Skip navigation
Please use this identifier to cite or link to this item: http://arks.princeton.edu/ark:/88435/dsp01th83m208r
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorFeamster, Nick-
dc.contributor.authorMiller, Samuel-
dc.date.accessioned2018-08-20T15:51:40Z-
dc.date.available2018-08-20T15:51:40Z-
dc.date.created2018-05-07-
dc.date.issued2018-08-20-
dc.identifier.urihttp://arks.princeton.edu/ark:/88435/dsp01th83m208r-
dc.description.abstractBecause of rapid growth in the number of Internet-connected devices, alongside recent advances in the field of data mining, the Internet of Things (IoT) presents an interesting problem for researchers concerned with user privacy. The simplicity of these devices combined with the narrow use cases of individual IoT devices causes their traffic patterns to reveal sensitive information about user activities and behaviors to passive network observers, such as an Internet service provider (ISP). This is true even for encrypted traffic and even if only the data rate is observed over time. This is particularly problematic in the absence of regulation and in the presence of the increasingly profitable field of user data mining for advertising or other purposes. This thesis aims to address this issue by tackling the problem first for two specific devices: the Belkin WeMo Switch and the Nest Cam Indoor Security Camera. This takes the form of a traffic shaping scheme where packets are only added to the network, rather than being intentionally delayed or dropped. This scheme would run partially on the device and partially on the server communicating with the device. This technique is then generalized so that it can be applied to other IoT devices as well.en_US
dc.format.mimetypeapplication/pdf-
dc.language.isoenen_US
dc.titleIoT Mask: Analyzing and Obfuscating Traffic Rates for Internet of Things Devicesen_US
dc.typePrinceton University Senior Theses-
pu.date.classyear2018en_US
pu.departmentElectrical Engineeringen_US
pu.pdf.coverpageSeniorThesisCoverPage-
pu.contributor.authorid961070696-
pu.certificateApplications of Computing Programen_US
Appears in Collections:Electrical Engineering, 1932-2020

Files in This Item:
File Description SizeFormat 
MILLER-SAMUEL-THESIS.pdf12.78 MBAdobe PDF    Request a copy


Items in Dataspace are protected by copyright, with all rights reserved, unless otherwise indicated.