Show simple item record

dc.contributor.authorAllen, Ashley
dc.contributor.authorMylonas, Alexios
dc.contributor.authorVidalis, Stilianos
dc.contributor.authorGritzalis, Dimitris
dc.date.accessioned2024-03-25T13:32:14Z
dc.date.available2024-03-25T13:32:14Z
dc.date.issued2024-04
dc.identifier.citationAllen , A , Mylonas , A , Vidalis , S & Gritzalis , D 2024 , ' Smart homes under siege: Assessing the robustness of physical security against wireless network attacks ' , Computers and Security , vol. 139 , 103687 . https://doi.org/10.1016/j.cose.2023.103687 , https://doi.org/10.1016/j.cose.2023.103687
dc.identifier.issn0167-4048
dc.identifier.otherJisc: 1635199
dc.identifier.otherJisc: 1686217
dc.identifier.otherORCID: /0000-0001-8819-5831/work/152250359
dc.identifier.urihttp://hdl.handle.net/2299/27544
dc.description© 2024 The Authors. Published by Elsevier Ltd. This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY), https://creativecommons.org/licenses/by/4.0/
dc.description.abstractNowadays domestic smart security devices, such as smart locks, smart doorbells, and security cameras, are becoming increasingly popular with users, due to their ease of use, convenience, and declining prices. Unlike conventional non-smart security devices, such as alarms and locks, performance standards for smart security devices, such as the British TS 621, are not easily understandable by end users due to the technical language employed. Users also have very few sources of unbiased information regarding product performance in real world conditions and protection against attacks from cyber attacker-burglars and, as a result, tend to take manufacturer claims at face value. This means that, as this work proves, users may be exposed to threats, such as theft, impersonation (should an attacker steal their credentials), and even physical injury, if the device fails and is used to prevent access to hazardous environments. As such, this paper deploys several attacks using popular wireless attack vectors (i.e., 433MHz radio, Bluetooth, and RFID) against domestic smart security devices to assess the protection offered against a cyber attacker-burglar. Our results suggest that users are open to considerable cyber physical attacks, irrespective if they use lesser known (i.e., no name) or branded smart security devices, due to the poor security offered by these devices.en
dc.format.extent2737457
dc.language.isoeng
dc.relation.ispartofComputers and Security
dc.subjectBluetooth
dc.subjectCybersecurity
dc.subjectIoT
dc.subjectPhysical security
dc.subjectRFID
dc.subjectSmart home
dc.subjectSmart locks
dc.subjectGeneral Computer Science
dc.subjectLaw
dc.titleSmart homes under siege: Assessing the robustness of physical security against wireless network attacksen
dc.contributor.institutionDepartment of Computer Science
dc.contributor.institutionSchool of Physics, Engineering & Computer Science
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.contributor.institutionCybersecurity and Computing Systems
dc.description.statusPeer reviewed
dc.identifier.urlhttp://www.scopus.com/inward/record.url?scp=85183060224&partnerID=8YFLogxK
rioxxterms.versionofrecord10.1016/j.cose.2023.103687
rioxxterms.typeJournal Article/Review
herts.preservation.rarelyaccessedtrue


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record