skip to main content
research-article

Smart Light-Based Information Leakage Attacks

Published:10 August 2020Publication History
Skip Abstract Section

Abstract

Modern Internet-enabled smart lights promise energy efficiency and many additional capabilities over traditional bulbs. However, these connected lights also expose a new attack surface, which can be maliciously used to violate users' privacy and security. We design and evaluate novel inference attacks that take advantage of the light emitted by these smart lights to infer sensitive user data and preferences.

References

  1. N. Avlonitis, E. Yeatman, M. Jones, and A. Hadjifotiou. 2006. Multilevel amplitude shift keying in sispersion uncompensated optical systems. OptoElectronics.Google ScholarGoogle Scholar
  2. G. E. Batista, X. Wang, and E. J. Keogh. 2011. A complexity-invariant distance measure for time series. In SIAM International Conference on Data Mining.Google ScholarGoogle Scholar
  3. L.J. Latecki, Q. Wang, S. Koknar-Tezel, and V. Megalooikonomou. Optimal subsequence bijection. 2007. In IEEE International Conference on Data Mining (ICDM).Google ScholarGoogle Scholar
  4. A. Maiti and M. Jadliwala. 2019. Light Ears: Information leakage via Smart Lights. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies.Google ScholarGoogle Scholar
  5. M. Muller. Information Retrieval for Music and Motion, Springer, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Puri and K. Ramchandran. Multiple description source coding using forward error correction codes. 1999. In Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers.Google ScholarGoogle Scholar
  7. M. Wollmer, M. Al-Hames, F. Eyben, B. Schuller, and G. Rigoll. A multidimensional dynamic time warping algorithm for efficient multimodal fusion of asynchronous data streams. 2009. Neurocomputing.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image GetMobile: Mobile Computing and Communications
    GetMobile: Mobile Computing and Communications  Volume 24, Issue 1
    March 2020
    38 pages
    ISSN:2375-0529
    EISSN:2375-0537
    DOI:10.1145/3417084
    Issue’s Table of Contents

    Copyright © 2020 Copyright is held by the owner/author(s)

    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 10 August 2020

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader