In: Computer Science
Security concerns and attacks in smart homes:
An estimated 80% of IoT devices are unprotected to a wide range of attacks. Clearly, connecting traditionally stand-alone or independent smart devices such as lights, appliances and locks introduces numerous cyber security risks. Common cyber security threats and attacks against smart home devices include:
How to organize work of security investigators?
Securing Smart Homes:
Connected smart home devices should be protected by a complete IoT security solution such as device to cloud that does not disrupt or derange a Service provider or OEMs profitability or time to market.
1. Secure boot: Secure boot utilizes or uses cryptographic code signing techniques, make sure that a device only executes code generated by the device or another trusted party. By using of secure boot technology prevents hackers from replacing firmware with malicious or poisoness versions, thereby preventing attacks.
2. Mutual authentication: Every time a smart home device connects to the network it should be authenticated or verified before receiving or transmitting data. Cryptographic algorithms involving symmetric keys or asymmetric keys can be utilized or used for two-way authentication.
3. Secure communication (Encryption): Protecting data in transit between a device and its service infrastructure (the cloud). Encryption ensures that only those with a secret decryption key can access transmitted data.
4. Security monitoring and analysis: Captures oe express data on the overall state of the system, including endpoint devices and connectivity traffic. This data is then analyzed to detect possible security breaches or potential system threats. Once detected, a broad range of actions formulated in the context of an overall system security policy should be executed, such as quarantining devices based on anomalous behavior.
5. Security lifecycle management: The lifecycle management feature allows service providers and OEMs to control the security aspects of IoT devices when in operation. Rapid over the air (OTA) device key(s) replacement during cyber disaster recovery ensures minimal service disruption.
What are the potential sources of data to focus on? Some possible sources of data in smart homes?
1. Track consumer behaviour
2. Improve customer experience and engagement