Skip to main content

Crime and the Consumer Internet of Things

  • Chapter
  • First Online:
The Handbook of Security
  • 1101 Accesses

Abstract

The authors systematically review the types of crime that the Internet of Things (IoT)—which brings Internet connectivity to everyday electronic devices, such as security cameras, TVs and speakers—has and might facilitate because of security lapses. They also discuss efforts to improve security including approaches to encourage manufacturers to address vulnerabilities in the products they manufacture.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For the academic review, the number of articles reviewed was too large to cite them all here. For details of the articles to which we refer, see Blythe and Johnson (2021).

  2. 2.

    It is worth noting that the purpose of the hack was not always known, and may sometimes have been to enslave a device for the purposes of conducting DDoS attacks.

  3. 3.

    For example, see https://blog.nicter.jp/2021/03/nicter_statistics_2020_4q/.

References

  • BBC News. (2017). Mirai botnet: Three admit creating and running attack tool. http://www.bbc.co.uk/news/technology-42342221. Last accessed 12 March 2021.

  • Blythe, J. M., & Johnson, S. D. (2021). A systematic review of crime facilitated by the consumer Internet of Things. Security Journal, 34, 97–125.

    Google Scholar 

  • Blythe, J. M., Sombatruang, N., & Johnson, S. D. (2019). What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?. Journal of Cybersecurity, 5(1), tyz005.

    Article  Google Scholar 

  • Blythe, J.M., Johnson, S.D. & Manning, M. (2020). What is security worth to consumers? Investigating willingness to pay for secure Internet of Things devices. Crime Sci, 9, 1.

    Google Scholar 

  • Bugeja, J., Jacobsson, A., & Davidsson, P. (2017). An analysis of malicious threat agents for the smart connected home. 2017 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2017, 557–562.

    Google Scholar 

  • Chowdhury, G. G. (2003). Natural language processing. Annual Review of Information Science and Technology, 37(1), 51–89.

    Article  Google Scholar 

  • Department for Digital, Culture, Media and Sport (2018). Code of Practice for Consumer IoT Security. https://www.gov.uk/government/publications/secure-by-design/code-of-practice-for-consumer-iot-security.

  • Dietz, C., Castro, R. L., Steinberger, J., Wilczak, C., Antzek, M., Sperotto, A., & Pras, A. (2018, November). IoT-botnet detection and isolation by access routers. In 2018 9th International Conference on the Network of the Future (NOF) (pp. 88–95). IEEE.

    Google Scholar 

  • The Guardian. (2017). German parents told to destroy doll that can spy on children. https://www.theguardian.com/world/2017/feb/17/german-parents-told-to-destroy-my-friend-cayla-doll-spy-on-children

  • Harris Interactive (2019). Consumer Internet of Things Security Labelling Survey Research Findings Report, https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/950429/Harris_Interactive_Consumer_IoT_Security_Labelling_Survey_Report_V2.pdf. Last accessed 12 March 2021.

  • Hoang, N. P., & Pishva, D. (2015). A TOR-based anonymous communication approach to secure smart home appliances. In International Conference on Advanced Communication Technology, ICACT (Vol. 3, pp. 517–525).

    Google Scholar 

  • Hong, G., Yang, Z., Yang, S., Zhang, L., Nan, Y., Zhang, Z.,... & Duan, H. (2018). How you get shot in the back: A systematical study about cryptojacking in the real world. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1701–1713.

    Google Scholar 

  • Johnson, S. D., Blythe, J. M., Manning, M., & Wong, G. T. (2020). The impact of IoT security labelling on consumer product choice and willingness to pay. PloS One, 15(1), e0227800.

    Article  Google Scholar 

  • Kang, W. M., Moon, S. Y., & Park, J. H. (2017). An enhanced security framework for home appliances in smart home. Human-Centric Computing and Information Sciences, 7(1), 6.

    Article  Google Scholar 

  • Kolias, C., Kambourakis, G., Stavrou, A., & Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84. https://doi.org/10.1109/MC.2017.201.

    Article  Google Scholar 

  • Kumar, P., Ylianttila, M., Gurtov, A., Lee, S. G., & Lee, H. J. (2014). An efficient and adaptive mutual authentication framework for heterogeneous wireless sensor network-based applications. Sensors, 14(2), 2732–2755.

    Article  Google Scholar 

  • Laycock, G. (2004). U.K. Car Theft Index: An Example of Government Leverage. In M.G. Maxfield & R.V. Clarke (Eds.), Understanding and Preventing Car Theft, Cullompton: Willan.

    Google Scholar 

  • Laufs, J., Borrion, H., & Bradford, B. (2020). Security and the smart city: A systematic review. Sustainable Cities and Society, 55, 102023.

    Article  Google Scholar 

  • Llinares, F. M., & Johnson, S. D. 2018. Cybercrime and Place. In The Oxford Handbook of Environmental Criminology.

    Google Scholar 

  • Lyu, M., Sherratt, D., Sivanathan, A., Gharakheili, H. H., Radford, A., & Sivaraman, V. (2017). Quantifying the reflective DDoS attack capability of household IoT devices. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks - WiSec ‘17 (pp. 46–51).

    Google Scholar 

  • Mohurle, S., & Patil, M. (2017). A brief study of wannacry threat: Ransomware attack 2017. International Journal of Advanced Research in Computer Science, 8(5), 1938–1940.

    Google Scholar 

  • Mokube, I., & Adams, M. (2007). Honeypots: concepts, approaches, and challenges. In Proceedings of the 45th annual southeast regional conference (pp. 321–326).

    Google Scholar 

  • McGuire, M., & Downling, S. (2013). Cyber crime: A review of the evidence Research Report 75 (Issue October).

    Google Scholar 

  • New York Times (2018). Thermostats, Locks and Lights: Digital Tools of Domestic Abuse, http://nyti.ms/3vmqIa4, last accessed 12 March 2021.

  • Ofcom (2020). Media Nations 2020—Interactive data. See: http://bit.ly/37YUJm1. Last accessed 1 March 2021.

  • Office for National Statistics. (2020). Crime survey for England and Wales.

    Google Scholar 

  • Pease, K. (1997). Crime reduction. In M. Maguire (Ed.), The Oxford Handbook of Criminology: Second Edition. Oxford: Clarendon Press.

    Google Scholar 

  • Schneier, B. (2018). Click Here to Kill Everybody. Norton: New York.

    Google Scholar 

  • Snader, R., Kravets, R., & Harris III, A. F. (2016). CryptoCop: Lightweight, energy-efficient encryption and privacy for wearable devices. 2nd ACM Workshop on Wearable Systems and Applications, WearSys 2016, 7–12. https://doi.org/10.1145/2935643.2935647.

  • Srinivasan, V., Stankovic, J., & Whitehouse, K. (2008). A fingerprint and timing-based snooping attack on residential sensor systems. ACM SIGBED Review, 5(1), 1–2.

    Article  Google Scholar 

  • Tuptuk, N., & Hailes, S. (2018). Security of smart manufacturing systems. Journal of Manufacturing Systems, 47, 93–106.

    Article  Google Scholar 

  • Vemi, S. G., & Panchev, C. (2015). Vulnerability testing of wireless access points using Unmanned Aerial Vehicles (UAV). In Proceedings of the European Conference on e-Learning (p. 245).

    Google Scholar 

  • Vigo, R., Yuksel, E., & Dewi Puspa Kencana Ramli, C. (2012). Smart grid security a Smart Meter-centric perspective. In 2012 20th Telecommunications Forum (TELFOR) (pp. 127–130). IEEE.

    Google Scholar 

  • Wall, D. (2007). Cybercrime: The transformation of crime in the information age (Vol. 4). Polity.

    Google Scholar 

  • Which? (2017). Safety alert: see how easy it is for almost anyone to hack your child’s connected toys. https://www.which.co.uk/news/2017/11/safety-alert-see-how-easy-it-is-for-almost-anyone-to-hack-your-childs-connected-toys/. Last accessed 13 March 2021.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shane D. Johnson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Johnson, S.D., Blythe, J.M., Kim, E., Sombatruang, N. (2022). Crime and the Consumer Internet of Things. In: Gill, M. (eds) The Handbook of Security. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-91735-7_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-91735-7_33

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-91734-0

  • Online ISBN: 978-3-030-91735-7

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics