Abstract
Devices in people’s homes increasingly depend on software and hardware components. They interoperate with other devices wirelessly and through the Internet. The sensitive nature of some of their data, their increasing interoperability puts their security at the forefront. In this paper we will show smart homes can resiliently be secured by varying functionality, exposure and authentication. We will demonstrate these mechanisms on simple smart home situations.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
BBC: ‘Smart’ home devices used as weapons in website attack, BBC Technology, 22 October 2016. http://www.bbc.co.uk/news/technology-37738823
Bilton, N.: Pitfalls of the connected home. The New York Times, 16 October 2015
Biro, M., Mashkoor, A., Sametinger, J., Seker, R. (eds.): Software safety and security risk mitigation in cyber-physical systems. IEEE Softw. 35(1), 24–29 (2018)
Denning, T., Kohno, T., Levy, H.M.: Computer security and the modern home. Commun. ACM 56(1), 94–103 (2013)
Doan, T.T., Safavi-Naini, R., Li, S., Avizheh, S., Venkateswarlu K., M., Fong, P.W.L.: Towards a resilient smart home. In: Proceedings of the 2018 Workshop on IoT Security and Privacy - IoT S&P 2018, Budapest, Hungary, pp. 15–21 (2018). https://dl.acm.org/citation.cfm?id=3229570
Eichelberger, F.: Using software defined radio to attack “smart home” systems. SANS Intitute (2015). https://www.sans.org/reading-room/whitepapers/threats/software-defined-radio-attack-smart-home-systems-35922
McGraw, G.: Software security. IEEE Secur. Priv. 2(2), 80–83 (2004). https://doi.org/10.1109/MSECP.2004.1281254
Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: Proceedings of 37th IEEE Symposium on Security and Privacy, May 2016
Fisher, D.: Pair of bugs open honeywell home controllers up to easy hacks. https://threatpost.com/pair-of-bugs-open-honeywell-home-controllers-up-to-easy-hacks/113965/
c’t press release: Weak Security In Loxone Smart Home System Lets Burglars Walk Right In, 31 August 2016. http://heise-gruppe.de/-3308694
Komninos, N., Lymberopoulos, D., Mantas, G.: Chapter 10 - Security in smart home environment. In: Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications, Medical Information Science Reference, USA, pp. 170–191 (2011)
The MITRE Corporation: Common Weakness Enumeration, A Community-Developed Dictionalry of Software Weakness Types. https://cwe.mitre.org
The MITRE Corporation: Common Vulnerabilities and Exposures, The Standard for Information Security Vulnerability Names. https://cve.mitre.org
Pretz, K.: IEEE provides the keys to a smarter home. Special Report on Smart Homes, 01 December 2015. http://theinstitute.ieee.org/technology-focus/technology-topic/ieee-provides-the-keys-to-a-smarter-home
ur Rehman, S., Gruhn, V.: An approach to secure smart homes in cyber-physical systems/Internet-of-Things. In: Fifth International Conference on Software Defined Systems (SDS), Barcelona, pp. 126–129 (2018)
Sametinger, J., Rozenblit, J.: Security scores for medical devices. In: SmartMedDev 2016 - Smart Medical Devices - From Lab to Clinical Practice, in Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2016) - Volume 5: HEALTHINF, Rome, Italy, 21–23 February 2016, pp. 533–541. ISBN 978-989-758-170-0
Sametinger, J., Steinwender, C.: Resilient medical device security. In: International Conference on Computational Science and Computational Intelligence, Symposium on Health Informatics and Medical Systems (CSCI-ISHI), NV, USA, Las Vegas, pp. 1775–1778 (2017)
Sasse, M.A., Smith, M. (eds.): The security-usability tradeoff myth. IEEE Secur. Priv. 14(5), 11–13 (2016)
Acknowledgement
This work has partially been supported by the LIT Secure and Correct Systems Lab funded by the State of Upper Austria.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Sametinger, J. (2019). Securing Smart Homes. In: Anderst-Kotsis, G., et al. Database and Expert Systems Applications. DEXA 2019. Communications in Computer and Information Science, vol 1062. Springer, Cham. https://doi.org/10.1007/978-3-030-27684-3_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-27684-3_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-27683-6
Online ISBN: 978-3-030-27684-3
eBook Packages: Computer ScienceComputer Science (R0)