Introduction-
Smart homes use devices that can connect to the internet and contain small computers that allow them to be controlled remotely. Alexa, Google Home, Amazon Echo, Apple Home Pod, and other smart assistant devices are examples of IoT devices. They make it easy to control smart devices installed at homes such as IoT-connected cameras, lights, locks, vacuum cleaners, etc. Through the Internet, these devices can be remotely operated from anywhere by network or mobile devices (smartphone or tablet).
Automated homes or smart homes-
The smart home is “a residence equipped with a communications network that connects sensors and domestic gadgets and appliances that can be remotely monitored, accessed, or controlled, and that delivers services that adapt to the demands of its residents.”
Devices on a smart home network enable user authentication to operate a variety of functions, including temperature control, lighting adjustment, door locking and unlocking, and security access to the home from a distance. On a smartphone or other network-connected device, the user can install various applications or use timer software to establish a schedule to operate the smart devices. Connecting the smart home to the Internet allows 24×7 access to the user. subject to the availability of the internet.
In the era of new technology, use of such devices is becoming popular and an integral part of our lives. In fact, real estate brokers in India have started offering consumers automated houses or flats.
Security protocols of IoT devices:
Always keep the system password and operating system up to date. Proper security measures should be implemented on a regular basis. Many IoT devices include a default password that is either not changed or can be easily guessed by cybercriminals or hackers.
IoT devices use an internet connection to function. Sensitive data may be compromised if network authentication can be bypassed. Therefore, a secure and authenticated network connection must be used.
A lot of personal data is collected by IoT devices. Cybercriminals will be able to easily steal information or personal data if security measures, encryption, and data policies are not implemented. IT companies that design and manufacture devices should improve security standards from the outset of product development.
Security Concern:
These smart devices can collect and store information on your usage, habits, and preference either on the device or on the network. All that data makes your smart home at potential privacy risk, and every device you add to the network adds a new privacy concern.
No doubt that such devices provide comfort and convenience. But at the same time, the internet-based security systems of your smart home can also be a security nightmare. Because your automated smart home is vulnerable to hackers.
DDoS attack by Mirai botnet- The Distributed Denial of Service (DDoS) attack, which was widely spread in 2016, was launched by the Mirai botnet. It sought to make Linux-based internet-connected devices into remotely controlled bots. Mirai was a botnet that affected home routers and IP cameras. Mirai was a type of malware that cybercriminals have used to attack computer systems.
As we become increasingly reliant on technology, it is important to remember that our homes are still vulnerable to security risks. In the digital age, we must be extra vigilant in protecting our homes from burglars, home invasions, and other threats. Hackers and cyber-criminals can target your home computers and devices to steal personal information or to commit identity theft. it is important to be aware of the risks that come with having a home security system in the digital age. While there are many benefits to having a system, there are also potential risks that you should be aware of.
Increasing reliance on technology carries with it an increased potential for risk. The entire Internet of Things network is susceptible to attack when there are security gaps. The rise of technology is making our houses increasingly smart. However, being smart does not always equate to being safer. A lack of security in the technology used in smart homes might have adverse effects on human life in the form of data leakage, security attacks, and privacy threats. For example, a vulnerability in a smart door lock can lead to a robbery or to other violent crimes.
Conclusion:
An automated home or smart home essentially is a communication network that connects smart devices, sensors, and actuators, allowing the owner to access, monitor, and manage them by local or remotely access. IoT is a network or set of devices that can communicate by built-in minicomputers. Consumers’ interest in such smart IoT devices is progressively growing these days.
Smart devices are meant to make our lives easier, but they are also gathering our private data. The internet of Things is smart but it is to be considered how secure it is.
However, these devices are vulnerable to the most common vulnerabilities that are being exploited by cyber attackers. Smart Homes face vital challenges due to issues and features related to home automation systems. No doubt such devices offer comfort but there are security flaws and challenges in the home automation systems from the standpoint of both the homeowner and security engineer. Therefore, Internet of Things Security Standards needs to be established. Experts in the field of the Internet of Things have urged various organizations, businesses, internet service providers, and manufacturers to collaborate in order to establish safety guidelines for the forthcoming IoT paradigm shift.
References:
https://carbontrack.com.au/blog/challenges-security-iot-home-automation/
https://repositorio.ipbeja.pt/bitstream/20.500.12207/5044/1/ICISSP_2019_100.pdf
https://www.byteant.com/blog/what-are-the-main-security-risks-with-smart-home-automation/
https://ifflab.org/ways-in-which-your-smart-home-is-vulnerable-to-hackers/
https://www.networkworld.com/article/3207535/what-is-iot-the-internet-of-things-explained.html
https://www.kaspersky.co.in/resource-center/threats/how-safe-is-your-smart-home
Author: Mr. Abhishek Singh, Research Associate, CyberPeace Foundation
Recent Comments