A Survey On Sensor-Based Threats To Internet-of-Things (IoT) Devices and Applications
A Survey On Sensor-Based Threats To Internet-of-Things (IoT) Devices and Applications
net/publication/349901174
CITATIONS READS
112 2,528
5 authors, including:
All content following this page was uploaded by Amit Kumar Sikder on 23 March 2021.
Abstract—Modern electronic devices have become “smart” as domains [3], [4]. From personal healthcare to home appliances,
well as omnipresent in our day-to-day lives. From small house- from big industrial applications to smart cities, smart devices
hold devices to large industrial machines, smart devices have are in every possible application domain. The increasing
become very popular in every possible application domain. Smart
devices in our homes, offices, buildings, and cities can connect popularity and utility of these devices in diverse application
with other devices as well as with the physical world around domains made the device industry grow at a tremendous rate.
them. This increasing popularity has also placed smart devices According to a report by Statista and Forbes, there will be 3.5
as the center of attention among attackers. Already, several billion smart devices by 2024 with a penetration rate of 52.4%
types of malicious activities exist that attempt to compromise and more than 152,000 smart devices will be connected to the
the security and privacy of smart devices. One interesting and
noteworthy emerging threat vector is the attacks that abuse the Internet every minute in 2025 [5], [6].
use of sensors on smart devices. Smart devices are vulnerable to The use of sensors in smart devices inevitably increases
sensor-based threats and attacks due to the lack of proper security the functionality of the devices; however, the sensors can
mechanisms available to control the use of sensors by installed also be used as vehicles to launch attacks on the devices
apps. By exploiting the sensors (e.g., accelerometer, gyroscope, or applications. Recently, there have been several attempts to
microphone, light sensor, etc.) on a smart device, attackers can
extract information from the device, transfer malware to a device, exploit the security of smart devices via their sensors [7]–[9].
or trigger a malicious activity to compromise the device. In this Attackers can use the sensors to transfer malicious code or a
paper, we explore various threats and attacks abusing sensors of trigger message to activate malware planted in a device [10],
smart devices for malicious purposes. Specifically, we present a [11], capture sensitive personal information shared between
detailed survey about existing sensor-based threats and attacks devices (e.g., smartwatches, smart home devices, etc.) [12]–
to smart devices and countermeasures that have been developed
to secure smart devices from sensor-based threats. Furthermore, [15], or even extract encrypted information by capturing
we discuss security and privacy issues of smart devices in the encryption and decryption keys [16]. Moreover, attackers can
context of sensor-based threats and attacks and conclude with use the sensors of one device as an attack platform to abuse
future research directions. or interrupt normal functionalities of connected devices [17].
Index Terms—Sensor-based threats, Smart devices, Internet- These sensor-based threats pose a significant risk to the smart
of-Things, Security, Sensors. devices as manufacturers are not fully aware yet [18]. Indeed,
sensor-based threats are becoming more prevalent because of
the easy access to the sensors and the limited security measures
I. I NTRODUCTION
that consider these threats [19]–[22].
MART devices such as smartphones, smart watches, smart Furthermore, attackers do not need any complicated tools
S lights, smart locks, etc. have become very popular in
recent years. With the tremendous growth of Internet of
to access the sensors, which make sensor-based threats easier
to execute [13], [23]. Existing studies have verified that it is
Things (IoT), smart devices now have advanced capabilities possible to execute sensor-based attacks without impeding the
to interact with other devices and also with human beings normal functions of devices. Also, there have been several real-
and its surrounding physical world to perform a myriad of life malware reported recently which use sensors as a means
tasks [1]. In this context, the use of sensors on smart devices of performing malicious activities on smart devices [24]. For
enables a seamless connection between the devices and the example, TrendMicro, a renowned security company, reported
physical world. Indeed, modern smart devices come with a in 2019 three publicly available Android apps in Google
wide range of sensors (e.g., accelerometer, gyroscope, micro- Playstore used the motion sensor to evade malware scanners in
phone, light sensor, etc.) that enable more efficient and user- the smartphone [25]. When a user performs any task such as
friendly applications [2]. These sensors introduce features such making calls or texting in the smartphone, it creates deviation
as context-awareness, self-learning, and automation which im- in the motion sensor. These malicious apps check the motion
prove the applicability of smart devices in various application sensor data to determine whether the app is running in a
real environment or in a sandbox environment of a malware
A. K. Sikder, H. Aksu, and A. S. Uluagac are with the Cyber-Physical Sys- scanner. Based on the detected sandbox environment, the
tems Security Lab (CSL), Electrical and Computer Engineering Department,
Florida International University, Miami, Florida, USA. E-mail: {asikd003, malware stop executing malicious code and perform the nor-
haksu, suluagac}@fiu.edu. mal operation. On the contrary, the malware inject malicious
G. Petracca and Trent Jaeger are with the Systems and Internet In- banking trojan such as Anubis and Cerberus upon detecting
frastructure Security Lab (SIIS), Department of Computer Science and
Engineering, Penn State University, Pennsylvania, USA. E-mail: {gxp18, a real-life environment with user interaction. Hence, trivial
tjaeger}@cse.psu.edu execution, easy access to the sensors, and lack of knowledge
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
about the sensor-based threats constitute significant risks for requirements to protect sensors in smart devices and how
the smart devices. existing systems address these goals. We also summarize the
Researchers have proposed several countermeasures such shortcomings of existing systems in detecting sensor-based
as enhancing permissions for sensor access, information flow threats. In Section V, we classify the sensor-based threats and
analysis, etc. to improve the security of smart devices against attacks based on key security principles and explain our scope
sensor-based threats [26], [27]. However, these proposed solu- of work. We present existing sensor-based threats and attacks
tion depend on either user decision or availability of the source in Section VI and summarize attack methods and impact of the
code of the apps. Moreover, the majority of these app-specific threats based on different vulnerability metrics. In Section VII,
solutions cannot envision the passive sensor-based threats such we articulate approaches that have been proposed to secure
as eavesdropping, triggering and transferring malware using sensors of smart devices and their shortcomings to detect
sensors, abusing sensors using interference, etc. For instance, a reported sensor-based threats and attacks. Future research in
specific on/off pattern of a smart light can trick a smart camera the area of sensor-based threats and security of smart devices
to capture and leak pictures containing sensitive information are described in Section VIII. Finally, we conclude this paper
in a smart home environment [28]. Thus, understanding these in Section IX.
sensor-based threats and attacks in the literature is necessary
for researchers and the community to design reliable solutions II. R ELATED W ORK
to detect and prevent these threats efficiently. In recent years, several surveys and tutorials have been
Contributions— In this paper, we present a detailed survey published covering different threats and defense mechanisms
of threats that can be exploited to attack sensors in smart of smart devices and applications [31], [33]. However, these
devices. Several prior works have mentioned sensor-based works either focus on traditional network-based threats or
threats as one of the emerging threat vectors to the smart system vulnerabilities generated from flawed frameworks. In
devices [29], [30]. In particular, previous works have included addition, prior works investigate security and privacy issues
sensor-based threats in the threat taxonomy as a general of wireless sensor networks focusing on communication level
threats to specific smart devices such as smartphones [31] threats [34].
and discussed major drawbacks on the operating system (OS) The majority of existing surveys and tutorials focus on
level [32]. However, no taxonomy and impact analysis of explaining the security and privacy issues of smart devices
sensor-based threats and attacks is provided in these works. in a generalized way overlooking the detail explanation of
Compared to the prior works, we conduct a detailed survey of sensor-based threats. However, the generalized discussion and
the existing sensor-based threats to smart devices and provide categorization of security and privacy issues presented in prior
a formal taxonomy of sensor-based threats to understand the works cannot illustrate the detailed attack surface of sensor-
attack mechanisms and effects on smart devices. We also based threats including attack methods, attack types, targeted
introduce common vulnerability metrics to perform impact sensors, and attack impacts. Suarez-Tangil et al. investigated
analysis of sensor-based threats to smart devices. Furthermore, malware evolution in smart devices and categorized the exist-
we present a taxonomy of existing solutions that specifically ing malware detection techniques in seven broad categories
focus on mitigating sensor-based threats and outline future including the type of detection, type of analysis, targeted
research directions in terms of sensor security in smart devices. malware, etc. [31]. Yang et al. surveyed the general security
In summary, the contributions of this paper are: and privacy issues of IoT devices and categorized the threats
to four categories - physical/perception, network, software,
• First, we present a detailed discussion regarding the security and encryption attacks [35]. The authors categorized sensor-
goals and requirements to protect smart devices from sensor- based threats under physical/perception attacks and discussed
based threats and identify the important shortcomings of the threats arising from tampered sensors and unencrypted com-
existing systems. munications only. Ammar et al. presented a tutorial work on
• Second, we provide a detailed taxonomy of sensor-based
security and privacy issues of IoT programming platforms such
threats and attacks to smart devices and discuss the mecha- as AWS IoT, Azure, etc. and explained how security features
nisms and effectiveness of the attacks in a detailed way. We on programming platforms are adapted in smart apps [36].
also summarize the effectiveness of the threats and attacks The authors mainly focused on security issues arising from
based on known vulnerability metrics. authentication, access control, and secure communication in
• Third, we discuss the proposed security solutions by the
IoT layers. Khan et al. surveyed different threats to smart-
research community and developers for smart devices and phones in IoT ecosystem [37]. Cao et al. presented a detailed
their shortcomings in the context of sensor-based threats and survey of network-based threats to cyber-physical systems
attacks. and discussed threats on perception and sensing layer arising
• Fourth, we identify several open issues and discuss future
from malicious communication between CPS devices [38].
research that could contribute to secure smart devices against Hassija et al. summarized security threats to IoT devices
emerging sensor-based threats. and categorizes the threats based on working layers [39].
Organization—The rest of the paper is organized as fol- Bhat et al. reviewed existing threats and mitigation techniques
lows. We discuss related works in Section II. In Section III, we in Android-operated smart devices and listed several sensor-
give the definition and general architecture of smart devices. based threats that exploits OS-level authorization [32]. In a
In Section IV, we briefly discuss the security goals and recent work, Li et al. surveyed adversarial threats to CPS and
2
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
IoT devices and categorizes adversarial threats to sensors of systems in wireless sensor networks [58]. In addition, Butun et
smart devices [29]. The authors only considered adversarial al. surveyed existing issues of wireless sensor networks in IoT
examples that exploit sensors in IoT and CPS devices and devices and categorized network layer threats emerging from
discussed how adversarial inputs can manipulate sensor data sensor nodes [59]. Al-garadi et al. surveyed machine learning-
in machine learning-based models. based security mechanisms for IoT devices and discussed
Security and privacy issues arising from communication challenges regarding security of IoT devices [60].
protocols in smart devices have been highlighted in several Differences from the existing works. All the aforementioned
surveys and tutorials. However, these works only cover sensor- surveys and tutorials are very useful to review the security of
based threats targeting the communication medium overlook- smart devices from the network and operating system level.
ing other sensor-based threats (e.g., keystroke inference, false While several prior works [7], [10], [18] mentioned sensor-
sensor data, etc. [15], [40]). Dragomir et al. reviewed several based threats as a security issue, no prior work investigated the
security threats of communication protocols for IoT systems sensor-based threats and attacks in-depth as in this paper. We
and summarized several network vulnerabilities of IoT sensor acknowledge that several prior works included sensor-based
networks [41]. Tomic et al. surveyed protocol level vulnera- threats as a variant of network-based and side-channel attacks
bilities in wireless sensor networks including eavesdropping, in the attack taxonomy of mobile or IoT devices overlooking
node tampering, and hardware threats [42]. Ngu et al. reviewed several existing sensor-based attacks [29], [30], [39], [45].
different aspects and issues of IoT middleware and summa- However, these prior works lack a method to organize these
rized threats to sensor communication in IoT ecosystem [43]. sensor-based attacks to help researchers understand the diverse
The authors discussed various threats to sensors that emerged attack surface and the effects of these threats on smart devices
from IoT middleware communication such as sensor to cloud as shown in Table 1. For instance, several existing surveys
communication, sensor computing in the cloud, web services explored defense mechanisms for mobile and IoT devices to
connected with sensors, etc. Another interesting work was address network-based threats and platform-specific security
presented by Polla et al. where authors mentioned sensor inadequacies that fail to assess the specific requirements for
sniffing as a severe threat to mobile devices (e.g., smartphone, securing sensors [30], [32], [37]. Instead, our work identifies
smart watch, etc.) [44]. Caprolu et al. investigated security and the diverse sensor functionalities in smart devices (both mobile
privacy aspects of short-ranged audio channel and considered and IoT devices) and provides a detailed taxonomy of sensor-
sensor eavesdropping as one of the major threats to smart based threats to explain how each type of attack can be
devices [45]. Neshenko et al. outlined security requirements performed by targeting sensors in smart devices. We also
in IoT network by introducing a layer and security-based introduce common vulnerability scoring metrics that provide
attack taxonomy [30]. Authors discussed existing flaws in IoT a systematic approach to assess the severity of existing and
devices and platforms and pointed out several key challenges future sensor-based threats based on the nature of the attacks,
to improve the security of IoT devices. Hamad et al. con- the attacker’s capabilities, the privilege requirements, and their
ducted a survey to discuss security flaws in IoT devices and success rate in different smart devices. In summary, we have
architecture and summarized recent advancements in security the following key differences from prior works-
services in IoT cloud [46]. In another work, Sengupta et al.
summarized blockchain-based security solutions to address • Sensor security requirements: In this survey, we identify
security and privacy threats in IoT devices [47]. Newaz et al. shortcomings of existing smart device platforms in securing
surveyed security and privacy issues in emerging health IoT sensors and summarize key security requirements to enhance
devices and applications [48]. Recently, yan et al. presented a sensor security in smart devices.
generalized approach to analyze security of analog sensors and • Threat taxonomy and modeling : Prior works have included
presented existing vulnerabilities [49]. Besides these works, sensor-based threats in the threat taxonomy and explained the
several prior works have summarized the security and privacy attacks from network and OS-perspective. Compared to prior
issues of smart devices and discussed future research directions works, we introduce a formal threat model of sensor-based
to resolve these issues [50]–[54]. threats considering attack methods, effects, and capabilities.
Several prior works have also surveyed existing security so- • Impact analysis: We introduce vulnerability metrics to ana-
lutions proposed by the research community and developers to lyze the impact of sensor-based threats on smart devices. We
address the security and privacy issues of smart devices. How- consider seven vulnerability metrics including attack method,
ever, there is no survey exploring security solutions addressing device access, attack complexity, privilege, user interaction,
sensor-based threats to smart devices. Yan et al. surveyed trust security impact, and success rate to understand the overall
management frameworks for IoT devices and discussed several impact of each reported sensor-based attack.
approaches for sensor enriched networks [55]. Chaabouni et al. • Taxonomy of existing security mechanisms: Several prior
summarized existing network-based intrusion detection meth- works have explored existing security mechanisms available
ods for IoT devices including detection methods for sensor- for smart devices and summarized how they enhance the
based threats using network traffic [56]. Butun et al. presented overall security of smart devices. Compared to these works,
a detailed overview of intrusion detection systems (host-based we provide a taxonomy of existing security mechanisms that
and network-based) for wireless sensor networks for traditional explicitly address sensor-based threats to smart devices. We
network-based attacks [57]. Another recent work updated the explain how each security mechanism enhances sensor security
aforementioned work with current trends of intrusion detection in smart devices and outlines their shortcomings based on
3
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
4
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
Figure 1: Smart device architecture layers and components. Some smart devices may have all the layers (e.g., smart thermostat)
or a subset of these layers (e.g., smart sensors).
combines with communication and data processing layer [66] 3) Position sensors: Position sensors deal with the physical
to capture and analyze sensed data. However, a device with position and location of the device. The most common position
only sensing layer cannot be considered as a smart device sensors used in smart devices are magnetic sensors and Global
since only sensing layer without any computing capabilities Positioning System (GPS). Magnetic sensors are usually used
cannot provide any functionalities of smart devices (automa- as a digital compass and help fix the orientation of a device’s
tion, context-awareness, self-learning, etc.) [63]. display. On the other hand, GPS is used for navigation
purposes.
A. Sensing Layer
The main purpose of the sensing layer is to identify any B. Communication Layer
phenomena in the devices’ peripheral and obtain data from The communication layer acts as a channel to transfer data
the real world. This layer consists of several sensors, where collected in the sensing layer to other connected devices.
multiple sensors are typically used together by applications In addition, the communication layer also establishes a con-
to collect various data [67]. The sensing layer of smart nection between the device and cloud server to accumulate
device ecosystem can consist of both on-device sensors and data from the external independent sensors [31], [69]. In
external independent sensors. In both cases, sensors are usually smart devices, the communication layer is realized by using
integrated through sensor hubs [68]. A sensor hub is a common diverse communication technologies (e.g., Wi-Fi, Bluetooth,
connection point for multiple sensors that accumulate and Zigbee, Z-Wave, LoRa, cellular network, etc.) to allow data
forward sensor data to the processing unit of a device. A flow between other devices within the same network. The
sensor hub may use several transport mechanisms (e.g., Inter- Communication layer also simplifies remote access to smart
Integrated Circuit (I2C) or Serial Peripheral Interface (SPI)) devices. For example, a user can control a smart light from
for data flow between sensors and applications. For on-device different locations using an app on a smartphone. For on-
sensors, the sensor hub uses Inter-Integrated Circuit (I2C) or board sensors, data communication from the sensor to the
Serial Peripheral Interface (SPI) to forward sensor data to the processing unit is performed by different serial and parallel
data processing layer. For external independent sensors, sensor communication protocols such as Serial Port Interface (SPI),
data are forwarded to the cloud server from the sensor hub Inter-Integrated Circuit (I2C) protocol, Peripheral Component
and smart devices can accumulate these data from the cloud Interconnect (PCI), etc.
server using the network layer. Sensors in smart devices can
be classified into three broad categories (A detailed description C. Data Processing Layer
of different sensors is given in Table II): The data processing layer takes data collected in the sensing
1) Motion Sensors: Motion sensors measure the change in layer and analyses it to make data-driven decisions. This layer
motion as well as the orientation of the devices. There are provides processed data to installed applications to perform
two types of motions one can observe in a device: linear different tasks. Also, in some smart devices (e.g., smartwatch,
and angular motions. The linear motion refers to the linear smart home hub, etc.), the data processing layer saves the
displacement of a smart device while the angular motion refers results from previous analysis to improve the user experience.
to the rotational displacement of the device. For instance, the data processing layer can learn the contexts
2) Environmental Sensors: Sensors such as light, pressure, and patterns during the user interactions to take autonomous
etc. are used to sense the change in environmental parameters decisions. This layer may share the result with other connected
in the device’s peripheral. The primary purpose of using envi- devices via the network layer.
ronmental sensors is to help the devices to take autonomous
decisions according to the changes in a device’s peripheral. For D. Application Layer
instance, environment sensors are used in many applications The application layer presents and renders the results of the
to improve user experience (e.g., home automation systems, data processing to the user. In other words, the application
smart locks, smart lights, etc.). layer is a user-centric layer which executes various tasks
5
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
for the users. There exist diverse applications, which include in his smart home system including smart lock, thermostat,
smart transportation, smart home, personal care, healthcare, motion sensor, temperature sensor, and presence sensor. Here,
etc. [70]. Application layer also provides user interface to the temperature and presence sensors are embedded in smart
users where users can select, control, and monitor different thermostat while the motion sensors are external sensors
applications of the smart devices. connected with smart devices using different communication
protocols (e.g., ZigBee, Z-Wave, BLE, etc.) or via cloud [64].
