Security Analysis of Smart Home Based on Life Cycle

被引:0
|
作者
Mao, Yuhang [1 ,2 ]
Li, Xuejun [1 ]
Jia, Yan [1 ,2 ]
Zhao, Shangru [1 ,2 ]
Zhang, Yuqing [1 ,2 ]
机构
[1] Xidan Univ, Sch Cyber Engn, Xian, Peoples R China
[2] Univ Chinese Acad Sci, Natl Comp Network Intrus Protect Ctr, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
IoT; Smart Home; Life Cycle; Traffic Analysis; Security and Privacy Introduction;
D O I
10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00261
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the rapid development of the Internet of Things (IoT) technology, security and privacy issues in the smart home have become the focus of extensive research. However, due to the differences in smart home solutions, especially the complex communication protocols and the wide variety of IoT devices, it is difficult for security researchers to systematically and comprehensively study the security of smart home. In this paper, we propose a novel security analysis method based on the life cycle of smart home, including the complete process of the user using IoT devices in smart home scenario, and take user, samrt device and IoT cloud as the research object. Moreover, in order to figure out the life cycle of smart home from different manufacturers, we propose a tool, called IoTCap (IoT Capture), to study the security and privacy issues of the smart home. The fundamental approach used in this tool is to capture IP-layer data packets sent and received by smart appliance on the user's mobile phone, and to analyze the contents of the data packets. Using this tool to recover the workflow and interaction process of the smart home, we further analyze security risks at all stages of the life cycle, including identity authentication, access control, protocol security, and privacy protection. The experimental results have shown that the method is feasible. We believe that this tool will be the basis of a general automation framework for analyzing the security and privacy of smart home.
引用
收藏
页码:1444 / 1449
页数:6
相关论文
共 50 条
  • [1] ISEE Smart Home (ISH): Smart video analysis for home security
    Zhang, Junge
    Shan, Yanhu
    Huang, Kaiqi
    [J]. NEUROCOMPUTING, 2015, 149 : 752 - 766
  • [2] Security Analysis of Smart Home Implementations
    Mahadewa, Kulani
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2018, 2018, 11232 : 450 - 454
  • [3] Analysis of Security Attacks in a Smart Home Networks
    Saxena, Utkarsh
    Sodhi, J. S.
    Singh, Yaduveer
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 431 - 436
  • [4] Security Analysis of Emerging Smart Home Applications
    Fernandes, Earlence
    Jung, Jaeyeon
    Prakash, Atul
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 636 - 654
  • [5] IoT Based Smart Security and Home Automation
    Somani, Shradha
    Solunke, Parikshit
    Oke, Shaunak
    Medhi, Parth
    Laturkar, P. P.
    [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [6] Security Approach on MQTT based Smart Home
    Biju, Sofia
    Shekokar, N. M.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 1106 - 1114
  • [7] A Location based security implementation in Smart Home
    Manish, T., I
    [J]. HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 1007 - 1011
  • [8] IoT based Smart home : Security Aspects and security architecture
    Ray, Abhay Kumar
    Bagwari, Ashish
    [J]. 2020 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2020), 2020, : 218 - 222
  • [9] Deep learning for smart home security systems: CNN-based home security
    Balasubramanian, M.
    Kakade, Kiran Shrimant
    Mane, Sulakshana B.
    Anand, Sujatha Jamuna
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (04) : 451 - 463
  • [10] Security technologies based on home gateway for making smart home secure
    Kim, Geon Woo
    Lee, Deok Gyu
    Han, Jong Wook
    Kim, Sang Wook
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 124 - +