Abstract
As Internet of Things (IoT) technologies enter the consumer market, smart cleaning robots have gained high attention and usage in households. However, as the “privacy paradox” phenomenon states, consumers behave differently even if many claim to be concerned about smart robot privacy issues. In this paper, we describe our attempt to discover effective measures for average consumers to guard against potential privacy intrusions by cleaning robots. We define our target devices, provide an ideal smart home network topology and establish our threat model. We document network redirection and analytic methods we used during our research. We categorize existing privacy protection methods and describe their general procedures. We assess and evaluate the protection methods with regard to three aspects: protection effectiveness, functionality loss and consumer-friendliness. In the end we perform a tabular qualitative comparison and develop our vision for privacy protection against cleaning robots.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
This exact device model is no longer officially listed. The current variant “Dreame D9 Mistral Pro” [16] only differs in colour.
- 2.
No substantial functional differences exist in the currently sold version 2.
References
262588213843476: Encryption and decryption tool for Xiaomi Mi Home’s API. https://gist.github.com/socram8888/4b8949023c8e8153970764d20c935785
Android: Application Sandbox. https://source.android.com/security/app-sandbox
Android Developers: Manifest.permission. https://developer.android.com/reference/kotlin/android/Manifest.permission
Apple: App Store Review Guidelines - Apple Developer. https://developer.apple.com/app-store/review/guidelines/
Apple: Launch Services Keys. https://developer.apple.com/library/archive/documentation/General/Reference/InfoPlistKeyReference/Articles/LaunchServicesKeys.html
Apple: Security of runtime process in iOS and iPadOS. https://support.apple.com/guide/security/security-of-runtime-process-sec15bfe098e/web
ASUS: [Wireless Router] How to configure Router to use Pi-Hole? https://www.asus.com/support/FAQ/1046062/
bang590: JSPatch (2022). https://github.com/bang590/JSPatch
Benz, P.: Implementierung Und Evaluierung Eines Systems Zur Hinderniserkennung Und Kollisionsvermeidung Für Indoor-Quadrokopter. Ph.D. thesis (2013). https://www.informatik.uni-wuerzburg.de/fileadmin/10030800/user_upload/quadcopter/Abschlussarbeiten/Hinderniserkennung_Infrarot_Paul_Benz_BA.pdf
Bitkom: Die Zukunft der Consumer Technology – 2020, p. 61 (2020). https://www.bitkom.org/sites/default/files/2020-08/200826_ct_studie_2020_online.pdf
Buffalo: AirStation™ HighPower N300 Open Source DD-WRT Wireless Router. https://www.buffalotech.com/products/airstation-highpower-n300-open-source-dd-wrt-wireless-router
Bujlow, T., Carela-Español, V., Barlet-Ros, P.: Extended independent comparison of popular deep packet inspection (DPI) tools for traffic classification (2014)
Dennis, G.: Dreame Rooting. https://builder.dontvacuum.me/dreame/cmds-reset.txt
Dennis, G.: Vacuum Robot Overview. https://dontvacuum.me/robotinfo/#root
DreameTech: Dreame Bot D9 Pro Robot Vacuum and Mop (EU) User Manual. https://cdn.shopify.com/s/files/1/0302/5276/1220/files/Dreame_Bot_D9_Pro_Robot_Vacuum_and_Mop_EU_User_Manual.pdf?v=1629773800
DreameTech: Dreame D9 Mistral Pro | Dreame [EN]. https://dreameeurope.com/en/dreame-devices/dreame-d9-mistral-pro/#ancla
EUR-lex: EUR-Lex - 02016R0679-20160504, Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A02016R0679-20160504
European Commission: EU: Attitudes on Data Protection and Electronic Identity in the European Union. https://joinup.ec.europa.eu/collection/eidentity-and-esignature/document/eu-attitudes-data-protection-and-electronic-identity-european-union