IV. E XISTING S ENSOR M ANAGEMENT S YSTEMS AND We assume all the smart devices and sensors are in the same
S ECURITY N EEDS IN S MART D EVICES network. Bob installed several smart apps to automate and
Modern smart devices create a many-to-many relationship control tasks in smart devices. For instance, Bob installed an
between apps and sensors that OSes manage. Managing this app in the thermostat to automate temperature control using
relation is a hard task and smart device OSes need effective the embedded temperature sensor. Also, Bob configured the
and practical sensor management schemes to ensure secure external motion sensor with the smart lock to unlock the
data flow from the sensors to the apps. In addition, the door with the users’ motion. Based on the configurations and
sensor management in several smart devices (e.g., smart light, installed apps, the following scenarios can happen-
thermostat, etc.) also needs to assure a secure and seamless Case 1- An attacker having access to the same network
connection with external sensors to perform multiple tasks. installs a malicious motion sensor without alerting Bob. How
Hence, an effective sensor management system is required can Bob identify the legitimate sensor while configuring the
to manage and ensure the security of all the sensors in the smart lock with the external motion sensor?
smart devices. In this section, we discuss different security Case 2- Bob unknowingly installs a malicious app for the
requirements and goals of smart devices and how the exist- smart thermostat that is trying to access all the embedded
ing sensor management systems address these requirements. sensors (both temperature and presence sensor). How can Bob
Furthermore, we also articulate the shortcomings of existing limit the sensor access of the installed app?
sensor management systems. Case 3- An attacker with the access of device peripheral
To understand the security needs in smart devices, we captures the network packets between external sensors and
consider the following smart device use cases. Assume a the smart lock using a sniffing device. Additionally, the
user, Bob, has several smart devices and sensors installed attacker is trying to change environment parameters (e.g.,
6
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
temperature) to change sensor reading and switch on the the device handler can be easily altered. The device handler
thermostat maliciously. How can Bob ensure that the attacker can be changed manually and an attacker can easily create
fails to extract any sensitive information from captured sensor- a fake device handler to trick smart device user to install a
device communication and verify whether the sensor reading compromised sensor in the smart device ecosystem. Attackers
is legitimate or not? can also exploit the sensors by mimicking the hard-coded
Case 4- An attacker having access to the network sends fingerprint in a compromised or fake sensor [72]. Furthermore,
malicious connection requests to the external motion sensor to Listing 1: An example device handler of Fibaro Motion Sensor
make it unavailable for performing pre-defined tasks. How can 1 metadata {
Bob confirm sensor availability while configuring the smart 2 definition (name: "Fibaro Motion Sensor", namespace: "
smartthings", author: "SmartThings", ocfDeviceType: "x.com.
lock with an external motion sensor? st.d.sensor.motion", runLocally: true, minHubCoreVersion: ’
000.021.00001’, executeCommandsLocally: true)
To address these questions, current smart device ecosystem 3 {
4 capability "Motion Sensor"
needs, (1) a sensor authentication system to identify fake or 5 capability "Temperature Measurement"
6 capability "Acceleration Sensor"
compromised sensors, (2) a sensor authorization framework 7 capability "Configuration"
8 capability "Illuminance Measurement"
to limit malicious sensor access, (3) Secure data sharing 9 capability "Sensor"
10 capability "Battery"
to confirm data confidentiality and integrity in sensors, (4) 11 capability "Health Check"
seamless connectivity to ensure sensor availability. In the 12
13 command "resetParams2StDefaults"
following sub-sections, we briefly discuss existing sensor 14 command "listCurrentParams"
15 command "updateZwaveParam"
management systems and their shortcoming in addressing the 16 command "test"
17 command "configure"
aforementioned security needs. 18
19 fingerprint mfr:"010F", prod:"0800", model:"2001"
20 fingerprint mfr:"010F", prod:"0800", model:"1001"
A. Sensor Authentication 21 }
7
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
Motion, Core Audio, Core Location, and Core Video [81]. The
Core Motion service provides access to the motion sensors
and some of the environmental sensors (e.g., barometer, light,
proximity, etc.). The audio sensors (microphone and speakers),
GPS, and the camera can be accessed via the Core Audio,
the Core Location, and the Core Video services, respectively.
These services provide data flow between the sensors and their
apps according to the requests.
However, the main shortcoming of the permission-based
sensor authorization is the dependence on the user’s consent
for sensor access. In most smart devices, permission-based
sensor authorization is implemented for a subset of the sup-
ported sensors (e.g., GPS, camera, audio sensor). Whenever
an application is installed in a smart device, it asks the users
to grant permission to access various sensors. Thus, malicious
applications may trick the user into allowing access to sensitive
sensors to launch sensor-based attacks [7], [13], [23]. Users
are typically unaware of what the malicious applications
Figure 3: Example Sensor Management System for Android. actually do with the sensed data [19], [21]. Furthermore,
permissions are imposed on selected on-device sensors only
and it is necessary to check whether the requested access is (e.g., camera, microphone, and GPS) and other sensors are
legitimate as apps can use sensors for malicious purposes. For automatically included without any explicit permission. Thus,
example, a simple flashlight app in the smartphone can access applications can easily access other no-permission-imposed
the motion sensor data which is irrelevant to the function of the sensors such as accelerometer, gyroscope, light sensor, etc.,
app and can leak the information surreptitiously [40]. Smart as discussed in the following sections in further detail. These
devices should have a robust authorization framework to limit sensors can be exploited maliciously and various sensor-based
these unauthorized sensor accesses. Sensor authorization can threats (e.g., information leakage, denial-of-service, etc.) can
be implemented in both the sensing and application layers. be launched on smart devices [82]–[84]. Additionally, for
The sensing layer authorization can bind sensors with the apps external sensors, the smart device ecosystem offers one-time
while the application layer authorization can offer user control sensor authorization at the time of sensor installation. After
over sensors [22], [74]. the initial installation, any connected smart device in the same
Current smart device OSes offer a permission-based sensor network can access the external sensor without any additional
management system to control on-device sensor authorization authorization step.
at app installation time and run-time [75], [76]. Here, we C. Data Confidentiality and Integrity
briefly discuss the Android sensor management system as
One major concern is to keep the collected sensor data
Android OS holds the highest market share in the smart device
secure in smart devices. Smart devices use multiple sensors
domain (approximately 37%) [77]. Whenever an application
to perform a task and recent studies have shown that user
wants to access a sensor in the OS, it has to communicate
activities on a smart device can be inferred using the sensor
via a sensor manager framework (Figure 3). An application
data [40]. The current smart device ecosystem implements
first sends a request to the sensor manager to register the
different encryption methods in the network layer to encrypt
desired sensor which invokes ListenerService service for the
sensor data before sharing with the devices. For example,
application. After receiving the request, the sensor manager
Azure IoT suite, Amazon AWS, and Weave use SSL/TLS pro-
creates a ListenerService for the application and maps the
tocol to ensure secure communication [36]. Moreover, smart
request with the designed sensor driver to acquire sensor data.
devices using ZigBee protocol use 128-bit AES encryption
If more than one App requests access for the same sensor,
for secure communication [85]. However, most of the existing
the sensor management system runs a multiplexing process to
encryption schemes are available for communication between
register one sensor to multiple Apps. This data acquisition
external sensors and smart devices or cloud communication.
path from the application to the sensor driver is initiated
Some smart device platforms (e.g., Apple HomeKit, Weave)
by the Hardware Abstraction Layer (HAL) which binds the
allows disk encryption to secure saved sensor data. But any app
sensor hardware with the device driver. The sensor driver
running in the smart devices can access these encrypted data,
then activates the requested sensor and creates a data flow
even collect unencrypted data from the on-device sensors [44].
path from the sensor to the app [78]. On the other hand,
These sensor data can be further processed to gain sensitive
Windows and Blackberry OSes use Sensor Class Extension
user information such as PIN code for the devices, typed
to connect sensor hardware with the device driver [79], [80].
information, even on-going tasks on a device [7].
Windows OS also uses the User Mode Driver Framework
to detect sensor access request and create a data acquisition D. Sensor Availability
path between sensor API and the APP. In iOS, the sensor To perform sensor-dependent tasks, smart devices should
management system is divided into four core services: Core have uninterrupted sensor access. This requires sensor avail-
8
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
ability to the application layer of the devices from the sensing (5) Indirect sensor data injection. Current sensor manage-
layer. Sensor availability is more important in external sensors ment systems do not offer any verification method to check
than on-device sensors as attackers can target the network whether a sensor input is valid or not. As a result, an at-
layer to perform a Denial-of-Service attack. The current smart tacker can target to maliciously change or control environment
device ecosystem offers firewall rules to filter unauthorized parameters such as light intensity or magnetic field to spoof
and malicious service requests to avoid unauthorized sensor sensor data, trigger malicious activities, or interrupt normal
access and avoid buffer overflow [86]. One possible solution device activities. For instance, an attacker can use inaudible
can be fine-grained access control systems in the application acoustic signals to trigger a voice command in voice-assisted
layer to ensure continuous data availability to legit app re- devices and interrupt drone operations [8], [92].
quests. However, the existing schemes cannot detect sensor
unavailability caused by forced changes in the sensors (e.g., V. T HREAT M ODEL
hacking gyroscope using acoustic signals [8]).
In this section, we first categorize sensor-based threats in
E. Summary of Existing Sensor Management Systems and smart devices based on different security requirements and
Their Shortcomings present the threat model.
Although existing sensor management systems in smart de- A. Types of Sensor-based Threats
vices acknowledge the needs of securing sensors by addressing
A sensor-based threat exploits on-device or external sensors
sensor authentication, authorization, and availability, there are
in a smart device ecosystem to perform attacks such as false
several shortcomings that can be easily exploited by sensor-
data injection, eavesdropping, information leakage, etc. to
based threats.
jeopardize the proper operation of the device. Based on the
(1) User Dependency. Existing sensor authorizations depend
nature of the threats, sensor-based threats can be categorized
on user permission where users are asked to allow or deny
in two categories.
sensor access permission to an app at installation time or
• Passive threats. Passive sensor-based threats refer to the ma-
run-time. However, no information about the nature of sensor
usage is presented to the users. Hence, an app can easily trick licious sensor activities in smart devices without obstructing
the users to get desired sensor authorization and abuse sensors the normal operation of the device. For example, a malicious
for malicious purposes [13], [87]. app installed in a smart device can run in the background and
(2) Selective sensor authorization. Existing sensor manage- observe the sensor behavior to infer the ongoing task in the
ment systems impose permission-based sensor authorization device [93]. Passive sensor-based threats can accomplish its
for selective sensors such as microphone, camera, and GPS. malicious intents by performing malicious activities within
However, any installed app can access other sensors such as a smart device or by utilizing another near-by smart device.
• Active threats. Active sensor-based threats obstruct the nor-
motion, light, magnetic, and proximity sensors without any
explicit user permission. Attackers can exploit this limitation mal operation of the smart device to perform malicious
to get access to sensors and perform malicious activities activities. An active sensor-based threats can directly abuse
including keystroke inference [88], eavesdropping [89], etc. an on-board or external connected sensor by spoofing the
(3) Passive sensor sniffing. As smart devices allow external sensor reading [91] or obstructing sensor signals using
sensor integration to perform various tasks, it is possible to external device [8].
capture the network traffic between sensors and smart devices
B. Attacker’s Capabilities
without interrupting normal operation. Also, both embedded
and external sensors in a smart device are sensitive to environ- To perform sensor attacks, we consider adversaries have
mental parameters which can be captured by a nearby smart the following capabilities in terms of device access, security
device. For instance, typing in a keyboard creates a tap noise privilege, and processing capabilities.
which can be captured by the microphone of a nearby smart- • Device access. An adversary may need device access to per-
phone [14], [90]. Attackers can extract sensitive information form malicious sensor activities in a smart device. Based on
from captured traffic and sensor data even if proper encryption the type of access needed for an adversary, we categorized
schemes are used to protect confidentiality [28], [85]. Hence, three different access types - direct access, transitive access,
current sensor management systems cannot protect sensor and peripheral access. In direct access, an adversary can
abuse from passive sniffing. directly access the sensors in a smart device to perform
(4) Transitive access. Smart devices create a network of malicious activities. For example, a malicious app installed
devices or smart environment where several devices are con- in a smartphone can directly access on-board sensors and
nected with each other to perform multiple tasks. Here, a collect data to infer sensitive information [7]. For transitive
newly installed smart device becomes automatically visible access, an adversary uses access to a smart device or sensor
and can access other devices and sensors without any explicit to perform malicious sensor activities in a targeted smart
privilege. As current sensor management systems use hard- device. For example, in a smart home environment, an
coded capabilities and fingerprint to authenticate devices and adversary can get access and strobe a smart light to change
sensors, attackers can introduce a compromised or fake device the output of the light sensor and a targeted smart light [91].
to capture sensitive sensor information and inject false data in In peripheral access, an adversary implanted in a device
the system to perform malicious activities [71], [91]. (affected device) can perform malicious sensor activities in
9
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
any smart device in its peripheral. Here, the affected device categories (e.g., information leakage includes keystroke infer-
and the targeted device share the same environment, but are ence, task inference, location inference, and eavesdropping)
not connected with each other. For example, an adversary based on the final impact of sensor-based threats in Section VI.
can use the audio sensor of a smartphone to eavesdrop to Each category includes other sub-threats based on how they
another smartphone in close proximity to infer keystrokes. are executed and targeted sensors in smart devices. Indeed,
• Security privilege. An adversary needs different levels of in total, we cover 89 different sensor-based threats reported
security privileges to perform malicious sensor activities in by developers and researchers. Note that a physical sensor
a smart device. For instance, to perform eavesdropping, an abuse or sensor tampering that could lead to physical damage
adversary needs minimum (low) privileges in the targeted to the smart devices is not considered and outside the scope
device while for false data injection in a sensor, an adversary of this work. Also, we do not consider threats arising from
needs maximum privileges to access the sensor. In this work, wireless sensor networks (WSNs) and cyber-physical systems
we consider an adversary can have both privileges to classify (e.g., smart grid, industrial control systems, robotics systems,
the sensor-based threats and attacks correctly. etc.) in the threat model. However, we do acknowledge that
• Processing capability. In smart devices, sensors mostly act there are several interesting threats reported by the research
as a triggering component to initiate automated applica- community related to sensor exploitation in WSNs and CPSs.
tions. The sensed information in the smart device sensors For instance, sensor impersonation attack in a wireless sensor
often needs further processing to extract important infor- network is an emerging threat where attackers implant a
mation. Hence, an adversary needs processing capabilities compromised sensor node to impersonate as valid components
to perform malicious sensor activities in smart devices. and perform malicious tasks such as false data injection and
Based on the adversary’s goal, the processing capacity may eavesdropping [94]–[96]. The readers are advised to check
vary. For example, an adversary extracting keystrokes from these useful studies for more more information.
motion sensors needs higher processing capabilities than
VI. TAXONOMY OF T HREATS , ATTACK M ETHODS , AND
an adversary recording phone conversation secretly off the
T HEIR I MPACT
device [40].
As existing sensor management systems and security
C. Threat Model schemes cannot provide adequate security to the sensors,
attackers can exploit these sensors in various ways. In this
In this paper, we consider sensor-based threats and attacks in section, we provide a detailed discussion about sensor-based
four working layers (sensing, communication, data processing, threats and attacks to smart devices and survey the existing
and application) of the smart devices. We consider adversaries malicious attacks confirmed by the research community and
that try to abuse the sensors to perform malicious tasks as a developers [13], [19]–[23].
sensor-based threat. Additionally, this work considers passive To understand the severity of sensor-based threats and
threats to the sensors that do not disrupt normal functionalities attacks, we considered several common vulnerability scoring
of the smart devices. An adversary can be installed in a smart metrics for sensor-based threats in our discussion [97]. These
device to get access to the embedded sensors of the device or scoring metrics give insights of the characteristics and impact
external sensors connected to the smart device. An adversary of the threats. Detailed of these metrics are given below.
that has access to the peripheral of a targeted smart device
• Attack Method (AM). Attack method reflects how the
to sniff the sensor data and network traffic is also within the
threats penetrate the smart device to perform malicious
scope of this work. Furthermore, we consider an adversary that
sensor events. For sensor-based threats, we consider three
can have direct or indirect access to the sensors of the smart
methods to assess the severity of the threat- active, passive,
devices to capture sensor data for further analysis. Specifically,
and combination.
we consider the following threats in our threat model.
• Device Access (DA). To initiate a malicious sensor activity
• Information Leakage. An active or passive adversary may in a smart device, sensor-based threats need to access the
try to access the sensor data to steal sensitive information device directly or indirectly. Based on the nature of the
such as typing information, unlock code, PIN code, etc. threat, we categorize the device access of sensor-based
• Transmitting Malicious Sensor Command. An adversary threats in three categories - direct access, transitive access,
may try to abuse sensors to transmit malicious sensor and peripheral access. Direct access refers to the threats that
command to trigger malicious activities in a smart device. need access to the targeted device. In transitive access, a
• False Sensor Data Injection. An adversary may try to inject sensor-based threat can preform malicious sensor activities
false sensor data to disrupt the normal functionalities of the by accessing a device that is connected with the targeted
smart devices. device. For example, a sensor-based threat can perform
• Denial-of-Service. An adversary may establish a sensory malicious activities in a smart light by accessing a connected
channel between on-device sensors and external entities light sensor [28]. A sensor-based threat can also execute
(e.g., device, signal generator, etc.) to impede normal sensor malicious sensor-activities by accessing the peripheral of the
operation which eventually leads to obstructing an on-going targeted device. For instance, keystrokes in a smartphone can
task in the smart device. be captured by a nearby smart speaker or smart watch [98].
We consider these threats based on the impact of the attacks • Attack Complexity (AC). Sensor-based threats and attacks
on smart devices. We expand the threat model in several sub- can target one single sensor or multiple sensors to perform
10
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
malicious tasks in smart devices. As abusing more than 1) Keystroke inference: Keystroke inference is a generic
one sensor at a time may require immense effort from the threat to smart devices. Most of the smart devices provide
attacker side, we consider two different levels (high and low) input medium such as the touchscreen, touchpad, keyboard
of complexity for sensor-based threats. (external or built-in virtual or real). Whenever a user types or
• Required Privilege (RP). To get access to the sensors for gives input to a device, the device tilts and turns which creates
initiating malicious activities, sensor-based threats need to deviations in data recorded by sensors (e.g., accelerometer,
exploit existing security mechanisms of smart devices. As gyroscope, microphone, light sensor, etc.). These deviations
we explained in Section IV, sensors in a smart device can be in sensor data can be used to infer keystrokes in a smart
categorized in two categories based on access permission: device. Keystroke inference can be performed on the device
no-permission imposed sensor and permission imposed sen- itself or on a nearby device using sensors of the smart device.
sor. To access the no-permission based sensors, an adversary Keystroke inference can be performed actively (using on-
needs no excessive privilege while an adversary targeting board sensors) or passively (using external sensors). Here, we
permission imposed sensors needs high privilege. Hence, summarize different keystroke inferences based on the targeted
based on permission needed for accessing sensors in a smart sensors in the smart devices.
device we consider two categories - high privilege threats Keystroke Inference with Light Sensors - Light sensors in
(need excessive permission) and low privilege threats (need smart devices are usually associated with the display unit. In
no permission). general, the display unit of the smart devices is touch-sensitive
• User Interaction (UI). This scoring metric portrays the need and provides a user interface to take inputs. For a constant
of user interaction other than the attacker to compromise the state and unchangeable ambiance, the readings of the light
sensor functionalities in smart devices. Low user interaction sensor are constant. Each time a user touches and uses the
indicates the higher impact of the sensor-based threats to touchscreen to interact with the device, he/she tilts and changes
smart devices. the orientation of the device, which causes changes in the
• Attack Impact (AI). This scoring metric represents the readings of the light sensor. Each input may have a dissimilar
impact of the sensor-based threats to various security re- light intensity recorded by the sensor. These changes in the
quirements of the smart device. For sensor-based threats, readings of the light sensor of a device can be utilized to infer
we choose three important security features that might get keystrokes of that particular device. An attacker can derive the
affected - confidentiality, integrity, and availability. various light intensities recorded by the light sensor by trying
• Success Rate (SR). Success rate of the sensor-based attacks several keystrokes in a device and then construct a database.
is the fraction or percentage of success of an attack to When users put their PINs or type something in the touchpad,
perform malicious activities in a smart device among a attackers can capture the data maliciously from the device
number of attempts. We categorize this metric in three and collate these data with the database to decode keystroke
categories - high (success rate >90%), medium (success rate information. As an example, some researchers developed a
70-90%), and low (success rate <70%). method named PIN Skimming to use the data from an ambient
In the following sub-sections, we summarize existing light sensor and RGBW (red, green, blue and white) sensor to
sensor-based threats and attacks in four broad categories extract PIN input of the smartphone [100].
based on the purpose and nature of the threats (presented in Keystroke Inference with Motion Sensors - The main
Section V). purpose of using the embedded motion sensors (e.g., ac-
celerometer, gyroscope, linear acceleration sensor) in smart
A. Information Leakage devices is to detect changes in motion of the devices such as
Information leakage is the most common sensor-based threat shake, tilt, etc.. Accelerometer and linear acceleration sensor
for smart devices and their applications. Sensors on smart measure acceleration force that is applied to a device while
devices can reveal sensitive data like passwords, secret keys gyroscope measures the rate of rotation in the devices. In smart
of a cryptographic system, credit card information, etc. This devices with user interface (e.g., smartphone, smart watch,
information can be used directly to violate user privacy or tablet, etc.), the value given by the motion sensors depends
to build a database for future attacks. An adversary (e.g., on the orientation of the device and user interactions (striking
malicious app) can get access to the sensor data by exploiting force of the finger on the device display, resistance force of the
vulnerabilities of existing sensor managements systems such hand, the location of the finger on the touchpad of the device,
as selective sensor authorization and user dependency (Sec- etc.). Thus, when a user gives inputs to a device, the motion
tion IV: use case 2). Only one sensor can be enough for sensors’ data changes accordingly. Generally, smart devices
information leakage (e.g., eavesdropping using microphone use two types of user interface to take user input – on-screen
[13]) or multiple sensors can be exploited to create a more user interface (e.g., touchpad) and external user interface (e.g.,
complex attack (e.g., keystroke inference using the gyroscope keyboard, keypad, etc.). For both user interfaces, input keys
and audio sensors [99]). Moreover, sensors of one smart device are in a fixed position and for a single keystroke, the motion
can be used to leak information from a nearby device (passive sensors give a specific value [101]. As attackers do not need
information leakage) (Section IV: use case 3). In general, any user permission to access the motion sensors, it is easy to
information leakage can be accomplished for the purpose access the motion sensor data.
