Cyber-enabled burglary of smart homes

被引:8
|
作者
Hodges, Duncan [1 ]
机构
[1] Cranfield Univ, Ctr Elect Warfare Informat & Cyber, Cranfield Def & Secur, Def Acad United Kingdom, Shrivenham SN6 8LA, England
关键词
Smart home; Cybercrime; Burglary; IoT; Physical security; RESIDENTIAL BURGLARY; TARGET SELECTION; SECURITY; IMPACT; TECHNOLOGIES; TERRORISM; INTERNET; RISKS; STATE;
D O I
10.1016/j.cose.2021.102418
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last few years, there has been a steady increase in smart home technology's pervasiveness, to the degree where consumer IoT is part of many homes. As our homes become complex cyber-physical spaces, the risk to our physical security from attacks originating in cyberspace becomes much more significant. Within the literature, there is much discussion about the technical vulnerabilities within the smart home. However, this is often not linked to a rich understanding of how an attacker could exploit them. In this paper, we focus on residential burglary and develop a rich understanding of the process by which residential burglary is committed and the effect of the smart home on this process. By combining two areas of the academic literature, residential burglary and smart-home security, this paper provides an academically grounded discussion that places the nascent vulnerabilities associated with the smart-home into the context of the process by which burglary is committed. The commission of residential burglary is a complex decision-making process, which the public often simplifies into planned or unplanned crimes; this is a dangerous oversimplification. The analysis identifies some increased risk during the target selection stage phase. However, in the short term, residential burglars are unlikely to exploit smart home technology routinely. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Cyber-enabled manufacturing systems for additive manufacturing
    Cooper, Khershed P.
    Wachter, Ralph F.
    RAPID PROTOTYPING JOURNAL, 2014, 20 (05) : 355 - 359
  • [22] Exploring the Needs of Victims of Cyber-dependent and Cyber-enabled Crimes
    Leukfeldt, Eric Rutger
    Notte, R. J.
    Malsch, M.
    VICTIMS & OFFENDERS, 2020, 15 (01) : 60 - 77
  • [23] Issues of Resilience to Cyber-Enabled Psychological and Information Operations
    Mlejnkova, Petra
    VOJENSKE ROZHLEDY-CZECH MILITARY REVIEW, 2022, 31 (01): : 38 - 50
  • [24] The existential threat from cyber-enabled information warfare
    Lin, Herbert
    BULLETIN OF THE ATOMIC SCIENTISTS, 2019, 75 (04) : 187 - 196
  • [25] Cybermatics for Cyberization Towards Cyber-enabled Hyper Worlds
    Ma, Jianhua
    2016 4TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2016), 2016, : 85 - 86
  • [26] Cyber-Enabled Simulations in Nanoscale Science and Engineering INTRODUCTION
    Strachan, Alejandro
    Klimeck, Gerhard
    Lundstrom, Mark
    COMPUTING IN SCIENCE & ENGINEERING, 2010, 12 (02) : 12 - 17
  • [27] Cyber-enabled grids: Shaping future energy systems
    Pong, Philip W. T.
    Annaswamy, Anuradha M.
    Kroposki, Benjamin
    Zhang, Yingchen
    Rajagopal, Ram
    Zussman, Gil
    Poor, H. Vincent
    ADVANCES IN APPLIED ENERGY, 2021, 1
  • [28] A cyber-enabled visual inspection system for rail corrugation
    Li, Qingyong
    Shi, Zhiping
    Zhang, Huayan
    Tan, Yunqiang
    Ren, Shengwei
    Dai, Peng
    Li, Weiyi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 79 : 374 - 382
  • [29] Shipping 4.0: Security Requirements for the Cyber-Enabled Ship
    Kavallieratos, Georgios
    Diamantopoulou, Vasiliki
    Katsikas, Sokratis K.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (10) : 6617 - 6625
  • [30] Chemical education and a future of Cyber-Enabled Chemistry research
    Holme, T
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2005, 229 : U472 - U472