kth.sePublications KTH
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Activity Recognition Protection for IoT Trigger-Action Platforms
Sharif University of Technology, Tehran, Iran.
Sharif University of Technology, Tehran, Iran.
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.ORCID iD: 0000-0002-3656-1614
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS.ORCID iD: 0000-0001-6005-5992
2024 (English)In: Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 600-616Conference paper, Published paper (Refereed)
Abstract [en]

Smart home devices collect and transmit user data to smart home Trigger Action Platforms (TAPs) for processing and executing automation rules. However, this data can also be used to infer user activities or other sensitive information. In this paper, we propose PTAP, a privacy-preserving approach based on adversarial example attacks. PTAP injects targeted perturbations into time-series sensor data, effectively confounding potentially malicious TAP classifiers. Our approach significantly reduces the chance of user activity recognition for a malicious TAP while preserving the essential information for automation rule execution, thus safeguarding TAP utility. We evaluated PTAP using a real-world smart-home dataset and examined its effectiveness in preserving utility through the execution of various IoT applications. Our results demonstrate that PTAP effectively preserves user privacy (reducing the accuracy of a malicious classifier 91 to 6 percent) while maintaining automation rule integrity, providing a practical and effective solution to protect user privacy in smart-home environments.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE) , 2024. p. 600-616
Keywords [en]
Activity recognition, Adversarial example, Data perturbation, Data privacy, Smart home, Trigger Action platform
National Category
Computer Sciences Communication Systems Computer Systems
Identifiers
URN: urn:nbn:se:kth:diva-353964DOI: 10.1109/EuroSP60621.2024.00039ISI: 001304430300031Scopus ID: 2-s2.0-85203675884OAI: oai:DiVA.org:kth-353964DiVA, id: diva2:1901040
Conference
9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, July 8-12, 2024, Vienna, Austria
Note

Part of ISBN 9798350354256

QC 20241106

Available from: 2024-09-25 Created: 2024-09-25 Last updated: 2024-11-06Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Artho, CyrilleBalliu, Musard

Search in DiVA

By author/editor
Artho, CyrilleBalliu, Musard
By organisation
Theoretical Computer Science, TCS
Computer SciencesCommunication SystemsComputer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 465 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf