Your browser does not support JavaScript!

Home    Collections    Type of Work    Post-graduate theses  

Post-graduate theses

Current Record: 26 of 4837

Back to Results Previous page
Next page
Add to Basket
[Add to Basket]
Identifier 000428738
Title Smart home devices activity fingerprinting from their network traffic and the role of virtual assistant devices
Alternative Title Ταυτοποίηση έξυπνων οικιακών συσκευών και αναγνώριση των εντολών τους από την διαδικτυακή κίνηση και ο ρόλος των εικονικών βοηθών
Author Καραμπινάκης, Εμμανουήλ Σ.
Thesis advisor Μαρκάτος, Ευάγγελος
Reviewer Παπαδοπούλη, Μαρία
Μαγκούτης, Κωνσταντίνος
Abstract Smart home devices are tending to become a necessity in our fast-paced life, Internet of Things (IoT) devices have proved to solve many of our everyday life problems of any kind. With the introduction of IoT devices in our homes, security and privacy must be taken more seriously, especially when the nature of those devices is to interact or handle sensitive and personal data. Amazon Echo is a smart speaker that can understand natural language voice commands and complete tasks for the user by communicating with Alexa, a cloud-based virtual assistant where the commands are analyzed and comprehended. The user activates the device with a wake up" word, then he interacts with it with voice commands. Alexa is also capable of connecting with peripheral smart devices at the same WiFi network, thus creating a smart home with interconnected devices under the brain of Alexa. We will demonstrate how an ISP or any other passive network observer with access to a users last-mile network traffic is capable of identifying the types of smart home devices even behind Network Address Translation (NAT). Figure out their state, and how the interconnection of the smart devices with a virtual assistant like Amazon Alexa, in the way that is implemented now, is giving away privacy-sensitive information. We will analyze the security of Amazon Echo and a few different types of smart home devices that are Alexa compatible, and we will describe the process of how a malicious network observer can infer information about the user. Also, we will present and cluster the security of IoT devices, how secure an IoT device can be with the existing implementation and on the other hand, how insecure is a more vulnerable smart device at the point where an attacker can not only extract sensitive information about the user's life but also actively interfere with its usage.
Language English
Subject IOT
Network traffic monitorine
Διαδίκτυο των πραγμάτων
Εικονικοί βοηθοί
Μελέτη διαδικτυακής κίνησης
Issue date 2020-03-27
Collection   Faculty/Department--Faculty of Sciences and Engineering--Department of Computer Science--Post-graduate theses
  Type of Work--Post-graduate theses
Permanent Link Bookmark and Share
Views 214

Digital Documents
No preview available

No permission to view document.
It won't be available until: 2020-09-27