0% found this document useful (0 votes)
77 views10 pages

Assessment of Smart Home

This document discusses security and privacy issues related to smart home technology. It begins by introducing smart homes and their components. It then discusses various security objectives for smart homes like availability, authenticity, and authorization. The document notes that while smart homes provide benefits, their internet connectivity and accessible data pose security risks. It argues more work is needed to properly assess each component's security and make systems comprehensible to all users to promote acceptance of these technologies.

Uploaded by

elon husk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views10 pages

Assessment of Smart Home

This document discusses security and privacy issues related to smart home technology. It begins by introducing smart homes and their components. It then discusses various security objectives for smart homes like availability, authenticity, and authorization. The document notes that while smart homes provide benefits, their internet connectivity and accessible data pose security risks. It argues more work is needed to properly assess each component's security and make systems comprehensible to all users to promote acceptance of these technologies.

Uploaded by

elon husk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

ORIGINAL RESEARCH Submitted: 28.08.2022; Accepted: 19.09.2022; Published online: 20.11.

2022

Assessment of Smart Home: 1. Introduction


Security and Privacy Smart home technology also referred to as home
automation, provides house owners with safe, afford-
1
Akshat Goyal, 2*Mugdha S Kulkarni ability, power conservation, and comfort while en-
couraging them to monitor homes, usually through a
1,2
Symbiosis Centre for Information Technology, Symbiosis Inter- mobile application. In reality, a smart home is a sys-
national (Deemed University), Pune, Maharashtra, India tem that provides a mobile application to track it from
your smartphone or laptop. It can monitor home ap-
*
Corresponding author: pliances such as lights, ventilation, air conditioning,
[email protected] smart door doors, etc. Bluetooth or Wi-Fi is used to
monitor devices remotely [1]. Smart home emphasizes
Abstract the automated regulation of home appliances such as
Home automation is now extremely common in Internet of intelligent lighting, ventilation, and heating. Although
things services and devices with a range of assurances to im- industry strives to manufacture specified goods, such
prove health, lifestyle, and customer wellbeing. In terms of as the thermostat, smart lights, work has tried to un-
its success and apparent utility for humans, intelligent homes derstand the wide spectrum of solutions introduced at
possess various safety concerns resulting from the diversified, home. The devices inside the system are configured to
vast-range, and nuanced nature of IoT. Previous studies have the main hub that governs the movement of informa-
talked about security and privacy issues. However, we observe tion among them, controlled and operated by end-us-
that they have not addressed the risk assessment of each smart er through mobile or web applications [2].
home component and corresponding security objective along While it is evident that potentially numerous IoT
with additional factors that affect a smart home security pos- devices and applications seem to be currently active in
ture. In this study, we have proposed a framework defining a the smart home market, they usually come into one of
standard level of security and then analyzing each component the following categories: Entertainment, Monitoring
concerning it. There are so many vulnerabilities, but all cannot and Safety, Household Maintenance, Lighting, Fitness,
be assessed due to the heterogeneity of devices and their con- and Power & Resource Management. Over the last few
nection in a small network. IoT can support a wide range of years, rapid development or shift has witnessed voice
technologies and programs in various domains, including smart technology adaptation in many computing applica-
cities and smart houses. For monitoring, data exchange, and tions. One of the most significant innovations that use
other operations in the given service, IoT smart objects com- voice technology is Smart Home Personal Assistants
municate with other elements such as proxies, mobile devices, (SPA), e.g., Amazon Echo, Google Home, etc. Con-
and data collectors. While such components help solve various nected home systems can be categorized into two ma-
social issues and provide consumers with modern advanced jor categories: remotely operated or locally controlled
services, their restricted computing capacities render them vul- systems [3]. The local system uses an in-house control-
nerable to well-known protection and privacy risks. ler to operatee. A smart home device is interconnected
via the Internet, enabling users to monitor operations
Keywords like home protection, temperature, lighting, etc. Users
IoT, Security, Smart Home System, Home Automation, Data Ex- can install anything in the home that uses electricity
change on your home network and at your command [4]. It
includes various devices that have hit the market that
Imprint regulate and control all devices such as Zigbee, Z-wave,
Akshat Goyal, Mugdha S Kulkarni. Assessment of Smart Home: Lutron, and Wink. So, the design of the Smart local sys-
Security and Privacy. Cardiometry; Issue 24; November 2022; tem, the reality is that it is still linked with the external
p. 400-409; DOI: 10.18137/cardiometry.2022.24.400409; Avail- world through the back door by extracting data from
able from: http://www.cardiometry.net/issues/no24-novem- homeowners and the Internet, poses a range of security
ber-2022/assessment-smart-home issues. They are systems that integrate most users’ digi-
tal devices and offer them a portal to control anything.
400 | Cardiometry | Issue 24. November 2022
However, generally, they come along with a mobile ap- Availability: It aims at ensuring that unauthorized
plication, and that you can access them from wherever individuals or programs can not restrict authorized
you want. Present Smart home systems include cloud- users from accessing the network resources.
based Samsung Smart Things and Amazon AWS, and Authenticity: It involves the conservation of the
also several other IoTs. An example, in which a home authentic self of a system user or organization and
device sensitizes the surrounding atmosphere and sub- linking the existing identity to the system-embedded
mits the overall collected data directly to the cloud or principal to make sure the system acknowledges this
else from a central hub [5]. The smart house is packed user.
with hundreds of sensors that are doing measurements Authorization: Authorization is the role of defin-
in conjunction with several other evidence, including ing access rights/resource privileges relevant to infor-
smart devices that will be used for customization, auto- mation security and data security in general and ac-
matic services, and enhancing the quality and usability cess control in particular.
of the occupants. Technically speaking, the smart home The idea of the “Internet of Things” is no longer a
model consists of five essential elements: device control, subject of science fiction but an integral part of our life.
sensors and actuators, network controllers, the control- One of the most common examples of IoT in action in-
ler, and the remote-control devices. A smart home pro- cludes technologies and applications designed to sup-
vides various security, childcare, healthcare, eldercare, port devices and Smart house systems [9]. However, the
energy efficiency, and management [6]. However, this fact that irrespective of smart home design, it will still
smart home model has essential aspects of information be linked with the external environment through an in-
protection and privacy. ternet connection, also the accessible back door protec-
The unprecedented growth in the number of linked tion extracted by the family members, pose a range of
devices has not only provided criminals new access security issues, observes Mantas et al. Smart homes face
points it also allows more of our knowledge to be cap- unique challenges in terms of security, safety, and us-
tured and eventually exchanged than ever before. Based ability because they are multiple users, multiple devices
on many principles and criteria, lots of equipment networks, which has an impact on the cognitive expe-
manufacturers provide a wide variety of devices (me- rience of most household occupants. Current Smart
ters, actuators, cameras, etc.) embedded in a household home hardware is not well configured for many appli-
setting. The device diversity increased security issues in cations, often ignoring simple access control and other
Smart Homes are directly impacted. Land and consum- ways of making the device intelligible and accessible to
ers and the knowledge they produce are an important all applications [10]. To promote the introduction and
portion of the smart house automation environment. acceptance of home automation technologies, it is in-
As the occupants gradually welcome them, these net- deed vital to explore the user’s view also, the current
work structures started attracting more attention from smart home conditions. There is a significant necessity
several other business markets [7]. The growing need to reassess the theories and concepts considering the
for these kinds of technologies can be seen from the rapid growth rate of studies in this field.
fact that the worldwide smart home market has been The project discusses privacy and security issues
estimated to value nearly $24000 million in 2016. The related to smart home systems and their components
figure is expected to rise as more and more people be- and segregating them based on Confidentiality, In-
gin to adopt smart home technology to the extent of tegrity, Availability, Authenticity, and Authorization,
$53500 million by 2020. The following are some key which are also the security objectives of a Smart Home
safety criteria when working with protection in IOTs, system. Lastly, we will give an overview of the mitiga-
which are also steps to analyze the performance of mul- tion options that can be implemented for developing a
tiple protected systems [8]. more secure home network [11].
Confidentiality: This applies to preventing the The rest of the paper is structured, as Section 2 will
transmission of data to unauthorized individuals, or- be explaining the objective, Section 3 will be Litera-
ganizations, and mechanisms. ture Review. Section 4 is a conceptual model of how
Integrity: It applies to avoiding falsification and a smart home system looks. Section 5 is a research
manipulation of data transmitted through the network methodology, and Section 6 will be the analysis part,
by unauthorized individuals or devices. which discusses the conclusion and limitations.
Issue 24. November 2022 | Cardiometry | 401
2. Conceptual Model wireless communication protocols. Sensors typically
A smart home environment and its major compo- connect using home security protocols, such as Zig-
nents are discussed in this section. These layers com- bee, Z-Wave, and WPA2, and networking procedures
municate with each other through signals to carry out that include Bluetooth, IEEE 802.15.4/.11ah, Wi-Fi,
operations. The conceptual model reference is taken low-WPAN, also option of mobile technologies. GPS
from [12]. and RFID are also used for tracking purposes.
Smart Home Systems, shown in Figure 1, are usu- Smart Hub
ally hardware modules composed of cameras, smart Wiring (if applicable)
objects, gateways, and sensors. The separate one com- • Services
ponent categories are: Services are mobile programs deployed in the cloud
• Devices or in the home setting responsible for scheduling sys-
Smart Home Systems are usually hardware modules tem services that are mobile programs deployed in the
composed of cameras, smart objects, gateways, and cloud or the home setting responsible for scheduling,
sensors. The separate one component categories are: system control, decision-making, etc. Usually, house-
Sensors: - Tests the electrical characteristics of the holds run these applications over their smartphones
atmosphere or the actual object. They may vary from or tablets to communicate with the computer locally
movable like wristbands to immovable, for example, or remotely [14].
CCTV. Smart Apps
Actuators: - They perform acts like clicking ON/ Web access
Off, dimming lights, closing gates, warnings, etc.
Gateway: This is a home access point that usually 3. Objective
helps owners or other individuals remotely track, oper- The core objective behind conducting research is
ate, and handle home electrical appliances and even de- to give an overview of the privacy and security issues
tectors. It serves as an integration node to transmit test in the IoT-based Smart home system. Due to vulner-
value with an outside system, like the service providers. abilities of the existing smart home systems and the
Smart devices: - are networks made up of sensors multiple attacks on these systems, we have challenged
and/or actuators. They are linked with the smart home security [15]. Therefore, the security of these systems
web. Examples here involve automated devices like a is an important issue that requires analysis. The major
smart speaker that reacts to the buzzer’s sound and de- emphasis is on highlighting the security vulnerabil-
livers access control based on real-time [13]. ity and risks distributed among major portions, like
• Communication human-related, network, hardware, software, and in-
Classic smart, wired home uses several proto- formation. It is accompanied by finding out the most
col connectivity solutions. They range from wired to and least vulnerable components installed within the

