Cyber-enabled burglary of smart homes

被引:8
|
作者
Hodges, Duncan [1 ]
机构
[1] Cranfield Univ, Ctr Elect Warfare Informat & Cyber, Cranfield Def & Secur, Def Acad United Kingdom, Shrivenham SN6 8LA, England
关键词
Smart home; Cybercrime; Burglary; IoT; Physical security; RESIDENTIAL BURGLARY; TARGET SELECTION; SECURITY; IMPACT; TECHNOLOGIES; TERRORISM; INTERNET; RISKS; STATE;
D O I
10.1016/j.cose.2021.102418
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last few years, there has been a steady increase in smart home technology's pervasiveness, to the degree where consumer IoT is part of many homes. As our homes become complex cyber-physical spaces, the risk to our physical security from attacks originating in cyberspace becomes much more significant. Within the literature, there is much discussion about the technical vulnerabilities within the smart home. However, this is often not linked to a rich understanding of how an attacker could exploit them. In this paper, we focus on residential burglary and develop a rich understanding of the process by which residential burglary is committed and the effect of the smart home on this process. By combining two areas of the academic literature, residential burglary and smart-home security, this paper provides an academically grounded discussion that places the nascent vulnerabilities associated with the smart-home into the context of the process by which burglary is committed. The commission of residential burglary is a complex decision-making process, which the public often simplifies into planned or unplanned crimes; this is a dangerous oversimplification. The analysis identifies some increased risk during the target selection stage phase. However, in the short term, residential burglars are unlikely to exploit smart home technology routinely. (c) 2021 Elsevier Ltd. All rights reserved.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Building Multimedia Artifacts Using a Cyber-enabled Video Repository: The VMCAnalytic
    Hmelo-Silver, Cindy E.
    Maher, Carolyn A.
    Palius, Marjory F.
    Sigley, Robert
    Alston, Alice
    Agnew, Grace
    Mills, Chad
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 3078 - 3087
  • [42] Hybrid Cloud Based Cyber-enabled Ship Control and Management System
    Qiu, Bohua
    Zhang, Yu
    Wei, Muheng
    Li, Yongjie
    Wang, Yue
    2018 IEEE INTERNATIONAL CONFERENCE ON PROGNOSTICS AND HEALTH MANAGEMENT (ICPHM), 2018,
  • [43] Dissemination of Microprocessor Courses through Classroom and Interactive Cyber-Enabled Technologies
    Hsiung, Steve C.
    Ritz, John M.
    Yaprak, Ece
    Stout, Thomas B.
    Jones, Richard L.
    2014 ASEE ANNUAL CONFERENCE, 2014,
  • [44] Fault Detector and Switch Placement in Cyber-Enabled Power Distribution Network
    Kapourchali, Mohammad Heidari
    Sepehry, Mojtaba
    Aravinthan, Visvakumar
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (02) : 980 - 992
  • [45] Denial of Service Attacks and Mitigation for Stability in Cyber-Enabled Power Grid
    Srikantha, Pirathayini
    Kundur, Deepa
    2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), 2015,
  • [46] Mapping Cyber-Enabled Crime: Understanding Police Investigations and Prosecutions of Cyberstalking
    O'Shea, Brianna
    Asquith, Nicole L.
    Prichard, Jeremy
    INTERNATIONAL JOURNAL FOR CRIME JUSTICE AND SOCIAL DEMOCRACY, 2022, 11 (04) : 25 - 39
  • [47] NSF's Activities in Cyber-enabled Energy Systems Research and Education
    Niebur, Dagmar
    IEEE POWER AND ENERGY SOCIETY GENERAL MEETING 2010, 2010,
  • [48] GeoGame analytics - A cyber-enabled petri dish for geographic modeling and simulation
    Ahlqvist, Ola
    Khodke, Nayan
    Ramnath, Rajiv
    COMPUTERS ENVIRONMENT AND URBAN SYSTEMS, 2018, 67 : 1 - 8
  • [49] Denial of Service Attacks and Mitigation for Stability in Cyber-Enabled Power Grid
    Srikantha, Pirathayini
    Kundur, Deepa
    2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), 2015,
  • [50] A socio-technical perspective to counter cyber-enabled industrial espionage
    Moufida Sadok
    Christine Welch
    Peter Bednar
    Security Journal, 2020, 33 : 27 - 42