of (1) keystroke inference, (2) task inference, (3) location One common keystroke inference attack can be performed
inference, or (4) eavesdropping as explained below. by exploiting accelerometer. As mentioned above, accelerom-
11
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
eter gives a specific reading for each user input on a smart Keystroke Inference with Audio Sensors - High precision
device, thus, attackers can build a database of pre-processed microphones used in smart devices can sense the acoustic
accelerometer readings with diverse input scenarios and make signals emanating from keyboards (built-in or nearby) which
a matching vector of sensor data and keystrokes to extract can be used to infer the keystrokes on a smart device. Asonov
users’ input [88], [102]. The data extracted from these attacks et al. proposed an experiment to record the sound of key
vary from text inputs to PINs and numbers typed in the tapping and infer the correct key from it [120]. In this
touchpad which is much more serious as attackers can acquire experiment, the attacker is assumed to record the acoustic
the PIN or credit card information [82], [103]. Owusu et al. signal emanating from the device while the user types on the
developed an app named ACCessory which can identify the keyboard. Then, the attacker matches this signal with a training
area of the touchscreen by analyzing accelerometer data of dataset recorded stealthily while the same user was typing in
smart devices [83]. ACCessory can infer PIN input on smart the training period.
devices based on the detected area from accelerometer data. Zhuang et al. showed that it would be possible to infer
Accelerometer data can also be used to infer keystroke from a keystrokes by just analyzing the acoustic emanation without
nearby keyboard. Marquardt et al. presented an attack scenario having a training data set [14]. In this attack scenario, a
where accelerometer data of a smart device can be used to specific key is assigned to a pre-defined class according to
guess input on a nearby keyboard [84]. Whenever a user types the frequency of the acoustic signal it generates while being
on the keyboard, a vibration occurs and the accelerometer of typed. The attacker then takes a ten-minute of recording of the
the smart devices can catch this vibration and keystrokes can acoustic signal of typing on a keyboard. This recorded signal
be identified correctly by analyzing this data [104]. is analyzed using machine learning and speech recognition
Another method of keystroke inference can be achieved by feature named Cepstrum to match with the previously defined
analyzing the gyroscope data of a smart device. Gyroscope key classes and infer the input of a keyboard.
measures the angles of rotation in all the three axes which In another work, Halevi et al. introduced a new technique
vary based on the specific area of the touch on the screen. named Time-Frequency Decoding to improve the accuracy of
Many smart devices such as smartphones, tablets, etc. have a keystroke inference from the acoustic signal [121]. In this tech-
feature when users input something on the touchpad the device nique, machine learning and the frequency-based calculations
vibrates and gyroscope is also sensitive to this vibrational are combined to match the recorded acoustic signal data from
force. The orientation angle recorded in the gyroscope and the a smart device with a training dataset and increase the success
vibration caused by the input can be used to distinguish inputs rate of the attack scenario. This technique also considers the
given by the users. Moreover, the data of the gyroscope can typing style of users to minimize the error rate of keystroke
be combined with the tap sound of each key recorded via the inference.
microphone which can increase the success rate of inferring Berger et al. divided a PC keyboard in regions based
keystrokes [99], [105], [106]. The combination of accelerome- on tap sound generated by keys and modeled a dictionary
ter and gyroscope data can also be used for keystroke inference attack [122]. This attack utilizes signal processing and cross-
which yields more accurate results [107]–[112]. Additionally, correlation functions to process acoustic signal emanations
the use of pattern recognition and deep learning algorithms from a nearby keyboard. Kune et al. proposed a timing attack
can improve the success rate of keystroke inference attacks to on a number pad used in smartphone and ATMs using the
smart devices [113]. audio feedback beeps generated while entering PIN [123].
In most wearables (smart bands, smartwatches, etc.), the Inter-keystroke timing and distance between the numbers on
motion sensors are utilized for monitoring the movement of the keypad are the main two features which are used to
the devices. A smartwatch, which is one of the most common infer the input PIN in this attack. By analyzing the audio
wearables, maintains constant connectivity with smartphones feedback recorded using the microphone of a nearby smart
via Bluetooth. While wearing a smartwatch, if a user moves device, these two features are extracted and using Hidden
his/her hands from an initial position, the motion sensor Markov Model, the input numbers and PINs are inferred.
calculates the deviation and provides the data regarding the Lu et al. proposed KeyListener, a context-aware inference
change of the position of the smartwatch [114]. Typing in the method to predict the keystroke in QWERTY keyboard of
touchpad of a smart device while wearing a smartwatch will smartphones and tablets using embedded microphones [124].
change the data recorded by the motion sensors of the smart- KeyListener uses a binary search tree algorithm to predict the
watch depending on user gestures. For a specific user input typed information and achieves over 90% success rate. Similar
interface such as QWERTY keyboard of smartphones which to KeyListener, Shumailov et al. presented an acoustic side-
has a specific distance between keys, the motion sensors’ data channel attack which uses the tap noises of a virtual keyboard
of the smartwatch can be used to infer the keystrokes [90], to infer the typed information in a smartphone [125]. Kim et
[115]–[117]. Modern wearable devices (e.g., Apple Watch 5, al. further improved this work by capturing tap noises using
Samsung Gear VR, etc.) also provide a user interface where multiple embedded microphones and combining the patterns
users can provide inputs to the devices. Researchers showed of the acoustic signals [126]. Here, researchers developed a
that it is possible to infer the user input in wearables by tapstroke detection and localization algorithms which can infer
observing hand movements [118]. A recent work showed it the typed information with 85.4% accuracy. In a recent work,
is possible to infer the unlock code of a smart lock from the Zhou et al. presented PatternListener+, an inference attack
gyroscope data of a smart watch [119]. to predict the unlock patterns on an Android device using
12
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
acoustic signal [127]. PatternListener+ uses the speaker of easily extract the information.
a smartphone to play an inaudible sound and capture the Shukla et al. showed a method to infer the PIN input by
reflected signal from users’ fingertips using the embedded analyzing the hand position using the recorded video [133].
microphone. The reflected signal contains information of the In this method, a background application gets access to the
hand movement which is further analyzed with a tree structure camera of the smartphone and records a video when a user
to infer the pattern of the lock. Backes et al. showed that starts typing in a touchpad. Then, analyzing the hand position
acoustic signal emanated from a dot matrix printer which and the position of the smartphone, an attacker can extract the
was collected by a nearby microphone of a smart device can inputs given in a touchpad. Another version of this attack is
be analyzed to predict the text printed on a paper [128]. In to record the typing scenario using an external camera. In this
the training phase of this attack, words from a list are being scenario, a camera of a smart device (e.g., smartphone, smart
printed, the acoustic signal is recorded and the data is stored. glass, smart surveillance system, etc.) is used to record the
The audio signal processing and speech recognition techniques video of typing the PIN. In both cases, the input PIN can be
are used to extract the features of the acoustic signal to create inferred with high accuracy.
a correlation between the number of needles used in the printer Adam J. Aviv introduced another type of attack named
and the intensity of the audio signal. In the real attack scenario, Smudge Attack using an external camera to infer pattern lock
the audio signal is captured by a nearby audio sensor and of a smart device [134]. In this attack scenario, a smart device
matched with the previous dataset to infer the printed text. is placed in between two cameras of other smart devices
Zhu et al. showed a context-free attack scenario using the (smartphone or smart glass) and high definition pictures are
keyboard's acoustic emanation recorded in a smartphone to taken. Whenever the user gives the unlock pattern in the
infer keystrokes [129]. In this attack scenario, the acoustic touchpad, some smudge marks are left on the screen, and
signals emanated from the keyboards are recorded by two or captured by the cameras, which leak information about the
more smartphones. For each pair of microphones of smart- unlock pattern to an attacker.
phones, the recorded acoustic signal strength will depend on Raguram et al. developed a process named iSpy which can
the distance between the typed key and the smartphones. By reconstruct the typed text by analyzing the reflection of the
calculating the time-difference of the arrival of the acoustic touchscreen in a reflective surface such as sunglass or smart
signal, the position of the key can be inferred. glass [135]. The experimental setup of iSpy includes a high
In a similar attack, Chhetri et al. introduced a method to definition camera which can capture the video of the reflective
reconstruct the design source code sent to a 3-D printer [130]. surface while a user types in the touchpad of a phone. The
In this attack scenario, the acoustic signal emanated the 3- reflection of the phone is being extracted from the video
D printer is being recorded by a recorder placed in close and consecutive frames are analyzed to extract stable pictures
proximity of a 3-D printer and the recorded file is processed for of the phone screen. Features (hand position, motion in the
extracting time and frequency domain features. These features screen, etc.) are extracted from stable pictures extracted from
are then cross-matched with a training dataset collected in a the video and by using machine learning techniques, key press
learning phase to infer the correct design. Song et al. improved detection is done and typed text can be inferred successfully.
this attack by adding magnetic sensor data to accurately In more recent work, Wang et al. proposed GazeRevealer, a
reconstruct the physical prints and their G-code [131]. novel side-channel attack to infer keystrokes in a smart device
Keystroke Inference with Video Sensors - Modern smart using the eye movement of the users [136]. GazeRevealer
devices come with powerful cameras which can both take still uses the front camera to capture video and analyzes to extract
pictures and record high definition videos. By applying image multiple features such as eye movement, head position, etc.
processing techniques in captured images, keystroke inference These features are used to train a classifier which can predict
can be done. Simon et al. developed a malware named PIN the keystroke in real-time with high accuracy.
skimmer which uses the front camera of a smartphone and Keystroke Inference with Magnetic Sensors - Besides the
microphone to infer PIN input in a smartphone [87]. PIN skim- aforementioned attack scenarios, electromagnetic emanations
mer records the tap sound on the touchpad of a smartphone from the keyboard can be used to infer the input of a
and records video using the front camera of the phone. The computer. As magnetic sensors of smart devices are sensitive
movement recorded in the video is then analyzed to detect to electromagnetic emanations, they can be used as the attack
which part of the touchscreen is used. This information is then medium. Vuagnoux et al. showed that both wired and wireless
combined with the tap sound to infer the inputs correctly. keyboards emit electromagnetic signals when a user types and
Another potential malware attack on the smart devices this signal can be further processed to infer keystroke [137].
using the camera is Juice Filming Attack [132]. In this attack In this method, electromagnetic radiation is measured by the
scenario, a malicious app uses the camera to take screenshots magnetic sensor of a smart device when a key is pressed and
when any user-input is given in the touchpad and save the using the falling edge transition technique, an attacker can
images on the storage unit (internal ROM or external memory infer the keystrokes.
card) of the device. Most of the smart devices use USB for Lessons learned for keystroke inference - We summarize
heterogeneous applications (e.g., charging, data transfer, etc.) the aforementioned threats and attacks in Table III with
and when the compromised device is connected to the laptop common vulnerability metrics. We can see smart devices with
or any other device with a storage unit, the app transfers the user input module (touchscreen, keypad, numeric keypad) are
stored pictures to the storage device from which attackers can mostly the targeted device for keystroke inference. These
13
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
Vulnerability
Attack Target Target Target
metrics† Ref.
name device sensor layer
AM DA AC RP UI SR
Pin Skimming Smartphone Light Sensing [100]
Text Inference Smartphone Accelerometer, Gyroscope Application [110]
Motion-based keystroke inference Smartphone Accelerometer, Gyroscope Sensing [101]
Keystroke inference on Android Smartphone Accelerometer, Gyroscope Sensing [88]
Input extraction via motion sensor Smartphone Accelerometer, Magnetometer Sensing [82]
Accelerometer side channel attack Smartphone Accelerometer Sensing [103]
ACCessory Smartphone Accelerometer Sensing [83]
(sp)iphone Smartphone Accelerometer Sensing [84]
Single-stroke language-agnostic keylogging Smartphone Gyroscope, Microphone Sensing [99]
Touchlogger Smartphone Accelerometer, Gyroscope Sensing [105]
Taplogger Smartphone Accelerometer, Gyroscope Application [107]
I Know What You Type Smartphone Accelerometer, Gyroscope, Light Sensing [113]
Type and leak smartphone Accelerometer Sensing [118]
Risk Assessment of motion sensor smartphone Accelerometer Sensing [102]
Infer tapped and traced user input Smartphone Accelerometer, Gyroscope Application [109]
Motion-based side-channel attack Smartphone Accelerometer, Gyroscope Sensing [106]
When good becomes evil Smart watch Accelerometer Sensing [115]
Mole Smart watch Accelerometer Application [90]
(Smart) watch your taps Smart watch Accelerometer Sensing [98], [116]
Wristsnoop Smart watch Accelerometer Sensing [117]
Inferring Mechanical Lock Combinations Smart lock Gyroscope Application [119]
Inference of private information Smartphone Accelerometer, gyroscope Sensing [111]
KeyListener Smartphone Microphone Sensing [124]
aLeak Smart watch Accelerometer, Gyroscope Sensing [112]
Keyboard acoustic emanation Smartphone Microphone Sensing [120]
Keyboard acoustic emanations revisited Smartphone Microphone Sensing [14]
A closer look at keyboard acoustic emanations Smartphone Microphone Sensing [121]
TapSnoop Smartphone Microphone Sensing [126]
Dictionary attacks using keyboard acoustic Smartphone Microphone Sensing [122]
Timing attacks Smartphone Microphone Sensing - [123]
Acoustic Side-Channel Attacks on Printers Smartphone Microphone Sensing [128]
Context-free keyboard acoustic emanations Smartphone Microphone Sensing [129]
PatternListener+ Smartphone Microphone, speaker Sensing [127]
Hearing your touch Smartphone Microphone, speaker Sensing [125]
PIN skimmer Smartphone Microphone, Camera Sensing [87]
Juice filming attack Smartphone Camera Application - [132]
Beware, your hands reveal your secrets! Smartphone Camera Sensing [133]
Smudge attack Smartphone Camera Sensing [134]
iSpy Smart security camera Camera Application [135]
GazeRevealer Smartphone Camera Application [136]
Compromising electromagnetic emanations Smartphone Magnetic Sensing [137]
My Smartphone Knows What You Print Smart printer Microphone, magnetic Sensing [131]
† Attack Method (AM): Active- , Passive- ; Device Access (DA): Direct- , Transitive- , Peripheral- ; Attack Complexity (AC): High- , Low- ; Required Privilege
(RP): High privilege- , Low privilege- ; User Interaction (UI): Needed - , not needed - ; Success Rate (SR): High (>90%) - , medium (70-90%) - , low
(<70%) - .
‡ Any type of keystroke inference impacts the confidentiality of the smart device.
14
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
Task Inference with Light Sensor - Light sensor of a by the mobile processors which are proportional to the CPU
smart device can be used to infer an on-going task on a device. workload. By analyzing the deviance in different working
Smart devices with display emit lights with distinct intensity conditions, MagneticSpy can infer the on-going CPU activity
for different tasks. For example, playing separate videos in with high accuracy (up to 90%).
a smart TV will change the emitted light intensity based An electromagnetic (EM) emanation is a common phe-
on the background and video quality. This change in light nomenon for smart devices. Electromagnetic emanations occur
intensity can be used to infer an on-going task on the display. whenever current passes through a device and a task is running
Chakraborty et al. showed that light intensity changed in a on a device. EM emanation attacks can also be observed in
flat panel display (e.g., smart TV, smart monitor, etc.) can be FPGA-based (Field-programmable gate array) smart devices
used to infer what is written on the screen by a light sensor [142]–[144]. Attackers can record electromagnetic emission
of a smartphone [138]. In this attack, an Android-powered data generated from the FPGA-based smart devices to deduct
smartphone is placed in front of the display to capture the which kind of application is running in the system and also
light intensity emitted from the screen. These captured light the states of logic blocks of the devices. Such information
signals can be sampled and deconvoluted to infer the task on leakages make the system vulnerable to the user. Smart cards
the monitor such as on-going videos, specific web pages, etc. also emit EM waves while performing various tasks which
Berkay et al. used a smart light to passively leak the status can be captured by a radio frequency (RF) antenna and
of a smart home [72]. In this attack, if no user is present the task can be inferred from the radiation [145]. Cheng et
inside the home, a smart light will maliciously trigger an on- al. proposed MagAttack, a side-channel attack to abuse the
off pattern to notify the user. Maiti et al. proposed a new magnetic sensor of smart mobile devices [146]. User activities
attack vector to infer the audio and video of a smart TV using such as application launching and operation has a slight but
the light emitted from a smart light [93]. Here, researchers significant effect on CPU’s power consumption, and hence in
used the multimedia-visualization feature of smart light which the EM emissions. An attacker can capture this EM emission
creates a vibrant lighting effect in conjunction with audio and using the magnetic sensors of a smart device and infer the
video playing nearby. Based on the light intensity emitted on-going user activities in a laptop or workstation.
in audio frequencies, researchers successfully inferred an on- Task Inference with Power Analysis - Power analysis
going audio or video. is a form of sensor-based threat where an attacker studies
Task Inference with Magnetic Sensors - Magnetic sensors the power consumption and power traces of the sensors for
in smart devices has the role to fix the orientation of the extracting information from the devices [147]. O’Flynn et
device with respect to Earth's magnetic field. Data recorded al. introduced an attack scenario where the power analysis
by a magnetic sensor change in the presence of an external attack is launched against IEEE 802.15.4 nodes [148], which
magnetic field in the device's peripheral. This deviation in is a standard low power wireless protocol used in smart
data can be used to identify the tasks running on a device. devices. Low power smart devices use this protocol standard
Many smart devices have a storage unit and whenever data is for various communication purposes such as connecting to
written or read from this storage unit, a change in the reading a network, communicating with other devices, etc.. In this
of the magnetic sensor can be observed. Magnetic sensors attack scenario, an attacker uses differential power analysis
of a smart device can be used not only to infer information in the sensors. As packets transmitted from the smart devices
of the device itself, but can also be used as a medium are encrypted, power analysis on the sensors can infer which
to fetch information from a nearby device. Biedermann et encryption process is running in the device. Again, diverse
al. showed that the magnetic sensor of a smartphone could encryption process leads to diverse power profiles which reveal
be used to infer on-going tasks in a storage unit like the associated information (e.g., key size, block size, etc.) about
hard drives of the computers and servers [139]. When an the encryption process. Encryption process also depends on
application is running on a computer, the hard drives generate the packet size which can be observed in the power profile
a magnetic field which can be sensed by a magnetic sensor and attackers can infer what type of information is being
of a smartphone. Various actions cause distinct readings on transmitted based on the packet size.
the magnetic sensor which can be used to track the users’ Task Inference from sniffing sensor data - In a connected
action. This can be considered as a serious threat to the device environment such as smart home, several smart devices are
and attackers can fetch valuable information in this way. Ning connected with each other and with multiple sensors. These
et al. proposed DeepMag+, a side-channel attack to exploit sensors communicate with the devices using various protocols
on-board magnetic sensor for inferring smart apps installed (e.g., WiFi, ZigBee, Z-Wave, etc.) and work as triggering
in a smart device [140]. DeepMag+ captures the on-board devices for several automated tasks. An attacker can sniff
magnetic sensor data while executing installed apps in a smart the communication traffics in the smart environment and
device and uses convolutional neural network to fingerprint infer user and device actions which can be considered as a
the apps. Additionally, DeepMag+ can combine motion sensor privacy violation [149]. Acar et al. showed that it is possible
data with magnetic sensor to increase the inference accuracy to infer user activities and devices states by capturing the
up to 98%. Similar to this work, Matyunin et al. presented communication packets and extracting sensor data in a smart
MagneticSpy , a novel website and application fingerprinting home environment [85]. In this attack scenario, an adversary
method exploiting magnetic sensors of a smart device [141]. in close proximity of the smart environment can sniff the
MagneticSpy analyzes the electromagnetic disturbances caused communication packets and infer the states of the devices
15
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
Vulnerability
Attack Target Target Target Ref.
metrics†
name device sensor layer
AM DA AC RP UI SR
LightSpy Smartphone Light Application [138]
IoTBench Smart light Light Application - [72]
Hard drive side-channel attacks Smartphone Magnetic Sensing [139]
Electro-magnetic Analysis of smart cards Smart card Magnetic Sensing - [142]
Task Power analysis attack Smart devices Any embedded sensors Sensing - [148]
Inference Light Ear Smart light Light Application - [93]
Peek-a-boo Smart home devices Motion, light, temperature Communication [85]
DeepMag+ smartphone Magnetometer Sensing [140]
MagAttack smartphone Magnetometer Sensing [146]
MagneticSpy smartphone Magnetometer Sensing [141]
VoipLoc Smartphone Microphone, speaker Sensing [150]
ACComplice Smartphone Accelerometer Application - [151]
Location
Inferring Your Secrets from Android Smart Navigation device Microphone, speaker Application [151]
inference
Permission less Location Attack Smartphone Magnetic Application [152]
Inferring User Routes and Locations Smartphone Accelerometer, gyroscope, magnetic Application [153]
MISSILE Smartphone Accelerometer, gyroscope Sensing [154]
Prying into Private Spaces Smartphone Accelerometer, gyroscope Sensing [155]
Soundcomber Smartphone Microphone Application [13]
VoicEmployer Smartphone Microphone, Speaker Application [156]
Eavesdropping CPVT Smartphone Microphone, Speaker Application - [157]
Hidden voice commands Smart car Microphone Application [158]
Gyrophone Smartphone Gyroscope Sensing [89]
Spearphone smartphone Accelerometer Sensing [159]
I Can Hear Your Alexa smart speaker Microphone Communication [160]
† Attack Method (AM): Active- , Passive- ; Device Access (DA): Direct- , Transitive- , Peripheral- ; Attack Complexity (AC): High- , Low- ; Required Privilege (RP): High
privilege- , Low privilege- ; User Interaction (UI): Needed - , not needed - ; Success Rate (SR): High (>90%) - , medium (70-90%) - , low (<70%) - .
