| Literature DB >> 29518023 |
Bako Ali1, Ali Ismail Awad2,3.
Abstract
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.Entities:
Keywords: OCTAVE Allegro; security risk assessment; smart homes; the Internet of Things (IoT)
Year: 2018 PMID: 29518023 PMCID: PMC5876893 DOI: 10.3390/s18030817
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1A generic architecture of an IoT system comprises IoT devices, a gateway, and a web server. The figure shows the internal and external sides of the system. The figure was modified from [1].
Figure 2Examples of some controlled environmental services in smart home environments.
Figure 3An IoT system from provider, network, and user perspectives. The figure highlights the points of weakness of the systems corresponding to the IoT layers.
Figure 4OCTAVE Allegro methodology flowchart of the eight steps, which are categorized into four major groups. The figure was excerpted and modified from [42].
Security threats found by performing an information risk assessment in terms of the possible threats associated with information assets.
| Asset ID | Information Asset | Possible Security Threats |
|---|---|---|
| 1 | User credentials | User impersonation |
| Identity and credential theft | ||
| 2 | Mobile personal data and apps | Malicious code injected into apps installed on a phone |
| 3 | Information modification | |
| Information collected by devices | Denial-of-service (DoS) attacks | |
| Device or sensor compromising | ||
| Smart home status information | Information disclosure | |
| Function interruption | ||
| 4 | Smart home structure | Gain access to inventory information to search for a specific device with known vulnerabilities to attack smart homes |
| Inventory information | ||
| 5 | Log information | Gain access to log data and obtain useful information enabling possible attacks on a smart home system |
| 6 | Information transmitted via a gateway | Steal information from packets transmitted via a gateway |
| 7 | Smart home setup information | Information modification |
| 8 | Video feed of surveillance cameras | Control cameras to monitor and spy on users |
| 9 | Location tracking information | Observation of location data traffic |
| 10 | Information resources | Steal private information |
| Make stored media inaccessible due to hardware failure |
Security risks identified by performing the information risk assessment in terms of the possible impacts and the risk score.
| Threat ID | Possible Impacts (Risks) | Risk Scores |
|---|---|---|
| Unauthorized access to the main smart home system | ||
| 1 | Unauthorized execution of operations | 41 |
| Loss of control over smart home system | ||
| Adversary can take photos, record conversations, and track locations | ||
| 2 | Attacker can control the smart phone remotely | 41 |
| Attacker can make calls and access the phone microphone and camera | ||
| Sensor measurements are manipulated to infiltrate the home system | ||
| 3 | Non-presence tracking leads to home break-in | 39 |
| Financial losses | ||
| Attacker identifies the weakest device with known vulnerabilities | ||
| 4 | Attacker takes control of smart home systems | 39 |
| Financial losses | ||
| Attacker finds a way to access the main system | ||
| 5 | Attacker changes the system configuration and adding back doors | 39 |
| Financial losses | ||
| System resources are exhausted via constant self-replication | ||
| 6 | Possibility of bringing the system down, making it ultimately unusable | 39 |
| Possibility of injecting new security vulnerabilities into the system | ||
| Difficulty in setting up the smart home system correctly | ||
| 7 | Misuse of SH systems with the possibility of malfunction | 36 |
| Financial losses | ||
| User privacy violation | ||
| 8 | 34 | |
| Financial losses | ||
| User privacy violation | ||
| 9 | Breaking into the smart home if it is vacant | 34 |
| Financial losses | ||
| User privacy violation | ||
| 10 | Loss of information | 23 |
| Damage to reputation |
Real-world examples related to the identified security threats and risks from different information assets.
| Asset ID | Real-World Examples |
|---|---|
| 1 | An unauthorized individual obtains the necessary credentials and is able to login into the main smart home system. |
| 2 | The legitimate user loses his or her mobile device or it becomes stolen, and then the smart home-related apps are manipulated. The phone application can be manipulated remotely via injecting a malicious code. |
| 3 | An information asset is altered intentionally by malicious individuals to cause the power supply smart meter to show high electricity consumption. |
| Jamming and tampering at the physical layer could prevent sensors from detecting risks such as fire, flood, and unexpected motion. | |
| A compromised motion sensor could be used to determine when there are people at home. | |
| The statuses of door locks and alarm systems could be used to determine when a smart home is occupied. | |
| 4 | Attackers can gain access to this information asset by obtaining unencrypted backup media or via a social engineering attack. |
| 5 | This asset can be obtained if the log data are easily accessible via an insecure channel. |
| 6 | This asset can be obtained if the gateway is not properly secured, e.g., an open Wi-Fi network. The adversary can hijack the Wi-Fi connection, can inject a malicious code, and then takes control over the smart home system. |
| 7 | This asset can be obtained if the information asset is stored as a data file in the smart home system (e.g., a PC) without strong authentication mechanisms. |
| 8 | This asset can be obtained if such devices are outsourced to a non-serious (untrusted) third-party service provider. |
| 9 | This asset can be obtained if such information is sent from the tracking system to a listener device in clear text and is captured by an attacker. |
| 10 | This asset can be found physically or digitally, e.g., on papers, CDs, DVDs, backup media, a PC, communication networks or databases. The information can be accessed by unauthorized people if not stored properly and securely. |
Proposed security threat and risk countermeasures to be applied in IoT-based smart home environments.
| Threat ID | Possible Mitigation Approaches |
|---|---|
| Control access to the system using efficient biometric identifiers [ | |
| 1 | Implement a user awareness program to make users aware of social engineering |
| Implement multi-factor authentication | |
| Avoid using insecure Wi-Fi, which gives hackers access to personal data | |
| 2 | Set up a secure network before using a home automation application |
| Be aware of stolen or lost devices | |
| Use a secure communication channel by utilizing a secure virtual private network (VPN) | |
| 3 | Limit network traffic such that it is accessible only to authorized users |
| Develop a security awareness training program for smart home inhabitants | |
| Use an intrusion detection system (IDS) / intrusion prevention system (IPS) | |
| 4 | Use encryption mechanisms for security data transmission [ |
| Perform frequent data backups to keep copies of sensitive data | |
| Secure the physical locations of installed devices | |
| 5 | Provide secure access to device configuration interfaces |
| Replace the default usability configuration of installed devices | |
| Use commodity hardware and software to collect and examine network traffic [ | |
| 6 | Create backups of the working system’s configurations |
| Always monitor system’s performance, looking for misbehavior incidents | |
| Apply a strong authentication mechanism such as fingerprint authentication [ | |
| 7 | Offer awareness and training programs regarding system security |
| Ensure that system configurations are secure and performed by authentic people | |
| Restrict physical access to devices to only authentic people | |
| 8 | Avoid infrastructure outsourcing to a third-party service provider |
| Modify default device configurations to achieve a better security level | |
| Disable unnecessary location tracking services on mobile devices | |
| 9 | Develop a good understanding of user privacy concerns |
| Track system behavior to identify any suspicious privacy leakage | |
| Use only trusted and authentic networks (wired or wireless) | |
| 10 | Share information carefully and in a restricted manner |
| Use only trusted providers to receive technical support for hardware failures in smart home |
Figure 5Security risks and mitigation approaches are pointed to an actual smart home environment. The floor plan was borrowed from Amazing Architecture [57].