"Is your Smart Home a Secure Home?" - Analysis of Smart Home Breaches and an Approach for Vulnerability Analysis and Device Isolation

被引:0
|
作者
Dorai, Gokila [1 ]
Williams, Eleason A. [2 ]
Chi, Hongmei [2 ]
Alo, Richard A. [3 ]
机构
[1] Augusta Univ, Dept Comp & Cyber Sci, Augusta, GA 30912 USA
[2] Florida A&M Univ, Dept Comp & Informat Sci, Tallahassee, FL 32307 USA
[3] Florida A&M Univ, Coll Sci & Technol, Tallahassee, FL 32307 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Smart devices are becoming quite popular and many homes all around the world have started using such devices. Smart devices are used for various purposes: home security, entertainment, news, streaming, HVAC, medical healthcare, etc. The cost of these devices vary according to their functionality, brand and configuration. However, there is one thing that is common among these devices in a home setting, that is, all these devices are connected to the home's Wi-Fi network. This could mean that if a security vulnerability exists in even one of the devices in a smart home setting especially in a smart medical home, it could lead to serious repercussions. Current state-of-the-art solution to this problem is to purchase vulnerability scanning software or to deploy packet sniffing network-based tools. The drawback is that those tools can be expensive and on the other hand, most people are unaware of the existence of security threats which could arise from vulnerabilities that exist in smart home devices. In this work, we aim to explore the existence of vulnerabilities in an experimental smart home setting using various connected devices and to propose a set of solutions to isolate vulnerable devices in order to secure the smart home.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Plug and Play your Robot into your Smart Home: Illustration of a New Framework: A Communication Protocol to Plug and Play any Robot or Device of a Smart Home
    Nguyen S.M.
    Lohr C.
    Tanguy P.
    Chen Y.
    KI - Künstliche Intelligenz, 2017, 31 (3) : 283 - 289
  • [22] A New Approach to Security Analysis of Smart Home Authentication Systems
    Zhang, Miao
    Wang, Chenyu
    Wang, Jiteng
    Tian, Si
    Li, Yanwei
    FUNDAMENTA INFORMATICAE, 2018, 157 (1-2) : 153 - 165
  • [23] Forensic Analysis for Cybersecurity of Smart Home Environments with Smart Wallpads
    Kim, Sungbum
    Bang, Jewan
    Shon, Taeshik
    ELECTRONICS, 2024, 13 (14)
  • [24] Analysis on Smart Warning System for Home Network in Smart Grid
    Ko, Hoon
    An, Kyung Jin
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 714 - 718
  • [25] Secure and Efficient Traffic Obfuscation for Smart Home
    He, Gaofeng
    Xiao, Xiancai
    Chen, Renhong
    Zhu, Haiting
    Zhang, Zhaowei
    Xu, Bingfeng
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6073 - 6078
  • [26] A secure electric energy management in smart home
    Mbarek, Bacem
    Meddeb, Aref
    Ben Jaballah, Wafa
    Mosbah, Mohamed
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (17)
  • [27] An Intelligent, Secure, and Smart Home Automation System
    Majeed, Rizwan
    Abdullah, Nurul Azma
    Ashraf, Imran
    Zikria, Yousaf Bin
    Mushtaq, Muhammad Faheem
    Umer, Muhammad
    SCIENTIFIC PROGRAMMING, 2020, 2020 (2020)
  • [28] Secure Smart Home Systems: A Blockchain Perspective
    Yang, Liuqing
    Liu, Xiao-Yang
    Gong, Wenbo
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 1003 - 1008
  • [29] Secure profile management in smart home networks
    Ziegler, M
    Mueller, W
    Schaefer, R
    Loeser, C
    Sixteenth International Workshop on Database and Expert Systems Applications, Proceedings, 2005, : 209 - 213
  • [30] What we do - and don't - know about the Smart Home: An analysis of the Smart Home literature
    Solaimani, Sam
    Keijzer-Broers, Wally
    Bouwman, Harry
    INDOOR AND BUILT ENVIRONMENT, 2015, 24 (03) : 370 - 383