TY - GEN
T1 - 'Is your Smart Home a Secure Home?' - Analysis of Smart Home Breaches and an Approach for Vulnerability Analysis and Device Isolation
AU - Dorai, Gokila
AU - Williams, Eleason A.
AU - Chi, Hongmei
AU - Alo, Richard A.
N1 - Publisher Copyright:
© 2020 IEEE.
PY - 2020/6
Y1 - 2020/6
N2 - Smart devices are becoming quite popular and many homes all around the world have started using such devices. Smart devices are used for various purposes: home security, entertainment, news, streaming, HVAC, medical healthcare, etc. The cost of these devices vary according to their functionality, brand and configuration. However, there is one thing that is common among these devices in a home setting, that is, all these devices are connected to the home's Wi-Fi network. This could mean that if a security vulnerability exists in even one of the devices in a smart home setting especially in a smart medical home, it could lead to serious repercussions. Current state-of-the-art solution to this problem is to purchase vulnerability scanning software or to deploy packet sniffing network-based tools. The drawback is that those tools can be expensive and on the other hand, most people are unaware of the existence of security threats which could arise from vulnerabilities that exist in smart home devices. In this work, we aim to explore the existence of vulnerabilities in an experimental smart home setting using various connected devices and to propose a set of solutions to isolate vulnerable devices in order to secure the smart home.
AB - Smart devices are becoming quite popular and many homes all around the world have started using such devices. Smart devices are used for various purposes: home security, entertainment, news, streaming, HVAC, medical healthcare, etc. The cost of these devices vary according to their functionality, brand and configuration. However, there is one thing that is common among these devices in a home setting, that is, all these devices are connected to the home's Wi-Fi network. This could mean that if a security vulnerability exists in even one of the devices in a smart home setting especially in a smart medical home, it could lead to serious repercussions. Current state-of-the-art solution to this problem is to purchase vulnerability scanning software or to deploy packet sniffing network-based tools. The drawback is that those tools can be expensive and on the other hand, most people are unaware of the existence of security threats which could arise from vulnerabilities that exist in smart home devices. In this work, we aim to explore the existence of vulnerabilities in an experimental smart home setting using various connected devices and to propose a set of solutions to isolate vulnerable devices in order to secure the smart home.
UR - http://www.scopus.com/inward/record.url?scp=85095596425&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85095596425&partnerID=8YFLogxK
U2 - 10.1109/WF-IoT48130.2020.9221420
DO - 10.1109/WF-IoT48130.2020.9221420
M3 - Conference contribution
AN - SCOPUS:85095596425
T3 - IEEE World Forum on Internet of Things, WF-IoT 2020 - Symposium Proceedings
BT - IEEE World Forum on Internet of Things, WF-IoT 2020 - Symposium Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 6th IEEE World Forum on Internet of Things, WF-IoT 2020
Y2 - 2 June 2020 through 16 June 2020
ER -