GLOBECOM 2020 - 2020 IEEE Global Communications Conference 2020
DOI: 10.1109/globecom42002.2020.9322070
|View full text |Cite
|
Sign up to set email alerts
|

A Defense Mechanism for Timing-based Side-Channel Attacks on IoT Traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 12 publications
0
3
0
1
Order By: Relevance
“…Our technique does not consider timing characteristics, such as the interarrival time. However, the issue of timing leakage has been addressed by delaying the data packets to obscure the related patterns [8]. This approach can be integrated with our defense to effectively conceal both the timing and the length features.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Our technique does not consider timing characteristics, such as the interarrival time. However, the issue of timing leakage has been addressed by delaying the data packets to obscure the related patterns [8]. This approach can be integrated with our defense to effectively conceal both the timing and the length features.…”
Section: Discussionmentioning
confidence: 99%
“…For example, to address the packet-size leakage, the current traffic shaping methods mainly pad packets with additional bytes to obscure the related characteristics [7]. Regarding the timing side-channel, which falls outside the scope of this paper, adding a random packet delay has been employed as a means to prevent such information leakage [8]. Obviously, both countermeasures introduce data and time overhead.…”
Section: Introductionmentioning
confidence: 99%
“…Various methods can be selected to achieve a certain desired result. The authors in [ 83 ] propose a defense mechanism against timing-based side-channel attacks to response time on the Internet of Things. This mechanism follows two modules, vulnerability testing and privacy protection.…”
Section: Review Of Selected Studiesmentioning
confidence: 99%
“…Em todos esses casos, é de extrema importância garantir a disponibilidade, a privacidade e a transmissão confidencial dos dados do usuário, do ambiente e das aplicações a um repositório centralizado de dados/nuvem de processamento [Datta et al 2018, Hafeez et al 2020, Nakayama et al 2019, Nogueira et al 2009]. Por exemplo, diferentes tipos de sensores geram tráfego de dados característico, que pode ser detectado no meio de outras transmissões e usado para estimar o tipo específico de monitoramento realizado em um determinado indivíduo e outras informações importantes [Dong et al 2019, Trimananda et al 2020, Al-Shawabka et al 2020, Prates et al 2020, Tahaei et al 2020]. Esse tipo de vazamento de privacidade do usuário ocorre por meio da análise do tráfego de dados gerado pelos sensores.…”
Section: Introductionunclassified