Abstract
Despite encryption, the packet size is still visible, enabling observers to infer private information in the Internet of Things (IoT) environment (e.g., IoT device identification). Packet padding obfuscates packet-length characteristics with a high data overhead because it relies on adding noise to the data. This paper proposes a more data-efficient approach that randomizes packet sizes without adding noise. We achieve this by splitting large TCP segments into random-sized chunks; hence, the packet length distribution is obfuscated without adding noise data. Our client-server implementation using TCP sockets demonstrates the feasibility of our approach at the application level. We realize our packet size control by adjusting two local socket-programming parameters. First, we enable the TCP_NODELAY option to send out each packet with our specified length. Second, we downsize the sending buffer to prevent the sender from pushing out more data than can be received, which could disable our control of the packet sizes. We simulate our defense on a network trace of four IoT devices and show a reduction in device classification accuracy from 98% to 63%, close to random guessing. Meanwhile, the real-world data transmission experiments show that the added latency is reasonable, less than 21%, while the added packet header overhead is only about 5%.
Full Text
Topics from this Paper
Packet Size
Traffic Obfuscation
Internet Of Things Device
Side-Channel Attacks
Internet Of Things
+ Show 5 more
Create a personalized feed of these topics
Get StartedSimilar Papers
Electronics
Sep 9, 2023
arXiv: Cryptography and Security
Mar 18, 2019
May 21, 2017
International Journal of Advanced Research in Science, Communication and Technology
May 20, 2022
Jun 1, 2020
Journal of Ambient Intelligence and Humanized Computing
Sep 10, 2019
Mathematics
Nov 17, 2022
International Journal of Interactive Mobile Technologies (iJIM)
Dec 21, 2021
IEEE Network
Jan 1, 2021