Cyber security of smart homes: development of a reference architecture for attack surface analysis
Cyber security of smart homes: development of a reference architecture for attack surface analysis
- Author(s): K. Ghirardello ; C. Maple ; D. Ng ; P. Kearney
- DOI: 10.1049/cp.2018.0045
For access to this article, please select a purchase option:
Buy conference paper PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Living in the Internet of Things: Cybersecurity of the IoT - 2018 — Recommend this title to your library
Thank you
Your recommendation has been sent to your librarian.
- Author(s): K. Ghirardello ; C. Maple ; D. Ng ; P. Kearney Source: Living in the Internet of Things: Cybersecurity of the IoT - 2018, 2018 page (10 pp.)
- Conference: Living in the Internet of Things: Cybersecurity of the IoT - 2018
- DOI: 10.1049/cp.2018.0045
- ISBN: 978-1-78561-843-7
- Location: London, UK
- Conference date: 28-29 March 2018
- Format: PDF
Recent advances in pervasive computing have caused a rapid growth of the Smart Home market, where a number of otherwise mundane pieces of technology are capable of connecting to the Internet and interacting with other similar devices. However, with the lack of a commonly adopted set of guidelines, several IT companies are producing smart devices with their own proprietary standards, leading to highly heterogeneous Smart Home systems in which the interoperability of the present elements is not always implemented in the most straightforward manner. As such, understanding the cyber risk of these cyber-physical systems beyond the individual devices has become an almost intractable problem. This paper tackles this issue by introducing a Smart Home reference architecture which facilitates security analysis. Being composed by three viewpoints, it gives a high-level description of the various functions and components needed in a domestic IoT device and network. Furthermore, this document demonstrates how the architecture can be used to determine the various attack surfaces of a home automation system from which its key vulnerabilities can be determined.
Inspec keywords: open systems; Internet of Things; home automation; security of data
Subjects: Mobile, ubiquitous and pervasive computing; Data security; Automated buildings
Related content
content/conferences/10.1049/cp.2018.0045
pub_keyword,iet_inspecKeyword,pub_concept
6
6