S2Net: Preserving Privacy in Smart Home Routers
At present, wireless home routers are becoming increasingly smart. While these smart routers provide rich functionalities to users, they also raise security concerns. Although the existing end-to-end encryption techniques can be applied to protect personal data, such rich functionalities become unav...
Saved in:
Published in | IEEE transactions on dependable and secure computing Vol. 18; no. 3; pp. 1409 - 1424 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Washington
IEEE
01.05.2021
IEEE Computer Society |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | At present, wireless home routers are becoming increasingly smart. While these smart routers provide rich functionalities to users, they also raise security concerns. Although the existing end-to-end encryption techniques can be applied to protect personal data, such rich functionalities become unavailable due to the encrypted payloads. On the other hand, if the smart home routers are allowed to process and store the personal data of users, once compromised, the users' sensitive data will be exposed. As a consequence, users face a difficult trade-off between the benefits of the rich functionalities and potential privacy risks. To deal with this dilemma, we propose a novel system named Secure and Smart Network (S2Net) for home routers. For S2Net, we propose a secure OS that can distinguish and manage multiple sessions belonging to different users. The secure OS and all the router applications are placed in the secure world using the ARM TrustZone technology. In S2Net, we also confine the router applications in sandboxes provided by the proposed secure OS to prevent data leakage. As a result, S2Net can provide rich functionalities for users while preserving strong privacy for home routers. In addition, we develop a crypto-worker model that provides an abstraction layer of cryptographic tasks performed by a heterogeneous multi-core system. The other important role of crypto-worker is to parallelize the computations in order to resolve the high computation cost of cryptographic functions. We report the system design of S2Net and the details of our implementation. Experimental results with benchmarks and real applications demonstrate that our implementation is capable of achieving high performance in terms of throughput while mitigating the overhead of S2Net design. |
---|---|
AbstractList | At present, wireless home routers are becoming increasingly smart. While these smart routers provide rich functionalities to users, they also raise security concerns. Although the existing end-to-end encryption techniques can be applied to protect personal data, such rich functionalities become unavailable due to the encrypted payloads. On the other hand, if the smart home routers are allowed to process and store the personal data of users, once compromised, the users' sensitive data will be exposed. As a consequence, users face a difficult trade-off between the benefits of the rich functionalities and potential privacy risks. To deal with this dilemma, we propose a novel system named Secure and Smart Network (S2Net) for home routers. For S2Net, we propose a secure OS that can distinguish and manage multiple sessions belonging to different users. The secure OS and