Figure 1: Smart home system elemental structure

402 | Cardiometry | Issue 24. November 2022


house setting based on types of attack, likelihood, and operate their houses effectively beneath managed con-
risk score [16]. Also, keeping into consideration inter- ditions and quite enough confidentiality and prevent
nal and external factors, The research would be useful abuse of sensitive information.
for manufacturers of home automation devices, com- The emergence of smart gadgets, which systemat-
ponents, and reviewers and to develop a more secured ically gathers classified data, becomes evident most-
smart system based on the risk assessment carried out. ly because of the expansion of everyday activities. In
From the end-user and provider perspective, it will be addition to that, a study says that insufficient protec-
useful as they know what factors affect smart home tion protocols and specialized outlier analysis mech-
security and make them aware and, in turn, increase anisms systems are sometimes present [21]. Such a
overall security posture [17]. diverse system renders it susceptible to various threats
like information theft, unknown connection, service
4. Literature Review disturbance, power wastage, and unsafe portals. An-
Research attempts have been made to analyze vul- other study states that with a wide range of electron-
nerabilities in IoT products in a smart home setting, ic devices and sensors, smart homes can be installed,
where security issues are addressed and attack clas- controlled from remote areas, making it impossible
sifications are identified. Homes are the areas where for the average person to uphold safety levels. Since
secrecy is supposed to be preserved. IoT (Internet of smart devices are connected to the Internet, the vec-
things) has emerged as a reliable technology to en- tors used by attackers are increasing significantly [22].
hance the lives in today’s digital homes by offering a It also makes it more difficult for forensic analysts to
variety of automated, interactive, and convenient ser- use the tool and appoint the person. The development
vices. However, maintaining safety and adequate pro- and implementation of complex, linked operating do-
tection for these necessary IOT offered services are key mains, such as intelligent public transport, buildings,
problems within a smart home setting [18]. A study by and cities, are on the rise [23]. The complexity of the
Bugeja et al. also speaks similarly that IoT services and threat area of automated homes is increasingly grow-
devices are becoming widely attractive among smart ing. Many vulnerable bugs got added, setting a stage
homes, including many attempts to raise the standard for a not so stable dangerous environment.
of living of individuals. However, the stratified, com- In a study, the author has attempted to present the
plex, and web-related complexity for such space raises definition of smart home system, the term privacy
additional issues since personal information is obtain- and security in perspective of smart home, security,
able, often without the knowledge of the household- vulnerabilities area, and existing security initiatives
er. However, the privacy and protection need of vital to counter these security and privacy threats [25].
technical infrastructure plus any important commer- The diversity of IoT devices has been the most critical
cial activities turn out to be somewhat distinct from problem to discuss on a high-priority basis. The prod-
the demands of the domestic Smart Home commu- uct comes with various networking requirements, and
nity, observed Lin & Bergmann [19]. Another study different app update features often come from differ-
states that homes are especially vulnerable to malware ent manufacturers. A study describes and addresses
and data breaches at the highest degree of smartness. the threat that those might influence the organization
So, paradoxically, the better digital a house becomes, classifying them into an external threat as well as in-
the more defenseless you get to be. Recent technolo- ternal in order to address the issue that since home
gy professionals speak on how only basic appliances, automation is a section of everyday lives, many folks
e.g., coffee machines, can also be an intruder’s gateway wish they can keep a check on his/her residence by just
to the whole house, which provides vulnerable digital tapping on mobile but are afraid to risk anonymity or
underbelly, which criminals might manipulate. IoT’s personal details that may lead to a lack of protection or
core deployment area is a home, an integrated place, even financial loss [26].
where many things connect through the Internet. A further study says IOT is also perceived as a com-
Hence, according to a study, this fast-technical devel- mon issue area, accompanied by potential approaches
opment of IoT poses ample threats [20]. For example, to be implemented through applications of a broad
in what way smart home users can get reliable utilities variety. However, the online security requirements for
to maintain their account and privacy and a way to essential technical systems and important business ac-
Issue 24. November 2022 | Cardiometry | 403
tivities were somewhat distinct in the smart house of tion among smart devices, a prevention methodolo-
a traditional setting. The first time IoT was created, gy based on smart devices and wireless connections
security was just an afterthought [27]. However, this is necessary. Also, while safeguarding against hackers
is no longer appropriate due to the high demand for or network attacks, it is quite often advised that the
IoT devices in consumer homes. Attacks on IoT sys- device’s original or out-of-box password should not be
tems may occur with or without human intervention, used and read the device’s security specifications be-
like the Mirai botnet. Ann effective IoT attack can also fore using them for the first time. Another study states
result in significant financial, reputational, and, worse, that even if the Internet of Things delivers enormous
life-threatening losses to customers. A study states benefits, it is prone to various security threats in our
that security is crucial to the proper development and everyday lives. The bulk of vulnerabilities were linked
implementation of home automation systems. It also to the disclosure of data and disruption in businesses.
gives the inhabitants of a home a sense of security and Cyber-attacks in IoT devices directly affect the risk of
