Cyber security study of “Amazon Echo” in home and organization automation
Smart speakers have the role of a hub for a smart home system because of convenience in controlling IoT devices with a voice command. Therefore, a smart speaker can be a new target for an attacker to infiltrate into the smart home system. As menial helpers today fill in as passage focuses to individ...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Smart speakers have the role of a hub for a smart home system because of convenience in controlling IoT devices with a voice command. Therefore, a smart speaker can be a new target for an attacker to infiltrate into the smart home system. As menial helpers today fill in as passage focuses to individuals’ homes apparatuses and gadget regulators, getting these focuses has gotten basic, with keeping up the client’s protection being first concern.
Amazon Echo was launched in 2016 and is not just a savvy speaker yet works as an insightful menial helper which communicates with other different Alexa-empowered gadgets to oversee other IoT gadgets, stay associated, play music and buy books, and put together one’s day. Alexa is integrated in both home and organizations to equip with remote management to help closely monitor the lives, activities of both home and organizations, seamless interaction and increasing productivity. Amazon Echo has an application that gives users ability to customize their preferences and control which is called Amazon Alexa App. Users from this app can personalize their preferences.
Amazon Alexa is quipped to protect user’s privacy through transparency. However, the research had highlighted certain vulnerabilities found on Amazon Echo such as in hardware, software and network and their impacts. The research further described the methods of attacks used by adversaries on these vulnerabilities found.
Nevertheless, the research provided with organizational security, operational security, and the methods to deploy to defend and safeguard the automation of an organization or home based on the vulnerabilities discovered. |
---|---|
ISSN: | 0094-243X 1551-7616 |
DOI: | 10.1063/5.0183100 |