Skip to main content

Consumer-Friendly Methods for Privacy Protection Against Cleaning Robots

  • Conference paper
  • First Online:
Attacks and Defenses for the Internet-of-Things (ADIoT 2022)

Abstract

As Internet of Things (IoT) technologies enter the consumer market, smart cleaning robots have gained high attention and usage in households. However, as the “privacy paradox” phenomenon states, consumers behave differently even if many claim to be concerned about smart robot privacy issues. In this paper, we describe our attempt to discover effective measures for average consumers to guard against potential privacy intrusions by cleaning robots. We define our target devices, provide an ideal smart home network topology and establish our threat model. We document network redirection and analytic methods we used during our research. We categorize existing privacy protection methods and describe their general procedures. We assess and evaluate the protection methods with regard to three aspects: protection effectiveness, functionality loss and consumer-friendliness. In the end we perform a tabular qualitative comparison and develop our vision for privacy protection against cleaning robots.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    This exact device model is no longer officially listed. The current variant “Dreame D9 Mistral Pro” [16] only differs in colour.

  2. 2.

    No substantial functional differences exist in the currently sold version 2.

References

  1. 262588213843476: Encryption and decryption tool for Xiaomi Mi Home’s API. https://gist.github.com/socram8888/4b8949023c8e8153970764d20c935785

  2. Android: Application Sandbox. https://source.android.com/security/app-sandbox

  3. Android Developers: Manifest.permission. https://developer.android.com/reference/kotlin/android/Manifest.permission

  4. Apple: App Store Review Guidelines - Apple Developer. https://developer.apple.com/app-store/review/guidelines/

  5. Apple: Launch Services Keys. https://developer.apple.com/library/archive/documentation/General/Reference/InfoPlistKeyReference/Articles/LaunchServicesKeys.html

  6. Apple: Security of runtime process in iOS and iPadOS. https://support.apple.com/guide/security/security-of-runtime-process-sec15bfe098e/web

  7. ASUS: [Wireless Router] How to configure Router to use Pi-Hole? https://www.asus.com/support/FAQ/1046062/

  8. bang590: JSPatch (2022). https://github.com/bang590/JSPatch

  9. Benz, P.: Implementierung Und Evaluierung Eines Systems Zur Hinderniserkennung Und Kollisionsvermeidung Für Indoor-Quadrokopter. Ph.D. thesis (2013). https://www.informatik.uni-wuerzburg.de/fileadmin/10030800/user_upload/quadcopter/Abschlussarbeiten/Hinderniserkennung_Infrarot_Paul_Benz_BA.pdf

  10. Bitkom: Die Zukunft der Consumer Technology – 2020, p. 61 (2020). https://www.bitkom.org/sites/default/files/2020-08/200826_ct_studie_2020_online.pdf

  11. Buffalo: AirStation™ HighPower N300 Open Source DD-WRT Wireless Router. https://www.buffalotech.com/products/airstation-highpower-n300-open-source-dd-wrt-wireless-router

  12. Bujlow, T., Carela-Español, V., Barlet-Ros, P.: Extended independent comparison of popular deep packet inspection (DPI) tools for traffic classification (2014)

    Google Scholar 

  13. Dennis, G.: Dreame Rooting. https://builder.dontvacuum.me/dreame/cmds-reset.txt

  14. Dennis, G.: Vacuum Robot Overview. https://dontvacuum.me/robotinfo/#root

  15. DreameTech: Dreame Bot D9 Pro Robot Vacuum and Mop (EU) User Manual. https://cdn.shopify.com/s/files/1/0302/5276/1220/files/Dreame_Bot_D9_Pro_Robot_Vacuum_and_Mop_EU_User_Manual.pdf?v=1629773800

  16. DreameTech: Dreame D9 Mistral Pro | Dreame [EN]. https://dreameeurope.com/en/dreame-devices/dreame-d9-mistral-pro/#ancla

  17. EUR-lex: EUR-Lex - 02016R0679-20160504, Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016. https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A02016R0679-20160504

  18. European Commission: EU: Attitudes on Data Protection and Electronic Identity in the European Union. https://joinup.ec.europa.eu/collection/eidentity-and-esignature/document/eu-attitudes-data-protection-and-electronic-identity-european-union

  19. European Data Protection Supervisor: Personal Information Management System. https://edps.europa.eu/data-protection/our-work/subjects/personal-information-management-system_en

  20. Fing: Fingbox. https://www.fing.com/products/fingbox

  21. Fing: [Fingbox] How does Fingbox block device? https://community.fing.com/discussion/4199/fingbox-how-does-fingbox-block-device