puts their minds at ease. As it is now, much vulnerabil- general security. Applying IOT technologies to smart
ity exploits the smart home network, but no strong de- homes creates both opportunities and security risks.
fensive mechanism has yet been developed [28]. One Homes integrated with the Internet of things smart
more recent study states that multi-user smart homes homes seem particularly unsafe for a range of security
face particular protection and privacy issues, such as hazards in and around the house. In case the protec-
supporting a wide variety of access control priorities tion of the home or device got breached. The securi-
and handling consumer pressures and disputes. Smart ty, private details, in addition to the protection of the
homes face particular problems in terms of protec- user, will be at risk.
tion, privacy, and accessibility, as they are multi-user, Necessary steps must be followed to move towards
multi-device networks, which have an impact on all safer homes and all the more acceptable for living in-
individuals in general experience living in the house, side. Supporting the research with a study that shows
but unfortunately, modern smart homes are not yet why smart home security is the new challenge is quite
intelligently built for connectivity with and use by sev- evident. In the current situation, the use of IoT & its
eral users [29]. A similar study shows that risk quanti- support technologies and strategies for deployment in
fication for smart homes is difficult because of its di- a smart home is one of several major fields, wherein a
verse environment with wired devices, appliances, and lot of major corporations like Google, Amazon, etc.,
networks. Its design poses multiple safety concerns as are spending a quite great deal of money also initiated
well as vulnerabilities in a suburban neighborhood. work for enhancing security and health at home. A re-
It is, therefore, necessary to control the risks to smart cent study shows that, up to date, the risk analyses of
homes. They also find out that many of the in-store IoT systems were not all-included. However, in certain
apps had an extra benefit or rights because of their instances, include best-known products or vendors.
ability to behave as a complex system. Furthermore, Recent tests have shown IoT devices are quite prone
after the application has been enabled, complete ac- to several cryptographic, system, network and phys-
cess to the device is given to the Smart App. It states ical, network attacks. At present, there are no health
that only partial access to the device is necessary [30]. standards for IoT devices. Therefore, the consequence
A further study states that cybercrime and infor- is that safety defects are found during usage, which
mation security challenges are far closer to the real- ensures IoT health hazards are not well understood
ity of wired home environments than has ever been or investigated. Vulnerability checks are conducted to
anticipated. Much of the work initiative focuses on assess if IoT applications can be abused. It is crucial for
the protection systems of collaboration and essential security vulnerabilities experiments to be well-round-
services. Failing to recognize a few out of several del- ed across all areas of attack vectors.
icate ties within the system emerges because of smart
equipment wired today and the future. A study depicts 5. Research Methodology
that because of the absence of a safety procedure for The research question identified for this paper is
smart components, most of which are easy preys; how- an addition to the existing research. It adds to more
ever, it is not in the subject’s experience about being knowledge about the associated security issues related
compromised. Considering the significance of protec- to a smart home.
404 | Cardiometry | Issue 24. November 2022
Q1. Are the current smart home environment 6. Data Interpretation and Analysis
security problems and privacy issues well ad- The smart home concept is modeled on conve-
dressed? nience by connectivity and the automation of efficien-
Q2. Do the smart home system components meet cy processes. When homeowners choose the idea of
or fulfill the proposed security standards? clever home, they must also be aware of the threats
Systematic Literature Review has been carried out posed by the clever home as cybercriminals trawl the
in conjunction with current exploration to address re- Internet and build hacks directed at a clever property.
search questions. The intention is to start by phases of In response, the desired intelligent homeowner must
the organizing, implementation, and documentation take a security measure. Smart home protection will
of the evaluation to support the execution of the liter- begin with understanding and take the appropriate
ature review. measures to protect your home network’s integrity.
Potential security risks include eavesdropping,
5.1. Selection of Primary Studies Distributed Denial of Service (DDoS) attack, data
Key findings have been outlined by entering tags spill, etc. Home automation is also under threat of un-
for a particular journal or web search service. Relevant authorized access.
keywords are chosen along with conditional ‘and’ and To fulfill the research question goals, we agreed to
‘or’ operators to help find better results. So, the threads develop a risk evaluation methodology to perform a
in the sample were: risk assessment for crucial components of smart home
(“Smart home” or “Home automation”) AND (“Se- systems probably to be the target of attacks. The below
curity” OR “Cybersecurity”) risk evaluation reference table is created based on the
data acquired from an institute risk analysis and man-
5.2. Inclusion and Exclusion Criteria agement framework. It is then customized according
Studies to be included in this SLR report empirical to the project need. The scale selected here is a three-
findings and could be papers on Smart home security, scale factor for the ease of doing risk assessment is
privacy and security issues of IoT-based smart home, shown in Table 1.
challenges implementing smart home. The inclusion
criteria were: English Paper, Paper having relevant Table 1
information related to smart home, smart home cy- Range of risk assessment factors
bersecurity. The exclusion criteria were: Non-English Risks Score Impact Likelihood
paper, a paper that is unclear and duplicate, paper re- 7.5 < Score < = 10 High > 65% - 100%
lated to the connection between a smart home and a 4 < Score < = 7.5 Medium > 25% - 65%
smart city. 1 < Score < = 4 Low 0 - 25%

5.3. Selection Results Along with the identified risks and vulnerabil-
The original searches for the selected keyword for ities of the components in Table 2, some factors are
the topic identified 90 articles, conference papers, and unintentional or say, not technical/network-related,
chapters. Upon elimination of redundant findings, that also affects smart home security. In Table 3, some
this was limited to 70. From remaining, the articles identified factors are listed out, followed by dividing
left to be read upon applying inclusion/exclusion cri- them into internal, related to the device, and external,
teria were 50 with the review, a risk assessment/anal- which are non-device related or actions happening
ysis is also going to be carried out that will contain outside a smart home.
Risk, Vulnerability, Threat vector, Impact, risk score
under which security requirement (Confidentiality, Talking about Internal Factors:
Integrity, Availability, Authenticity, Authorization) Constrained System Resources – It is still a chal-
the risk identified will fall in the defined security re- lenge for IoT device manufacturers to design compre-
quirements needed for the securing functioning of hensive security measures within a constraint avail-
a smart home are used later during risk assessment able memory.
part so that we can group which risks impact which Failure of Home Device – It is a situation that is
requirement. unintentional and can make a device vulnerable to
Issue 24. November 2022 | Cardiometry | 405
Table 2
A risk assessment matrix describing component vulnerabilities/threat vector together with their likelihood, potential risk, risk score,
security objective, and impact
Smart Home Vulnerability/ Potential risks Risk Likelihood Impact Security
Component Threat vectors Score Objective
Hampered
Hardware
RFID Eavesdropping reading user tags and application 7 > 25% - 65% Medium Confidentiality,
requests, encrypt connection Availability
RFID Cloning password, and duplicate secret keys
Smart Lock Handshake key Unauthorized access to home 6.5 > 25% - 65% High Authorization
leakage
Smart Meter Man, in the Discover in house activity occupancy 4 < 0 - 25% Low to Confidentiality
Middle attack detection Medium
Sensors Wormhole Prevent sensors from detecting 5 > 25% - 65% Medium Authenticity,
attack fire and motion, give location integrity
information of the user to the
attacker
Smart Port scanning Leakage of personal information into 3.5 < 0 - 25% Low Confidentiality
Appliances Device hardware hands of attackers,
exploitation Malfunctioning results in fire or
monitoring.
Smart hub Man, in the Full access to central and peripheral 5 > 25% - 65% Medium Confidentiality,
middle attack devices, creation of SSH backdoor Authorization
Biometrics Sensor output Captured sample is replayed and 6.5 > 25% - 65% Medium Authenticity
interception falsely accepts by the individual.
Network High Integrity
Wi-Fi Duplicating Smart home devices password 9 > 65% -
access point leakage leading to a cyber-attack. 100%
Replay attack
Telnet Dictionary Credentials could be used to 5.5 > 25% - 65% Medium Authentication
attack connect and use smart devices as a
botnet.
Smart home Denial of User unable to use the home 8 > 65% - High Availability
server Service attack network service 100%
WSN Eavesdropping Access to sensitive information 3.5 < 0 - 25% Low Confidentiality
flowing between two devices
Gateway Inadequate Impersonation of the device 5.5 > 25% - 65% Medium Integrity
physical security can happen by using just its
compromised certificate,
Home network under attack
Software
Firmware Malicious code Alter, demolish information, permit 6.5 > 25% - 65% Medium Authorization
attack unauthorized access

