Connected devices in smart homes have control issues

Apr 03, 2014 by Nancy Owano weblog

(Phys.org) —Smart homes are growing smarter. But it all depends on how you define "smart." Smart, as in connected to the Internet, or smart as in a well-planned architecture of intelligent gadgets that can be managed optimally? The Internet of Things can signal a new era of Breaking-into Things. Mundane objects such as fridges could pose security threats as more daily-use objects gain connectivity and go online.

Last month, V3 reported that Jan Neutze, Microsoft director of cyber security policy for Europe, the Middle East and Africa, spoke at CeBIT, saying cyber criminals will shift their hacks away from businesses and instead begin to look at everyday items. "What happens when somebody attacks your refrigerator? Who's going to patch your fridge? Is it the energy company that runs your smartgrid, is it the software company, is it the manufacturer of the device? We're going to have to look at new models of collaboration that have never existed before." he said.

According to a recent report in Communications of the ACM, the publication of the Association for Computing Machinery (ACM), it is not likely the systems can be able to resist being hacked, not without further security considerations.

Smart doorlocks may unlock. Smart webcams may result in pictures posted online. While interactive features of connected devices pose convenience, they may also offer opportunities for abuse. Pranksters may turn lights off and on, but that is not the . Thieves may disable automated doorlocks, or deranged characters can spy on child monitoring cameras.

The ACM publication reported on the paper "The Current State of Access Control for Smart Devices in Homes," by Jaeyeon Jung and Stuart Schechter at Microsoft Research and Blase Ur, a doctoral student at Carnegie Mellon University. The most important devices to secure first, said Jung, were those critical for the physical security of the home, such as door locks and home , followed by devices collecting sensitive information in the home, such as sleep monitors with Web cameras, according to Communications.

The authors discussed today's homes that are kitted out with smart home automation devices with access control features. "Although connected devices and smart homes are now marketed to average consumers, little is known about how access-control systems for these devices fare in the real world," they said. They examined three items in particular, an Internet-connected lighting system, bathroom scale, and electronic door lock..

They found that each had its own "siloed access-control system"referring to how each of the three devices operated within its own silo. They also observed a lack of mechanisms for monitoring access, making it impossible for users to understand who has accessed their devices. Jung and collaborators have been working on a prototype of an auditing interface for connected devices configured as a Web interface, which can also be accessed via smartphone.

Explore further: Cyberattack traced to hacked refrigerator, researchers report

More information: The Current State of Access Control for Smart Devices in Homes, (PDF) cups.cs.cmu.edu/soups/2013/HUPS/HUPS13-BlaseUR.pdf

add to favorites email to friend print save as pdf

Related Stories

'Smart' homes open doors to hackers

Jul 30, 2013

Smart homes that let residents control alarms, locks and more over the internet are opening doors for crooks with hacker skills, according to computer security specialists.

Next up: Smart homes

May 28, 2012

You've got a smartphone and maybe a smart TV, and may have heard that smart refrigerators are in the works. Next up: the smart home.

Recommended for you

US seeks China's help after cyberattack

8 hours ago

The United States is asking China for help as it weighs potential responses to a cyberattack against Sony Pictures Entertainment that the U.S. has blamed on North Korea.

Impoverished North Korea falls back on cyber weapons

Dec 19, 2014

As one of the world's most impoverished powers, North Korea would struggle to match America's military or economic might, but appears to have settled on a relatively cheap method to torment its foe.

Five ways to make your email safer in case of a hack attack

Dec 19, 2014

The Sony hack, the latest in a wave of company security breaches, exposed months of employee emails. Other hacks have given attackers access to sensitive information about a company and its customers, such as credit-card ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.