WiFinger: Fingerprinting Noisy IoT Event Traffic Using Packet-level Sequence Matching
By: Ronghua Li , Shinan Liu , Haibo Hu and more
Potential Business Impact:
Stops hackers from spying on smart homes.
IoT environments such as smart homes are susceptible to privacy inference attacks, where attackers can analyze patterns of encrypted network traffic to infer the state of devices and even the activities of people. While most existing attacks exploit ML techniques for discovering such traffic patterns, they underperform on wireless traffic, especially Wi-Fi, due to its heavy noise and packet losses of wireless sniffing. In addition, these approaches commonly target at distinguishing chunked IoT event traffic samples, and they failed at effectively tracking multiple events simultaneously. In this work, we propose WiFinger, a fine-grained multi-IoT event fingerprinting approach against noisy traffic. WiFinger turns the traffic pattern classification task into a subsequence matching problem and introduces novel techniques to account for the high time complexity while maintaining high accuracy. Experiments demonstrate that our method outperforms existing approaches on Wi-Fi traffic, achieving an average recall of 85% (vs. 0.49% and 0.46%) for various IoT events while maintaining almost zero false positives for most of them.
Similar Papers
A Comprehensive Survey on Smart Home IoT Fingerprinting: From Detection to Prevention and Practical Deployment
Cryptography and Security
Identifies smart home gadgets to keep them safe.
Noise-Robust Radio Frequency Fingerprint Identification Using Denoise Diffusion Model
Signal Processing
Identifies Wi-Fi devices even with weak signals.
To See or Not to See -- Fingerprinting Devices in Adversarial Environments Amid Advanced Machine Learning
Cryptography and Security
Helps tell safe gadgets from bad ones.