Skip to main content

Securing Smart Homes

  • Conference paper
  • First Online:
  • 616 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1062))

Abstract

Devices in people’s homes increasingly depend on software and hardware components. They interoperate with other devices wirelessly and through the Internet. The sensitive nature of some of their data, their increasing interoperability puts their security at the forefront. In this paper we will show smart homes can resiliently be secured by varying functionality, exposure and authentication. We will demonstrate these mechanisms on simple smart home situations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. BBC: ‘Smart’ home devices used as weapons in website attack, BBC Technology, 22 October 2016. http://www.bbc.co.uk/news/technology-37738823

  2. Bilton, N.: Pitfalls of the connected home. The New York Times, 16 October 2015

    Google Scholar 

  3. Biro, M., Mashkoor, A., Sametinger, J., Seker, R. (eds.): Software safety and security risk mitigation in cyber-physical systems. IEEE Softw. 35(1), 24–29 (2018)

    Google Scholar 

  4. Denning, T., Kohno, T., Levy, H.M.: Computer security and the modern home. Commun. ACM 56(1), 94–103 (2013)

    Article  Google Scholar 

  5. Doan, T.T., Safavi-Naini, R., Li, S., Avizheh, S., Venkateswarlu K., M., Fong, P.W.L.: Towards a resilient smart home. In: Proceedings of the 2018 Workshop on IoT Security and Privacy - IoT S&P 2018, Budapest, Hungary, pp. 15–21 (2018). https://dl.acm.org/citation.cfm?id=3229570

  6. Eichelberger, F.: Using software defined radio to attack “smart home” systems. SANS Intitute (2015). https://www.sans.org/reading-room/whitepapers/threats/software-defined-radio-attack-smart-home-systems-35922

  7. McGraw, G.: Software security. IEEE Secur. Priv. 2(2), 80–83 (2004). https://doi.org/10.1109/MSECP.2004.1281254

    Article  Google Scholar 

  8. Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: Proceedings of 37th IEEE Symposium on Security and Privacy, May 2016

    Google Scholar 

  9. Fisher, D.: Pair of bugs open honeywell home controllers up to easy hacks. https://threatpost.com/pair-of-bugs-open-honeywell-home-controllers-up-to-easy-hacks/113965/

  10. c’t press release: Weak Security In Loxone Smart Home System Lets Burglars Walk Right In, 31 August 2016. http://heise-gruppe.de/-3308694

  11. Komninos, N., Lymberopoulos, D., Mantas, G.: Chapter 10 - Security in smart home environment. In: Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications, Medical Information Science Reference, USA, pp. 170–191 (2011)

    Google Scholar 

  12. The MITRE Corporation: Common Weakness Enumeration, A Community-Developed Dictionalry of Software Weakness Types. https://cwe.mitre.org

  13. The MITRE Corporation: Common Vulnerabilities and Exposures, The Standard for Information Security Vulnerability Names. https://cve.mitre.org

  14. Pretz, K.: IEEE provides the keys to a smarter home. Special Report on Smart Homes, 01 December 2015. http://theinstitute.ieee.org/technology-focus/technology-topic/ieee-provides-the-keys-to-a-smarter-home

  15. ur Rehman, S., Gruhn, V.: An approach to secure smart homes in cyber-physical systems/Internet-of-Things. In: Fifth International Conference on Software Defined Systems (SDS), Barcelona, pp. 126–129 (2018)

    Google Scholar 

  16. Sametinger, J., Rozenblit, J.: Security scores for medical devices. In: SmartMedDev 2016 - Smart Medical Devices - From Lab to Clinical Practice, in Proceedings of the 9th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2016) - Volume 5: HEALTHINF, Rome, Italy, 21–23 February 2016, pp. 533–541. ISBN 978-989-758-170-0

    Google Scholar 

  17. Sametinger, J., Steinwender, C.: Resilient medical device security. In: International Conference on Computational Science and Computational Intelligence, Symposium on Health Informatics and Medical Systems (CSCI-ISHI), NV, USA, Las Vegas, pp. 1775–1778 (2017)

    Google Scholar 

  18. Sasse, M.A., Smith, M. (eds.): The security-usability tradeoff myth. IEEE Secur. Priv. 14(5), 11–13 (2016)

    Google Scholar 

Download references

Acknowledgement

This work has partially been supported by the LIT Secure and Correct Systems Lab funded by the State of Upper Austria.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Johannes Sametinger .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sametinger, J. (2019). Securing Smart Homes. In: Anderst-Kotsis, G., et al. Database and Expert Systems Applications. DEXA 2019. Communications in Computer and Information Science, vol 1062. Springer, Cham. https://doi.org/10.1007/978-3-030-27684-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-27684-3_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-27683-6

  • Online ISBN: 978-3-030-27684-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics