ZTE Communications ›› 2015, Vol. 13 ›› Issue (3): 6-12.DOI: 10.3969/j.issn.1673-5188.2015.03.002

• Special Topic • Previous Articles     Next Articles

A Solution-Based Analysis of Attack Vectors on Smart Home Systems

Andreas Brauchli, Depeng Li   

  1. Department of Information and Computer Sciences, University of Hawaii at Manoa, HI 96822, USA
  • Received:2015-04-26 Online:2015-09-25 Published:2015-09-25
  • About author:Andreas Brauchli (andreasb@hawaii.edu) received his MS in Computer Sciences from the University of Hawaii at Manoa, USA (UHM) and his B.Sc. C. S. from the Federal Institute of Technology in Zurich, Switzerland (ETHZ). He is employed as Mobile Software Engineer at Sensirion and previously interned at AIZO where he worked on digitalSTROM smart home applications. His research position at the University of Hawaii focused on privacy and security in multiple domains, amongst others, he worked on the AllNet delay tolerant secure networking protocol. His interests lay in the fields of Open Source Software and the vast areas of security and privacy around the digitally connected life.,br/> Depeng Li (depengli@hawaii.edu) obtained his PhD in computer science from Dalhousie University, Canada. He received his BS and Master Degree in Computer Science from Shandong University, Jinan, China. He is currently an Assistant Professor in Department of Information and Computer Sciences (ICS) at University of Hawaii at Manoa (UHM). Before that, he had been worked in RIM (Blackberry) in Ottawa, Canada and Microsoft, Redmond, US to release Blackberry smart phone and Windows 7, respectively. He had also been worked as Post-Doc researcher for MIT and Masdar Institute cyber security project. His research interests are in security, privacy, and applied cryptography. His research projects span across areas such as Internet of Things, smart grids, mobile Health-tech, aerospace safety and physical-human -cyber triad. He had published around 40 papers at some famous journals and conferences.

A Solution-Based Analysis of Attack Vectors on Smart Home Systems

Andreas Brauchli, Depeng Li   

  1. Department of Information and Computer Sciences, University of Hawaii at Manoa, HI 96822, USA
  • 作者简介:Andreas Brauchli (andreasb@hawaii.edu) received his MS in Computer Sciences from the University of Hawaii at Manoa, USA (UHM) and his B.Sc. C. S. from the Federal Institute of Technology in Zurich, Switzerland (ETHZ). He is employed as Mobile Software Engineer at Sensirion and previously interned at AIZO where he worked on digitalSTROM smart home applications. His research position at the University of Hawaii focused on privacy and security in multiple domains, amongst others, he worked on the AllNet delay tolerant secure networking protocol. His interests lay in the fields of Open Source Software and the vast areas of security and privacy around the digitally connected life.,br/> Depeng Li (depengli@hawaii.edu) obtained his PhD in computer science from Dalhousie University, Canada. He received his BS and Master Degree in Computer Science from Shandong University, Jinan, China. He is currently an Assistant Professor in Department of Information and Computer Sciences (ICS) at University of Hawaii at Manoa (UHM). Before that, he had been worked in RIM (Blackberry) in Ottawa, Canada and Microsoft, Redmond, US to release Blackberry smart phone and Windows 7, respectively. He had also been worked as Post-Doc researcher for MIT and Masdar Institute cyber security project. His research interests are in security, privacy, and applied cryptography. His research projects span across areas such as Internet of Things, smart grids, mobile Health-tech, aerospace safety and physical-human -cyber triad. He had published around 40 papers at some famous journals and conferences.

Abstract: The development and wider adoption of smart home technology also created an increased requirement for safe and secure smart home environments with guaranteed privacy constraints. In this paper, a short survey of privacy and security in the more broad smart-world context is first presented. The main contribution is then to analyze and rank attack vectors or entry points into a smart home system and propose solutions to remedy or diminish the risk of compromised security or privacy. Further, the usability impacts resulting from the proposed solutions are evaluated. The smart home system used for the analysis in this paper is a digitalSTROM installation, a home-automation solution that is quickly gaining popularity in central Europe, the findings, however, aim to be as solution independent as possible.

Key words: digitalSTROM, smart home systems(SHS), digitalSTROM server(dSS)

摘要: The development and wider adoption of smart home technology also created an increased requirement for safe and secure smart home environments with guaranteed privacy constraints. In this paper, a short survey of privacy and security in the more broad smart-world context is first presented. The main contribution is then to analyze and rank attack vectors or entry points into a smart home system and propose solutions to remedy or diminish the risk of compromised security or privacy. Further, the usability impacts resulting from the proposed solutions are evaluated. The smart home system used for the analysis in this paper is a digitalSTROM installation, a home-automation solution that is quickly gaining popularity in central Europe, the findings, however, aim to be as solution independent as possible.

关键词: digitalSTROM, smart home systems(SHS), digitalSTROM server(dSS)