Enhancing IoT Privacy: Why DNS-over-HTTPS Alone Falls Short?

| Samuel Pélissier, Gianluca Anselmi, Abhishek Kumar, Anna Maria Mandalari, Mathieu Cunche

Recent years have seen widespread adoption of consumer Internet of Things (IoT) devices, offering diverse benefits to end-users, from smart homes to healthcare monitoring, but raising serious privacy concerns. To address this, securing efforts, such as encrypting DNS, have been proposed.

In this paper, we study the effectiveness of such measures in the specific context of ensuring IoT privacy. We introduce a device identification attack against DNS-over-HTTPS-enabled IoT devices. We conduct more than 25,000 automated experiments across 6 public DNS resolvers and find that the proposed attack can identify devices via DNS-over-HTTPS (DoH) traffic with a 0.98 balanced accuracy. We point out padding as a mitigation technique that reduces identification by a significant 33%. Additionally, we find that half of the evaluated DNS resolvers do not adhere to the relevant specification, substantially compromising user privacy.

Metadata

  • Published in: 23rd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2024).
  • Joint work with the University College London through the MAGPIE associate team.