‡ Any type of information leakage impacts the confidentiality of the smart device.
Table IV: Summary of task inference, location inference, and eavesdropping via sensors in smart devices.
(active/inactive). In addition, authors showed that the attacker abused to generate a location fingerprint. The attack leverages
could deduce the actions of the users (e.g., walking, presence, the pattern of acoustic reflections of the human voice at the
etc.) using machine learning techniques in captured traffics. user's location and does not depend on any characteristic
Lessons learned for task inference - Similar to keystroke background sounds. The attack can be used to compromise
inference, task inference in smart devices also affect the location privacy of participants of an anonymous VoIP session,
confidentiality of the devices. From Table IV, we can observe or even to carry out confirmation attacks that verify if a pair
the majority of the task inference threats (6 out of 10 reported of audio recordings originated from the same location regard-
threats and attacks) are passive which indicates the high impact less of the speakers. Other researchers have also shown that
on the smart devices. Another interesting fact is the majority several heuristics can be used to identify sensitive locations
of these threats does not need any additional privilege (9 out of (i.e., home and work locations) of a victim whose personal
10) to bypass existing security schemes. Also, task inference device is under an adversary control [20]. Han et al. showed
threats target sensing (6 reported threats), application (3 re- that it is possible to infer the location of a user using the
ported threats), and communication (1 reported threat) which accelerometer of a smartphone [151]. Here, researchers first
indicates a broad attack surface of these threats. One limitation derived an approximate motion trajectory from accelerometer
of reported task inference attacks is the lack of extensive reading and correlated the trajectory with the map to infer
evaluation of the attacks. To understand the effectiveness of a the exact location of the user. Zhou et al. showed that it is
sensor-based attack, it is necessary to check the success rate of possible to infer the location of the user by analyzing verbal
the attack on real-life smart devices. The majority of the task directions provided by navigation apps of a smart device [161].
inference attacks are not appropriately evaluated with known Researchers measured the on/off times of the speaker con-
evaluation metrics such as success rate, error rate, precision, trolled by the navigation app to leak the driving instructions
etc.. Without proper evaluation metrics, especially without to the attacker. In a more recent work, Block et al. introduced
reported success rate, it is hard to understand the effectiveness a new location inference technique using the smartphone’s
and feasibility of task inference attacks on a smart device. magnetometer [152]. Here, researchers used small fluctuations
Task inference directly impacts the confidentiality and privacy originated by nearby magnetic fields while the smartphone
of the smart device users by leaking sensitive information is in motion to build a trajectory path of the user. Narain
such as user activity, installed security measures, installed et al. proposed a combination of sensor data (accelerometer,
apps on smart devices, etc. Attackers can profile a user gyroscope, and magnetometer) to further improve the accuracy
based on task inference attacks to perform diverse types of of the inferred location [153]. In a recent work, Zheng et al.
malicious activities such as gaining access to the smart device proposed a location eavesdropping attack using the mobile
and environment, bypassing security measures to leak data, inertia/motion sensors [154]. Here, researchers showed that
manipulate or obstruct on-going tasks, etc. [85]. in the presence of specific indoor structures (e.g., elevators,
fire stop doors, etc.), motion sensors display specific patterns
3) Location Inference: Researchers developed a novel
which can be utilized to infer the location correctly. Similar
location-privacy attack based on acoustic side-channels [150].
to this work, Fyke et al. used the motion sensors data to
The attack is based on acoustic information embedded within
recreate user’s movement and plot maps and landmarks in
foreground-audio disseminated in a closed environment (i.e.,
private spaces (e.g., home, workplace, etc.) [155].
conference room). The researchers studied how audio, gener-
ated by secure messaging clients in voice-call mode, can be Lessons learned for location inference - Although location
16
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
inference attacks impact the confidentiality of smart devices, records voice commands of the user and extracts features from
all of the threats (7 reported threats and attacks) are active the recorded audio clips. From the extracted features, a new
which limits the consequences (Table IV). Also, to execute command is generated which is not understandable by humans,
malicious sensor activities, these threats need direct access but recognized by the voice assistant apps. In a recent work,
to the devices which affect the easy deployability of these Kennedy et al. showed that it is possible to infer the voice
threats in real-life smart devices. One can also observe from command given to a voice assistant device (e.g., Amazon
Table IV that the success rate of these attacks is low to Alexa) by capturing the network packet and using natural
medium range. Compared to keystroke and task inference language processing [160].
attacks, location inference poses less effects on the security of The gyroscope on smart devices is also sensitive to an
the smart devices. However, leaking location information can acoustic signal. The typical sampling rate of gyroscope covers
violate user’s privacy and propagate other attacks including a some frequency of audible range which can be used to
targeted physical attack on the user’s vehicle [161]. reconstruct the speech of a user. Michalevsky et al. proposed
4) Eavesdropping: Many smart devices such as voice- a new way of eavesdropping by analyzing vibrational noise in
enabled speakers use audio sensors for making calls, recording gyroscope caused by an acoustic signal [89]. As the gyroscope
audio messages, receiving voice commands, etc. Eavesdrop- does not cover the full audible range, this new process can
ping refers to a type of attack where a malicious app records a distinguish speakers and one-syllable words by using signal
conversation stealthily by exploiting audio sensors and extract processing and machine learning techniques. In a recent work,
information from the conversation. An attacker can save the Anand et al. showed that the on-board accelerometer could be
recorded conversation on a device or listen to the conversation used to eavesdrop and reconstruct the speech of a user [159].
in real-time. One of the recent examples of eavesdropping via While a user talks on a smartphone, the loudspeaker of
the microphone of a smartphone is Soundcomber [13]. In this a smartphone shows some reverberations which impact the
example, a malicious app covertly records when a conversation accelerometer reading. This deviation in accelerometer can
is initiated from the device. As the recording is done in the be further analyzed to extract sensitive information such as
background, a user does not have any idea about the recording. speaker identification and gender classification.
Several companies like banks, social security offices, credit Lessons learned for eavesdropping - Eavesdropping
card companies, etc. have automated voice messaging systems mostly affects smart devices with audio sensors and impacts
and users have to say their private information such as credit the confidentiality of the devices. From Table IV, it is visible
card numbers or social security numbers at the beginning of that the majority of the eavesdropping are active attacks (4
the call. Thus, Soundcomber does not have to record all the out of 5 reported threats and attacks) and require additional
conversations to extract data. Only the beginning part of the privileges (4 out of 5 threats and attacks) to bypass the existing
conversations will be enough for extracting private information security schemes. These threats also need users to interact
of the user. Moreover, a specific conversation can also be with the system to perform malicious tasks that limit the
recorded by identifying the dialed number on a smartphone. impact of these threats. For performing eavesdropping, the
The touchpad of the smartphone creates corresponding tones majority of the threats and attacks also need direct access
when any number is dialed. This tone can be recorded and (4 reported threats) on a targeted smart device. Because of
processed to identify the dialed number. After that, when the these dependencies, the impact of eavesdropping is lower
desired number is dialed, the conversation can be recorded and than other types of information leakage attacks. Nevertheless,
then processed to extract information. the information captured in the eavesdropping attack can be
Another way to exploit microphones is to attack through used to perform various malicious activities such as leaking
voice assistant apps, e.g., Apple’s Siri and Google Voice private conversation, gaining physical access to a secured
Search. Most of the smart devices nowadays have built-in environment, etc. [162].
voice search apps. Diao et al. developed a malware named
VoicEmployer which can be installed on the device to record B. Transmitting Malicious Sensor Commands
the voice command given in a smartphone [156]. This malware Sensors available in the smart devices can be used to
can use the recorded command for various malicious activities transmit malicious sensor patterns or triggering commands to
such as replicate malicious voice command, transfer infor- activate malware that may have been implanted in a victim’s
mation to paired devices, etc. Cyber Physical Voice privacy device [18]. Sensors may be employed to create unexpected
Theft Trojan horse (CPVT) is another malware which uses the communication channels between device peripherals. Such
microphone of smartphones to record conversations [157]. The channels can be used to exchange critical sensor parameters
recording of the conversation can be controlled by external (e.g., devices’ motion, light intensity, magnetic field, etc.) or
control channels like SMS, Wi-Fi, or Sensory channels [18]. to transmit malicious commands (Section IV: use case 3).
An attacker can trigger CPVT and create command about when Transmitting via Light Sensors - Light sensors can be used
to start recording and when to stop recording using SMS, as a potential method of transmitting signals and malicious
Wi-FI, or even sensors. Recorded conversations are stored in commands [178]. It is easier to transfer a bit stream via a
the device and the attacker can gain the stored files using light source by turning it on and off. Since the light sensor of
Email, SMS, or connecting via USB. Carlini et al. showed a smart device can distinguish the intensity of the light source,
that it is possible to exploit voice assistant apps by inserting the light intensity change can be decoded as a bit stream in
hidden voice commands [158]. In this attack, the attacker first the device. By controlling the voltage of a light source, an
17
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
Vulnerability
Attack Target Target Target Ref.
metrics†
name device sensor layer
AI AM DA AC RP UI SR
Out-of-band command Smartphone Light Sensing I [11]
Creating seizures using strobed light Smart light Light Application I [33]
IoTBench- Side channel attack Smart light Light Application I [72]
Out-of-band command via magnetic sensor Smartphone Magnetic Sensing I [11]
Transmitting
Out-of-band command via audio sensor Smartphone Microphone Sensing I [11]
malicious
Inaudible sound as a covert channel Smartphone Microphone Sensing I [163]
sensor
Sensor side channels Smartphone Microphone Sensing I - [10]
commands
Skill squatting attack Smart Speaker Microphone Sensing C, I [164]
DolphinAttack Smart Speaker Microphone, Speaker Application C, I - [165]
Injecting inaudible voice commands Smart voice assistant Microphone, Speaker Application C, I - [92]
Vaspy smartphone Microphone Application C, I [166]
GPS spoofing attack Smart navigation device GPS Application I - [167]
GPS jamming Smart navigation device GPS Application I - [168]
Spy-sense Smart sensor network - Data processing I - [169]
Injected and Delivered Smart cars, drone Accelerometer, gyroscope Sensing I [170]
False sensor This ain’t your dose Smart medical device Light Sensing I [171]
data Illusion and dazzle Smart car Light Application I - [172]
injection Remote attacks on automated vehicles Smart car Light, Camera Application I [173]
REEVE Smart voice assistant Microphone Application I - [174]
Using AI to Hack IA Smart voice assistant Microphone, Speaker Application I - [175]
Light Commands Smart voice assistant Light Application I - [176]
Rocking drones Smart drone Gyroscope Communication A [8]
Denial-of-Service
Pairjam Smart home device Microphone Communication A [177]
† Attack Impact (AI): Confidentiality (C), Integrity (I), Availability (A); Attack Method (AM): Active- , Passive- ; Device Access (DA): Direct- , Transitive- , Peripheral- ; Attack
Complexity (AC): High- , Low- ; Required Privilege (RP): High privilege- , Low privilege- ; User Interaction (UI): Needed - , not needed - ; Success Rate (SR): High (>90%)
- , medium (70-90%) - , low (<70%) - .
18
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
off between excessive privilege and success rate determines Tippenhauer et al. showed another attack scenario in GPS-
the effects of the threats and attacks. enabled devices to change the real location of the device [167].
In this attack scenario, a vehicle with a GPS enabled device is
C. False Sensor Data Injection used. The attacker transmits a forged GPS signal to the device
to alter the location of the vehicle. In this way, the real location
The applications of smart devices largely depend on data of the vehicle is disguised and the attacker can perform any
collected by sensors available on the devices. By altering physical attack on the disguised vehicle. The GPS data used
the sensor data, one can control the applications of smart in the smartwatches can expose the location of a user and this
devices. False sensor data injection refers to an attack where GPS data can then be forged and a new location can be given
the sensor data used in the smart applications is forged or as a false input in the GPS [168].
intentionally changed to perform malicious activities. The false The power analysis attack on smart devices can also be used
sensor data can be injected in the devices by accessing the for injecting false data. The power analysis on smart devices
device physically or by using various communication mediums running an encryption algorithm can reveal information about
(Bluetooth, ZigBee, Z-Wave, Wi-Fi, cellular network, etc.) the encryption process including the block size, key size, even
covertly. An attacker can also introduce fake sensors in the the actual encryption key [180]. This information can be used
IoT environment to inject false generated data and initiate to encrypt a false data and replace the original data on the
malicious activities (Section IV: use cases - 1 and 3) [72], device. Thus, attackers can inject false encrypted data in the
[179]. Moreover, the sensors of smart devices can also be used communication channel to change the action of a device for
to alter data typed or stored on the devices. specific commands. Giannetsos et al. introduced a malicious
Tu et al. presented a spoof attack, where an out-of-band app named Spy-sense, which monitors the behavior of the
signal is inserted in smart devices via motion sensor [170]. sensors in a device and can manipulate data by deleting or
This signal injection results in deviation in sensor output which modifying it [169]. Spy-sense exploits the active memory
disrupts the normal functionality of the smart devices. Park et region of a device and alters the data structure and reports
al. used infrared light to disrupt normal operation of a smart back important data to a server covertly.
medical device [171]. Here, researchers used a medical infu- Lessons learned for false data injection - False data
sion pump to inject the spoof light signal and change the dose injection impacts the integrity of the smart devices as these
of the medicine in the device. In another recent work, Shin et threats and attacks disrupt the output of an on-going task.
al. exploited the light sensor of a smart car to change the output From Table V, it is evident that the majority of the threats
of the automatic obstruction detection system [172]. Petit et and attacks are simple and do not need any user interaction (8
al. improved this attack by combining camera reading of a out of 11 reported threats and attacks) to perform malicious
smart car to change the output of autonomous vehicle [173]. tasks. Also, false data injection attacks are passive by nature
In a recent work, Zhou et al. proposed an attack to exploit (6 out of 11 threats) and do not need any excessive privilege
the voice assistant of a smart car [162]. In this attack, the (7 out of 11 threats) to perform the attack. Another interesting
adversary inserts malicious commands in an audio or video file fact we observe is the effect of the successful attack directly
which can inject malicious commands to the voice assistant impact the on-going activities of the smart devices. Hence,
apps upon playing. false data injection attacks are method-wise passive, but effect-
The smart voice assistant is deployed in several smart wise active. However, the majority of the existing false data
devices such as smartphone, smart speaker, smart home hub, injection attacks did not report any success rate. Without
etc. These smart assistants usually triggered with a specific proper evaluation, it is hard to understand the effectiveness of
command such as ”Hi Google”, ”Hey Siri”, or ”Alexa”. Recent the reported attacks in real-life smart devices. Hence, further
researches showed that it is possible to inject malicious com- investigation is needed to properly evaluate the effectiveness
mands to smart voice assistants by exploiting the microphone of these attacks on real-life smart devices. The effects of false
of the smart devices. As smart voice assistants constantly data injection are diverse as it can manipulate the targeted
scan for desired a triggering command, an adversary needs smart device to perform numerous malicious activities. For
no additional privilege to inject malicious audio signals to instance, false data injected in smart voice assistant can
the device. Yuan et al. proposed REEVE, a stealthy voice give the attacker access to any connected device in a smart
manipulation attack to smart voice assistant [174]. REEVE environment which can cause device theft, undesired physical
uses benign audio signals such as TV or radio as a medium access to properties, unauthorized bank transactions and online
and insert malicious trigger commands which can be detected shopping, etc. [174], [175].
by a nearby voice assistant device. The researchers tested this
attack on consumer voice assistant devices (Amazon Echo) D. Denial-of-Service
and achieved high success rate. Zhang et al. improved this Denial-of-Service (DoS), by definition, is a type of attack
attack by eliminating the need of external audio signals [175]. where the normal operation of a device or application is
Here, researchers developed a spyware which can abuse the denied maliciously. DoS attacks can be active attacks where
microphone of a smartphone to record phone conversations an application or task is refused forcefully or passive attacks
and detect the trigger messages. Later, the spyware replays the where attacking one application can stop another on-going
recorded command using the speaker of the same smartphone task on the device. An adversary with access to smart device
to inject false commands to the voice assistant service. network and peripheral can send unauthorized access request
19
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
(a) Types of sensors (b) Active vs. passive (c) Targeted security mechanisms
20
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
inference and transmitting malicious sensor commands. As Table VI: Effect of sensor-based attacks on smart devices.
keystroke inference attacks typically target smart devices
with user interfaces, we can observe higher number of a smart device which can be propagated to nearby smart
sensor-based attacks in smartphones and smart watches. Fig- devices. Additionally, introducing false sensor data in a
ure 4f shows the common sensor-based threats and attacks smart device can change the output of a smart device and
to the smart devices. make a device or sensor unavailable for performing a task
• Effect of the sensor-based threats and attacks: In Table VI, (DoS). Also, external signal can interrupt an on-going task
we summarize the effects of sensor-based threats and attacks in smart devices by obstructing benign sensor activities.
on smart devices. One can notice that keystroke inference at-
tacks can leak diverse typing information such as passwords, F. Attack comparison and our findings
PIN input, hand gestures, printed texts, etc. by exploiting Sensor-based threats are emerging attack vectors and have
a smart device directly or using a smart device to extract diverse malicious effects on smart devices. In this survey, we
information from a nearby device. Task inference attacks surveyed 89 directly reported threats and observed that the
reveal the nature of on-going tasks on smart devices either majority of the threats aim to extract sensor readings to infer
in the user interface of the device or in a connected smart sensitive user information. The selective sensor authorization
environment. Sensor-based threats can also infer the geo- in existing smart devices is the main reason for increasing
location of a smart device user as well as create a location number of information leakage attacks on smart devices’
map of users’ route. By performing an eavesdropping attack sensors. Besides, embedded sensors in smart devices are prune
using sensors, an adversary can capture users’ conversa- to passive sniffing which also leads to several information leak-
tions and smart device commands to extract information age attacks, including keystroke inference and eavesdropping.
and accessing a targeted device. An adversary transmitting Compared to the information leakage, other types of sensor-
malicious sensor commands can trigger malicious events on based threats such as false data injection and transmitting
21
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
malicious sensor commands are mostly active attacks which and applications has made it hard to secure all the sensors
need to bypass implemented security measures. Hence, these by one effective framework. Moreover, with the rise of IoT,
active attacks are harder to execute in real-life smart devices. securing sensors of a single smart device does not guarantee
Another interesting observation is the correlation of success the security of all the connected devices. Furthermore, the
rate and attack method in sensor-based threats and attacks. lack of knowledge of the existing sensor-based threats and
We observed that passive sensor-based attacks are easy to differences in sensor characteristics make it hard to establish
execute. However, the average success rate of passive attacks a complete and comprehensive security measure to secure all
is lower than the active attacks as attackers need efficient the sensors of smart devices against the sensor-based threats
analytical tools to perform the attack. For instance, passive [7]. In this section, we discuss three main approaches proposed
information leakage attack uses sniffing techniques to capture by researchers in an attempt to design security mechanisms
sensor data. But, to extract information from passively cap- for sensor-based threats on smart devices. A summary of the
tured data, attackers need extra analytical tools that can learn existing solutions is given in Table VII.
the sensor patterns and decode sensitive information from raw
sensor data. On the contrary, active attacks on smart device A. Enhancing Existing Sensor Management Systems
sensors have higher success rate as attackers usually exploit One approach toward securing the sensors in smart devices
the sensors by directly accessing the device. For instance, in an is to enhance existing sensor management systems of smart
active eavesdropping attack, attackers can directly capture and device OSes. For instance, Xu et al. proposed an extension of
record users’ conversation by exploiting audio sensors [13], the Android sensor management system named SemaDroid,
[157]. Here, no analytical tool is usually needed to extract which provides users with a monitoring and logging feature
information from the captured data. to make the usage of sensors by apps explicit [26]. Also, with
As smart devices allow third-party app installation, the ma- Semadroid, users can specify policies to control whether and
jority of the reported threats utilize third-party apps to exploit with what level of precision third-party apps can access to
the sensors. We found several cases where a benign app source sensed data. Moreover, SemaDroid creates mock data to verify
code is altered to capture sensitive sensor information from how applications, from unknown vendors, use sensed data and,
smart devices. In these cases, the installed third-party apps thus, prevents malicious behaviors.
