"Is your Smart Home a Secure Home?" - Analysis of Smart Home Breaches and an Approach for Vulnerability Analysis and Device Isolation

被引:0
|
作者
Dorai, Gokila [1 ]
Williams, Eleason A. [2 ]
Chi, Hongmei [2 ]
Alo, Richard A. [3 ]
机构
[1] Augusta Univ, Dept Comp & Cyber Sci, Augusta, GA 30912 USA
[2] Florida A&M Univ, Dept Comp & Informat Sci, Tallahassee, FL 32307 USA
[3] Florida A&M Univ, Coll Sci & Technol, Tallahassee, FL 32307 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart devices are becoming quite popular and many homes all around the world have started using such devices. Smart devices are used for various purposes: home security, entertainment, news, streaming, HVAC, medical healthcare, etc. The cost of these devices vary according to their functionality, brand and configuration. However, there is one thing that is common among these devices in a home setting, that is, all these devices are connected to the home's Wi-Fi network. This could mean that if a security vulnerability exists in even one of the devices in a smart home setting especially in a smart medical home, it could lead to serious repercussions. Current state-of-the-art solution to this problem is to purchase vulnerability scanning software or to deploy packet sniffing network-based tools. The drawback is that those tools can be expensive and on the other hand, most people are unaware of the existence of security threats which could arise from vulnerabilities that exist in smart home devices. In this work, we aim to explore the existence of vulnerabilities in an experimental smart home setting using various connected devices and to propose a set of solutions to isolate vulnerable devices in order to secure the smart home.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Vulnerability Analysis Model for IoT Smart Home Camera
    Aljandali, Asia Othman
    Alsaidi, Nawal
    Alsafri, Maram
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2022, 22 (07): : 229 - 239
  • [2] ISEE Smart Home (ISH): Smart video analysis for home security
    Zhang, Junge
    Shan, Yanhu
    Huang, Kaiqi
    NEUROCOMPUTING, 2015, 149 : 752 - 766
  • [3] Secure device control scheme with blockchain in a smart home
    Park, Junbeom
    Chang, Seongju
    MEASUREMENT & CONTROL, 2023, 56 (3-4): : 546 - 557
  • [4] The smart home: a visual analysis
    Sadati Far, Sara
    Leszczynski, Agnieszka
    VISUAL COMMUNICATION, 2025,
  • [5] How Smart Is Your Home?
    Cook, Diane J.
    SCIENCE, 2012, 335 (6076) : 1579 - 1581
  • [6] "Smart Home Sweet Smart Home": An Examination of Smart Home Acceptance
    Marikyan, Davit
    Papagiannidis, Savvas
    Alamanos, Eleftherios
    INTERNATIONAL JOURNAL OF E-BUSINESS RESEARCH, 2021, 17 (02) : 1 - 23
  • [7] Analysis of the RFID security protocol for secure smart home network
    Kim, Hyun-Seok
    Oh, Jung-Hyun
    Choi, Jin-Young
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 356 - +
  • [8] Home smart home
    Graham-Rowe, D
    TECHNOLOGY REVIEW, 2005, 108 (08) : 23 - 24
  • [9] Home smart home
    Knivett, V.
    New Electronics, 2001, 34 (19): : 16 - 18
  • [10] Home, Smart Home
    Hansen, Ellen Kathrine
    IEEE SPECTRUM, 2010, 47 (08) : 34 - 38