{"@context":"http://iiif.io/api/presentation/2/context.json","@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/manifest.json","@type":"sc:Manifest","label":"Detecting Smart Home Activity Through Network Traffic Signatures","metadata":[{"label":"dc.identifier.uri","value":"https://hdl.handle.net/11401/79109"},{"label":"dcterms.abstract","value":"The popularity of the Internet of Things (IoT), smart home devices specifically, has been tremendous in the past couple of years. Devices like smart speakers, smart fridge, etc. have integrated seamlessly with the lives of homeowners. The main reasons being their accessibility, cost-effectiveness, and energy-efficiency. These devices by nature, continuously communicate with each other and their servers, to automate the day-to-day activities for their owners and in the process generate huge amounts of network traffic. But at the same time, this underlying automation can often occlude the operation and communication between devices from their owners.\nThis thesis is a step towards understanding the causation of smart-home activities, thereby increasing the visibility and transparency in a smart home. In this thesis, we use the network traffic traces to generate packet-level traffic signatures for device activities (change speaker volume, play music, turn ON lights), which can help identify the triggering devices for an observed activity in a smart home, without causing significant computational overhead or storage constraints. By signature matching, we show how the triggering device can be identified by the users. We present our results on our IoT testbed (WINGS Lab in Stony Brook University) and publicly available datasets. We demonstrate that our approach can identify activities and corresponding sources with good accuracy."},{"label":"dcterms.available","value":"2020-05-01"},{"label":"dcterms.contributor","value":"Committee members: Das, Samir, R.; Rahmati, Amir; Polychronakis, Michalis; Nagendra, Vasudevan"},{"label":"dcterms.creator","value":"Alatkar, Sayali Anil"},{"label":"dcterms.date","value":"2020"},{"label":"dcterms.dateAccepted","value":"2021-04-16T13:34:12Z"},{"label":"dcterms.description","value":"Department of Computer Science"},{"label":"dcterms.extent","value":"39 pages"},{"label":"dcterms.format","value":"application/pdf"},{"label":"dcterms.issued","value":"2020-05-01"},{"label":"dcterms.language","value":"en"},{"label":"dcterms.provenance","value":"Made available in DSpace on 2021-11-23T21:13:54Z (GMT). No. of bitstreams: 3\nAlatkar_grad.sunysb_0771M_14613.pdf.txt: 49624 bytes, checksum: fbb4df14e39a6d3e675a1326fe448fd1 (MD5)\nlicense.txt: 2349 bytes, checksum: 6814eec9a3f3f30924c67dbf996f2d5d (MD5)\nAlatkar_grad.sunysb_0771M_14613.pdf: 4347998 bytes, checksum: 1d190960d107baebbac34a245cc6d787 (MD5)"},{"label":"dcterms.publisher","value":"Stony Brook University"},{"label":"dcterms.subject","value":"Device Activity Detection, Internet of Things, Smart Home, Traffic Signatures"},{"label":"dcterms.title","value":"Detecting Smart Home Activity Through Network Traffic Signatures"},{"label":"dcterms.type","value":"Text"}],"description":"This manifest was generated dynamically","viewingDirection":"left-to-right","sequences":[{"@type":"sc:Sequence","canvases":[{"@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/canvas/page-1.json","@type":"sc:Canvas","label":"Page 1","height":1650,"width":1275,"images":[{"@type":"oa:Annotation","motivation":"sc:painting","resource":{"@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/14%2F07%2F24%2F1407249435646003676367201664831092083/full/full/0/default.jpg","@type":"dctypes:Image","format":"image/jpeg","height":1650,"width":1275,"service":{"@context":"http://iiif.io/api/image/2/context.json","@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/14%2F07%2F24%2F1407249435646003676367201664831092083","profile":"http://iiif.io/api/image/2/level2.json"}},"on":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/canvas/page-1.json"}]}]}]}