Mobile Design flaw Leakage of hardcoded passwords 8 > 65% - High Authentication
Application Malicious code 100%
injection
API SQL injection A device can be made to pretend 7 > 25% - 65% Medium Availability
attack to perform correctly using its leaked
DOS attack credentials, device data leakage
Device Outdated Can create a smart device to behave 4 0 - 25% Low Authorization
software software inappropriately
Weak
credentials
Information
Cloud server Large amount Affects performance of IoT 3.5 0 - 25% Low Integrity,
of information Availability
received

406 | Cardiometry | Issue 24. November 2022


Smart Home Vulnerability/ Potential risks Risk Likelihood Impact Security
Component Threat vectors Score Objective
Hampered
Denial of service Information collected by devices 6 > 25% - 65% Medium Availability
attack
Lack or absence Inadequate authentication, 4 0 - 25% Low Confidentiality
of access control Inadequate access control
policy
Human
User Account Weak Password Complete compromise of device and 9.5 > 65% - High Authorization,
management user account 100% Authenticity
Home Inexperienced Various degree of social engineering 8 > 65% - Medium Availability
security end users attacks 100%

NOTE: Smart lock is an exception; the impact is high because if attacked, the whole smart home system and users are compro-
mised.

Table 3
Internal and external factors affecting security posture of smart
home system
Internal factors External factors
7. Results and Discussion
Constrained System resourc- Lack of dedicated profes-
es sionals The serious challenges in a smart world are main-
Failure of home devices Moderate intake of quality ly security and privacy. Smart computers/devices are
standards quite vulnerable to attacks, resulting in data loss and
Power and internet malfunc- Time analysis identity breaches.
tion
Due to the lack of security mechanisms in IoT de-
vices, many become soft targets and even without be-
security attack. These happen either because of poor ing in victim’s knowledge of getting infected. We made
design flow or software failure. an effort in this paper to deliver a Risk evaluation for
Power and Internet Malfunction – A malfunction smart connected home surroundings constructed on
in power can also affect device security. Most IoT de- IoT. Major emphasis is on highlighting the privacy,
vices are low-powered ones; therefore, a surge could security vulnerability, risks distributed among ma-
damage the device. Also, an internet malfunction can jor portions like human-related, network, hardware,
create a barrier between consumers and their connect- software, and information. Issues discussed were in
ed devices. context with security and privacy objective, which is
CIA triad and authorization and authenticity. For risk
External Factors: assessment, a framework created with the help of ref-
Lack of Dedicated Professionals – It is noted that erence form is proposed, in which we have defined
there is a lack of professional assistance in the concept that the expected level of security for any component
or service phases of IoT implementation in the Smart is 60%, which is 6 in our case, as our risk score ranges
Home system. An improvement can greatly reduce se- from 0 to 10, which helped us in finding out which
curity vulnerabilities. are the least and most vulnerable components as risk
Slow Uptake of Standards – This problem is the score above 6 is more vulnerable and below is less vul-
lack of uniform standards and appropriate certifi- nerable. Here, the concept of risk appetite comes into
cates by manufacturers and providers, resulting in the picture, which we have integrated into our study
low-quality products. As a result, security is compro- based on the results are drawn. Coming to the hard-
mised. ware-related vulnerabilities, the least vulnerable are
Time Analysis – It is a side-channel attack that smart appliances, and one more is RFID. In network,
might not be active, but instead just watching and an- less vulnerable is WSN, and more vulnerable is Wi-
alyzing just how much time various computations take Fi. In software, the less vulnerable is Device software,
to perform. This factor is crucial because it happens and the more vulnerable one is Mobile application.
