A GAN-Based Approach for Mitigating Inference Attacks in Smart Home Environment

A GAN-Based Approach for Mitigating Inference Attacks in Smart Home Environment

A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment Olakunle Ibitoye, Ashraf Matrawy, and Omair Shafiq School of Information Technology Carleton University, Ottawa, Canada Email: fKunle.Ibitoye, Ashraf.Matrawy, Omair.Shafiq, [email protected] Abstract— The proliferation of smart, connected, always private conversations. One recommended approach for pro- listening devices have introduced significant privacy risks to tecting user privacy in smart homes from always listening users in a smart home environment. Beyond the notable devices is the use of sound masking by adding white noise risk of eavesdropping, intruders can adopt machine learning techniques to infer sensitive information from audio recordings to audio signals [5]. White noise includes all frequencies on these devices, resulting in a new dimension of privacy at equal energy. However, it is more desirable to generate concerns and attack variables to smart home users. Techniques audio signals that sound more comfortable to listeners. As such as sound masking and microphone jamming have been such, only the specific frequency spectrum that are required effectively used to prevent eavesdroppers from listening in to to increase privacy are produced with resultant minimal private conversations. In this study, we explore the problem of adversaries spying on smart home users to infer sensitive distraction. information with the aid of machine learning techniques. We Providers and vendors of smart home IoT devices have then analyze the role of randomness in the effectiveness of argued that connected, always listening devices such as Ama- sound masking for mitigating sensitive information leakage. We zon Echo speakers implement a temporary buffer [6] that propose a Generative Adversarial Network (GAN) based ap- prevents the device from continuously recording user conver- proach for privacy preservation in smart homes which generates random noise to distort the unwanted machine learning-based sations. In addition, users can review and delete their voice inference. Our experimental results demonstrate that GANs can recordings either through the app or by voice commands. be used to generate more effective sound masking noise signals While these techniques are a reasonable proposition, their which exhibit more randomness and effectively mitigate deep effectiveness is not yet proven in preserving user privacy, learning-based inference attacks while preserving the semantics especially since the attack surface increases with Internet of the audio samples. Index terms - privacy, IoT, generative adversarial networks, connectivity and accessibility to various third-party apps. information leakage, smart home Moreover, this requires having a complete trust in several providers (hardware, software, etc.) and the insiders within I. INTRODUCTION the organization, which may not be guaranteed all the time. In this study, we explore risks beyond eavesdropping and The presence of ”always listening” devices in a user’s consider information leakage in smart home environments. environment poses significant privacy concerns, as an ad- An information leakage attack provides a larger attack sur- versary may leverage these devices to eavesdrop on a user’s face because the adversary can deduce or infer sensitive in- private conversations. With the proliferation of IoT smart formation with the aid of computation and machine learning home devices, the number of microphone bearing devices in techniques. For example, an adversary can infer that there is residential homes has increased exponentially over the past an infant child in the home, can infer the race and gender decade resulting in an increased attack surface for adver- of the occupants, or activities being performed in a home by arXiv:2011.06725v1 [cs.LG] 13 Nov 2020 saries. A typical case study in [1] showed that researchers merely running inference attacks on the smart home devices with minimal coding effort converted an Amazon Echo smart [7] [8]. speaker into a spy device for eavesdropping on homeowners. Sound-based inference attacks may provide greater incen- Similar studies [2] [3] have suggested a wide range of tives to adversaries. For example, they can get thousands of adversaries including IoT platform owners, app developers, users to download an app, and infer certain sensitive informa- device manufacturers and solution providers. tion such as behavioral patterns for a large number of people, The ability of GANs to create high dimensional data has which can then be used for commercial purposes such as been researched [4]. In this study, we seek to correlate advertising and sales targeting [9]. An adversary may also the relationship between high dimensional data in GAN use such information for more malicious purposes, which generated audio samples and increased randomness. could jeopardise the safety of the smart home occupants, The use of sound masking noise signals has been an such as inferring home occupancy and planning a robbery important technique in protecting user privacy against eaves- attack [10]. droppers who attempt to gain unauthorized access to users’ Our contributions from this study are twofold. In our first contribution, we demonstrate that GAN generated noise results in better performance in mitigating machine learning-based information leakage inference in smart home thus propose approaches to incorporate privacy preservation environments due to the increased randomness in the GAN techniques into the structure of the GAN. noise. We show the relationship between randomness in Researchers have investigated the use of noise audio audio signals and the effectiveness of a sound-masking noise signals for privacy preservation in smart environments, such signal in preventing sensitive information leakage. as in [18], where a noise generator was proposed for preserv- For our second contribution, we introduce a novel Gen- ing privacy in smart tactical platforms. In [19], researchers erative Adversarial Network (GAN) structure for producing exploited the use of audio masking for preventing sensitive sound-masking noise signals that are proven to be truly information leakage in smartphones. random. We adopt existing frameworks for measuring the The feasibility of inferring sensitive information in smart randomness element in discrete signals and demonstrate that homes has been studied from numerous contexts. In [20], the GAN based audio noise signals have more entropy-based user activities such as walking, sleeping etc. could be inferred randomness compared to digitally generated white noise by observing the network traffic in a smart home. Even signals. when such traffic is encrypted as in [21], an adversary can The novelty of our research is demonstrated in the fol- still perform information leakage attacks on the smart home, lowing ways. To the best of our knowledge, this is the compromising user privacy and confidentiality. first study to investigate the use of GAN-based noise for Several attempts have been made to explore the usage of mitigating sound-based privacy leakage inference attacks GAN’s in network security. [22] proposed the use of GAN’s targeted against smart home environments. for defending against adversarial attacks in network security. Also, this is the first study to the best of our knowledge From our literature review, we observed that no published to investigate the effect of randomness in the ability of a work had explored the use of Generative Adversarial Net- sound masking noise signal to mitigate sensitive information works (GANs) to generate audio noise signals to mitigate leakage. Our findings show that information leakage mitiga- audio inference attacks in smart home environments. Our tion is strongly correlated with the randomness element in research, therefore, seeks to close this gap. the sound masking audio signal. We further demonstrate that GANs can generate noise signals which can effectively mitigate sound-based privacy III. PROBLEM STATEMENT AND PROPOSED SOLUTION inference attacks while maintaining the semantics of the audio signal, as shown in section VII-C. Several users have installed various IoT devices to make their homes smarter. These devices are always connected, II. RELATED WORK measuring, and collecting data about the environment. An Existing research work for privacy preservation / infor- adversary can use the information from those sensors to infer mation leakage prevention with noise distortion has focused sensitive information about the occupants of the home. This on signal jamming – to distort the signal and prevent an raises significant privacy concerns. For example, researchers eavesdropper from listening. No existing solution has utilized have been able to infer the TV content of home users by generative adversarial networks to create the noise distortion. listening to the sound from the TV [23]. Similar work [11] has also used ultrasonic transmission to While it is easy for someone who is familiar with the jam nearby microphones . movie to tell just by listening to the audio sound if the Lei et al. [12] proposed the use of a physical presence person is in close proximity to the home, the proliferation of based access control mechanism which ensures that physical smart, connected devices that are always listening creates presence is detected before activating the ”wake word” in a larger attack surface. This means that IoT devices or voice assistants as a security measure or before accepting smartphones could be accessed remotely without the owners’ voice commands

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    12 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us