Torrent details for "Meng Y. Security in Smart Home Networks 2023 [andryold1]"    Log in to bookmark

wide
Torrent details
Cover
Download
Torrent rating (0 rated)
Controls:
Category:
Language:
English English
Total Size:
11.78 MB
Info Hash:
3293684b1a2879830c20af6534b75c880d941c7a
Added By:
Added:  
21-01-2023 11:52
Views:
184
Health:
Seeds:
5
Leechers:
0
Completed:
6
wide




Description
wide
Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format

This book presents the security and privacy challenges of the smart home following the logic of “terminal device – voice interface – application platform”. For each component, the authors provide answers to the three questions: 1) In the terminal device layer, how to conduct cross-layer privacy breach analysis and provide effective countermeasures 2) In the voice interface layer, how to design effective and lightweight schemes to defend against voice spoofing 3) In the application layer, how to design an effective anomaly detection system without breaching the application platform. The authors conduct a thorough analysis of the security threats and challenges in each component of the smart home, review the existing state-of-the-art solutions proposed by other researchers, and elaborate on proposed countermeasures. This book aims to provide both security threats analysis and state-of-the-art countermeasures for the smart home network.
As a typical application of the Internet of things (IoT), the smart home system is widely deployed and plays an important role in our lifestyle. In the smart home environment, smart devices are connected through wireless networks, provide users with non-contact interfaces such as the voice interface, and are managed uniformly through smart applications. Smart terminal devices (e.g., smartphones, tablets, smart sensing devices) provide users with richer functions and can sense the environmental changes of the smart home in real time. With the popularization of the voice interface, users can interact with the smart home system without contact. Smart applications can automatically control devices and adjust the status of the smart home system.
However, current researches show that the smart home network still faces a wide range of security threats. Firstly, although the wireless communication technology adopted by the terminal devices speeds up the network communication rate and expands the network range, it also increases the privacy risks of users when encountering side-channel attacks. Secondly, due to the open nature of the voice channel, the voice interface faces various voice spoofing attacks. Lastly, the smart application platform suffers from the abnormal behavior of smart applications. To ensure the security and privacy of a smart home network, in this monograph, we study the corresponding key technologies following the logic of “terminal device—user interface—application platform.”
1 Introduction
2 Literature Review of Security in Smart Home Network
3 Privacy Breaches and Countermeasures at Terminal Device Layer
4 Wireless Signal Based Two-Factor Authentication at Voice Interface Layer
5 Microphone Array Based Passive Liveness Detection at Voice Interface Layer
6 Traffic Analysis Based Misbehavior Detection at Application Platform Layer
7 Conclusion and Future Directions
In Chap. 1, we first introduce the growth trend and architecture of the smart home network. Especially we clearly describe three different components of the smart home and their functionalities. In Chap. 2, we review existing literature about security and privacy issues faced by three components of the smart home. More specifically, we introduce the side-channel attacks faced by the terminal device, the voice spoofing attacks and countermeasures in the voice interface, and the misbehavior and defense mechanism for the application platform. In Chap. 3, at the layer of the terminal device, we study the side-channel privacy threats caused by the side-channel attack aiming at the wireless communication protocol and propose an obfuscation-based countermeasure mechanism. In Chap. 4, at the layer of voice interface, we propose a liveness detection scheme named WSVA via leveraging the Wi-Fi signal, which is ubiquitous in the smart home environment. WSVA uses the wireless Wi-Fi signal to characterize the user’s mouth movement and then determines whether the voice command received by the voice interface is an authentic voice command or a spoofing command by judging the consistency between the user’s mouth movement and the voice signal. Then, in Chap. 5, to further improve the universality of liveness detection, we propose the passive liveness detection scheme named ArrayID that only depends on the collected voice signal. ArrayID uses the microphone array commonly equipped by smart speakers to achieve more robust liveness detection performance. In Chap. 6, at the layer of the smart application platform, to solve the threat of application misbehavior, we propose a third-party anomaly detection system HoMonit. By analyzing the side-channel information of wireless communication traffic, HoMonit can accurately detect the application’s misbehavior. Finally, in Chap. 7, we summarize the main context of this monograph and introduce the possible future research directions

  User comments    Sort newest first

No comments have been posted yet.



Post anonymous comment
  • Comments need intelligible text (not only emojis or meaningless drivel).
  • No upload requests, visit the forum or message the uploader for this.
  • Use common sense and try to stay on topic.

  • :) :( :D :P :-) B) 8o :? 8) ;) :-* :-( :| O:-D Party Pirates Yuk Facepalm :-@ :o) Pacman Shit Alien eyes Ass Warn Help Bad Love Joystick Boom Eggplant Floppy TV Ghost Note Msg


    CAPTCHA Image 

    Anonymous comments have a moderation delay and show up after 15 minutes