with malicious code snippets can directly capture sensitive Furthermore, system designers have long struggled with the
information or raw sensor data which needs further analysis challenge of determining how to let the user control when
to extract information. We also observe a correlation between applications may perform operations using privacy-sensitive
attack type and targeted sensors. As existing smart device sensors securely and effectively. Current commercial systems
platforms offer selective authorization for sensors such as request that users authorize such operations once (i.e., on
GPS, microphone, and camera, threats targeting these sensors install or first use), but malicious apps may abuse such
need to bypass the sensor authorization mechanism. Hence, authorizations to collect data stealthily using such sensors. Pro-
sensor-based threats targeting GPS, microphone, and camera posed research methods enable systems to infer the operations
are usually active in nature and need excessive privilege to associated with user input events [188]–[190], but malicious
perform an attack. In contrast, threats targeting motion sensors applications may still trick users into allowing unexpected,
and light sensors are relatively easy to execute and do not need stealthy operations. To prevent users from being tricked, Pe-
any user interaction and excessive privileges. tracca et al. proposed to bind applications’ operation requests
In conclusion, our study show that passive sensor-based to the associated user input events and how such events are
threats targeting no-permission imposed sensors can easily obtained explicitly, enabling users to authorize operations on
bypass existing security mechanisms in smart devices and can privacy-sensitive sensors unambiguously [19], [21]. To demon-
cause severe effect in terms of security and privacy of smart strate this solution, they implemented the AWare authorization
devices. However, while the issue of sensor-based threats have framework for Android, extending the Android Middleware to
received attention from the developer and research communi- control access to privacy-sensitive sensors. They evaluated the
ties, an additional investigation is needed to understand the effectiveness of AWare in: (1) a laboratory-based user study,
diverse effect of sensor-based threats on smart devices. Also, finding that at most 7% of the users were tricked by examples
researchers should study the existing sensor-based threats in of four types of attacks when using AWare, instead of 85% on
detail to learn the future trends of zero-day sensor threats and average for prior approaches; (2) a field study, showing that the
enhance sensor security on smart devices accordingly. user authorization effort increases by only 2.28 decisions on
average per application; (3) a compatibility study with 1,000 of
the most downloaded Android apps, demonstrating that such
VII. E XISTING S ECURITY M ECHANISMS TO P REVENT
applications can operate effectively under AWare. A similar
S ENSOR - BASED T HREATS AND ATTACKS
work is presented in EnTrust, where researchers implemented
Researchers have identified a diverse set of sensor-based an improved authorization framework in Android to regulate
threats to smart devices. Table III, IV, and V lists a sum- sensor authorization based on input events and delegation
mary of the existing sensor-based threats to smart devices. graphs generated from co-operating programs [181]. EnTrust
Although there are several threats, no comprehensive security user authorization for any sensor authorization requests and
mechanism to prevent such threats has been developed yet. remember the user’s decision for similar requests for future
Indeed, the use of a wide range of sensors in smart devices authorization. Another recent work, ContexIoT, proposed an
22
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
23
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
enhanced permission model for smart home devices [71]. Lessons learned for IDS - With context-aware IDS pro-
ContexIoT observes the inter-procedure control and data flow posed in [7] and [28], security of sensors in smart devices
in an app to determine the context of the app and forward the can be improved. However, to build the context-aware model,
detail information to the users before allowing sensor access the system needs a higher number of sensors to correctly
to the apps. Although, the context-aware approach gives users understand the user and device behavior model (the ground
more information before allowing permissions, ContexIoT still truth) [191]. Thus, proposed context-aware solutions are suit-
depends on user decisions and an app can trick the user by able for sensor-riched smart devices and the environment.
obfuscating the code. Monitoring sensor data continuously can also increase the
Lessons learned for enhancing sensor management sys- overhead in terms of power and CPU usage. For the real-
tems - Existing permission-based sensor management system life implementation of proposed IDSs, researchers should
lacks in securing all the sensors in smart devices and the perform overhead analysis and proposed possible solutions to
aforementioned solutions enhance the existing system to be reduce the resource usage. In summary, context-aware sensor-
more robust and secure in terms of sensor security. However, based IDSs ensure comprehensive security to the smart device
permission-based sensor management still relies on user per- sensors, but introduce overhead in the system.
missions which can be easily tricked as users may not be
aware of the threats. Additionally, in a smart environment,
C. Protecting Sensed Data
sensor-based threats can use transitive permissions to access
a smart device using the sensors of a connected device. In Another approach toward securing smart devices against the
this case, permission-based sensor management systems may sensor-based threats is to protect the sensed data in transfer
fail to protect the sensors from malicious attacks. In summary, and at rest. Indeed, malicious applications record sensor data
enhanced sensor management systems improve the sensor se- and transmit it later when the device is locked or when security
curity in smart devices significantly, but not comprehensively. mechanisms are turned off. For instance, sensed location data
may be subject to inference attacks by cyber-criminals that
aim to obtain sensitive locations such as the victim’s home
B. Intrusion Detection System and work locations to launch a variety of attacks.
One common approach to secure a system from external Location-Privacy Preserving Mechanisms (LPPMs) exist to
attacks is to install an intrusion detection system (IDS). An reduce the probability of success of inference attacks on
IDS monitors the device and sensor states to detect suspicious location data. However, such mechanisms have been shown
activity and alert the system upon finding any vulnerability. to be less effective when the adversary is informed of the
In recent years, several prior works have proposed IDSs protection mechanism adopted, also known as white-box at-
specifically to detect sensor-based threats to smart devices. A tacks. Petracca et al. proposed a novel approach that makes
sensor-based threat detection method is proposed in 6thSense, use of targeted maneuvers to augment real sensors’ data with
where researchers proposed a context-aware framework to synthetic data and obtain a uniform distribution of data points,
detect the sensor-based threats in IoT devices [7], [40]. This which creates a robust defense against white-box attacks
framework is built upon the observation that for any user [20]. Such maneuvers are systematically activated in response
activity on an IoT device, a specific set of sensors becomes to specific system events (i.e., internal state of sensors) to
active. 6thSense builds a comprehensive context-aware model rapidly and continuously control the rate of change in system
for each user activity based on this observation. Different configurations and increase diversity in the space of readings,
from other works, 6thSense utilizes all the sensor data in which would decrease the probability of success of inference
real-time and determines whether the present context of the attacks by an adversary. For instance, in the event of stationary
sensors is malicious or not using various machine learning- states, devices leak more information about the location of the
based approaches. Researchers tested the proposed framework users such as stop position, home location, etc. The proposed
with 50 real-life user data and confirmed that 6thSense can solution activates random obfuscation as a maneuver which
detect various sensor-based threats with approximately 98% selects one protection mechanism from a set of mechanisms
accuracy and F-score. In a later version of this work, the to increase the number of required guesses of an adversary.
researchers implemented 6thSense in a smartwatch and tested This ends up in reducing success rate of the adversary to leak
against several sensor-based threats [40]. Here, researchers location information. Proposed technique also implements two
collected user activity data from 100 real-life smartwatch users other maneuvers (spatial and temporal distribution) to deceit
and achieved approximately 97% accuracy in detecting differ- the adversary if there is no new data point over a longer period.
ent sensor-based threats. In another recent work, researchers Experimental results performed on a real data set showed
proposed Aegis, a context-aware intrusion detection system that the adoption of such maneuvers reduces the probability
(IDS) for the smart connected environment [28], [182]. Aegis of success of white-box attacks to 3% on average compared
observes on-going user activities in a smart environment to to 57% when using the state-of-the-art LPPMs. Acar et al.
learn how the state of smart devices change. Based on that, proposed a new approach to inject false packet in network
Aegis builds a context-aware model to detect malicious sensor traffic to protect sensor information from network sniffing.
activities in a smart environment. Researchers tested Aegis in Here, the authors showed that it is possible to prevent sensor
several smart environment configurations and achieved over information leakage by modifying the feature vectors of the
97% accuracy in detecting different sensor-based threats. network packets and protect the sensor data.
24
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
Furthermore, power analysis attacks and electromagnetic and protecting sensed data is that many of the enhanced sensor
emanation attacks exploit information from the power con- management systems prevent sensor access to prevent sensor-
sumption and electromagnetic emissions of active sensors based threats before executing whereas protecting sensed data
from the device. One proposed countermeasure to immune schemes target to secure sensed data at run-time. Protecting
electromagnetic emanation attacks is to use a single inverter sensed data can ensure sensor security against specific types of
ring oscillator (SIRO) [183]. In this proposed system, a multi- sensor-based threats and attacks (active information leakage,
clock system with cipher embodiment is used with SIRO- eavesdropping, etc.). However, passive sensor-based threats
based synchronization. The absence of external oscillator can still bypass the aforementioned solutions and execute
and unsynchronized nature of SIRO makes the system more malicious sensor activities. In addition, encrypting sensor data
immune to electromagnetic emission. Again, the SIRO-based in a sensor-rich smart device can introduce overhead in terms
system provides a frequency hopping scheme in cipher which of resource usage and latency.
increases immunity to timing and power analysis attacks.
Standaert et al. proposed an approach to minimize the effect
of power analysis attack which is based on the correlation D. App Analysis for Security and Privacy Invasion
between the power consumption measurements and a simple Smart devices such as smartphones, smartwatches, smart
prediction developed on the number of bit transitions within home devices, etc. support different apps to provide multiple
the devices [184]. The use of random pre-charges in the functions to the users. These apps can use the embedded
devices can minimize the probability of power analysis attack sensors of the smart devices or external connected sensors
on the FPGA-based smart devices. (e.g., motion sensors in smart home systems) to perform
More general solutions to address the protection of the various tasks. As current sensor management systems in smart
sensed data have also been proposed. For example, Roman devices offer selective restrictions on sensors, a malicious
et al. proposed the use of public-key encryption to secure app can abuse the sensors to perform malicious activities in
sensor data from devices [192]. They proposed the encryption a device. One effective way to prevent sensor-based threats
of sensor data collected and stored it in the device before and attacks is to perform app analysis to detect malicious
sharing it with third-party apps or other devices. Devices apps in the devices. There are two approaches to perform
connected to each other can share their public key through app analysis for smart devices – static analysis and dynamic
a key management system and use their assigned private key analysis. In static analysis, the source code of the apps is
to decrypt the sensor data. Third-party apps installed in the analyzed to detect any malicious activity such as information
device can also use a public key encryption scheme to use leakage, transferring malicious codes, etc. One common static
sensor data for various applications. analysis approach is taint analysis where data entry points
Trust management frameworks can also be leveraged for (source) and exit points (sink) are tainted to observe the
secure information flow among sensors, secure communication information flow inside the app. In a smart device app, sensors
of sensor data with other devices, and to certify authorized are considered as sources and any communication method such
access of sensors by trusted software and apps in the sys- as the Internet, text messaging, Bluetooth, etc. are considered
tem. Trust management frameworks can detect over-access as sinks. The taint analysis observes how the collected sensor
requests on sensors and take decisions based on whether data from the sources link to the sinks and any sensitive sensor
the requests are legitimate or not. For instance, a framework information leakage via the sinks is revealed. Fernandes et
named AuDroid was proposed to secure communications via al. proposed a static analysis framework named, FlowFence,
audio channels when applications make use of the device’s mi- which offers a language-independent taint analysis approach
crophones and speakers [22]. AuDroid leverages the SELinux to detect information leakage in IoT apps [187]. FlowFence
kernel module to build a reference monitor which enforces takes the source code of an untrusted IoT app, inserts code
access control policies over dynamically created audio chan- snippets to track sensitive data flow between the sources and
nels. It controls information flows over audio channels and sinks, and runs the app in a sandbox to detect malicious sensor
notifies users whenever an audio channel is created between data flow in the apps. FlowFence is tested with different IoT
processes at runtime. Mirzamohammadi et al. developed Di- apps to determine its effectiveness against information leakage.
tio, a trustworthy auditing framework to capture and verify However, FlowFence can only detect information leakage from
sensor activities with pre-defined policies [186]. Ditio uses an the apps and fails to protect the sensors from side-channel
authentication protocol to connect with a secured server and attacks. Another static analysis tool, SaINT, is proposed by
log sensor activity to check compliance with enforced usage Celik and Babun et al. for the smart home platform [72].
policies. It detects any untrusted sensor activity at a specified SaINT specifically performs static analysis of smart home
time by analyzing the logged data. Babun et al. proposed a apps and detects sensitive information leakage by performing
forensic analysis tool to detect malicious user and app behavior the taint analysis of the source code. SaINT analyzed a total
on sensors in a smart environment. Authors considered the of 230 smart home apps and reported sensitive information
state of smart devices and sensors to build a state model of flow including sensor data leakage in smart home systems.
a smart environment and use machine learning algorithms to However, SaINT fails to detect passive attacks such as trigger
detect malicious behaviors on sensors. malware or transferring malicious codes using sensors.
Lessons learned for protecting sensed data- One interest- Lessons learned for app analysis- As smart devices often
ing difference between existing sensor management systems use different smart apps to perform various tasks, app analysis
25
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
Proposed Attacks Covered† Smart device OS User Sensor and Analytical Detection
Solution type Overhead
Solution IL TC FD DoS Platform Dependency Dependency Device dependency model type
SemaDroid [26] Sensor management Standalone
AWare [19], [21] Sensor management Standalone
ContexIoT [71] Sensor authorization Connected
EnTrust [181] Sensor authorization Standalone
6thSense [7] Intrusion detection Standalone
Aegis [28] Intrusion detection Connected
Location-Privacy
Data spoofing Standalone N/A
Preserving Mechanism [20]
SIRO [183] Signal masking Standalone N/A
Protection against Data correlation and
Standalone N/A
power analysis [184] randomization
AuDroid [22] Sensor authorization Standalone
IoTDots [185] Forensic analysis Connected
Ditio [186] Sensor management Standalone
Peek-a-Boo [85] Data spoofing Connected
FlowFence [187] Static analysis Connected
SaINT [72] Static analysis Connected
† IL - Information leakage, TC - Transmitting malicious sensor command, FD - False data injection, DoS - Denial-of-Service.
‡ Smart device platform: Standalone smart device, connected smart devices; OS dependency: Dependent - , Independent - ; User dependency: Dependent - , Independent -
; Sensor and device dependency: Dependent - , Independent - ; Analytical model: Supervised - , Unsupervised - ; Detection type: Real-time - , static/after incident
- ; Overhead: High - , Low - .
Table VIII: Comparison between existing security mechanisms to prevent sensor-based threats in smart devices.
can be an effective solution to detect sensor-based threats in (e.g., camera, GPS, and microphone). Similarly, AuDroid pro-
the application layer. However, the majority of the sensor- vides a policy-enforced framework to secure the audio sensors
based threats target the sensing layer (Section VI) and app of smart devices explicitly [22]; however, such framework was
analysis techniques often cannot detect these anomalies in not designed to protect other sensitive sensors. Other proposed
source code [7]. Existing app analysis techniques are mostly solutions only provide protection against power analysis and
static analysis [72] which needs the source code of an app to electromagnetic emanation-based attacks, respectively [183],
perform the analysis. This is a major drawback as the source [184]. A step forward was made with AWare and 6thSense
code of the app may not be available to the users. Unlike that covered a wider set of privacy-sensitive sensors available
enhanced sensor management systems and IDS, performing in current smart devices to build a context-aware model and
app analysis depends on user interaction (interacting with the determine whether a sensor usage scenario is malicious.
tools) which requires technical knowledge. As users may not (4) In solutions where users’ decisions are utilized to build
have required technical expertise, performing app analysis to the sensor use policy for third-party apps, such as in Semadroid
detect sensor-based threats can be ineffective in real-life. and AWare, if a user allows an application to use a sensor
without any restriction, then the application is blindly treated
E. Shortcomings of Proposed Security Mechanisms as secure by the system.
(5) Encrypting sensor data using public key encryption
Although the aforementioned solutions address sensor-based
schemes provides protection to sensor data, but it also con-
threats and attacks, there are still limitations that need to be
sumes high power to run in smaller smart devices [192].
overcome.
This power-performance trade-off is impractical for resource-
(1) Most of the proposed security mechanisms for smart limited smart devices. In conclusion, a complete and compre-
devices are anomaly detection frameworks at the application hensive solution for autonomous policy enforcement, compre-
level which are not suitable for detecting sensor-based threats hensive coverage of all the sensors, and an efficient power-
or attacks at the system level [193]–[196]. Sikder et al. performance trade-off are yet to be designed.
analyzed the performance of several sensor-based threats with
respect to real-life malicious software scanners available in
VirusTotal website and observed that no scanner can recognize F. Comparison of Security Mechanisms and Our Findings
sensor-based threats [7]. Berkay et al. showed that Apps While existing security mechanisms address sensor-based
with malicious sensor logic in smart home devices cannot be threats to some extent, further research is needed to develop
detected via static analysis [72]. comprehensive and efficient security mechanisms and tools
(2) With the growing popularity of the IoT concept, more to prevent sensor-based threats effectively. A comparison be-
and more smart devices are being interconnected with each tween existing security mechanisms is given in Table VIII. We
other and the security of these devices becomes difficult to notice that the majority of the existing security mechanisms
manage. Many smart devices are severely resource-limited, only address information leakage by enhancing OS sensor
small devices and it is hard to implement a complex security management system and encrypting sensor data. Hence, threats
mechanism considering the limited resources of the devices such as transmitting malicious sensor command and false data
[197]. injection can easily bypass these security mechanisms and
(3) Proposed security mechanisms only target a subset of exploit sensors in smart devices. Compared to a sensor man-
sensitive sensors available in smart devices nowadays. For in- agement and authorization framework, an intrusion detection
stance, commercial sensor management systems use an explicit system can perform efficiently as it can address several sensor-
permission-based security model for only some of the sensors based threats at run-time [7], [28]. However, the existing
26
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
intrusion detection systems for smart devices use supervised (2) Further investigation of existing threats, and (3) Solutions
learning which are ineffective for zero-day threats. to detect sensor-based threats. In the following discussion,
Another interesting observation is the user dependency in we briefly explain these open issues and summarize future
existing sensor management, authorization, and static analysis research directions needed to counter sensor-based threats.
tools [72]. As attackers can easily trick the users to bypass Smart device architectures and platforms. The smart
installed sensor management systems and authorization rules, device industry is growing rapidly and these smart devices
user dependency in security mechanisms may become ineffec- are different from each other in terms of hardware, software,
tive against sensor-based threats. Again, static analysis tools implementation, and functionalities. To understand the sensor-
require app source code and user interaction which can be based threats, it is important to understand the smart device
undesirable to novice smart device users. Hence, compared to architecture and functionalities properly. Researchers and de-
intrusion detection systems, the existing sensor management, velopers can investigate the following open issues in smart
authorization, and static analysis techniques perform ineffec- device architecture to understand the consequences of sensor-
tively against sensor-based threats. based threats properly.
To protect sensor data, several prior works have proposed Study of Smart Device Architectures and Sensor Operations
data encryption and spoofing mechanisms. While the proposed - With the introduction of IoT, the number of smart devices in
mechanisms effectively address information leakage at sensor different domains is increasing rapidly. The smart devices have
level, the majority of the encryption and spoofing methods several internal architectures (i.e., software and hardware) with
are sensor-specific and OS-dependent solutions. Also, data less knowledge available, which is an obstacle to secure sen-
encryption at sensor level introduces high overhead which can sors in these devices. For instance, there are several operating
affect the normal operation of smart devices. Researchers may systems (e.g., Linux, Android, Contiki, TinyOS, etc.) available
study efficient end-to-end and sensor-independent encryption for smart devices which vary in terms of functionalities,
schemes to protect sensor data at rest and run-time. We operations, and integrated security features. Moreover, smart
also notice that there is no effective security mechanism that devices can connect with each other and create a network of
address denial-of-service (DoS) attacks in standalone smart smart devices to perform various tasks. The lack of knowledge
devices (e.g., smartphones, smart watches, etc.). Although of device architectures can affect the security of the devices as
there are only two reported threats that perform DoS attacks security flaws in one smart device can cause the compromise
in smart devices, lack of security measures may encourage of other connected smart devices. Additionally, in a smart
attackers to develop novel DoS attacks targeting sensors. connected environment, multiple smart devices use one sensor
In conclusion, while several prior works have proposed to automate various tasks [28]. Hence, compromising one
various security mechanisms to protect sensors in smart de- sensor can trigger malicious activities in several connected
vices, we notice the absence of comprehensive understandings smart devices. Researchers and developers should study the
and security mechanisms to protect sensors from diverse smart device architectures (both standalone and connected
sensor-based threats reported by research community and smart devices) and functionalities to understand the sensor
industry. Also, we observe the OS and user dependency in mechanism which will help to understand the consequences
existing security mechanisms which impact the effectiveness of emerging sensor-based threats.
in detecting sensor-based threats. Hence, further investigation Adoption of Standard Security Mechanisms - Currently,
is needed to understand the robustness of existing security there exist several operating systems for smart devices that
mechanisms in different smart devices and platforms which manage their on-board and external connected sensors in
would provide valuable insights to develop comprehensive distinctive ways (Section IV). These dissimilarities make it
mitigation techniques against sensor-based threats. hard to converge for a general security scheme to protect
sensors of the smart devices [198]. For example, in a smart
VIII. O PEN I SSUES , F UTURE D IRECTIONS , AND environment, several smart devices from different vendors can
R ECOMMENDATIONS share the same sensors and physical environment. Any sensor-
The concept of making devices ’smart’ is no longer in based threats compromising normal functionalities of a sensor
the developing stage and new research ideas related to smart can propagate to several connected smart devices. In this
devices are emerging these days. In this section, we discuss scenario, installing vendor-specific sensor security schemes
open issues and future research directions in the context of surely increase the security of smart devices from a specific
sensor-based threats and attacks to smart devices. vendor. However, sensor-based threats targeting smart devices
from another vendor can compromise connected smart devices
even with an installed vendor-specific security scheme [28].
