Proxy-based solution for legacy IoT security and privacy

Detalhes bibliográficos
Autor(a) principal: Rodrigo Monteiro da Cunha Costa Caldas
Data de Publicação: 2021
Tipo de documento: Dissertação
Idioma: eng
Título da fonte: Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
Texto Completo: https://hdl.handle.net/10216/135000
Resumo: Numerous legacy IoT devices are vulnerable to even trivial attacks that can easily compromise the entire system, and as such, securing legacy device traffic becomes a necessity when redesigning the device itself is not feasible. After implementing a layer 2 tunnel over TLS for legacy device traffic, the goal is to analyze one of the threats that the tunnel does not address, specifically inference attacks on encrypted tunnel traffic. Using a multi-node fire detection and alarm system, it is covered the possibility of inferring device behavior, even if the device traffic is encrypted. Then, in order to avoid traffic detection, by implementing traffic obfuscation methods such as padding and dummy traffic in the tunnel, it will result in an expected decrease in the ability of an eavesdropper to infer the behavior of the legacy device, even if the eavesdropper retrains its model with both padding and dummy traffic.
id RCAP_893aab481425e1178b46d5ec75dc8db6
oai_identifier_str oai:repositorio-aberto.up.pt:10216/135000
network_acronym_str RCAP
network_name_str Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
repository_id_str https://opendoar.ac.uk/repository/7160
spelling Proxy-based solution for legacy IoT security and privacyEngenharia electrotécnica, electrónica e informáticaElectrical engineering, Electronic engineering, Information engineeringNumerous legacy IoT devices are vulnerable to even trivial attacks that can easily compromise the entire system, and as such, securing legacy device traffic becomes a necessity when redesigning the device itself is not feasible. After implementing a layer 2 tunnel over TLS for legacy device traffic, the goal is to analyze one of the threats that the tunnel does not address, specifically inference attacks on encrypted tunnel traffic. Using a multi-node fire detection and alarm system, it is covered the possibility of inferring device behavior, even if the device traffic is encrypted. Then, in order to avoid traffic detection, by implementing traffic obfuscation methods such as padding and dummy traffic in the tunnel, it will result in an expected decrease in the ability of an eavesdropper to infer the behavior of the legacy device, even if the eavesdropper retrains its model with both padding and dummy traffic.2021-07-162021-07-16T00:00:00Zinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesisapplication/pdfhttps://hdl.handle.net/10216/135000TID:202825183engRodrigo Monteiro da Cunha Costa Caldasinfo:eu-repo/semantics/openAccessreponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiainstacron:RCAAP2025-02-27T19:15:13Zoai:repositorio-aberto.up.pt:10216/135000Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireinfo@rcaap.ptopendoar:https://opendoar.ac.uk/repository/71602025-05-28T23:12:36.546116Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiafalse
dc.title.none.fl_str_mv Proxy-based solution for legacy IoT security and privacy
title Proxy-based solution for legacy IoT security and privacy
spellingShingle Proxy-based solution for legacy IoT security and privacy
Rodrigo Monteiro da Cunha Costa Caldas
Engenharia electrotécnica, electrónica e informática
Electrical engineering, Electronic engineering, Information engineering
title_short Proxy-based solution for legacy IoT security and privacy
title_full Proxy-based solution for legacy IoT security and privacy
title_fullStr Proxy-based solution for legacy IoT security and privacy
title_full_unstemmed Proxy-based solution for legacy IoT security and privacy
title_sort Proxy-based solution for legacy IoT security and privacy
author Rodrigo Monteiro da Cunha Costa Caldas
author_facet Rodrigo Monteiro da Cunha Costa Caldas
author_role author
dc.contributor.author.fl_str_mv Rodrigo Monteiro da Cunha Costa Caldas
dc.subject.por.fl_str_mv Engenharia electrotécnica, electrónica e informática
Electrical engineering, Electronic engineering, Information engineering
topic Engenharia electrotécnica, electrónica e informática
Electrical engineering, Electronic engineering, Information engineering
description Numerous legacy IoT devices are vulnerable to even trivial attacks that can easily compromise the entire system, and as such, securing legacy device traffic becomes a necessity when redesigning the device itself is not feasible. After implementing a layer 2 tunnel over TLS for legacy device traffic, the goal is to analyze one of the threats that the tunnel does not address, specifically inference attacks on encrypted tunnel traffic. Using a multi-node fire detection and alarm system, it is covered the possibility of inferring device behavior, even if the device traffic is encrypted. Then, in order to avoid traffic detection, by implementing traffic obfuscation methods such as padding and dummy traffic in the tunnel, it will result in an expected decrease in the ability of an eavesdropper to infer the behavior of the legacy device, even if the eavesdropper retrains its model with both padding and dummy traffic.
publishDate 2021
dc.date.none.fl_str_mv 2021-07-16
2021-07-16T00:00:00Z
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/masterThesis
format masterThesis
status_str publishedVersion
dc.identifier.uri.fl_str_mv https://hdl.handle.net/10216/135000
TID:202825183
url https://hdl.handle.net/10216/135000
identifier_str_mv TID:202825183
dc.language.iso.fl_str_mv eng
language eng
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.source.none.fl_str_mv reponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
instacron:RCAAP
instname_str FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
instacron_str RCAAP
institution RCAAP
reponame_str Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
collection Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)
repository.name.fl_str_mv Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia
repository.mail.fl_str_mv info@rcaap.pt
_version_ 1833600056672911360