Smart homes under siege: Assessing the robustness of physical security against wireless network attacks

Ashley Allen, Alexios Mylonas, Stilianos Vidalis, Dimitris Gritzalis

Research output: Contribution to journalArticlepeer-review

Abstract

Nowadays domestic smart security devices, such as smart locks, smart doorbells, and security cameras, are becoming increasingly popular with users, due to their ease of use, convenience, and declining prices. Unlike conventional non-smart security devices, such as alarms and locks, performance standards for smart security devices, such as the British TS 621, are not easily understandable by end users due to the technical language employed. Users also have very few sources of unbiased information regarding product performance in real world conditions and protection against attacks from cyber attacker-burglars and, as a result, tend to take manufacturer claims at face value. This means that, as this work proves, users may be exposed to threats, such as theft, impersonation (should an attacker steal their credentials), and even physical injury, if the device fails and is used to prevent access to hazardous environments. As such, this paper deploys several attacks using popular wireless attack vectors (i.e., 433MHz radio, Bluetooth, and RFID) against domestic smart security devices to assess the protection offered against a cyber attacker-burglar. Our results suggest that users are open to considerable cyber physical attacks, irrespective if they use lesser known (i.e., no name) or branded smart security devices, due to the poor security offered by these devices.
Original languageEnglish
Article number103687
JournalComputers and Security
Volume139
Early online date28 Dec 2023
DOIs
Publication statusE-pub ahead of print - 28 Dec 2023

Keywords

  • Bluetooth
  • Cybersecurity
  • IoT
  • Physical security
  • RFID
  • Smart home
  • Smart locks

Fingerprint

Dive into the research topics of 'Smart homes under siege: Assessing the robustness of physical security against wireless network attacks'. Together they form a unique fingerprint.

Cite this