A taxonomy of cyber-physical threats and impact in the smart home

In the past, home automation was a small market for technology enthusiasts. Interconnectivity between devices was down to the owner’s technical skills and creativity, while security was non-existent or primitive, because cyber threats were also largely non-existent or primitive. This is not the case...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 2018-09, Vol.78, p.398-428
Hauptverfasser: Heartfield, Ryan, Loukas, George, Budimir, Sanja, Bezemskij, Anatolij, Fontaine, Johnny R.J., Filippoupolitis, Avgoustinos, Roesch, Etienne
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 428
container_issue
container_start_page 398
container_title Computers & security
container_volume 78
creator Heartfield, Ryan
Loukas, George
Budimir, Sanja
Bezemskij, Anatolij
Fontaine, Johnny R.J.
Filippoupolitis, Avgoustinos
Roesch, Etienne
description In the past, home automation was a small market for technology enthusiasts. Interconnectivity between devices was down to the owner’s technical skills and creativity, while security was non-existent or primitive, because cyber threats were also largely non-existent or primitive. This is not the case any more. The adoption of Internet of Things technologies, cloud computing, artificial intelligence and an increasingly wide range of sensing and actuation capabilities has led to smart homes that are more practical, but also genuinely attractive targets for cyber attacks. Here, we classify applicable cyber threats according to a novel taxonomy, focusing not only on the attack vectors that can be used, but also the potential impact on the systems and ultimately on the occupants and their domestic life. Utilising the taxonomy, we classify twenty five different smart home attacks, providing further examples of legitimate, yet vulnerable smart home configurations which can lead to second-order attack vectors. We then review existing smart home defence mechanisms and discuss open research problems.
doi_str_mv 10.1016/j.cose.2018.07.011
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2131206403</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404818304875</els_id><sourcerecordid>2131206403</sourcerecordid><originalsourceid>FETCH-LOGICAL-c372t-aa4852e13b25575047d9d8344082bd8907c8b9c9a0d6858ae96413362d36c8ba3</originalsourceid><addsrcrecordid>eNp9kEtLAzEUhYMoWKt_wFXA9Yw3j5lkwE0RX1Bwo-uQSVKaoTOpSSrOvzelrl1dOPecew8fQrcEagKkvR9qE5KrKRBZg6iBkDO0IFLQqqUgz9GimETFgctLdJXSAEBEK-UCrVY4658whXHGYYPN3LtY7bdz8kbvcN5Gp3PCerLYj3ttMvZTUR1Oo44Zb8PortHFRu-Su_mbS_T5_PTx-Fqt31_eHlfryjBBc6U1lw11hPW0aUQDXNjOSsY5SNpb2YEwsu9Mp8G2spHadS0njLXUsrZsNFuiu9PdfQxfB5eyGsIhTuWlooQRCi0HVlz05DIxpBTdRu2jL11nRUAdUalBHVGpIyoFQhVUJfRwCrnS_9u7qJLxbjLO-uhMVjb4_-K_q-BwNQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2131206403</pqid></control><display><type>article</type><title>A taxonomy of cyber-physical threats and impact in the smart home</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Heartfield, Ryan ; Loukas, George ; Budimir, Sanja ; Bezemskij, Anatolij ; Fontaine, Johnny R.J. ; Filippoupolitis, Avgoustinos ; Roesch, Etienne</creator><creatorcontrib>Heartfield, Ryan ; Loukas, George ; Budimir, Sanja ; Bezemskij, Anatolij ; Fontaine, Johnny R.J. ; Filippoupolitis, Avgoustinos ; Roesch, Etienne</creatorcontrib><description>In the past, home automation was a small market for technology enthusiasts. Interconnectivity between devices was down to the owner’s technical skills and creativity, while security was non-existent or primitive, because cyber threats were also largely non-existent or primitive. This is not the case any more. The adoption of Internet of Things technologies, cloud computing, artificial intelligence and an increasingly wide range of sensing and actuation capabilities has led to smart homes that are more practical, but also genuinely attractive targets for cyber attacks. Here, we classify applicable cyber threats according to a novel taxonomy, focusing not only on the attack vectors that can be used, but also the potential impact on the systems and ultimately on the occupants and their domestic life. Utilising the taxonomy, we classify twenty five different smart home attacks, providing further examples of legitimate, yet vulnerable smart home configurations which can lead to second-order attack vectors. We then review existing smart home defence mechanisms and discuss open research problems.