A. Open Issues and Future Directions Moreover, installing different security schemes in different
Due to the lack of knowledge among users and research smart devices can lead to high resource usage and introduce
communities, sensor-based threats become compelling to the overhead in the smart environment. Hence, a comprehensive
attackers to exploit the security of smart devices and perform vendor-independent sensor security scheme is needed to secure
malicious activities. There are several open issues that exist in sensors of smart devices in a connected smart environment.
smart devices that need attention from developers, researchers, One of the future research efforts should be the standardization
and users. These open issues can be categorized in three of development platforms for smart devices which will make
major areas - (1) Smart device architectures and platforms, it easier for researchers to come up with universal security
27
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
measures to defend against sensor-based threats and attacks. should be secured, which helps in end-to-end security for the
Therefore, researchers should investigate the possibility of a devices. Secure end-to-end communication from sensors to
common security mechanism for authentication of sensor data the devices and among devices is vital to avoid information
as well as authorization of legitimate sensor access. leakage [201], [202]. Devices should share encrypted sensor
Fine-grained Control of Sensors - Existing sensor manage- data to avoid any information leakage via packet sniffing [85].
ment systems of smart devices offer permission-based sensor Sensor data should also be available to all the connected
management which completely depends on user consent. Apps devices continuously to ensure unimpeded performance.
generally ask for permission to access specific sensors on Privacy Concerns in Smart Device Sensors- Sensors in
installation time and once the permissions are granted, users smart devices are associated with several tasks on smart
have less control over the sensors’ usage by the apps. Again, devices that capture sensitive user inputs including user cre-
the user permission is enforced only to secure a limited number dentials, typed information, PIN code, etc. Hence, raw sensor
of the on-board sensors (e.g., microphone, camera, GPS). data leaked from smart devices can lead to privacy violations in
Granting permission to these sensors automatically grant per- smart devices [203]. Attackers can utilize advanced techniques
mission for other sensors such as accelerometer, gyroscope, and analytical engines to learn sensitive information from
light sensor, etc. In recent years, researchers have also shown sensor data and emulate user inputs to perform malicious
that both permission-enforced (microphone, camera, GPS) activities such as accessing the device, alter device settings,
and no permission-enforced (accelerometer, gyroscope, etc.) etc. For instance, a malware installed in a smart device can
sensors are vulnerable to sensor-based threats and attacks. capture keystrokes from sensor input and start injecting false
Therefore, a fine-grained sensor management system is needed keystrokes to perform malicious tasks while the device is on
to verify compliance between sensor access and user intent. sleep mode [204]. Hence, it is important to ensure sensor data
Further Investigation of Sensor-based Threats. Several confidentiality in ongoing tasks of a smart device to protect
prior works have reported many sensor-based threats to smart user privacy. One effective solution can be run-time encryption
devices in recent years. However, these sensor-based threats of sensor data which can prevent information leakage from raw
are unique from one another in terms of attack methods, tar- sensor data. Another possible solution can be sensor-assisted
geted devices, and attack consequences. To understand sensor- continuous authentication in connected smart devices to detect
based threats, it is important to study the existing threats and emulated user input [205], [206]. Further investigation is
use the knowledge to enhance the security of smart devices to needed from the research community to develop emulated user
tackle new sensor-based threats. input detection techniques and sensor encryption schemes to
Study of Malicious Sensor Behavior and User Perspectives- ensure user privacy at the sensor level.
Sensor-based threats are relatively new and there are only a Sensor-based Threats in Other Domains- Sensors have
few comprehensive studies available to understand the threats become ubiquitous not only in modern smart devices, but
properly. This lack of knowledge is lucrative for attackers also sensor-assisted technologies are gaining popularity in
to target and trick smart device users to install malicious various application domains. The diverse use of sensors in
apps and perform malicious sensor activities [199]. Users smart devices opens up the possibility of new security threats
carelessly install any third-party apps with illegitimate sensor adopted from different application domains. For instance, sen-
permissions which can compromise smart devices [74], [200]. sor impersonation attack is a common threat vector in wireless
Therefore, to secure sensors in smart devices, it is important sensor networks which can be easily adapted to exploit sensors
to understand how users, smart devices, and apps are using in a multi-device smart environment [207], [208]. Also,
sensors to perform and automate various tasks and what their a compromised sensor node is an interesting security issue
views of sensor-based threats are. Researchers may perform in cyber-physical systems such as smart grid which can be
additional usability studies to better understand how users can modified to exploit sensors in smart devices [209], [210]. To
contribute to improving sensor access control via their inputs address such adopted sensor-based threats, researchers may
in smart devices. study OS-level and user-level sensor behavior to differentiate
Prevent Leakage of Sensor Data - Smart devices can au- benign and compromised sensors in smart devices [211].
tonomously sense their surrounding environment which can be Another interesting research direction to address such threats
used to prevent information leakage from the devices. Sensors can be to investigate correlation between user behavior and
in smart devices can anticipate an on-going task and detect sensor behavior to identify compromised sensor nodes in smart
the pattern of information accessed by the task. These sensor devices. Hence, the study of adopted sensor-based threats
patterns vary for different activities and by observing these in interconnected application domains can be an emerging
sensor behaviors, it is possible to prevent information leakage research topic for both industry and research communities.
in smart devices [7]. Security Measures for Sensor-based Threats. As men-
Control Sharing of Data among Sensors - Communica- tioned in Section VII, there are no comprehensive solutions to
tion on smart devices become more sensor-to-sensor (i.e., detect sensor-based threats in smart devices. The existing solu-
machine-to-machine) compared to human-to-sensor or sensor- tions focus on specific threats or sensors which are ineffective
to-human (human-to-machine or machine-to-human) and the in addressing sensor-based threats extensively. Researchers
introduction of a huge number of sensors in smart devices and developers should focus on the following open issues
is speeding up this shift. As smart devices deal with sensi- to develop effective security measures to detect sensor-based
tive personal data, sensor-to-sensor communication channels threats properly.
28
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
Device Independent Security Measure - The majority of the right for every embedded and connected sensors. With the
existing solutions to secure sensors in smart devices focus introduction of IoT, sensors can be external devices and
on smartphone overlooking the security needs of other smart connected via different communication means. Hence, vendors
devices [31]. However, the number of different smart devices need to consider sensors as embedded components as well
are also increasing rapidly. Several prior works have verified as independent before implementing security measures. Smart
that not only smartphones but all the smart devices (e.g., smart device vendors also should have a strong research strategy
watch, smart home devices, etc.) are vulnerable to emerging to understand the sensor-based threats and attacks and its
sensor-based threats [28], [212]. Additionally, smartphones consequences to secure the devices.
can be used as a platform to launch sensor-based threats to End-users - The main victims of the sensor-based threats
other smart devices as smartphones act as controller device and attacks are end-users. Attackers mostly target end-users
for several smart devices such as smart lock, smart camera, with less technical knowledge of sensor-based threats to per-
etc. [37]. Hence, researchers should consider sensor-based form malicious activities such as information leakage, task
threat as a general threat to smart devices to develop device inference, etc. Although it is hard to understand the technical
independent security measures. part of different sensor-based threats and attacks, end-users
Protect Sensor Data when at Rest - Smart device applica- should know the consequences of these threats and attacks and
tions deal with multiple sensor data at a time and tampered be cautious before using any risky apps in the devices. Ad-
data in the smart devices can impact the normal behavior of ditionally, end-users can follow good security practices such
applications. To ensure the authenticity of sensor data, various as rejecting any suspicious sensor access, disabling automatic
end-to-end encryption mechanisms may be applied from the data sharing between apps, etc. to secure their devices and
sensors to the program requesting it. Various security features information. Users can also raise their concerns to the vendors
of the hardware such as ARM TrustZone may be adopted to regarding sensor-based threats and attacks.
achieve secure data flow inside the devices [213]. Researchers Developers - Developers can play an important role in se-
may also invest their effort in studying the adoption of the curing smart devices against sensor-based threats and attacks.
blockchain technology as a way of designing highly distributed Modern app-based platforms increase the popularity of smart
systems able to provide attestation and verification among devices rapidly and developers can build numerous apps and
multiparty and heterogeneous components part of a larger publish them in app markets. To secure the devices from the
smart device ecosystem. sensor-based threats and attacks, developers can follow the
Protect Integrity of Sensor Operations - The research guidelines published by the vendors to minimize the sensor
community has not invested enough effort in studying the data abuse in the apps [215]. Developers can also follow good
design and development of tools for automated detection app developing practices such as the use of encrypted sensor
and analysis of sensors-based threats. For instance, no tool data in the app, trusted data flow path, use of only essential
is available to automatically identify and analyze adversary- sensor permission, etc. Developers can also help the vendors
controlled sensors that would compromise the integrity of to build specific security measures against the sensor-based
sensor operations, as well as the integrity of the data generated threats and attacks.
or modified by such operations. Also, no tool is available to Research community - Several on-going research efforts
automatically identify dangerous configurations in enforced have already confirmed the necessity of securing sensors in
access control policies, which may lead to risky operations smart devices [7], [164]. The research community can help
by trusted programs that may compromise the integrity of the the industry to address the sensor-based threats and attacks
entire connected smart device environment. efficiently and propose various solutions. Researchers along
Adoption of Intrusion Mechanisms to Detect Attacks - In re- with the industry experts should jointly propose a standard
cent years, multiple efficient techniques (e.g., machine learning practice in app development to minimize the sensor abuses in
(ML) and neural network (NN)) were applied to detect threats smart devices. Furthermore, researchers should report newly
in various application domains. These detection techniques found sensor-based threats to the vendors immediately to
should be explored in detail to design novel intrusion detection reduce the consequences.
mechanism, for smart devices and applications, able to identify Summary - In summary, there are several interesting re-
when unsafe operations are authorized. Therefore, researchers search problems that may be tackled by the research commu-
should investigate NN and ML classification algorithms as nity toward improving the security of sensors in smart devices
viable solutions to identify and differentiate legitimate from and applications. While following the above directions toward
illegal sensing activities. Another interesting approach is to better protection mechanisms against the sensor-based threats
study adversarial effects on sensor-based threat detection. Prior and attacks, researchers have to identify the key characteristics
works showed ML-based intrusion detection can be pruned that differentiate IoT security from the commodity system
to adversarial attacks [214]. Hence, researchers and industry security. Such unique characteristics will guide toward the
practitioners should investigate and develop mitigation strate- design of innovative mechanisms that will be robust against
gies against adversarial attacks on sensors. the sensor attacks.
29
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
in smart devices and applications. In this paper, we surveyed [9] A. Nahapetian, “Side-channel attacks on mobile and wearable systems,”
a lesser-known yet serious family of sensor-based threats and in Consumer Communications & Networking Conference (CCNC),
2016 13th IEEE Annual. IEEE, 2016, pp. 243–247.
attacks to smart devices. To the best of our knowledge, this [10] V. Subramanian, S. Uluagac, H. Cam, and R. Beyah, “Examining
survey is the first one to address sensor-based threats and the characteristics and implications of sensor side channels,” in IEEE
attacks as a major security issue to smart devices and classify International Conference on Communications (ICC), 2013, pp. 2205–
2210.
these emerging threats and attacks formally. We presented [11] R. Hasan, N. Saxena, T. Haleviz, S. Zawoad, and D. Rinehart,
a comprehensive overview of sensors in smart devices and “Sensing-enabled channels for hard-to-detect command and control of
existing sensor management systems used in commodity smart mobile devices,” in Proceedings of the 8th ACM SIGSAC symposium on
Information, computer and communications security, 2013, pp. 469–
devices. We provided a detailed analysis of recent sensor-based 480.
threats and attacks and discussed how these threats and attacks [12] R. Wijewickrama, A. Maiti, and M. Jadliwala, “dewristified: handwrit-
can be used to exploits various sensors in smart devices. ing inference using wrist-based motion sensors revisited,” in Proceed-
ings of the 12th Conference on Security and Privacy in Wireless and
We also summarized several security approaches proposed Mobile Networks, 2019, pp. 49–59.
by researchers in the attempt to address critical shortcomings [13] R. Schlegel, K. Zhang, X.-y. Zhou, M. Intwala, A. Kapadia, and
for the security of these devices, and discussed some of the X. Wang, “Soundcomber: A stealthy and context-aware sound trojan
for smartphones.” NDSS, vol. 11, pp. 17–33, 2011.
challenges for future research work in this area. In conclu-
[14] L. Zhuang, F. Zhou, and J. D. Tygar, “Keyboard acoustic emanations
sion, we believe this survey will have a positive impact in revisited,” ACM Transactions on Information and System Security
the research community by documenting recent sensor-based (TISSEC), vol. 13, no. 1, p. 3, 2009.
threats and attacks to smart devices and motivating researchers [15] A. Maiti, M. Jadliwala, J. He, and I. Bilogrevic, “(smart) watch your
taps: side-channel keystroke inference attacks using smartwatches,” in
to develop further comprehensive security schemes to secure Proceedings of the 2015 ACM International Symposium on Wearable
these devices against sensor-based threats and attacks. Computers. ACM, 2015, pp. 27–30.
[16] S. M. Del Pozo, F.-X. Standaert, D. Kamel, and A. Moradi, “Side-
ACKNOWLEDGMENT channel attacks from static power: When should we care?” in Proceed-
ings of the 2015 Design, Automation & Test in Europe Conference &
The authors would like to thank US National Science Foun- Exhibition. EDA Consortium, pp. 145–150.
dation to support this work under the awards NSF-CAREER- [17] “Mems accelerometer hardware design flaws (update a),” https://ics-
cert.us-cert.gov/alerts/ICS-ALERT-17-073-01A, May 2017.
CNS-1453647, NSF-CNS-1718116. This research was also [18] A. S. Uluagac, V. Subramanian, and R. Beyah, “Sensory channel threats
sponsored by the Army Research Laboratory and was accom- to cyber physical systems: A wake-up call,” in IEEE Conference on
plished under Cooperative Agreement Number W911NF-13-2- Communications and Network Security (CNS), 2014, pp. 301–309.
[19] G. Petracca, A.-A. Reineh, Y. Sun, J. Grossklags, and T. Jaeger, “Aware:
0045 (ARL Cyber Security CRA). The views and conclusions Preventing abuse of privacy-sensitive sensors via operation bindings,”
contained in this document are those of the authors and should in 26th USENIX Security Symposium (USENIX Security 17), 2017, pp.
not be interpreted as representing the official policies, either 379–396.
[20] G. Petracca, L. M. Marvel, A. Swami, and T. Jaeger, “Agility maneu-
expressed or implied, of the Army Research Laboratory or vers to mitigate inference attacks on sensed location data,” in IEEE
the U.S. Government. The U.S. Government is authorized to Military Communications Conference, MILCOM, 2016, pp. 259–264.
reproduce and distribute reprints for Government purposes not [21] G. Petracca, A. Atamli, Y. Sun, J. Grossklags, and T. Jaeger, “Aware:
with standing any copyright notation here on. controlling app access to i/o devices on mobile platforms,” arXiv
preprint arXiv:1604.02171, 2016.
[22] G. Petracca, Y. Sun, T. Jaeger, and A. Atamli, “Audroid: Preventing
R EFERENCES attacks on audio channels in mobile devices,” in Proceedings of the 31st
[1] N. Bari, G. Mani, and S. Berkovich, “Internet of things as a method- Annual Computer Security Applications Conference. ACM, 2015, pp.
ological concept,” in Fourth International Conference on Computing 181–190.
for Geospatial Research and Application (COM. Geo). IEEE, 2013, [23] R. Templeman, Z. Rahman, D. Crandall, and A. Kapadia, “PlaceRaider:
pp. 48–55. Virtual theft in physical spaces with smartphones,” in The 20th Annual
[2] N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T. Network and Distributed System Security Symposium (NDSS), To
Campbell, “A survey of mobile phone sensing,” IEEE Communications appear, Feb 2013.
magazine, vol. 48, no. 9, 2010. [24] M. Kumar. (2019) New android malware apps use motion sensor to
[3] Y. Yu, J. Wang, and G. Zhou, “The exploration in the education of evade detection. [Online]. Available: https://thehackernews.com/2019/
professionals in applied internet of things engineering,” in 4th Inter- 01/android-malware-play-store.html
national Conference on Distance Learning and Education (ICDLE). [25] T. Micro. (2019) Google play apps drop anubis banking
IEEE, 2010, pp. 74–77. malware, use motion-based evasion tactics. [Online]. Available:
[4] A. K. Sikder, A. Acar, H. Aksu, A. S. Uluagac, K. Akkaya, and https://blog.trendmicro.com/trendlabs-security-intelligence/google-
M. Conti, “Iot-enabled smart lighting systems for smart cities,” in play-apps-drop-anubis-banking-malware-use-motion-based-evasion-
2018 IEEE 8th Annual Computing and Communication Workshop and tactics/
Conference (CCWC). IEEE, 2018, pp. 639–645. [26] Z. Xu and S. Zhu, “Semadroid: A privacy-aware sensor management
[5] Statista, “Smart home,” September 2019. [Online]. Available: framework for smartphones,” in Proceedings of the 5th ACM Confer-
https://www.statista.com/outlook/279/109/smart-home/united-states ence on Data and Application Security and Privacy. ACM, 2015, pp.
[6] M. Kanellos, “152,000 smart devices every minute in 2025: 61–72.
Idc outlines the future of smart things,” March 2016. [Online]. [27] S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein,
Available: https://www.forbes.com/sites/michaelkanellos/2016/03/03/ Y. Le Traon, D. Octeau, and P. McDaniel, “Flowdroid: Precise con-
152000-smart-devices-every-minute-in-2025-idc-outlines-the-future- text, flow, field, object-sensitive and lifecycle-aware taint analysis for
of-smart-things/#f055f744b63e android apps,” Acm Sigplan Notices, vol. 49, no. 6, pp. 259–269, 2014.
[7] A. K. Sikder, H. Aksu, and A. S. Uluagac, “6thsense: A context- [28] A. K. Sikder, L. Babun, H. Aksu, and A. S. Uluagac, “Aegis: a context-
aware sensor-based attack detector for smart devices,” in 26th USENIX aware security framework for smart home systems,” in Proceedings of
Security Symposium (USENIX Security), Vancouver, BC, 2017, pp. the 35th Annual Computer Security Applications Conference, 2019, pp.
397–414. 28–41.
[8] Y. Son, H. Shin, D. Kim, Y.-S. Park, J. Noh, K. Choi, J. Choi, Y. Kim [29] J. Li, Y. Liu, T. Chen, Z. Xiao, Z. Li, and J. Wang, “Adversarial attacks
et al., “Rocking drones with intentional sound noise on gyroscopic and defenses on cyber-physical systems: A survey,” IEEE Internet of
sensors.” in USENIX Security, 2015, pp. 881–896. Things Journal, 2020.
30
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
[30] N. Neshenko, E. Bou-Harb, J. Crichigno, G. Kaddoum, and N. Ghani, services for future iot: A survey,” IEEE Access, vol. 5, pp. 8956–8977,
“Demystifying iot security: an exhaustive survey on iot vulnerabilities 2017.
and a first empirical look on internet-scale iot exploitations,” IEEE [54] N. Yousefnezhad, A. Malhi, and K. Främling, “Security in product
Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2702–2733, lifecycle of iot devices: A survey,” Journal of Network and Computer
2019. Applications, p. 102779, 2020.
[31] G. Suarez-Tangil, J. E. Tapiador, P. Peris-Lopez, and A. Ribagorda, [55] Z. Yan, P. Zhang, and A. V. Vasilakos, “A survey on trust management
“Evolution, detection and analysis of malware for smart devices,” IEEE for internet of things,” Journal of network and computer applications,
Communications Surveys & Tutorials, vol. 16, no. 2, pp. 961–987, vol. 42, pp. 120–134, 2014.
2013. [56] N. Chaabouni, M. Mosbah, A. Zemmari, C. Sauvignac, and P. Faruki,
[32] P. Bhat and K. Dutta, “A survey on various threats and current state “Network intrusion detection for iot security based on learning tech-
of security in android platform,” ACM Computing Surveys (CSUR), niques,” IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp.
vol. 52, no. 1, pp. 1–35, 2019. 2671–2701, 2019.
[33] E. Fernandes, J. Jung, and A. Prakash, “Security analysis of emerging [57] I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection
smart home applications,” in IEEE Symposium on Security and Privacy systems in wireless sensor networks,” IEEE communications surveys
(SP), 2016, pp. 636–654. & tutorials, vol. 16, no. 1, pp. 266–282, 2013.
