Scrutinizing Implementations of Smart Home Integrations

被引:8
|
作者
Mahadewa, Kulani [3 ]
Wang, Kailong [3 ]
Bai, Guangdong [5 ]
Shi, Ling [4 ]
Liu, Yan [6 ]
Dong, Jin Song [1 ,2 ]
Liang, Zhenkai [3 ]
机构
[1] Natl Univ Singapore, Sch Comp, Singapore, Singapore
[2] Griffith Univ, Nathan, Qld 4111, Australia
[3] Natl Univ Singapore, Dept Comp Sci, Singapore, Singapore
[4] Natl Univ Singapore, Singapore, Singapore
[5] Univ Queensland, Brisbane, Qld, Australia
[6] Ant Financial, Hangzhou 310000, Peoples R China
基金
新加坡国家研究基金会;
关键词
Network security; Smart homes; Zigbee; Protocols; Authentication; !text type='Java']Java[!/text; Wireless fidelity; Internet of Things; IoT security; smart home; specification extraction; program analysis; SECURITY;
D O I
10.1109/TSE.2019.2960690
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A key feature of the booming smart home is the integration of a wide assortment of technologies, including various standards, proprietary communication protocols and heterogeneous platforms. Due to customization, unsatisfied assumptions and incompatibility in the integration, critical security vulnerabilities are likely to be introduced by the integration. Hence, this work addresses the security problems in smart home systems from an integration perspective, as a complement to numerous studies that focus on the analysis of individual techniques. We propose HomeScan, an approach that examines the security of the implementations of smart home systems. It extracts the abstract specification of application-layer protocols and internal behaviors of entities, so that it is able to conduct an end-to-end security analysis against various attack models. Applying HomeScan on three extensively-used smart home systems, we have found twelve non-trivial security issues, which may lead to unauthorized remote control and credential leakage.
引用
收藏
页码:2667 / 2683
页数:17
相关论文
共 50 条
  • [41] A secure authentication scheme for IoT application in smart home
    Pankaj Kumar
    Lokesh Chouhan
    Peer-to-Peer Networking and Applications, 2021, 14 : 420 - 438
  • [42] A Review on ZigBee Security Enhancement in Smart Home Environment
    Bin Karnain, Md. Azmi
    Bin Zakaria, Zahriladha
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 21 - 24
  • [43] Making Effective Home Security Available to Everyone - Towards Smart Home Security Communities
    Koehler, Marcus
    Wortmann, Felix
    INTERNET OF THINGS: IOT INFRASTRUCTURES, PT II, 2015, 151 : 312 - 317
  • [44] AIoT Smart Home via Autonomous LLM Agents
    Rivkin, Dmitriy
    Hogan, Francois
    Feriani, Amal
    Konar, Abhisek
    Sigal, Adam
    Liu, Xue
    Dudek, Gregory
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (03): : 2458 - 2472
  • [45] Is anyone home? A critical review of occupant-centric smart HVAC controls implementations in residential buildings
    Stopps, Helen
    Huchuk, Brent
    Touchie, Marianne F.
    O 'Brien, William
    BUILDING AND ENVIRONMENT, 2021, 187
  • [46] Deep Reinforcement Learning for Smart Home Energy Management
    Yu, Liang
    Xie, Weiwei
    Xie, Di
    Zou, Yulong
    Zhang, Dengyin
    Sun, Zhixin
    Zhang, Linghua
    Zhang, Yue
    Jiang, Tao
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 2751 - 2762
  • [47] Context-Rich Privacy Leakage Analysis Through Inferring Apps in Smart Home IoT
    Luo, Yuan
    Cheng, Long
    Hu, Hongxin
    Peng, Guojun
    Yao, Danfeng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04) : 2736 - 2750
  • [48] Anonymous Secure Framework in Connected Smart Home Environments
    Kumar, Pardeep
    Braeken, An
    Gurtov, Andrei
    Iinatti, Jari
    Ha, Phuong Hoai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) : 968 - 979
  • [49] Security Technology of Smart Home Based on Internet of Things
    Xu, Zhi-fang
    Zhu, Xun
    Gui, Lin
    INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL AND AUTOMATION ENGINEERING (ECAE 2013), 2013, : 536 - 540
  • [50] Smart Home System Design Based on Internet of Things
    Liu, Rui
    Ge, Yongqi
    2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND EDUCATION (ICCSE 2017), 2017, : 444 - 448