Content area
Full Text
Abstract-This paper provides an overview of hardware vulnerabilities in smart home designs with emphasis on side-channel attacks, reverse engineering, tampering of smart homes and Wi-Fi network systems. Smart homes include an intelligent set-up made of sensors, actuators and embedded communication hardware. A smart home security system should detect all existing vulnerabilities, and predict future threats using robust detection methods. This work identifies vulnerabilities in smart home application such as smart TVs, thermostats, smart locks etc. The common sets of vulnerability levels are presented for a state-of-the-art smart home. Many smart home application providers provide security to their customers with compromised or flawed design. In this survey, readers will gain insight into existing smart home related hardware vulnerabilities.
I.INTRODUCTION
The goal of smart homes is to have smart household devices delivering services needed for efficient home functioning with minimum human intervention. Smart home devices have to deal with security and privacy issues. The concept of digitalization has led to several interesting application using Internet of Things (IoT) [1]. The IoT application, such as smart homes, buildings, cities, retail and public safety. Most of the current smart home systems use digital door lock having an interface for customers to input a PIN (personnel identification number) thus eliminating the customer burden of carrying keys. Survey from vendors like August and Kwikset Kevo smart locks have demonstrated critical vulnerabilities in their devices.
Many products are being developed by companies around the world for smart homes application and services. Even though smart homes offer desirable qualities, it can cause security and privacy vulnerability. Overcoming stolen private information due to vulnerabilities in smart homes is a critical challenge for wide adoption. Even if private information is not stolen by adversaries, customers still have issues about their private information being gathered, shared and exploited.
Smart homes offer all in one applications that allow a user can easily control lights, TVs, appliances, thermostat, and locks on an array of touchpad sensors. There are some vulnerabilities in these devices that can be exploited. Figure. 1 below show different devices that are connect to the smart homes.
A.Hardware Vulnerabilities
According to an FBI report, 58.3 percent of burglaries in the United States involved in forcible entry [2] and according to CNBC cyber theft is...