Score: 1

WiFinger: Fingerprinting Noisy IoT Event Traffic Using Packet-level Sequence Matching

Published: August 5, 2025 | arXiv ID: 2508.03151v1

By: Ronghua Li , Shinan Liu , Haibo Hu and more

Potential Business Impact:

Stops hackers from spying on smart homes.

IoT environments such as smart homes are susceptible to privacy inference attacks, where attackers can analyze patterns of encrypted network traffic to infer the state of devices and even the activities of people. While most existing attacks exploit ML techniques for discovering such traffic patterns, they underperform on wireless traffic, especially Wi-Fi, due to its heavy noise and packet losses of wireless sniffing. In addition, these approaches commonly target at distinguishing chunked IoT event traffic samples, and they failed at effectively tracking multiple events simultaneously. In this work, we propose WiFinger, a fine-grained multi-IoT event fingerprinting approach against noisy traffic. WiFinger turns the traffic pattern classification task into a subsequence matching problem and introduces novel techniques to account for the high time complexity while maintaining high accuracy. Experiments demonstrate that our method outperforms existing approaches on Wi-Fi traffic, achieving an average recall of 85% (vs. 0.49% and 0.46%) for various IoT events while maintaining almost zero false positives for most of them.

Country of Origin
πŸ‡­πŸ‡° πŸ‡ΊπŸ‡Έ Hong Kong, United States

Page Count
16 pages

Category
Computer Science:
Cryptography and Security