Analysis of security attacks in a smart home networks

This paper presents an analytical review about smart home network, their working and technologies from a security standpoint. It highlights various security flaws in a different smart home networks. It clearly explain, why a smart home is such an easy target for the attackers, it also discuss the role of interfaces in a smart home network by describing the scenario in which smart home network can be easily trapped. It also explains various types of home automation techniques along with the attacks which are quite more vulnerable to the smart home networks. As there of now there are many vulnerabilities which are exploiting the smart home network but no strong defensive mechanism has been developed till yet. It also indicates the basic components of a smart home network and the possible attacks which can be happen on a smart home networks.

[1]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[2]  Stefan Saroiu,et al.  Home automation in the wild: challenges and opportunities , 2011, CHI.

[3]  Eric Campo,et al.  A review of smart homes - Present state and future challenges , 2008, Comput. Methods Programs Biomed..

[4]  Shwetak N. Patel,et al.  Experimental Security Analyses of Non-Networked Compact Fluorescent Lamps: A Case Study of Home Automation Security , 2013, LASER.

[5]  Sheikh Iqbal Ahamed,et al.  Security in Pervasive Computing: Current Status and Open Issues , 2006, Int. J. Netw. Secur..

[6]  Siraj A. Shaikh,et al.  Information security education in the UK: a proposed course in secure e-commerce systems , 2004, InfoSecCD '04.

[7]  L. Delahoche,et al.  The Smart Home Concept : our immediate future , 2006, 2006 1ST IEEE International Conference on E-Learning in Industrial Electronics.

[8]  Vinay Soni,et al.  Detecting Sinkhole Attack in Wireless Sensor Network , 2013 .

[9]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[10]  Behrang Fouladi,et al.  Security Evaluation of the Z-Wave Wireless Protocol , 2013 .

[11]  Michalis Faloutsos,et al.  Coping with packet replay attacks in wireless networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[12]  J. J. Greichen Value based home automation for todays' market , 1992 .