all the router applications are placed in the secure world using the ARM TrustZone technology. In S2Net, we also confine the router applications in sandboxes provided by the proposed secure OS to prevent data leakage. As a result, S2Net can provide rich functionalities for users while preserving strong privacy for home routers. In addition, we develop a crypto-worker model that provides an abstraction layer of cryptographic tasks performed by a heterogeneous multi-core system. The other important role of crypto-worker is to parallelize the computations in order to resolve the high computation cost of cryptographic functions. We report the system design of S2Net and the details of our implementation. Experimental results with benchmarks and real applications demonstrate that our implementation is capable of achieving high performance in terms of throughput while mitigating the overhead of S2Net design. |
Author | Tan, Kun Shi, Hang Lee, SuKyoung Lee, Seung-Seob Cui, Yong Liu, Yunxin |
Author_xml | – sequence: 1 givenname: Seung-Seob orcidid: 0000-0002-3497-3295 surname: Lee fullname: Lee, Seung-Seob email: shsym@yonsei.ac.kr organization: Department of Computer Science, Yonsei University, Seoul, South Korea – sequence: 2 givenname: Hang orcidid: 0000-0001-9384-7486 surname: Shi fullname: Shi, Hang email: shi-h15@mails.tsinghua.edu.cn organization: Department of Computer Science and Technology, Tsinghua University, Beijing, China – sequence: 3 givenname: Kun surname: Tan fullname: Tan, Kun email: cohen_tan@hotmail.com organization: Huawei Technologies Co., Ltd., Beijing, China – sequence: 4 givenname: Yunxin orcidid: 0000-0001-7352-8955 surname: Liu fullname: Liu, Yunxin email: yunxin.liu@microsoft.com organization: Microsoft Research Asia, Beijing, China – sequence: 5 givenname: SuKyoung surname: Lee fullname: Lee, SuKyoung email: sklee@yonsei.ac.kr organization: Department of Computer Science, Yonsei University, Seoul, South Korea – sequence: 6 givenname: Yong orcidid: 0000-0002-5171-739X surname: Cui fullname: Cui, Yong email: cuiyong@tsinghua.edu.cn organization: Department of Computer Science and Technology, Tsinghua University, Beijing, China |
BookMark | eNo9kEFLAzEQhYNUsK3-APGy4HnbySTZTbxJrVYoKraeQ7o7K1vsbk22hf57U1o8zRt4b-bxDVivaRti7JbDiHMw4-XTYjJC4GaEBmWG8oL1uZE8BeC6F7WSKlUm51dsEMIaAKU2ss_GC3yj7iH58BTI7-vmO8p674pDUjfJYuN8l8zaDSWf7a4jH67ZZeV-At2c55B9PU-Xk1k6f395nTzO0wKN6NIyy6XMC-PyqoDcUG6000qKMkNluCOJKypFKeOmyUmtoYQCKm5UjisHpRiy-9PdrW9_dxQ6u253vokvLSrMTIaAIrr4yVX4NgRPld36OnY-WA72yMUeudgjF3vmEjN3p0xNRP9-HfsKUOIPLU1d5g |
CODEN | ITDSCM |
CitedBy_id | crossref_primary_10_1007_s11390_023_2488_3 crossref_primary_10_4018_IJISP_303668 crossref_primary_10_1109_ACCESS_2021_3054575 |
Cites_doi | 10.1145/2967360.2967380 10.1007/978-981-10-1463-5_5 10.1109/TDSC.2018.2861756 10.1145/1400097.1400109 10.1145/1272996.1273025 10.1145/1950365.1950399 10.1145/2674005.2674991 10.1109/LCOMM.2006.1603387 10.1145/2785956.2787482 10.1109/JIOT.2014.2323395 10.1145/3081333.3081349 10.1109/IC2EW.2016.24 10.1145/3231594 10.1145/2893177 10.1145/1831407.1831429 10.1109/Trustcom.2015.378 10.1109/ARES.2016.64 10.1145/2831347.2831354 10.1145/1961296.1950399 10.1145/2785956.2787502 10.1016/j.procs.2017.05.357 |
ContentType | Journal Article |
Copyright | Copyright IEEE Computer Society 2021 |