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2018.07.011</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Actuation ; Artificial intelligence ; Classification ; Cloud computing ; Cyber crime ; Cyber security ; Cyber-Physical Attacks ; Cybersecurity ; Internet of Things ; IoT ; Privacy ; Smart buildings ; Smart Home ; Smart houses ; Taxonomy</subject><ispartof>Computers &amp; security, 2018-09, Vol.78, p.398-428</ispartof><rights>2018 Elsevier Ltd</rights><rights>Copyright Elsevier Sequoia S.A. Sep 2018</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c372t-aa4852e13b25575047d9d8344082bd8907c8b9c9a0d6858ae96413362d36c8ba3</citedby><cites>FETCH-LOGICAL-c372t-aa4852e13b25575047d9d8344082bd8907c8b9c9a0d6858ae96413362d36c8ba3</cites><orcidid>0000-0003-3559-5182 ; 0000-0002-3708-1540 ; 0000-0002-8913-4173 ; 0000-0002-4110-9112</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.cose.2018.07.011$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3550,27924,27925,45995</link.rule.ids></links><search><creatorcontrib>Heartfield, Ryan</creatorcontrib><creatorcontrib>Loukas, George</creatorcontrib><creatorcontrib>Budimir, Sanja</creatorcontrib><creatorcontrib>Bezemskij, Anatolij</creatorcontrib><creatorcontrib>Fontaine, Johnny R.J.</creatorcontrib><creatorcontrib>Filippoupolitis, Avgoustinos</creatorcontrib><creatorcontrib>Roesch, Etienne</creatorcontrib><title>A taxonomy of cyber-physical threats and impact in the smart home</title><title>Computers &amp; security</title><description>In the past, home automation was a small market for technology enthusiasts. Interconnectivity between devices was down to the owner’s technical skills and creativity, while security was non-existent or primitive, because cyber threats were also largely non-existent or primitive. This is not the case any more. The adoption of Internet of Things technologies, cloud computing, artificial intelligence and an increasingly wide range of sensing and actuation capabilities has led to smart homes that are more practical, but also genuinely attractive targets for cyber attacks. Here, we classify applicable cyber threats according to a novel taxonomy, focusing not only on the attack vectors that can be used, but also the potential impact on the systems and ultimately on the occupants and their domestic life. Utilising the taxonomy, we classify twenty five different smart home attacks, providing further examples of legitimate, yet vulnerable smart home configurations which can lead to second-order attack vectors. We then review existing smart home defence mechanisms and discuss open research problems.</description><subject>Actuation</subject><subject>Artificial intelligence</subject><subject>Classification</subject><subject>Cloud computing</subject><subject>Cyber crime</subject><subject>Cyber security</subject><subject>Cyber-Physical Attacks</subject><subject>Cybersecurity</subject><subject>Internet of Things</subject><subject>IoT</subject><subject>Privacy</subject><subject>Smart buildings</subject><subject>Smart Home</subject><subject>Smart houses</subject><subject>Taxonomy</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><recordid>eNp9kEtLAzEUhYMoWKt_wFXA9Yw3j5lkwE0RX1Bwo-uQSVKaoTOpSSrOvzelrl1dOPecew8fQrcEagKkvR9qE5KrKRBZg6iBkDO0IFLQqqUgz9GimETFgctLdJXSAEBEK-UCrVY4658whXHGYYPN3LtY7bdz8kbvcN5Gp3PCerLYj3ttMvZTUR1Oo44Zb8PortHFRu-Su_mbS_T5_PTx-Fqt31_eHlfryjBBc6U1lw11hPW0aUQDXNjOSsY5SNpb2YEwsu9Mp8G2spHadS0njLXUsrZsNFuiu9PdfQxfB5eyGsIhTuWlooQRCi0HVlz05DIxpBTdRu2jL11nRUAdUalBHVGpIyoFQhVUJfRwCrnS_9u7qJLxbjLO-uhMVjb4_-K_q-BwNQ</recordid><startdate>201809</startdate><enddate>201809</enddate><creator>Heartfield, Ryan</creator><creator>Loukas, George</creator><creator>Budimir, Sanja</creator><creator>Bezemskij, Anatolij</creator><creator>Fontaine, Johnny R.J.</creator><creator>Filippoupolitis, Avgoustinos</creator><creator>Roesch, Etienne</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-3559-5182</orcidid><orcidid>https://orcid.org/0000-0002-3708-1540</orcidid><orcidid>https://orcid.org/0000-0002-8913-4173</orcidid><orcidid>https://orcid.org/0000-0002-4110-9112</orcidid></search><sort><creationdate>201809</creationdate><title>A taxonomy of cyber-physical threats and impact in the smart home</title><author>Heartfield, Ryan ; Loukas, George ; Budimir, Sanja ; Bezemskij, Anatolij ; Fontaine, Johnny R.J. ; Filippoupolitis, Avgoustinos ; Roesch, Etienne</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c372t-aa4852e13b25575047d9d8344082bd8907c8b9c9a0d6858ae96413362d36c8ba3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Actuation</topic><topic>Artificial intelligence</topic><topic>Classification</topic><topic>Cloud computing</topic><topic>Cyber crime</topic><topic>Cyber security</topic><topic>Cyber-Physical Attacks</topic><topic>Cybersecurity</topic><topic>Internet of Things</topic><topic>IoT</topic><topic>Privacy</topic><topic>Smart buildings</topic><topic>Smart Home</topic><topic>Smart houses</topic><topic>Taxonomy</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Heartfield, Ryan</creatorcontrib><creatorcontrib>Loukas, George</creatorcontrib><creatorcontrib>Budimir, Sanja</creatorcontrib><creatorcontrib>Bezemskij, Anatolij</creatorcontrib><creatorcontrib>Fontaine, Johnny R.J.</creatorcontrib><creatorcontrib>Filippoupolitis, Avgoustinos</creatorcontrib><creatorcontrib>Roesch, Etienne</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers &amp; security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Heartfield, Ryan</au><au>Loukas, George</au><au>Budimir, Sanja</au><au>Bezemskij, Anatolij</au><au>Fontaine, Johnny R.J.</au><au>Filippoupolitis, Avgoustinos</au><au>Roesch, Etienne</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A taxonomy of cyber-physical threats and impact in the smart home</atitle><jtitle>Computers &amp; security</jtitle><date>2018-09</date><risdate>2018</risdate><volume>78</volume><spage>398</spage><epage>428</epage><pages>398-428</pages><issn>0167-4048</issn><eissn>1872-6208</eissn><abstract>In the past, home automation was a small market for technology enthusiasts. Interconnectivity between devices was down to the owner’s technical skills and creativity, while security was non-existent or primitive, because cyber threats were also largely non-existent or primitive. This is not the case any more. The adoption of Internet of Things technologies, cloud computing, artificial intelligence and an increasingly wide range of sensing and actuation capabilities has led to smart homes that are more practical, but also genuinely attractive targets for cyber attacks. Here, we classify applicable cyber threats according to a novel taxonomy, focusing not only on the attack vectors that can be used, but also the potential impact on the systems and ultimately on the occupants and their domestic life. Utilising the taxonomy, we classify twenty five different smart home attacks, providing further examples of legitimate, yet vulnerable smart home configurations which can lead to second-order attack vectors. We then review existing smart home defence mechanisms and discuss open research problems.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2018.07.011</doi><tpages>31</tpages><orcidid>https://orcid.org/0000-0003-3559-5182</orcidid><orcidid>https://orcid.org/0000-0002-3708-1540</orcidid><orcidid>https://orcid.org/0000-0002-8913-4173</orcidid><orcidid>https://orcid.org/0000-0002-4110-9112</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0167-4048
ispartof Computers & security, 2018-09, Vol.78, p.398-428
issn 0167-4048
1872-6208
language eng
recordid cdi_proquest_journals_2131206403
source Elsevier ScienceDirect Journals Complete
subjects Actuation
Artificial intelligence
Classification
Cloud computing
Cyber crime
Cyber security
Cyber-Physical Attacks
Cybersecurity
Internet of Things
IoT
Privacy
Smart buildings
Smart Home
Smart houses
Taxonomy
title A taxonomy of cyber-physical threats and impact in the smart home
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T13%3A37%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20taxonomy%20of%20cyber-physical%20threats%20and%20impact%20in%20the%20smart%20home&rft.jtitle=Computers%20&%20security&rft.au=Heartfield,%20Ryan&rft.date=2018-09&rft.volume=78&rft.spage=398&rft.epage=428&rft.pages=398-428&rft.issn=0167-4048&rft.eissn=1872-6208&rft_id=info:doi/10.1016/j.cose.2018.07.011&rft_dat=%3Cproquest_cross%3E2131206403%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2131206403&rft_id=info:pmid/&rft_els_id=S0167404818304875&rfr_iscdi=true