European Data Protection Supervisor: Personal Information Management System. https://edps.europa.eu/data-protection/our-work/subjects/personal-information-management-system_en
Fing: Fingbox. https://www.fing.com/products/fingbox
Fing: [Fingbox] How does Fingbox block device? https://community.fing.com/discussion/4199/fingbox-how-does-fingbox-block-device
Haun, M.: Einleitung als Motivation. In: Haun, M. (ed.) Handbuch Robotik. V, pp. 1–32. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39858-2_1
Inkwire Tech: App Privacy Insights. https://apps.apple.com/us/app/app-privacy-insights/id1575583991
Kim Jong Cracks: Checkra1n. https://checkra.in/
Könings, B., Schaub, F., Weber, M.: Who, how, and why? Enhancing privacy awareness in ubiquitous computing. In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (Percom Workshops), pp. 364–367. IEEE (2013)
Könings, B., Schaub, F., Weber, M., Kargl, F.: Towards territorial privacy in smart environments. In: 2010 AAAI Spring Symposium Series (2010)
Miller, J.F.: Supply chain attack framework and attack patterns. Technical report, MITRE Corp, Mclean, VA (2013)
Mitmproxy: Mitmproxy - an interactive HTTPS proxy. https://mitmproxy.org/
Network Working Group: Extensible Messaging and Presence Protocol (XMPP): Core. https://xmpp.org/rfcs/rfc3920.html
Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100–126 (2007). https://doi.org/10.1111/j.1745-6606.2006.00070.x
Okano, M.T.: IOT and industry 4.0: the industrial new revolution. In: International Conference on Management and Information Systems, vol. 25, p. 26 (2017). https://www.researchgate.net/profile/Marcelo-Okano-2/publication/319881057_IOT_and_Industry_40_The_Industrial_New_Revolution/links/59c018a5aca272aff2e20639/IOT-and-Industry-40-The-Industrial-New-Revolution.pdf
Pi-hole: Pi-hole®, Network-wide Ad Blocking. https://pi-hole.net/
Sami, S., Dai, Y., Tan, S.R.X., Roy, N., Han, J.: Spying with your robot vacuum cleaner: eavesdropping via lidar sensors. In: Proceedings of the 18th Conference on Embedded Networked Sensor Systems, SenSys 2020, pp. 354–367. Association for Computing Machinery, New York (2020). https://doi.org/10.1145/3384419.3430781
StatCounter: Mobile Operating System Market Share Worldwide. https://gs.statcounter.com/os-market-share/mobile/worldwide
Sunyaev, A.: Internet Computing: Principles of Distributed Systems and Emerging Internet-Based Technologies. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-34957-8
unknownFalleN: Xiaomi DNS Blocklist (2022). https://github.com/unknownFalleN/xiaomi-dns-blocklist/blob/f8d3ca891e3aec4d11ffd8de23c7a7657b9a76a9/xiaomi_dns_block.lst
Valetudo: Valetudo. https://valetudo.cloud/
Vodafone: Vodafone Station - Anleitungen & Einrichtung | Vodafone-Hilfe. https://www.vodafone.de/hilfe/router/station.html
Weiser, M.: Some computer science issues in ubiquitous computing. Commun. ACM 36(7), 75–84 (1993)
Westin, A.F.: Privacy and freedom Atheneum. New York 7, 431–453 (1967)
Wireshark: Wireshark \(\cdot \) Go Deep. https://www.wireshark.org/
Xiaomi: Xiaomi Home - xiaomi smarthome im App Store. https://apps.apple.com/de/app/xiaomi-home-xiaomi-smarthome/id957323480
Xiaomi Home: Rc4_miio/LSApplicationQueriesSchemes.txt at main \(\cdot \) seminar-mi-robot/rc4_miio. https://github.com/seminar-mi-robot/rc4_miio
Yanxiu, W.: Seminar-mi-robot/rc4_miio. https://github.com/seminar-mi-robot/rc4_miio
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Wuwang, Y., Schiefer, G. (2022). Consumer-Friendly Methods for Privacy Protection Against Cleaning Robots. In: Li, W., Furnell, S., Meng, W. (eds) Attacks and Defenses for the Internet-of-Things. ADIoT 2022. Lecture Notes in Computer Science, vol 13745. Springer, Cham. https://doi.org/10.1007/978-3-031-21311-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-031-21311-3_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21310-6
Online ISBN: 978-3-031-21311-3
eBook Packages: Computer ScienceComputer Science (R0)