Copyright_xml | – notice: Copyright IEEE Computer Society 2021 |
DBID | 97E RIA RIE AAYXX CITATION JQ2 |
DOI | 10.1109/TDSC.2019.2924624 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005-present IEEE All-Society Periodicals Package (ASPP) Online IEEE Electronic Library Online CrossRef ProQuest Computer Science Collection |
DatabaseTitle | CrossRef ProQuest Computer Science Collection |
DatabaseTitleList | ProQuest Computer Science Collection |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library Online url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1941-0018 |
EndPage | 1424 |
ExternalDocumentID | 10_1109_TDSC_2019_2924624 8744305 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Research Foundation of Korea grantid: NRF-2017R1A2B4002000 funderid: 10.13039/501100003725 |
GroupedDBID | .4S .DC 0R~ 29I 3V. 4.4 5GY 5VS 6IK 7WY 8FE 8FG 8FL 8R4 8R5 97E AAJGR AASAJ AAYOK ABJCF ABQJQ ABUWG ABVLG ACGFO ACIWK AENEX AETIX AFKRA AIBXA AKJIK ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS ATWAV AZQEC BEFXN BENPR BEZIV BFFAM BGLVJ BGNUA BKEBE BPEOZ BPHCQ CCPQU CS3 DU5 DWQXO EBS EDO EJD FRNLG GNUQQ GROUPED_ABI_INFORM_COMPLETE HCIFZ HZ~ IEDLZ IFIPE IPLJI ITG ITH JAVBF K60 K6V K6~ K7- L6V LAI M0C M0N M43 M7S O9- OCL P2P P62 PQBIZ PQBZA PQQKQ PROAC PTHSS Q2X RIA RIC RIE RIG RNI RNS RZB XFK AAYXX CITATION JQ2 |
ID | FETCH-LOGICAL-c293t-d67447c9a7fc079e798a8543d62591ae42bed3d42598ea4880d0c0f19572ba0d3 |
IEDL.DBID | RIE |
ISSN | 1545-5971 |
IngestDate | Thu Oct 10 19:16:39 EDT 2024 Fri Aug 23 02:57:29 EDT 2024 Wed Jun 26 19:26:47 EDT 2024 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 3 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-d67447c9a7fc079e798a8543d62591ae42bed3d42598ea4880d0c0f19572ba0d3 |
ORCID | 0000-0002-5171-739X 0000-0002-3497-3295 0000-0001-9384-7486 0000-0001-7352-8955 |
PQID | 2526962023 |
PQPubID | 27603 |
PageCount | 16 |
ParticipantIDs | proquest_journals_2526962023 ieee_primary_8744305 crossref_primary_10_1109_TDSC_2019_2924624 |
PublicationCentury | 2000 |
PublicationDate | 2021-05-01 |
PublicationDateYYYYMMDD | 2021-05-01 |
PublicationDate_xml | – month: 05 year: 2021 text: 2021-05-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Washington |
PublicationPlace_xml | – name: Washington |
PublicationTitle | IEEE transactions on dependable and secure computing |
PublicationTitleAbbrev | TDSC |
PublicationYear | 2021 |
Publisher | IEEE IEEE Computer Society |
Publisher_xml | – name: IEEE – name: IEEE Computer Society |
References | ref12 ref53 ref52 ref11 ref54 ref10 (ref7) 0 ref17 ref16 (ref35) 0 raj (ref26) 2015 (ref55) 0 (ref46) 2014 ref51 ref50 baumann (ref9) 2014 (ref22) 0 davis (ref34) 2010 ref42 ref41 ref43 (ref13) 0 bech (ref39) 2018 (ref38) 0 mcgrew (ref49) 0 (ref45) 2011 ref8 (ref30) 0 ref3 ref40 (ref27) 0 (ref18) 0 patil (ref15) 2017 (ref20) 0 ref31 (ref23) 2003 niebler (ref56) 0 ref32 ref2 ref1 (ref5) 0 (ref44) 2013 (ref14) 0 (ref33) 0 loreto (ref47) 2014 peon (ref48) 0 (ref28) 0 ref24 pearson (ref25) 2003 kocher (ref37) 2018 (ref19) 0 ref29 lipp (ref36) 2018 (ref4) 0 constantin (ref6) 0 (ref21) 0 |