  22. Haun, M.: Einleitung als Motivation. In: Haun, M. (ed.) Handbuch Robotik. V, pp. 1–32. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39858-2_1

    Chapter  Google Scholar 

  23. Inkwire Tech: App Privacy Insights. https://apps.apple.com/us/app/app-privacy-insights/id1575583991

  24. Kim Jong Cracks: Checkra1n. https://checkra.in/

  25. Könings, B., Schaub, F., Weber, M.: Who, how, and why? Enhancing privacy awareness in ubiquitous computing. In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (Percom Workshops), pp. 364–367. IEEE (2013)

    Google Scholar 

  26. Könings, B., Schaub, F., Weber, M., Kargl, F.: Towards territorial privacy in smart environments. In: 2010 AAAI Spring Symposium Series (2010)

    Google Scholar 

  27. Miller, J.F.: Supply chain attack framework and attack patterns. Technical report, MITRE Corp, Mclean, VA (2013)

    Google Scholar 

  28. Mitmproxy: Mitmproxy - an interactive HTTPS proxy. https://mitmproxy.org/

  29. Network Working Group: Extensible Messaging and Presence Protocol (XMPP): Core. https://xmpp.org/rfcs/rfc3920.html

  30. Norberg, P.A., Horne, D.R., Horne, D.A.: The privacy paradox: personal information disclosure intentions versus behaviors. J. Consum. Aff. 41(1), 100–126 (2007). https://doi.org/10.1111/j.1745-6606.2006.00070.x

    Article  Google Scholar 

  31. Okano, M.T.: IOT and industry 4.0: the industrial new revolution. In: International Conference on Management and Information Systems, vol. 25, p. 26 (2017). https://www.researchgate.net/profile/Marcelo-Okano-2/publication/319881057_IOT_and_Industry_40_The_Industrial_New_Revolution/links/59c018a5aca272aff2e20639/IOT-and-Industry-40-The-Industrial-New-Revolution.pdf

  32. Pi-hole: Pi-hole®, Network-wide Ad Blocking. https://pi-hole.net/

  33. Sami, S., Dai, Y., Tan, S.R.X., Roy, N., Han, J.: Spying with your robot vacuum cleaner: eavesdropping via lidar sensors. In: Proceedings of the 18th Conference on Embedded Networked Sensor Systems, SenSys 2020, pp. 354–367. Association for Computing Machinery, New York (2020). https://doi.org/10.1145/3384419.3430781

  34. StatCounter: Mobile Operating System Market Share Worldwide. https://gs.statcounter.com/os-market-share/mobile/worldwide

  35. Sunyaev, A.: Internet Computing: Principles of Distributed Systems and Emerging Internet-Based Technologies. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-34957-8

  36. unknownFalleN: Xiaomi DNS Blocklist (2022). https://github.com/unknownFalleN/xiaomi-dns-blocklist/blob/f8d3ca891e3aec4d11ffd8de23c7a7657b9a76a9/xiaomi_dns_block.lst

  37. Valetudo: Valetudo. https://valetudo.cloud/

  38. Vodafone: Vodafone Station - Anleitungen & Einrichtung | Vodafone-Hilfe. https://www.vodafone.de/hilfe/router/station.html

  39. Weiser, M.: Some computer science issues in ubiquitous computing. Commun. ACM 36(7), 75–84 (1993)

    Article  Google Scholar 

  40. Westin, A.F.: Privacy and freedom Atheneum. New York 7, 431–453 (1967)

    Google Scholar 

  41. Wireshark: Wireshark \(\cdot \) Go Deep. https://www.wireshark.org/

  42. Xiaomi: Xiaomi Home - xiaomi smarthome im App Store. https://apps.apple.com/de/app/xiaomi-home-xiaomi-smarthome/id957323480

  43. Xiaomi Home: Rc4_miio/LSApplicationQueriesSchemes.txt at main \(\cdot \) seminar-mi-robot/rc4_miio. https://github.com/seminar-mi-robot/rc4_miio

  44. Yanxiu, W.: Seminar-mi-robot/rc4_miio. https://github.com/seminar-mi-robot/rc4_miio

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yanxiu Wuwang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wuwang, Y., Schiefer, G. (2022). Consumer-Friendly Methods for Privacy Protection Against Cleaning Robots. In: Li, W., Furnell, S., Meng, W. (eds) Attacks and Defenses for the Internet-of-Things. ADIoT 2022. Lecture Notes in Computer Science, vol 13745. Springer, Cham. https://doi.org/10.1007/978-3-031-21311-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-21311-3_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-21310-6

  • Online ISBN: 978-3-031-21311-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics