Advertisement

Securing Smart Homes

  • Johannes SametingerEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1062)

Abstract

Devices in people’s homes increasingly depend on software and hardware components. They interoperate with other devices wirelessly and through the Internet. The sensitive nature of some of their data, their increasing interoperability puts their security at the forefront. In this paper we will show smart homes can resiliently be secured by varying functionality, exposure and authentication. We will demonstrate these mechanisms on simple smart home situations.

Keywords

Security Smart home Functionality Exposure Authentication Resilience 

Notes

Acknowledgement

This work has partially been supported by the LIT Secure and Correct Systems Lab funded by the State of Upper Austria.

References

  1. 1.
    BBC: ‘Smart’ home devices used as weapons in website attack, BBC Technology, 22 October 2016. http://www.bbc.co.uk/news/technology-37738823
  2. 2.
    Bilton, N.: Pitfalls of the connected home. The New York Times, 16 October 2015Google Scholar
  3. 3.
    Biro, M., Mashkoor, A., Sametinger, J., Seker, R. (eds.): Software safety and security risk mitigation in cyber-physical systems. IEEE Softw. 35(1), 24–29 (2018)Google Scholar
  4. 4.
    Denning, T., Kohno, T., Levy, H.M.: Computer security and the modern home. Commun. ACM 56(1), 94–103 (2013) CrossRefGoogle Scholar
  5. 5.
    Doan, T.T., Safavi-Naini, R., Li, S., Avizheh, S., Venkateswarlu K., M., Fong, P.W.L.: Towards a resilient smart home. In: Proceedings of the 2018 Workshop on IoT Security and Privacy - IoT S&P 2018, Budapest, Hungary, pp. 15–21 (2018). https://dl.acm.org/citation.cfm?id=3229570
  6. 6.
    Eichelberger, F.: Using software defined radio to attack “smart home” systems. SANS Intitute (2015). https://www.sans.org/reading-room/whitepapers/threats/software-defined-radio-attack-smart-home-systems-35922
  7. 7.
    McGraw, G.: Software security. IEEE Secur. Priv. 2(2), 80–83 (2004).  https://doi.org/10.1109/MSECP.2004.1281254CrossRefGoogle Scholar
  8. 8.
    Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: Proceedings of 37th IEEE Symposium on Security and Privacy, May 2016Google Scholar
  9. 9.
    Fisher, D.: Pair of bugs open honeywell home controllers up to easy hacks. https://threatpost.com/pair-of-bugs-open-honeywell-home-controllers-up-to-easy-hacks/113965/
  10. 10.
    c’t press release: Weak Security In Loxone Smart Home System Lets Burglars Walk Right In, 31 August 2016. http://heise-gruppe.de/-3308694
  11. 11.
    Komninos, N., Lymberopoulos, D., Mantas, G.: Chapter 10 - Security in smart home environment. In: Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications, Medical Information Science Reference, USA, pp. 170–191 (2011)Google Scholar
  12. 12.
    The MITRE Corporation: Common Weakness Enumeration, A Community-Developed Dictionalry of Software Weakness Types. https://cwe.mitre.org
  13. 13.
    The MITRE Corporation: Common Vulnerabilities and Exposures, The Standard for Information Security Vulnerability Names. https://cve.mitre.org
  14. 14.
    Pretz, K.: IEEE provides the keys to a smarter home. Special Report on Smart Homes, 01 December 2015. http://theinstitute.ieee.org/technology-focus/technology-topic/ieee-provides-the-keys-to-a-smarter-home
  15. 15.
    ur Rehman, S., Gruhn, V.: An approach to secure smart homes in cyber-physical systems/Internet-of-Things. In: Fifth International Conference on Software Defined Systems (SDS), Barcelona, pp. 126–129 (2018)Google Scholar
  16. 16.
    Sametinger, J., Rozenblit, J.: Security scores for medical devices. In: SmartMedDev 2016 - Smart Medical Devices - From Lab to Clinical Practice, in Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2016) - Volume 5: HEALTHINF, Rome, Italy, 21–23 February 2016, pp. 533–541. ISBN 978-989-758-170-0Google Scholar
  17. 17.
    Sametinger, J., Steinwender, C.: Resilient medical device security. In: International Conference on Computational Science and Computational Intelligence, Symposium on Health Informatics and Medical Systems (CSCI-ISHI), NV, USA, Las Vegas, pp. 1775–1778 (2017)Google Scholar
  18. 18.
    Sasse, M.A., Smith, M. (eds.): The security-usability tradeoff myth. IEEE Secur. Priv. 14(5), 11–13 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Business Informatics, LIT Secure and Correct Systems LabJohannes Kepler University LinzLinzAustria

Personalised recommendations