[34] Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security [58] O. Can and O. K. Sahingoz, “A survey of intrusion detection systems
issues in wireless sensor networks,” CSE Journal Articles, University in wireless sensor networks,” in 2015 6th International Conference on
of Nebraska-Lincoln, 2006. Modeling, Simulation, and Applied Optimization (ICMSAO). IEEE,
[35] Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, “A survey on security and 2015, pp. 1–6.
privacy issues in internet-of-things,” IEEE Internet of Things Journal, [59] I. Butun, P. Österberg, and H. Song, “Security of the internet of things:
vol. 4, no. 5, pp. 1250–1258, 2017. vulnerabilities, attacks and countermeasures,” IEEE Communications
[36] M. Ammar, G. Russello, and B. Crispo, “Internet of things: A survey Surveys & Tutorials, 2019.
on the security of iot frameworks,” Journal of Information Security and [60] M. A. Al-Garadi, A. Mohamed, A. Al-Ali, X. Du, I. Ali, and
Applications, vol. 38, pp. 8–27, 2018. M. Guizani, “A survey of machine and deep learning methods for
[37] M. H. Khan and M. A. Shah, “Survey on security threats of smart- internet of things (iot) security,” IEEE Communications Surveys &
phones in internet of things,” in 22nd International Conference on Tutorials, 2020.
Automation and Computing (ICAC). IEEE, 2016, pp. 560–566. [61] A. Hamza, H. H. Gharakheili, and V. Sivaraman, “Iot network se-
[38] L. Cao, X. Jiang, Y. Zhao, S. Wang, D. You, and X. Xu, “A survey of curity: Requirements, threats, and countermeasures,” arXiv preprint
network attacks on cyber-physical systems,” IEEE Access, vol. 8, pp. arXiv:2008.09339, 2020.
44 219–44 227, 2020. [62] S. Poslad, Ubiquitous computing: smart devices, environments and
[39] V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, “A interactions. John Wiley & Sons, 2011.
survey on iot security: application areas, security threats, and solution [63] M. Silverio-Fernández, S. Renukappa, and S. Suresh, “What is a smart
architectures,” IEEE Access, vol. 7, pp. 82 721–82 743, 2019. device?-a conceptualisation within the paradigm of the internet of
[40] A. K. Sikder, H. Aksu, and A. S. Uluagac, “A context-aware framework things,” Visualization in Engineering, vol. 6, no. 1, p. 3, 2018.
for detecting sensor-based threats on smart devices,” IEEE Transactions
[64] “Smartthings developer documentation,” http://docs.smartthings.com/
on Mobile Computing, 2019.
en/latest/architecture/index.html, accessed: 2017-7-07.
[41] D. Dragomir, L. Gheorghe, S. Costea, and A. Radovici, “A survey on
[65] C. Salzmann and D. Gillet, “Smart device paradigm, standardization
secure communication protocols for iot systems,” in 2016 International
for online labs,” in IEEE Global Engineering Education Conference
Workshop on Secure Internet of Things (SIoT). IEEE, 2016, pp. 47–62.
(EDUCON). IEEE, 2013, pp. 1217–1221.
[42] I. Tomić and J. A. McCann, “A survey of potential security issues in
existing wireless sensor network protocols,” IEEE Internet of Things [66] G. C. Meijer et al., Smart sensor systems. Wiley Online Library, 2008,
Journal, vol. 4, no. 6, pp. 1910–1923, 2017. vol. 7.
[43] A. H. Ngu, M. Gutierrez, V. Metsis, S. Nepal, and Q. Z. Sheng, “Iot [67] R. Khan, S. U. Khan, R. Zaheer, and S. Khan, “Future internet: the
middleware: A survey on issues and enabling technologies,” IEEE internet of things architecture, possible applications and key chal-
Internet of Things Journal, vol. 4, no. 1, pp. 1–20, 2016. lenges,” in 10th International Conference on Frontiers of Information
[44] M. La Polla, F. Martinelli, and D. Sgandurra, “A survey on security Technology (FIT). IEEE, 2012, pp. 257–260.
for mobile devices,” IEEE communications surveys & tutorials, vol. 15, [68] C. Perera, P. Jayaraman, A. Zaslavsky, P. Christen, and D. Geor-
no. 1, pp. 446–471, 2012. gakopoulos, “Dynamic configuration of sensors using mobile sensor
[45] M. Caprolu, S. Sciancalepore, and R. Di Pietro, “Short-range audio hub in internet of things paradigm,” in IEEE Eighth International
channels security: Survey of mechanisms, applications, and research Conference on Intelligent Sensors, Sensor Networks and Information
challenges,” IEEE Communications Surveys & Tutorials, 2020. Processing, 2013, pp. 473–478.
[46] S. A. Hamad, Q. Z. Sheng, W. E. Zhang, and S. Nepal, “Realizing an [69] A. F. A. Rahman, M. Daud, and M. Z. Mohamad, “Securing sensor to
internet of secure things: A survey on issues and enabling technolo- cloud ecosystem using internet of things (iot) security framework,” in
gies,” IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. Proceedings of the International Conference on Internet of things and
1372–1391, 2020. Cloud Computing, 2016, pp. 1–5.
[47] J. Sengupta, S. Ruj, and S. D. Bit, “A comprehensive survey on attacks, [70] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,”
security issues and blockchain solutions for iot and iiot,” Journal of Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.
Network and Computer Applications, vol. 149, p. 102481, 2020. [71] Y. J. Jia, Q. A. Chen, S. Wang, A. Rahmati, E. Fernandes, Z. M.
[48] A. Newaz, A. K. Sikder, M. A. Rahman, and A. S. Uluagac, “A survey Mao, A. Prakash, and S. J. Unviersity, “Contexlot: Towards providing
on security and privacy issues in modern healthcare systems: Attacks contextual integrity to appified iot platforms.” in NDSS, 2017.
and defenses,” arXiv preprint arXiv:2005.07359, 2020. [72] Z. B. Celik, L. Babun, A. K. Sikder, H. Aksu, G. Tan, P. McDaniel, and
[49] C. Yan, H. Shin, C. Bolton, W. Xu, Y. Kim, and K. Fu, “Sok: A A. S. Uluagac, “Sensitive information tracking in commodity iot,” in
minimalist approach to formalizing analog sensor security,” in IEEE 27th USENIX Security Symposium (USENIX Security 18). Baltimore,
Symposium on Security and Privacy (SP). IEEE, 2020, pp. 233–248. MD: USENIX Association, 2018, pp. 1687–1704.
[50] S. Alnefaie, S. Alshehri, and A. Cherif, “A survey on access control [73] A. K. Sikder, L. Babun, Z. B. Celik, A. Acar, H. Aksu, P. McDaniel,
in iot: models, architectures and research opportunities,” International E. Kirda, and A. S. Uluagac, “Kratos: multi-user multi-device-aware
Journal of Security and Networks, vol. 16, no. 1, pp. 60–76, 2021. access control system for the smart home,” in Proceedings of the 13th
[51] J. Granjal, E. Monteiro, and J. S. Silva, “Security for the internet of ACM Conference on Security and Privacy in Wireless and Mobile
things: a survey of existing protocols and open research issues,” IEEE Networks, 2020, pp. 1–12.
Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1294–1312, [74] A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner,
2015. “Android permissions: User attention, comprehension, and behavior,”
[52] K. Zhao and L. Ge, “A survey on the internet of things security,” in Proceedings of the eighth symposium on usable privacy and security.
in Ninth international conference on computational intelligence and ACM, 2012, p. 3.
security. IEEE, 2013, pp. 663–667. [75] “Apple developer documentation,” https://developer.apple.com/
[53] L. Chen, S. Thombre, K. Järvinen, E. S. Lohan, A. Alén-Savikko, documentation, accessed: 2015-12-1.
H. Leppäkoski, M. Z. H. Bhuiyan, S. Bu-Pasha, G. N. Ferrara, [76] “Sensor overview,” https://developer.android.com/guide/topics/sensors/
S. Honkala et al., “Robustness, security and privacy in location-based sensors overview.html, accessed: 2017-10-23.
31
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
[77] “Who leads os share in internet of things era?” https: [101] L. Cai and H. Chen, On the practicality of motion based keystroke
//spectrummattersindeed.blogspot.com/2017/04/who-leads-os-share- inference attack. Springer, 2012.
in-internet-of.html, accessed: 2017-10-23. [102] Y. Huang, X. Guan, H. Chen, Y. Liang, S. Yuan, and T. Ohtsuki,
[78] “Sensor stack,” https://source.android.com/devices/sensors/sensor- “Risk assessment of private information inference for motion sensor
stack.html, accessed: 2017-03-10. embedded iot devices,” IEEE Transactions on Emerging Topics in
[79] “Introduction to the sensor and location platform in windows,” Computational Intelligence, 2019.
https://msdn.microsoft.com/en-us/library/windows/desktop/ [103] A. J. Aviv, B. Sapp, M. Blaze, and J. M. Smith, “Practicality of
dd318936(v=vs.85).aspx, accessed: 2017-03-10. accelerometer side channels on smartphones,” in Proceedings of the
[80] “Sensors,” https://developer.blackberry.com/native/documentation/ 28th Annual Computer Security Applications Conference. ACM, 2012,
device comm/sensors/, accessed: 2017-03-10. pp. 41–50.
[81] “Core motion,” https://developer.apple.com/documentation/ [104] A. Acar, H. Aksu, A. S. Uluagac, and K. Akkaya, “Waca: Wearable-
coremotion, accessed: 2017-10-23. assisted continuous authentication,” in IEEE Security and Privacy
[82] C. Shen, S. Pei, Z. Yang, and X. Guan, “Input extraction via motion- Workshops (SPW), May 2018, pp. 264–269.
sensor behavior analysis on smartphones,” Computers & Security, [105] L. Cai and H. Chen, “Touchlogger: Inferring keystrokes on touch screen
vol. 53, pp. 143–155, 2015. from smartphone motion.” HotSec, vol. 11, pp. 9–9, 2011.
[83] E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang, “Accessory: pass- [106] J. Lin and J. Seibel, “Motion-based side-channel attack on
word inference using accelerometers on smartphones,” in Proceedings mobile keystrokes,” https:// pdfs.semanticscholar.org/ 95cb/
of the Twelfth Workshop on Mobile Computing Systems & Applications. 6a266e7a7319334775d8c89e353adf9b514e.pdf , 2019.
ACM, 2012, p. 9. [107] Z. Xu, K. Bai, and S. Zhu, “Taplogger: Inferring user inputs on smart-
[84] P. Marquardt, A. Verma, H. Carter, and P. Traynor, “(sp) iphone: Decod- phone touchscreens using on-board motion sensors,” in Proceedings
ing vibrations from nearby keyboards using mobile phone accelerom- of the fifth ACM conference on Security and Privacy in Wireless and
eters,” in Proceedings of the 18th ACM conference on Computer and Mobile Networks, 2012, pp. 113–124.
communications security, 2011, pp. 551–562. [108] E. Miluzzo, A. Varshavsky, S. Balakrishnan, and R. R. Choudhury,
[85] A. Acar, H. Fereidooni, T. Abera, A. K. Sikder, M. Miettinen, H. Aksu, “Tapprints: your finger taps have fingerprints,” in Proceedings of the
M. Conti, A.-R. Sadeghi, and S. Uluagac, “Peek-a-boo: I see your smart 10th international conference on Mobile systems, applications, and
home activities, even encrypted!” in Proceedings of the 13th ACM services. ACM, 2012, pp. 323–336.
Conference on Security and Privacy in Wireless and Mobile Networks, [109] T. Nguyen, “Using unrestricted mobile sensors to infer tapped and
2020, pp. 207–218. traced user inputs,” in 12th International Conference on Information
[86] W. M. Kang, S. Y. Moon, and J. H. Park, “An enhanced security frame- Technology-New Generations (ITNG). IEEE, 2015, pp. 151–156.
work for home appliances in smart home,” Human-centric Computing [110] D. Hodges and O. Buckley, “Reconstructing what you said: Text
and Information Sciences, vol. 7, no. 1, p. 6, 2017. inference using smartphone motion,” IEEE Transactions on Mobile
[87] L. Simon and R. Anderson, “Pin skimmer: Inferring pins through the Computing, vol. 18, no. 4, pp. 947–959, 2018.
camera and microphone,” in Proceedings of the Third ACM workshop
[111] Y. Liang, Z. Cai, J. Yu, Q. Han, and Y. Li, “Deep learning based
on Security and privacy in smartphones & mobile devices, 2013, pp.
inference of private information using embedded sensors in smart
67–78.
devices,” IEEE Network, vol. 32, no. 4, pp. 8–14, 2018.
[88] A. Al-Haiqi, M. Ismail, and R. Nordin, “Keystrokes inference attack on
[112] Y. Liu and Z. Li, “aleak: Context-free side-channel from your smart
android: A comparative evaluation of sensors and their fusion,” Journal
watch leaks your typing privacy,” IEEE Transactions on Mobile Com-
of ICT Research and Applications, vol. 7, no. 2, pp. 117–136, 2013.
puting, 2019.
[89] Y. Michalevsky, D. Boneh, and G. Nakibly, “Gyrophone: Recognizing
[113] L. Bo, L. Fengjun, W. Guanghui et al., “I know what you type on your
speech from gyroscope signals.” in USENIX Security Symposium, 2014,
phone: Keystroke inference on android device using deep learning,”
pp. 1053–1067.
Ph.D. dissertation, University of Kansas, 2019.
[90] H. Wang, T. T.-T. Lai, and R. Roy Choudhury, “Mole: Motion leaks
through smartwatch sensors,” in Proceedings of the 21st Annual Inter- [114] Z. Ji, Z.-Y. Li, P. Li, and M. An, “A new effective wearable hand gesture
national Conference on Mobile Computing and Networking. ACM, recognition algorithm with 3-axis accelerometer,” in 12th International
2015, pp. 155–166. Conference on Fuzzy Systems and Knowledge Discovery (FSKD).
[91] A. K. S. Z. Berkay Celik, Leonardo Babun. (2018) A micro- IEEE, 2015, pp. 1243–1247.
benchmark suite to assess the effectiveness of tools designed for iot [115] X. Liu, Z. Zhou, W. Diao, Z. Li, and K. Zhang, “When good becomes
apps. [Online]. Available: https://github.com/IoTBench/ evil: Keystroke inference with smartwatch,” in Proceedings of the 22nd
[92] C. Yan, G. Zhang, X. Ji, T. Zhang, T. Zhang, and W. Xu, “The ACM SIGSAC Conference on Computer and Communications Security,
feasibility of injecting inaudible voice commands to voice assistants,” 2015, pp. 1273–1285.
IEEE Transactions on Dependable and Secure Computing, 2019. [116] A. Maiti, M. Jadliwala, J. He, and I. Bilogrevic, “(smart) watch your
[93] A. Maiti and M. Jadliwala, “Light ears: Information leakage via smart taps: side-channel keystroke inference attacks using smartwatches,”
lights,” arXiv preprint arXiv:1808.07814, 2018. in Proceedings of the ACM International Symposium on Wearable
[94] H.-W. Choi and H. Kim, “Impersonation attacks on anonymous user Computers, 2015, pp. 27–30.
authentication and key agreement scheme in wireless sensor networks,” [117] A. Sarkisyan, R. Debbiny, and A. Nahapetian, “Wristsnoop: Smart-
Journal of Digital Convergence, vol. 14, no. 10, pp. 287–293, 2016. phone pins prediction using smartwatch motion sensors,” in IEEE
[95] M. Barbeau, J. Hall, and E. Kranakis, “Detecting impersonation attacks International Workshop on Information Forensics and Security (WIFS),
in future wireless and mobile networks,” in International Workshop on 2015, pp. 1–6.
Secure Mobile Ad-hoc Networks and Sensors. Springer, 2005, pp. [118] Z. Ling, Z. Li, C. Chen, J. Luo, W. Yu, and X. Fu, “I know what you
80–95. enter on gear vr,” in 2019 IEEE Conference on Communications and
[96] S. A. Salehi, M. A. Razzaque, P. Naraei, and A. Farrokhtala, “Se- Network Security (CNS). IEEE, 2019, pp. 241–249.
curity in wireless sensor networks: Issues and challanges,” in 2013 [119] A. Maiti, R. Heard, M. Sabra, and M. Jadliwala, “Towards inferring me-
IEEE International Conference on Space Science and Communication chanical lock combinations using wrist-wearables as a side-channel,”
(IconSpace). IEEE, 2013, pp. 356–360. in Proceedings of the 11th ACM Conference on Security & Privacy in
[97] First.org. (2019) Common vulnerability scoring system version 3.1: Wireless and Mobile Networks. ACM, 2018, pp. 111–122.
Specification document. [Online]. Available: https://www.first.org/ [120] D. Asonov and R. Agrawal, “Keyboard acoustic emanations,” in IEEE
cvss/specification-document Symposium on Security and Privacy. IEEE, 2004, pp. 3–11.
[98] A. Maiti, M. Jadliwala, J. He, and I. Bilogrevic, “Side-channel infer- [121] T. Halevi and N. Saxena, “A closer look at keyboard acoustic ema-
ence attacks on mobile keypads using smartwatches,” IEEE Transac- nations: random passwords, typing styles and decoding techniques,”
tions on Mobile Computing, vol. 17, no. 9, pp. 2180–2194, 2018. in Proceedings of the 7th ACM Symposium on Information, Computer
[99] S. Narain, A. Sanatinia, and G. Noubir, “Single-stroke language- and Communications Security. ACM, 2012, pp. 89–90.
agnostic keylogging using stereo-microphones and domain specific [122] Y. Berger, A. Wool, and A. Yeredor, “Dictionary attacks using keyboard
machine learning,” in Proceedings of the ACM conference on Security acoustic emanations,” in Proceedings of the 13th ACM conference on
and privacy in wireless & mobile networks, 2014, pp. 201–212. Computer and communications security. ACM, 2006, pp. 245–254.
[100] R. Spreitzer, “Pin skimming: Exploiting the ambient-light sensor in [123] D. Foo Kune and Y. Kim, “Timing attacks on pin input devices,” in
mobile devices,” in Proceedings of the 4th ACM Workshop on Security Proceedings of the 17th ACM conference on Computer and communi-
and Privacy in Smartphones & Mobile Devices, 2014, pp. 51–62. cations security, 2010, pp. 678–680.
32
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
[124] L. Lu, J. Yu, Y. Chen, Y. Zhu, X. Xu, G. Xue, and M. Li, “Keylistener: smartphone,” in Proceedings of the ACM Asia Conference on Computer
Inferring keystrokes on qwerty keyboard of touch screen through and Communications Security, 2019, pp. 283–294.
acoustic signals,” in IEEE International Conference on Computer [147] S. B. Örs, E. Oswald, and B. Preneel, “Power-analysis attacks on
Communications, 2019, pp. 775–783. an fpga–first experimental results,” in Cryptographic Hardware and
[125] I. Shumailov, L. Simon, J. Yan, and R. Anderson, “Hearing your Embedded Systems-CHES. Springer, 2003, pp. 35–50.
touch: A new acoustic side channel on smartphones,” arXiv preprint [148] C. O’Flynn and Z. Chen, “Power analysis attacks against ieee 802.15.
arXiv:1903.11137, 2019. 4 nodes,” in International Workshop on Constructive Side-Channel
[126] H. Kim, B. Joe, and Y. Liu, “Tapsnoop: Leveraging tap sounds to infer Analysis and Secure Design. Springer, 2016, pp. 55–70.
tapstrokes on touchscreen devices,” IEEE Access, vol. 8, pp. 14 737– [149] A. I. Newaz, A. K. Sikder, L. Babun, and A. S. Uluagac, “Heka:
14 748, 2020. A novel intrusion detection system for attacks to personal medical
[127] M. Zhou, Q. Wang, J. Yang, Q. Li, P. Jiang, Y. Chen, and Z. Wang, devices,” in 2020 IEEE Conference on Communications and Network
“Stealing your android patterns via acoustic signals,” IEEE Transac- Security (CNS). IEEE, 2020, pp. 1–9.
tions on Mobile Computing, 2019. [150] Anonymous, “Voiploc: Compromising location-privacy via
[128] M. Backes, M. Dürmuth, S. Gerling, M. Pinkal, and C. Sporleder, acoustic side-channel attacks,” https:// www.semanticscholar.org/
“Acoustic side-channel attacks on printers.” in USENIX Security Sym- paper/ VoipLoc-%3A-Compromising-location-privacy-via-attacks/
posium, 2010, pp. 307–322. b3a04badcab8e68491277735ceb4dcd12c3e3f71, 2016.
[129] T. Zhu, Q. Ma, S. Zhang, and Y. Liu, “Context-free attacks using [151] J. Han, E. Owusu, L. T. Nguyen, A. Perrig, and J. Zhang, “Accomplice:
keyboard acoustic emanations,” in Proceedings of the 2014 ACM Location inference using accelerometers on smartphones,” in Fourth
SIGSAC Conference on Computer and Communications Security, 2014, International Conference on Communication Systems and Networks.
pp. 453–464. IEEE, 2012, pp. 1–9.
