Cyber-enabled burglary of smart homes

被引:8
作者
Hodges, Duncan [1 ]
机构
[1] Cranfield Univ, Ctr Elect Warfare Informat & Cyber, Cranfield Def & Secur, Def Acad United Kingdom, Shrivenham SN6 8LA, England
关键词
Smart home; Cybercrime; Burglary; IoT; Physical security; RESIDENTIAL BURGLARY; TARGET SELECTION; SECURITY; IMPACT; TECHNOLOGIES; TERRORISM; INTERNET; RISKS; STATE;
D O I
10.1016/j.cose.2021.102418
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last few years, there has been a steady increase in smart home technology's pervasiveness, to the degree where consumer IoT is part of many homes. As our homes become complex cyber-physical spaces, the risk to our physical security from attacks originating in cyberspace becomes much more significant. Within the literature, there is much discussion about the technical vulnerabilities within the smart home. However, this is often not linked to a rich understanding of how an attacker could exploit them. In this paper, we focus on residential burglary and develop a rich understanding of the process by which residential burglary is committed and the effect of the smart home on this process. By combining two areas of the academic literature, residential burglary and smart-home security, this paper provides an academically grounded discussion that places the nascent vulnerabilities associated with the smart-home into the context of the process by which burglary is committed. The commission of residential burglary is a complex decision-making process, which the public often simplifies into planned or unplanned crimes; this is a dangerous oversimplification. The analysis identifies some increased risk during the target selection stage phase. However, in the short term, residential burglars are unlikely to exploit smart home technology routinely. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 83 条
  • [21] Flatley J., 2016, FOCUS PROPERTY CRIME
  • [22] Gai A, 2018, INT CONF COMP COMMUN
  • [23] Geneiatakis D, 2017, 2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1292, DOI 10.23919/MIPRO.2017.7973622
  • [24] Ghirardello K., 2018, LIVING INTERNET THIN, P1
  • [25] Keeping energy visible? Exploring how householders interact with feedback from smart energy monitors in the longer term
    Hargreaves, Tom
    Nye, Michael
    Burgess, Jacquelin
    [J]. ENERGY POLICY, 2013, 52 : 126 - 134
  • [26] Honey, I Shrunk Your App Security: The State of Android App Hardening
    Haupert, Vincent
    Maier, Dominik
    Schneider, Nicolas
    Kirsch, Julian
    Mueller, Tilo
    [J]. DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2018, 2018, 10885 : 69 - 91
  • [27] A taxonomy of cyber-physical threats and impact in the smart home
    Heartfield, Ryan
    Loukas, George
    Budimir, Sanja
    Bezemskij, Anatolij
    Fontaine, Johnny R. J.
    Filippoupolitis, Augoustinos
    Roesch, Etienne
    [J]. COMPUTERS & SECURITY, 2018, 78 : 398 - 428
  • [28] Systematically Understanding the Cyber Attack Business: A Survey
    Huang, Keman
    Siegel, Michael
    Madnick, Stuart
    [J]. ACM COMPUTING SURVEYS, 2018, 51 (04)
  • [29] A risk analysis of a smart home automation system
    Jacobsson, Andreas
    Boldt, Martin
    Carlsson, Bengt
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 : 719 - 733
  • [30] Victim and perpetrator accounts of interpersonal transgressions: Self-serving or relationship-serving biases?
    Kearns, JN
    Fincham, FD
    [J]. PERSONALITY AND SOCIAL PSYCHOLOGY BULLETIN, 2005, 31 (03) : 321 - 333