Security in Home Automation

Authors

  • Esmeralda Kadëna Obuda University, Doctoral School on Safety and Security Sciences

Keywords:

Home Automation, Security, Z-Wave protocol

Abstract

Nowadays we live in the era where technology is smarter than ever. The newest devices and applications simplify tasks, make better use of resources and transform the way we live. As a consequence the world around us is rapidly changing. Smart home is a reality due to innovation in wireless connectivity and the protocols that allow devices to talk to each other.  But with “The peace of mind” comes a critical point which is about security. Z-Wave protocol is the most widely used and the main reason is because of its security level. But is really this protocol secure enough? In this work are demonstrated the main security risks for a Home Automation system and how secure are the consumers while using these smart technologies.

References

[1] D. Schwarz, „The Current State of Security in Smart Homes Systems,” SEC Consult Vulnerability Lab, Vienna, 2016.
[2] D. Kennedy és S. Dave, „Pentesting Social-Engineering over Power lines,” Defcon, 2011.
[3] W. J, „KillerBee: Practical ZigBee Exploitation,” 2009.
[4] ABC News, „‘Smart Homes' Convenient But Are They Safe?,” ABC News.go.com, 2013.
[5] K. Hill , „When 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House Via The Internet,” Forbes, 2013.
[6] S. Griffiths, „Computer hackers can now hijack TOILETS: 'Smart toilet' users in Japan could become victim to Bluetooth bidet attacks and stealthy seat closing,” Dailymail, 2013.
[7] H. Kelly, „'Smart homes' are vulnerable, say hackers,” CNN, 2013.
[8] L. Hautala, „Internet-connected homes open the door to hackers,” cnet, 2015.
[9] N. C. Moore, „Hacking into homes: 'Smart home' security flaws found in popular system,” University of Michigan News, 2016.
[10] RF Wireless World, „z-wave protocol stack | z-wave protocol layer basics,” RF Wireless World, [Online]. Available: http://www.rfwireless-world.com/Tutorials/z-wave-protocol-stack.html. [Hozzáférés dátuma: October 2017].
[11] M. Rouse, „Internet of Things (IoT),” IoT Agenda, Tech Target, 2015.
[12] P. Waher, Learning Internet of Things, Birmingham: Packt Publishing Ltd., 2015.
[13] H. S. Alavi, D. Lalanne, J. Nembrini, E. Churchill, D. Kirk és W. Moncur, „Future of Human-Building Interaction,” in CHI EA '16 Proceedings of the 2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, San-Jose, California, 2016.
[14] N. Boers, D. Chodos, J. Huang, P. Gburzyski, I. Nikolaidis és E. Stroulia, „The Smart Condo: Visualizing independent living environments in a virtual world,” in Pervasive Computing Technologies for Healthcare, 2009.
[15] B. A. Brush, R. Mahajan, B. Lee, S. Agarwal, S. Saroiu és C. Dixon, „Home automation in the wild: challenges and opportunities,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, Vancouver, BC, 2011.
[16] C. Wilsom, T. Hargreaves és R. Hauxwell-Baldwin, „Smart homes and their users: a systematic analysis and key challenges,” Personal and Ubiquitous Computing, %1. kötet19, %1. szám2, pp. 463-476, 2015.
[17] D. Rye, „My life at X10,” X10 (USA) Inc., USA.
[18] J. Greenough, „How the 'Internet of Things' will impact consumers, businesses, and governments in 2016 and beyond,” Business Insider, 2016.
[19] Research and Markets, „Global $78 Bn Home Automation Market Size, Demand Forecasts, Industry Trends and Updates 2016-2022,” CISION PR Newswire, Dublin, 2017.
[20] B. Fouladi és S. Ghanoun, „Black Hat 2013 - Honey, I'm Home!! - Hacking Z-Wave Home Automation Systems-You Tube,” HackersOnBoard, 19 November 2013. [Online]. Available: https://www.youtube.com/watch?v=KYaEQhvodc8. [Hozzáférés dátuma: 30 October 2017].
[21] B. Lewis, „Z-Wave opens up as smart home connectivity battle closes in,” Embedded Computing Design, 2016.
[22] K. Parrish, „ZigBee, Z-Wave, Thread and WeMo: What's the Difference?,” Tom's Guide, 2017.
[23] B. Fouladi és S. Ghanoun, „Security Evaluation of the Z-Wave Wireless Protocol,” Black Hat USA, 2013.
[24] Electronics Research Group, „Manchester Encoding,” Electronics Research Group, March 2007. [Online]. Available: http://www.erg.abdn.ac.uk/users/gorry/course/phy-pages/man.html. [Hozzáférés dátuma: October 2017].
[25] Z-Wave Alliance, „About Z-Wave Technology - Z-Wave Alliance,” [Online]. Available: https://z-wavealliance.org/about_z-wave_technology/. [Hozzáférés dátuma: October 2017].
[26] M. Campbell, „Mirai-based DDoS attack highlights benefits of Apple's secure HomeKit platform,” Apple Insider, 21 October 2016. [Online]. Available: http://appleinsider.com/articles/16/10/22/mirai-ddos-attack-highlights-benefits-of-apples-secure-homekit-platform. [Hozzáférés dátuma: October 2017].
[27] L. Hamilton, „Z-Wave Alliance Announces Board Member and New Security Mandate,” CED Magazine, 2016.
[28] W. Wong, „Q&A: S2’s Impact on Z-Wave and IoT Security,” Electronic Design, 2017.
[29] R. Crist, „Z-Wave smart-home gadgets announce new IoT security standards,” CNET, 2016.
[30] R. Crist, „Your Z-Wave smart home gadgets just got more secure,” CNET, 2017.
[31] K. Briodagh, „Mandatory Security Implementation for Z-Wave IoT Devices Takes Effect,” IoT Evolution, 2017.
[32] T. Jorgensen, „Z-Wave as Home Control RF Platform,” HomeToys, 2005.
[33] P. Christensson, „API Definition,” Tech terms, 20 June 2016. [Online]. Available: https://techterms.com/definition/api. [Hozzáférés dátuma: October 2017].
[34] M. Rouse, „Definition: Mesh Network Topology (mesh network),” December 2015. [Online]. Available: http://internetofthingsagenda.techtarget.com/definition/mesh-network-topology-mesh-network. [Hozzáférés dátuma: October 2017].

Downloads

Published

2018-01-04

Issue

Section

Safety Science (Biztonságtudomány)