even if the data is encrypted. Coming to information, less vulnerable is cloud server
Issue 24. November 2022 | Cardiometry | 407
and more is data storage, including physical storage in with other devices, such as remote access from a far
memory cards, etc. In human-related cases, most of location and social impact of smart home security.
the security cases occur due to poor password man- Artificial intelligence can greatly improve smart home
agement. The study helps in carefully addressing the security and also blockchain.
security issues of each home automation component;
also mentioning which security objective is breached References
along with identified external and internal factors that 1. Abdur, M., Habib, S., Ali, M., & Ullah, S.
affect the smart home security. Through the proposed (2017). Security Issues in the Internet of Things (IoT):
framework, we learned that most of the components A Comprehensive Study. International Journal of Ad-
meet the defined expected level of security. It is be- vanced Computer Science and Applications, 8(6).
cause of design flaws, low memory constraints, het- 2. Alam, T., A. Salem, A., O. Alsharif, A., & M.
erogeneity of sensors, appliances, and networks. It Alhejaili, A. (2020). Smart home automation towards
shows that the proposed method can help the manu- the development of smart cities. Computer Science
facturers and providers develop a more secure smart and Information Technologies, 1(1), 17–25. https://
home environment. doi.org/10.11591/csit.v1i1.p17-25
3. Ali, B., & Awad, A. I. (2018). Cyber and phys-
8. Conclusion ical security vulnerability assessment for IoT-based
The topic of cybersecurity is much more closely smart homes. Sensors (Switzerland), 18(3), 1–17.
related to the Smart Home Environment than is com- 4. Almusaylim, Z. A., & Zaman, N. (2019). A
monly assumed. People have been producing a large review on smart home present state and challenges:
volume of personal data due to the increased use of linked to context-awareness Internet of things (IoT).
smart devices, posing a significant privacy danger, Wireless Networks, 25(6), 3193–3204.
particularly as this data is stored in small smart devic- 5. Anthi, E., Williams, L., Slowinska, M., Theo-
es that are more vulnerable to privacy, mostly achieved dorakopoulos, G., & Burnap, P. (2019). A Supervised
without the user’s understanding. Third parties gath- Intrusion Detection System for Smart Home IoT De-
er and store any of this data, and in some situations, vices. IEEE Internet of Things Journal, 6(5), 9042–9053.
this is achieved without the user’s permission. It is also 6. Banham, R. (2017). Cyber Scorekeepers. Rm-
crucial to consider the data after it has been obtained magazine. http://www.rmmagazine.com/2017/11/01/
from the end-user. The result would remain the same cyber-scorekeepers/
if the data were stolen from an unreliable machine or 7. Batalla, J. M., Vasilakos, A., & Gajewski, M.
computer. The user was duped into giving more data (2017). Secure Smart Homes: Opportunities and chal-
than he wanted. The sourced data will be repurposed lenges. ACM Computing Surveys, 50(5).
or distributed to third parties by the organizations that 8. Bugeja, J., Jacobsson, A., & Davidsson, P.
collected it. The customer has little influence of it, and (2016). On Privacy and Security in Smart Homes.
in some cases, no knowledge of it. Every safeguard 2016 European Intelligence and Security Informatics
taken by the recipient will only restrict the amount of Conference (EISIC), 172–175.
data gathered. Smart device manufacturers and inter- 9. Davis, B. D., Mason, J. C., & Anwar, M. (2020).
face designers must resolve these concerns in order to Vulnerability Studies and Security Postures of IoT De-
ensure adequate protection and privacy. vices: A Smart Home Case Study. IEEE Internet of
Things Journal, 4662(c), 1–1.
9. Limitations and Future scope 10. Desai, D., & Upadhyay, H. (2014). Security and
When we transition into the next generation, more Privacy Consideration for Internet of Things in Smart
and more devices will continue to connect. For future Home Environments. International Journal of Engi-
scope in smart home security, we should seek to view neering Research and Development, 10(11), 73–83.