References_xml | – ident: ref50 doi: 10.1145/2967360.2967380 – year: 0 ident: ref35 article-title: YouTube help, live encoder settings, bitrates, and resolutions. – year: 0 ident: ref20 article-title: ARM security technology - building a secure system using TrustZone technology. – year: 2015 ident: ref26 article-title: fTPM: A firmware-based TPM 2.0 implementation contributor: fullname: raj – year: 0 ident: ref55 – ident: ref16 doi: 10.1007/978-981-10-1463-5_5 – ident: ref31 doi: 10.1109/TDSC.2018.2861756 – year: 0 ident: ref21 article-title: Genode operating system framework. – ident: ref54 doi: 10.1145/1400097.1400109 – year: 0 ident: ref49 article-title: TLS proxy server extension. draft-mcgrew-tls-proxyserver-01 contributor: fullname: mcgrew – ident: ref53 doi: 10.1145/1272996.1273025 – year: 0 ident: ref33 article-title: Disk benchmark software. – year: 0 ident: ref56 article-title: Chapter 46. Boost.Xpressive. contributor: fullname: niebler – year: 0 ident: ref28 article-title: OpenSSL cryptography and SSL/TLS toolkit. – year: 0 ident: ref27 article-title: NXP i.MX 6Quad processors. – year: 2017 ident: ref15 article-title: New range of smart home products accommodates early and new adopters of home automation contributor: fullname: patil – year: 0 ident: ref30 article-title: Secure boot on i.MX50, i.MX53, and i.MX 6 series using HABv4 – year: 0 ident: ref6 contributor: fullname: constantin – year: 2010 ident: ref34 article-title: Building energy-efficient systems for sequential I/O workloads contributor: fullname: davis – year: 0 ident: ref48 article-title: Explicit Proxy in HTTP/2.0 draft-rpeon-httpbis-exproxy-00 contributor: fullname: peon – year: 2011 ident: ref45 article-title: TPM main specification level 2 Version 1.2, Revision 116 – ident: ref52 doi: 10.1145/1950365.1950399 – start-page: 2005 year: 0 ident: ref13 article-title: ARM security technology - building a secure system using TrustZone technology – ident: ref8 doi: 10.1145/2674005.2674991 – year: 0 ident: ref38 article-title: Speculative processor vulnerability. – ident: ref32 doi: 10.1109/LCOMM.2006.1603387 – ident: ref10 doi: 10.1145/2785956.2787482 – ident: ref24 doi: 10.1109/JIOT.2014.2323395 – ident: ref12 doi: 10.1145/3081333.3081349 – ident: ref2 doi: 10.1109/IC2EW.2016.24 – year: 0 ident: ref22 – ident: ref41 doi: 10.1145/3231594 – year: 2018 ident: ref37 article-title: Spectre attacks: Exploiting speculative execution publication-title: arXiv 1801 01203 contributor: fullname: kocher – ident: ref40 doi: 10.1109/TDSC.2018.2861756 – start-page: 973 year: 2018 ident: ref36 article-title: Meltdown: Reading Kernel Memory from User Space publication-title: In 27th USENIX Secur Symp (USENIX Secur 18) contributor: fullname: lipp – ident: ref42 doi: 10.1145/2893177 – ident: ref51 doi: 10.1145/1831407.1831429 – year: 0 ident: ref5 – year: 0 ident: ref7 – year: 0 ident: ref4 – start-page: 267 year: 2014 ident: ref9 article-title: Shielding applications from an untrusted cloud with haven publication-title: Proc 11th USENIX Symp Operating Syst Des Implementation contributor: fullname: baumann – year: 0 ident: ref19 article-title: Overview of Application Virtualization – ident: ref29 doi: 10.1109/Trustcom.2015.378 – ident: ref17 doi: 10.1109/ARES.2016.64 – year: 2014 ident: ref46 article-title: Intel Software guard extensions programming reference – year: 2018 ident: ref39 article-title: Linaro - implications of meltdown and spectre : Part 2 contributor: fullname: bech – ident: ref1 doi: 10.1145/2831347.2831354 – ident: ref43 doi: 10.1145/1961296.1950399 – year: 0 ident: ref14 – year: 2014 ident: ref47 article-title: Explicit trusted proxy in HTTP/2.0. draft-loreto-httpbis-trusted-proxy20-01 contributor: fullname: loreto – year: 2013 ident: ref44 article-title: AWS CloudHSM getting started guide – year: 2003 ident: ref23 – year: 0 ident: ref18 – year: 2003 ident: ref25 publication-title: Trusted Computing Platforms TCPA Technology in Context contributor: fullname: pearson – ident: ref11 doi: 10.1145/2785956.2787502 – ident: ref3 doi: 10.1016/j.procs.2017.05.357 |
SSID | ssj0024894 |
Score | 2.3503575 |
Snippet | At present, wireless home routers are becoming increasingly smart. While these smart routers provide rich functionalities to users, they also raise security... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Publisher |
StartPage | 1409 |
SubjectTerms | ARM TrustZone Cryptography Encryption Hardware heterogeneous multi-core architecture Internet Parallel processing Payloads Personal information Privacy private data protection Program processors Routers secure operating system Smart buildings Smart home router Smart homes Smart houses Systems design transport layer security |
Title | S2Net: Preserving Privacy in Smart Home Routers |
URI | https://ieeexplore.ieee.org/document/8744305 https://www.proquest.com/docview/2526962023 |
Volume | 18 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV05T8MwFLZKJxaugigU5IEJkTZxHDtmQ4WqQmqXtlK3KLZfUYVIEaRI8Ovxy1HEMbB5SGTL77Y_v4-QC-2D5cZJIHbJkMdB4EGTcIWrAWsF8yG2eA45GovhjN_Po3mDXG3ewgBAAT6DLg6Lu3y7Mms8Kuthq_YQG5ZuSaXKt1pfffXigvQQMwLPJclBdYMZ-Ko3vZ30EcSlusxVG4LxbzGoIFX55YmL8DLYJaN6YSWq5LG7znXXfPzo2fjfle-RnSrPpDelYuyTBmQHZLfmcKCVSbdIb8LGkF9ThGKg28ge3HD5lpp3uszo5MlpFkUqdYrQIZcqHpLZ4G7aH3oViYJnXCTPPSvc1NKoVC6MLxVIFadxxEOLhU-QAmcabGid6aoYUjRn6xt_EahIMp36NjwizWyVwTGhEYQRZ5BKLoBrK7V1HiBQdmFiJ1lt2-Sy3tbkueyVkRQ1hq8SlEGCMkgqGbRJC7dp82G1Q23SqQWRVNb0mjCkQRdI9H7y91-nZJsh1qQAInZIM39Zw5lLFnJ9XmjJJ8s4ug4 |
link.rule.ids | 315,783,787,799,27936,27937,55086 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED1VZYCFAgVRKJCBCZE2cRwnZkMFVKDt0lbqFiX2FVWIFEGKBL8eX5IW8TGweUhky3dnv7Of7wGcJg5qrowFQgOGbI6CDpqESVwVai2Yg6Gmc8j-QHTH_G7iTypwvnoLg4g5-Qxb1Mzv8vVcLeiorE2l2j0qWLpmcHUoitdaX5X1wlz2kDCBbWCyW95huo5sj66GHaJxyRYz-YZg_NsulMuq_FqL8w3mpgb95dAKXslja5ElLfXxo2rjf8e-BZsl0rQuC9fYhgqmO1BbqjhYZVDXoT1kA8wuLCJj0MKRPpjm7C1W79YstYZPxrcsElO3iDxkwOIujG-uR52uXcoo2Mrs5Zmthek6UDIOpsoJJAYyjEOfe5pSHzdGzhLUnjbBK0OMKaC1o5ypK_2AJbGjvT2opvMU98Hy0fM5wzjgAnmig0SbNcCVeqpCY9tEN-BsOa3Rc1EtI8qzDEdGZIOIbBCVNmhAnaZp9WE5Qw1oLg0RlfH0GjESQhck9X7w918nsN4d9XtR73ZwfwgbjJgnOS2xCdXsZYFHBjpkyXHuMZ-2mb1Z |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=S2Net%3A+Preserving+Privacy+in+Smart+Home+Routers&rft.jtitle=IEEE+transactions+on+dependable+and+secure+computing&rft.au=Lee%2C+Seung-seob&rft.au=Shi%2C+Hang&rft.au=Tan%2C+Kun&rft.au=Liu%2C+Yunxin&rft.date=2021-05-01&rft.issn=1545-5971&rft.eissn=1941-0018&rft.spage=1&rft.epage=1&rft_id=info:doi/10.1109%2FTDSC.2019.2924624&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TDSC_2019_2924624 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1545-5971&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1545-5971&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1545-5971&client=summon |