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
ActiSen: Activity-aware sensor network in smart environments
Pervasive and Mobile Computing
Smart blueprints: automatically generated maps of homes and the devices within them
Pervasive'12 Proceedings of the 10th international conference on Pervasive Computing
Privacy in mobile technology for personal healthcare
ACM Computing Surveys (CSUR)
RoomZoner: occupancy-based room-level zoning of a centralized HVAC system
Proceedings of the ACM/IEEE 4th International Conference on Cyber-Physical Systems
WBAN Based Long Term ECG Monitoring
International Journal of Monitoring and Surveillance Technologies Research
Hi-index | 0.00 |
In this paper, we first present a new privacy leak in residential wireless ubiquitous computing systems, and then we propose guidelines for designing future systems to prevent this problem. We show that we can observe private activities in the home such as cooking, showering, toileting, and sleeping by eavesdropping on the wireless transmissions of sensors in a home, even when all of the transmissions are encrypted. We call this the Fingerprint and Timing-based Snooping (FATS) attack. This attack can already be carried out on millions of homes today, and may become more important as ubiquitous computing environments such as smart homes and assisted living facilities become more prevalent. In this paper, we demonstrate and evaluate the FATS attack on eight different homes containing wireless sensors. We also propose and evaluate a set of privacy preserving design guidelines for future wireless ubiquitous systems and show how these guidelines can be used in a hybrid fashion to prevent against the FATS attack with low implementation costs.