the local network as a whole and create a framework 11. Doan, T. T., Safavi-Naini, R., Li, S., Avizheh,
that can quickly detect the intruder and his actions S., Muni Venkateswarlu, K., & Fong, P. W. L. (2018).
during the attack. This paper presents opportunities Towards a resilient smart home. IoT S and P 2018 -
for potential research work in this area. There is also Proceedings of the 2018 Workshop on IoT Security
the scope of examination of security of components and Privacy, Part of SIGCOMM 2018, 15–21.
408 | Cardiometry | Issue 24. November 2022
12. Edu, J. S., Such, J. M., & Suarez-Tangil, G. ment. International Journal of Applied Engineering
(2019). Smart Home Personal Assistants: A Security Research, 14(7), 75–78.
and Privacy Review. http://arxiv.org/abs/1903.05593 23. Philomin, S., Singh, A., Ikuesan, A., & Venter,
13. Gadiyar, H. M. T., Thyagaraju, G. S., Bhavya, H. (2020). Digital forensic readiness framework for
T. P., & Ahana, R. (2018). Privacy and Security issues smart homes. Proceedings of the 15th International
in IoT-based Smart Home Applications. 6(15), 6–8. Conference on Cyber Warfare and Security, ICCWS
14. J. Sturgess, J. R. C. Nurse, and J. Z. (2018). 2020, 627–636.
Kent Academic Repository Movement. A Capabili- 24. Ray, A. K., & Bagwari, A. (2018). Study of
ty-Oriented Approach to Assessing Privacy Risk in smart home communication protocols and securi-
Smart Home Ecosystems, 47, 459–469. https://kar. ty & privacy aspects. Proceedings - 7th International
kent.ac.uk/69955/ Conference on Communication Systems and Network
15. Jacobsson, A., Boldt, M., & Carlsson, B. Technologies, CSNT 2017, 240–245.
(2016). A risk analysis of a smart home automation 25. Saxena, U., Sodhi, J. S., & Singh, Y. (2017).
system. Future Generation Computer Systems, 56, Analysis of security attacks in a smart home network.
719–733. Proceedings of the 7th International Conference Con-
16. Karimi, K., & Krit, S. (2019). Smart fluence 2017 on Cloud Computing, Data Science and
home-smartphone systems: Threats, security require- Engineering, 431–436.
ments and open research challenges. Proceedings of 26. Shouran, Z., Ashari, A., & Kuntoro, T. (2019).
2019 International Conference of Computer Science Internet of Things (IoT) of Smart Home: Privacy and
and Renewable Energies, ICCSRE 2019, 1–5. Security. International Journal of Computer Applica-
17. Kavallieratos, G., Chowdhury, N., Katsikas, S., tions, 182(39), 3–8.
Gkioulos, V., & Wolthusen, S. (2019). Threat Analysis 27. Sikder, A. K., Babun, L., Aksu, H., & Ulua-
for Smart Homes. Future Internet, 11(10), 207. gac, A. S. (2019). AEGIS: A Context-aware Security
18. Lamba, A., Singh, S., Dutta, N., & Muni, S. S. Framework for Smart Home Systems. ACM Interna-
R. (2019). Uses of Different Cyber Security Service to tional Conference Proceeding Series, 28–41.
Prevent Attack on Smart Home Infrastructure. SSRN 28. Sovacool, B. K., & Furszyfer Del Rio, D. D.
Electronic Journal, 1(11), 5809–5813. (2020). Smart home technologies in Europe: A crit-
19. Lavanya, N and Malarvizhi, T. (2008). Risk ical review of concepts, benefits, risks, and policies.
analysis and management a vital key to effective proj- Renewable and Sustainable Energy Reviews, 120(May
ect management. PMI Global Congress Proceedings. 2019), 109663.
20. Lin, H., & Bergmann, N. W. (2016). IoT pri- 29. Wongvises, C., Khurat, A., Fall, D., & Kashi-
vacy and security challenges for smart home environ- hara, S. (2017). Fault tree analysis-based risk quanti-
ments. Information (Switzerland), 7(3). fication of smart homes. Proceeding of 2017 2nd In-
21. Mantas, G., Lymberopoulos, D., & Komninos, ternational Conference on Information Technology,
N. (2010). Security in a smart home environment. INCIT 2017, 2018-Janua, 1–6.
Wireless Technologies for Ambient Assisted Living 30. Zeng, E., & Roesner, F. (2019). Understand-
and Healthcare: Systems and Applications, 170–191. ing and improving security and privacy in multi-user
https://doi.org/10.4018/978-1-61520-805-0.ch010 smart homes: A design exploration and in-home user
22. Nagarkar, S. (2019). Evaluating Privacy and study. Proceedings of the 28th USENIX Security Sym-
Security Threats in IoT- based Smart Home Environ- posium, 159–176.

Issue 24. November 2022 | Cardiometry | 409

You might also like