Research Article

ZPA: A Smart Home Privacy Analysis System Based on ZigBee Encrypted Traffic

Table 1

Description of the related fingerprinting methods.

ApproachIdentification typeFeaturesTechniquePurpose

Corbett et al. [3]NIC vendorTraffic rateSpectral analysisProtects networks
Bratus et al. [4]Chipsets and driversResponse to crafted framesDecision list learningIdentifies fake APs
Gao et at. [5]APsInterarrival timeWavelet analysisDetects unsafe APs
Loh et al. [8]802.11 devicesProbe request framesTiming analysisProtects networks
Neumann et al. [10]802.11 devicesTransmission time and interarrival timeHistogram and cosine similarityDevice fingerprinting
Dalai and Jena[11]Wi-Fi devicesCorrelation-based feature selectionSimilarity measureDevice fingerprinting
Shahid et al. [12]Wi-Fi devicesPacket size and timeT-SNE technology, machine learningDevice behavior description
Bezawada et al. [13]Wi-Fi devicesPacket header and payload featuresMachine learningDevice type identification
Dong et al. [14]Wi-Fi devicesPacket header and payload featuresLSTMDevice type identification
Mirsky et al. [19]IP cameraTemporal statistics featuresUnsupervised ANNAnomaly detection
Bovenzi et al. [20]Wi-Fi devicesTCP/IP stack layer featuresDeep autoencoders, machine learning, and double-censoring mechanismAnomaly detection
Acar et al. [22]Wi-Fi, BLE, and ZigBee devicesTiming features, sensor state and controller state features, and controller location featuresMachine learningDevice privacy leakage
Singh et al. [23]Wi-Fi-based wireless sensorsMAC address, cause-effect relationshipGranger causality, dead reckoningDevice privacy protection