Reducing DNS Traffic to Enhance Home IoT Device Privacy.

Sensors (Basel)

Department of Telematic Engineering, University Carlos III of Madrid, Av. de la Universidad 30, E-28911 Leganes, Spain.

Published: April 2024

The deployment of Internet of Things (IoT) devices is widespread in different environments, including homes. Although security is incorporated, homes can become targets for cyberattacks because of their vulnerabilities. IoT devices generate Domain Name Server (DNS) traffic primarily for communication with Internet servers. In this paper, we present a detailed analysis of DNS traffic from IoT devices. The queried domains are highly distinctive, enabling attackers to easily identify the IoT device. In addition, we observed an unexpectedly high volume of queries. The analysis reveals that the same domains are repeatedly queried, DNS queries are transmitted in plain text over User Datagram Protocol (UDP) port 53 (Do53), and the excessive generation of traffic poses a security risk by amplifying an attacker's ability to identify IoT devices and execute more precise, targeted attacks, consequently escalating the potential compromise of the entire IoT ecosystem. We propose a simple measure that can be taken to reduce DNS traffic generated by IoT devices, thus preventing it from being used as a vector to identify the types of devices present in the network. This measure is based on the implementation of the DNS cache in the devices; caching few resources increases privacy considerably.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11085491PMC
http://dx.doi.org/10.3390/s24092690DOI Listing

Publication Analysis

Top Keywords

iot devices
20
dns traffic
16
iot
8
iot device
8
identify iot
8
devices
7
traffic
5
dns
5
reducing dns
4
traffic enhance
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!