Implementing secure smart home using existing infrastructure
DOI:
https://doi.org/10.18046/syt.v15i43.2710Keywords:
DragonBoard, Kerberos, security, smart home.Abstract
The emergence of Internet of Things [IoT] paves the path of the smart home. A smart home learns the habits of residents to make intelligent decision, which requires knowledge to be communicated and stored. The communication of generated data creates loop-hole in security and privacy of the user of smart home. Another challenging issue while designing a smart home is that legacy home appliances lack the smart connectivity. This paper focuses on designing a secure architecture to access smart home appliances, while using the existing home appliances that lacks networking and processing power like a bulb or fan. To ensure secure communication using internet, we are using third party authentication tool deployed in cloud. We have installed a gateway as the entry point to our smart home and connected all the appliances to it. The user is authenticated by authentication server and gets access to the services. For implementation purpose, we used Kerberos as authentication tool and DragonBoard as gateway.
References
Bugeja, J., Jacobsson, A., & Davidsson, P. (2016). On privacy and security challenges in smart connected homes. In 2016 European Intelligence And Security Informatics Conference (EISIC). http://dx.doi.org/10.1109/eisic.2016.044
Chen, S., Liu, T., Gao, F., Ji, J., Xu, Z., & Qian, B. et al. (2017). Butler, not servant: A human-centric smart home energy management system. IEEE Communications Magazine, 55(2), 27-33. http://dx.doi.org/10.1109/mcom.2017.1600699cm
Chitnis, S., Deshpande, N., & Shaligram, A. (2016). An investigative study for smart home security: Issues, challenges and countermeasures. Wireless Sensor Network, 8(4), 61-68. http://dx.doi.org/10.4236/wsn.2016.84006
European Union Agency for Network and Information Security [ENISA]. (2015). Security and resilience of smart home environments good practices and recommendations. Heraklion, Greece: ENISA.
Fernandes, E., Jung, J., & Prakash, A. (2016). Security analysis of emerging smart home applications. In 2016 IEEE Symposium on Security And Privacy (SP). http://dx.doi.org/10.1109/sp.2016.44
Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., & Wagner, D. (2016). Smart locks. In Proceedings Of The 11Th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16. http://dx.doi.org/10.1145/2897845.2897886
Holzleitner, M., & Reichl, J. (2017). European provisions for cyber security in the smart grid – an overview of the NIS-directive. E&I, Elektrotechnik und Informationstechnik, 134(1), 14-18. http://dx.doi.org/10.1007/s00502-017-0473-7
Hosek, J., Masek, P., Kovac, D., Ries, M., & Kröpfl, F. (2014). IP home gateway as universal multi-purpose enabler for smart home services. E&I, Elektrotechnik und Informationstechnik, 131(4-5), 123-128. http://dx.doi.org/10.1007/s00502-014-0209-x
hue: Your personal wireless lighting system. (2017). Retrieved 12 July 2017, from http://www2.meethue.com/en-in/about-/
IT Services: Stanford WebAuth. (2017). Webauth.stanford.edu. Retrieved 13 July 2017, from http://webauth.stanford.edu
Jacobsson, A., Boldt, M., & Carlsson, B. (2016). A risk analysis of a smart home automation system. Future Generation Computer Systems, 56, 719-733. http://dx.doi.org/10.1016/j.future.2015.09.003
Kerberos: The network authentication protocol. (2017). Retrieved from https://web.mit.edu/kerberos
Kubitza, T., Voit, A., Weber, D., & Schmidt, A. (2016). An IoT infrastructure for ubiquitous notifications in intelligent living environments. In Proceedings of The 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct - Ubicomp '16. http://dx.doi.org/10.1145/2968219.2968545
SAML Single Sign-On Solutions - SAML SSO Identity Provider, SAML Service Provider. (2017). Retrieved from https://www.onelogin.com/saml
Saurugg, H. & Pichlmayr, J. (2013). “Smart“, vernetzung und komplexität – ein plädoyer für einen kritischeren umgang mit dem thema vernetzung. E&I, Elektrotechnik Und Informationstechnik, 130(4-5), 103-108. http://dx.doi.org/10.1007/s00502-013-0139-z
Wendzel, S. (2016). How to increase the security of smart buildings? Communications of the ACM, 59(5), 47-49. http://dx.doi.org/10.1145/2828636
Your home may be smart, but is it intelligent? It can be with IBM Watson IoT and cognitive computing. (2017). Retrieved from https://www.ibm.com/internet-of-things/iot-zones/iot-home/
Zhang, X., Adhikari, R., Pipattanasomporn, M., Kuzlu, M., & Rahman, S. (2016). Deploying IoT devices to make buildings smart: Performance evaluation and deployment experience. In 2016 IEEE 3Rd World Forum on Internet of Things (WF-IoT). http://dx.doi.org/10.1109/wf-iot.2016.7845464
Downloads
Published
Issue
Section
License
This journal is licensed under the terms of the CC BY 4.0 licence (https://creativecommons.org/licenses/by/4.0/legalcode).