[130] S. R. Chhetri, A. Canedo, and M. A. Al Faruque, “Poster: Exploiting [152] K. Block and G. Noubir, “My magnetometer is telling you where i’ve
acoustic side-channel for attack on additive manufacturing systems,” been?: A mobile device permission less location attack,” in Proceedings
University of California, Irvine, 2016. of the 11th ACM Conference on Security & Privacy in Wireless and
[131] C. Song, F. Lin, Z. Ba, K. Ren, C. Zhou, and W. Xu, “My smart- Mobile Networks, 2018, pp. 260–270.
phone knows what you print: Exploring smartphone-based side-channel [153] S. Narain, T. D. Vo-Huu, K. Block, and G. Noubir, “Inferring user
attacks against 3d printers,” in Proceedings of the ACM SIGSAC routes and locations using zero-permission mobile sensors,” in IEEE
Conference on Computer and Communications Security, 2016, pp. Symposium on Security and Privacy (SP), 2016, pp. 397–413.
895–907. [154] H. Zheng and H. Hu, “Missile: A system of mobile inertial sensor-
[132] W. Meng, W. H. Lee, S. Murali, and S. Krishnan, “Charging me and based sensitive indoor location eavesdropping,” IEEE Transactions on
i know your secrets!: towards juice filming attacks on smartphones,” Information Forensics and Security, 2019.
in Proceedings of the 1st ACM Workshop on Cyber-Physical System [155] Z. Fyke, I. Griswold-Steiner, and A. Serwadda, “Prying into private
Security, 2015, pp. 89–98. spaces using mobile device motion sensors,” in 17th International
[133] D. Shukla, R. Kumar, A. Serwadda, and V. V. Phoha, “Beware, Conference on Privacy, Security and Trust (PST). IEEE, 2019, pp.
your hands reveal your secrets!” in Proceedings of the ACM SIGSAC 1–10.
Conference on Computer and Communications Security, 2014, pp. [156] W. Diao, X. Liu, Z. Zhou, and K. Zhang, “Your voice assistant is mine:
904–917. How to abuse speakers to steal information and control your phone,”
[134] A. J. Aviv, “Side channels enabled by smartphone interaction,” Ph.D. in Proceedings of the 4th ACM Workshop on Security and Privacy in
dissertation, Pennsylvania State University, 2012. Smartphones & Mobile Devices, 2014, pp. 63–74.
[135] R. Raguram, A. M. White, D. Goswami, F. Monrose, and J.-M. Frahm, [157] L. Lei, Y. Wang, J. Zhou, D. Zha, and Z. Zhang, “A threat to mobile
“ispy: automatic reconstruction of typed input from compromising cyber-physical systems: Sensor-based privacy theft attacks on android
reflections,” in Proceedings of the 18th ACM conference on Computer smartphones,” in 12th IEEE International Conference on Trust, Security
and communications security, 2011, pp. 527–536. and Privacy in Computing and Communications, 2013, pp. 126–133.
[136] Y. Wang, W. Cai, T. Gu, and W. Shao, “Your eyes reveal your secrets: [158] N. Carlini, P. Mishra, T. Vaidya, Y. Zhang, M. Sherr, C. Shields,
An eye movement based password inference on smartphone,” IEEE D. Wagner, and W. Zhou, “Hidden voice commands,” in 25th USENIX
Transactions on Mobile Computing, 2019. Security Symposium, 2016, pp. 513–530.
[137] M. Vuagnoux and S. Pasini, “Compromising electromagnetic emana- [159] S. A. Anand, C. Wang, J. Liu, N. Saxena, and Y. Chen, “Spearphone:
tions of wired and wireless keyboards.” in USENIX security symposium, A speech privacy exploit via accelerometer-sensed reverberations from
2009, pp. 1–16. smartphone loudspeakers,” arXiv preprint arXiv:1907.05972, 2019.
[138] S. Chakraborty, W. Ouyang, and M. Srivastava, “Lightspy: Optical [160] S. Kennedy, H. Li, C. Wang, H. Liu, B. Wang, and W. Sun, “I can hear
eavesdropping on displays using light sensors on mobile devices,” in your alexa: Voice command fingerprinting on smart home speakers,”
IEEE International Conference on Big Data, 2017, pp. 2980–2989. in 2019 IEEE Conference on Communications and Network Security
[139] S. Biedermann, S. Katzenbeisser, and J. Szefer, “Hard drive side- (CNS). IEEE, 2019, pp. 232–240.
channel attacks using smartphone magnetic field sensors,” in Interna- [161] X. Zhou, S. Demetriou, D. He, M. Naveed, X. Pan, X. Wang,
tional Conference on Financial Cryptography and Data Security, 2015, C. A. Gunter, and K. Nahrstedt, “Identity, location, disease and more:
pp. 489–496. inferring your secrets from android public resources,” in Proceedings
[140] R. Ning, C. Wang, C. Xin, J. Li, and H. Wu, “Deepmag+: Sniffing mo- of the ACM SIGSAC conference on Computer and Communications
bile apps in magnetic field through deep learning,” Elsevier Pervasive Security, 2013, pp. 1017–1028.
and Mobile Computing, vol. 61, p. 101106, 2020. [162] M. Zhou, Z. Qin, X. Lin, S. Hu, Q. Wang, and K. Ren, “Hidden voice
[141] N. Matyunin, Y. Wang, T. Arul, K. Kullmann, J. Szefer, and S. Katzen- commands: Attacks and defenses on the vcs of autonomous driving
beisser, “Magneticspy: Exploiting magnetometer in mobile devices for cars,” IEEE Wireless Communications, vol. 26, no. 5, pp. 128–133,
website and application fingerprinting,” in Proceedings of the 18th 2019.
ACM Workshop on Privacy in the Electronic Society, 2019. [163] L. Deshotels, “Inaudible sound as a covert channel in mobile devices,”
[142] J.-J. Quisquater and D. Samyde, “Electromagnetic analysis (ema): in 8th USENIX Workshop on Offensive Technologies, 2014.
Measures and counter-measures for smart cards,” in Smart Card [164] D. Kumar, R. Paccagnella, P. Murley, E. Hennenfent, J. Mason,
Programming and Security. Springer, 2001, pp. 200–210. A. Bates, and M. Bailey, “Skill squatting attacks on amazon alexa,”
[143] V. Carlier, H. Chabanne, E. Dottax, and H. Pelletier, “Electromagnetic in 27th USENIX Security Symposium, 2018, pp. 33–47.
side channels of an fpga implementation of aes,” in CRYPTOLOGY [165] G. Zhang, C. Yan, X. Ji, T. Zhang, T. Zhang, and W. Xu, “Dol-
EPRINT ARCHIVE, REPORT 2004/145. Citeseer. phinattack: Inaudible voice commands,” in Proceedings of the ACM
[144] D. Agrawal, B. Archambeault, J. Rao, and P. Rohatgi, “The em SIGSAC Conference on Computer and Communications Security, 2017,
side—channel(s),” in Cryptographic Hardware and Embedded Systems. pp. 103–117.
Springer, 2003, vol. 2523, pp. 29–45. [166] R. Zhang, X. Chen, S. Wen, and J. Zheng, “Who activated my
[145] Y. Ren and L. Wu, “Power analysis attacks on wireless sensor nodes voice assistant? a stealthy attack on android phones without users’
using cpu smart card,” in 22nd Wireless and Optical Communication awareness,” in International Conference on Machine Learning for
Conference (WOCC). IEEE, 2013, pp. 665–670. Cyber Security. Springer, 2019, pp. 378–396.
[146] Y. Cheng, X. Ji, W. Xu, H. Pan, Z. Zhu, C.-W. You, Y.-C. Chen, and [167] N. O. Tippenhauer, C. Pöpper, K. B. Rasmussen, and S. Capkun, “On
L. Qiu, “Magattack: Guessing application launching and operation via the requirements for successful gps spoofing attacks,” in Proceedings of
33
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
the 18th ACM conference on Computer and communications security, of the ACM SIGSAC Conference on Computer and Communications
2011, pp. 75–86. Security, 2016, pp. 204–216.
[168] J. Coffed, “The threat of gps jamming: The risk to an information [191] A. K. Sikder, H. Aksu, and A. S. Uluagac, “Context-aware intrusion
utility,” Report of EXELIS, Jan. Chicago, 2014. detection method for smart devices with sensors,” Sep. 17 2019, uS
[169] T. Giannetsos and T. Dimitriou, “Spy-sense: spyware tool for executing Patent 10,417,413.
stealthy exploits against sensor networks,” in Proceedings of the 2nd [192] R. Roman, C. Alcaraz, J. Lopez, and N. Sklavos, “Key management
ACM workshop on Hot topics on wireless network security and privacy, systems for sensor networks in the context of the internet of things,”
2013, pp. 7–12. Computers & Electrical Engineering, vol. 37, no. 2, pp. 147–159, 2011.
[170] Y. Tu, Z. Lin, I. Lee, and X. Hei, “Injected and delivered: Fabricating [193] H. Wang, T. T.-T. Lai, and R. Roy Choudhury, “Mole: Motion leaks
implicit control over actuation systems by spoofing inertial sensors,” through smartwatch sensors,” in Proceedings of the 21st Annual Inter-
in 27th USENIX Security Symposium, 2018, pp. 1545–1562. national Conference on Mobile Computing and Networking. ACM,
[171] Y. Park, Y. Son, H. Shin, D. Kim, and Y. Kim, “This ain’t your dose: 2015, pp. 155–166.
Sensor spoofing attack on medical infusion pump.” in 10th {USENIX} [194] M. Sun, M. Zheng, J. Lui, and X. Jiang, “Design and implementation
Workshop on Offensive Technologies, 2016. of an android host-based intrusion prevention system,” in Proceedings
[172] H. Shin, D. Kim, Y. Kwon, and Y. Kim, “Illusion and dazzle: of the 30th Annual Computer Security Applications Conference. ACM,
Adversarial optical channel exploits against lidars for automotive 2014, pp. 226–235.
applications,” in International Conference on Cryptographic Hardware [195] W.-C. Wu and S.-H. Hung, “Droiddolphin: a dynamic android malware
and Embedded Systems. Springer, 2017, pp. 445–467. detection framework using big data and machine learning,” in Proceed-
[173] J. Petit, B. Stottelaar, M. Feiri, and F. Kargl, “Remote attacks on ings of the 2014 Conference on Research in Adaptive and Convergent
automated vehicles sensors: Experiments on camera and lidar,” Black Systems. ACM, 2014.
Hat Europe, vol. 11, p. 2015, 2015. [196] G. G. Sundarkumar, V. Ravi, I. Nwogu, and V. Govindaraju, “Malware
[174] X. Yuan, Y. Chen, A. Wang, K. Chen, S. Zhang, H. Huang, and I. M. detection via api calls, topic models and machine learning,” in IEEE
Molloy, “All your alexa are belong to us: A remote voice control International Conference on Automation Science and Engineering
attack against echo,” in 2018 IEEE Global Communications Conference (CASE),, 2015, pp. 1212–1217.
(GLOBECOM), 2018, pp. 1–6. [197] S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, “Security,
[175] R. Zhang, X. Chen, J. Lu, S. Wen, S. Nepal, and Y. Xiang, “Using ai privacy and trust in internet of things: The road ahead,” Computer
to hack ia: A new stealthy spyware against voice assistance functions Networks, vol. 76, pp. 146–164, 2015.
in smart phones,” arXiv preprint arXiv:1805.06187, 2018. [198] M. W. Live, “Analysis: Mobile world congress 2016 wrap-up,” March
[176] T. Sugawara, B. Cyr, S. Rampazzi, D. Genkin, and K. Fu, “Light 2016. [Online]. Available: http://www.mobileworldlive.com/mwc16-
commands: laser-based audio injection attacks on voice-controllable articles/analysis-mwc16-wrapup/
systems,” in 29th USENIX Security Symposium (USENIX Security 20), [199] A.-R. Sadeghi, C. Wachsmann, and M. Waidner, “Security and privacy
2020, pp. 2631–2648. challenges in industrial internet of things,” in Proceedings of the 52nd
[177] J. Mao, S. Zhu, and J. Liu, “An inaudible voice attack to context- Annual Design Automation Conference. ACM, 2015, p. 54.
based device authentication in smart iot systems,” Journal of Systems [200] A. P. Felt, S. Egelman, M. Finifter, D. Akhawe, D. A. Wagner et al.,
Architecture, vol. 104, p. 101696, 2020. “How to ask for permission.” HotSec, vol. 12, pp. 7–7, 2012.
[178] G. Joy Persial, M. Prabhu, and R. Shanmugalakshmi, “Side channel [201] M. M. Hossain, M. Fotouhi, and R. Hasan, “Towards an analysis of
attack-survey,” Int J Adva Sci Res Rev, vol. 1, no. 4, pp. 54–57, 2011. security issues, challenges, and open problems in the internet of things,”
[179] M. A. Hakim, H. Aksu, A. S. Uluagac, and K. Akkaya, “U-pot: A in IEEE World Congress on Services (SERVICES), 2015, pp. 21–28.
honeypot framework for upnp-based iot devices,” in 2018 IEEE 37th [202] R. H. Weber, “Internet of things–new security and privacy challenges,”
International Performance Computing and Communications Confer- Computer law & security review, vol. 26, no. 1, pp. 23–30, 2010.
ence (IPCCC). IEEE, 2018, pp. 1–8. [203] L. Babun, Z. B. Celik, P. McDaniel, and A. S. Uluagac, “Real-
[180] M. Yoshikawa and Y. Nozaki, “Hierarchical power analysis attack for time analysis of privacy-(un) aware iot applications,” arXiv preprint
falsification detection cipher,” in IEEE 7th Annual Computing and arXiv:1911.10461, 2019.
Communication Workshop and Conference (CCWC), 2017, pp. 1–6. [204] N. Farhi, N. Nissim, and Y. Elovici, “Malboard: A novel user keystroke
[181] G. Petracca, Y. Sun, A.-A. Reineh, P. McDaniel, J. Grossklags, and impersonation attack and trusted detection framework based on side-
T. Jaeger, “Entrust: Regulating sensor access by cooperating programs channel analysis,” Computers & Security, vol. 85, pp. 240 – 269, 2019.
via delegation graphs,” in 28th USENIX Security Symposium, 2019. [205] A. Acar, H. Aksu, A. S. Uluagac, and K. Akkaya, “A usable and
[182] A. K. Sikder, L. Babun, and A. S. Uluagac, “Aegis+ a context-aware robust continuous authentication framework using wearables,” IEEE
platform-independent security framework for smart home systems,” Transactions on Mobile Computing, 2020.
Digital Threats: Research and Practice, vol. 2, no. 1, pp. 1–33, 2021. [206] L. Babun, Z. B. Celik, P. McDaniel, and A. S. Uluagac, “Real-
[183] Y. Zafar and D. Har, “A novel countermeasure enhancing side channel time analysis of privacy-(un) aware iot applications,” Proceedings on
immunity in fpgas,” in International Conference on Advances in Privacy Enhancing Technologies, vol. 2021, no. 1, pp. 145–166, 2021.
Electronics and Micro-electronics. IEEE, 2008, pp. 132–137. [207] W. Aman, M. M. U. Rahman, J. Qadir, H. Pervaiz, and Q. Ni,
[184] F.-X. Standaert, F. Macé, E. Peeters, and J.-J. Quisquater, “Updates on “Impersonation detection in line-of-sight underwater acoustic sensor
the security of fpgas against power analysis attacks,” in International networks,” IEEE Access, vol. 6, pp. 44 459–44 472, 2018.
Workshop on Applied Reconfigurable Computing, 2006, pp. 335–346. [208] T.-H. Lin, C.-C. Lee, and C.-H. Chang, “Wsn integrated authentication
[185] L. Babun, A. K. Sikder, A. Acar, and A. S. Uluagac, “Iotdots: A schemes based on internet of things,” Journal of Internet Technology,
digital forensics framework for smart environments,” arXiv preprint vol. 19, no. 4, pp. 1043–1053, 2018.
arXiv:1809.00745, 2018. [209] C. Hartung, J. Balasalle, and R. Han, “Node compromise in sensor
[186] S. Mirzamohammadi, J. A. Chen, A. A. Sani, S. Mehrotra, and networks: The need for secure systems,” Department of Computer
G. Tsudik, “Ditio: Trustworthy auditing of sensor activities in mobile & Science University of Colorado at Boulder, 2005.
iot devices,” in Proceedings of the 15th ACM Conference on Embedded [210] A. Aseeri and R. Zhang, “Secure data aggregation in wireless sensor
Network Sensor Systems, 2017, pp. 1–14. networks: Enumeration attack and countermeasure,” in IEEE Interna-
[187] E. Fernandes, J. Paupore, A. Rahmati, D. Simionato, M. Conti, and tional Conference on Communications (ICC). IEEE, 2019, pp. 1–7.
A. Prakash, “Flowfence: Practical data protection for emerging iot [211] L. Babun, H. Aksu, and A. S. Uluagac, “A system-level behavioral
application frameworks.” in USENIX Security Symposium, 2016. detection framework for compromised cps devices: Smart-grid case,”
[188] K. Onarlioglu, W. Robertson, and E. Kirda, “Overhaul: Input-driven ACM Transactions on Cyber-Physical Systems, vol. 4, no. 2, 2019.
access control for better privacy on traditional operating systems,” [212] A. I. Newaz, A. K. Sikder, M. A. Rahman, and A. S. Uluagac,
in 46th Annual IEEE/IFIP International Conference on Dependable “Healthguard: A machine learning-based security framework for smart
Systems and Networks (DSN), 2016, pp. 443–454. healthcare systems,” in Sixth International Conference on Social Net-
[189] F. Roesner, T. Kohno, A. Moshchuk, B. Parno, H. J. Wang, and works Analysis, Management and Security. IEEE, 2019, pp. 389–396.
C. Cowan, “User-driven access control: Rethinking permission granting [213] C. Namiluko, A. J. Paverd, and T. De Souza, “Towards enhancing web
in modern operating systems,” in IEEE Symposium on Security and application security using trusted execution.” in WASH, 2013.
privacy (SP), 2012, pp. 224–238. [214] A. Newaz, N. I. Haque, A. K. Sikder, M. A. Rahman, and A. S. Ulu-
[190] T. Ringer, D. Grossman, and F. Roesner, “Audacious: User-driven agac, “Adversarial attacks to machine learning-based smart healthcare
access control with unmodified operating systems,” in Proceedings systems,” arXiv preprint arXiv:2010.03671, 2020.
34
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/COMST.2021.3064507, IEEE
Communications Surveys & Tutorials
[215] “Security for android developers,” https://developer.android.com/topic/ Dr. A. Selcuk Uluagac is currently a member of
security/, accessed: 2018-10-23. the faculty in the Department of Electrical and Com-
puter Engineering at Florida International University
as an Eminent Scholar Chaired Associate Professor,
Amit Kumar Sikder is currently a PhD student and where he directs the Cyber-Physical Systems Secu-
Research Assistant in the Department of Electrical rity Lab (CSL), focusing on security and privacy
and Computer Engineering at Florida International of Internet of Things and Cyber-Physical Systems.
University, as a member of the Cyber-Physical Sys- Before joining Florida International University, he
tems Security Lab (CSL). He previously completed was a Senior Research Engineer in the School
his Bachelors in Electrical and Electronic Engi- of Electrical and Computer Engineering (ECE) at
neering from Bangladesh University of Engineering Georgia Institute of Technology and Senior Research
and Technology (BUET). His research interests are Engineer at Symantec. Dr. Uluagac earned a Ph.D., M.S. from Georgia
focused on the security of Cyber-Physical Systems Institute of Technology, and MS from Carnegie Mellon University. He received
(CPS) and Internet of Things (IoT). He also has the U.S. National Science Foundation CAREER award and U.S. Air Force
worked in areas related to security of smart devices, Office of Sponsored Research’s Summer Faculty Fellowship in 2015. He
security of smart home, smart city, wireless communication. More information serves on the editorial boards of the IEEE Transactions on Mobile Computing,
can be obtained from: http://web.eng.fiu.edu/asikd003/. Elsevier Computer Networks, and the IEEE Communications and Surveys
and Tutorials. Dr. Uluagac has served on the program committees of top-
tier security conferences such as IEEE S&P, NDSS, ASIACCS, inter alia.
He was the General Chair of ACM Conference on Security and Privacy in
Giuseppe Petracca is currently a PhD student and
Wireless and Mobile Networks (ACM WiSec) in 2019. More information can
Research Assistant in the Department of Computer
be obtained from: http://nweb.eng.fiu.edu/selcuk.
Science and Engineering at The Pennsylvania State
University. He also collaborates for the Cyber Secu-
rity Collaborative Research Alliance (CRA), spon-
sored by the Army Research Laboratory (ARL).
Giuseppe has a B.S. and a M.S. in Computer Science
and Engineering from Sapienza University of Rome,
Italy. Giuseppe’s research interest focuses on mobile
systems and cloud computing security. His industry
experience includes a summer internship in 2013
as Graduate Researcher at Intel, a summer internship in 2014 as Graduate
Technical Engineer at Intel Labs, a summer internship in 2016 as Software
Engineer and Security Researcher at Samsung Research America, and a
summer internship in 2017 as Software Engineer and Security Researcher at
Google. More information can be obtained from: http://sites.psu.edu/petracca/.
35
1553-877X (c) 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Authorized licensed use limited to: Georgia Institute of Technology. Downloaded on March 23,2021 at 18:03:44 UTC from IEEE Xplore. Restrictions apply.
View publication stats