Autors: Nikolova P., Tsochev, G. R.
Title: Security Vulnerabilities of Smart Home: A Case Study of the Smart Plug
Keywords:

Abstract: The home, as a physical dimension, has been likened to a place of security and control, of domestic practices and identity. On the other hand, smart homes are often presented narrowly in technical or functional terms because of their ability to improve comfort, convenience, energy management and security. Smart home research, which addresses the issues of control and security, aims to improve the usability of smart home technologies and remove barriers to wider adoption. This article explains the use of two common attacks for making disturbance in smart plug working plan, which can lead to his inoperability. Penetration test results are presented.

References

  1. Dineva, K.; Atanasova, T. Security in IoT Systems. In Proceedings of the XIX International Multidisciplinary Scientific GeoConference SGEM, Vienna, Austria, 9-12 December 2019; Volume 19, pp. 576-577.
  2. R. Miltchev and N. Chehlarova, "Development of digital competencies and skills in the field of use of cloud services and electronic communication", Science Engineering & Education, vol. 5, no. 1, pp. 41-50, 2020, [online] Available: https://mmu2.uctm.edu/see/node/jsee2020-1/7_20-07_p_41-50.pdf, ISSN 2534-8515
  3. V. Stefanova-Stoyanova, K. Stoyanov and P. Danov, "Comparison Of Architectural Models Of IoT Systems - Advantages And Disadvantages," 2021 XXX International Scientific Conference Electronics (ET), Sozopol, Bulgaria, 2021, pp. 1-5, doi: 10.1109/ET52713.2021.9579948.
  4. M. Ali, Smart Home Security: Security and Vulnerabilities, 2022, [online] Available: https://www.wevolver.com/article/smart-home-security-security-and-vulnerabilities
  5. Юг Times, Как «умный дом» может восстать против собственного хозяина, 2020, [online] Available: https://yugtimes.com/news/59448/
  6. https://lenta.ru/news/2021/10/20/domofon/
  7. https://iz.ru/1025217/elena-motrenko/khaker-vashemu-domu-grozit-li-umnomu-zhiliu-kiberataka
  8. P. Borovska, D. Ivanova; In silico knowledge data discovery in the context of IoT ecosystem security issues. AIP Conference Proceedings 8 March 2021; 2333 (1): 030004. https://doi.org/10.1063/5.0043737
  9. https://besto.bg/naj-dobri-smart-kontakti/
  10. Pazaruvai, 2023, Available: https://elektricheski-kontakt.pazaruvaj.com/
  11. ESP-IDF Programing Guide, https://docs.espressif.com/projects/esp-idf/en/latest/esp32/apireference/network/esp_smartconfig.html
  12. https://github.com/tuanpmt/iot-for-beginners-book/blob/master/doc/05-wifi-config/01-smartconfig.en.adoc
  13. Aspencore Network, Learn how to turn an ESP8266 into a smart home device, 2020, Available: https://iot.eetimes.com/learn-how-to-turn-an-esp8266-into-a-smart-home-device/
  14. Al. Hewko, STRIDE Threat Modeling: What You Need to Know, 2021, Available: https://www.softwaresecured.com/stride-threat-modeling/
  15. What is OWASP? What is the OWASP Top 10?, Available: https://www.cloudflare.com/learning/security/threats/owasp-top-10/
  16. M. Nawir, A. Amir, N. Yaakob and O. B. Lynn, "Internet of Things (IoT): Taxonomy of security attacks," 2016 3rd International Conference on Electronic Design (ICED), Phuket, Thailand, 2016, pp. 321-326, doi: 10.1109/ICED.2016.7804660.
  17. Apthorpe, N., Reisman, D., Sundaresan, S., Narayanan, A., & Feamster, N. (2017). Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. arXiv preprint arXiv:1708.05044.
  18. Abdullah, T. A., Ali, W., Malebary, S., & Ahmed, A. A. (2019). A review of cyber security challenges attacks and solutions for Internet of Things based smart home. Int. J. Comput. Sci. Netw. Secur, 19(9), 139.
  19. Andrade, R. O., Ortiz-Garcés, I., & Cazares, M. (2020, July). Cybersecurity attacks on Smart Home during Covid-19 pandemic. In 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) (pp. 398-404). IEEE.
  20. Heartfield, R., Loukas, G., Budimir, S., Bezemskij, A., Fontaine, J. R., Filippoupolitis, A., & Roesch, E. (2018). A taxonomy of cyber-physical threats and impact in the smart home. Computers & Security, 78, 398-428.
  21. Obaid, A. J. (2021). Assessment of smart home assistants as an IoT. International Journal of Computations, Information and Manufacturing (IJCIM), 1(1).
  22. Demertzi, V., Demertzis, S., & Demertzis, K. (2023). An Overview of Cyber Threats, Attacks and Countermeasures on the Primary Domains of Smart Cities. Applied Sciences, 13(2), 790.

Issue

AIP Conference Proceedings, vol. 3182, 2025, United States, https://doi.org/10.1063/5.0246135

Вид: публикация в международен форум, публикация в издание с импакт фактор, публикация в реферирано издание, индексирана в Scopus