Implementing secure smart home using existing infrastructure

Amit Banerjee, Mohd Sameen Chishti, Sunjay Kumar

Abstract


The emergence of Internet of Things [IoT] paves the path of the smart home.  A smart home learns the habits of residents to make intelligent decision, which requires knowledge to be communicated and stored. The communication of generated data creates loop-hole in security and privacy of the user of smart home. Another challenging issue while designing a smart home is that legacy home appliances lack the smart connectivity. This paper focuses on designing a secure architecture to access smart home appliances, while using the existing home appliances that lacks networking and processing power like a bulb or fan. To ensure secure communication using internet, we are using third party authentication tool deployed in cloud. We have installed a gateway as the entry point to our smart home and connected all the appliances to it. The user is authenticated by authentication server and gets access to the services. For implementation purpose, we used Kerberos as authentication tool and DragonBoard as gateway.


Keywords


DragonBoard; Kerberos; security; smart home.

Full Text:

PDF

References


Agosta, G., Antonini, A., Barenghi, A., Galeri, D., & Pelosi, G. (2015). Cyber-security analysis and evaluation for smart home management solutions. In 2015 International Carnahan Conference on Security Technology (ICCST). http://dx.doi.org/10.1109/ccst.2015.7389663

Bugeja, J., Jacobsson, A., & Davidsson, P. (2016). On privacy and security challenges in smart connected homes. In 2016 European Intelligence And Security Informatics Conference (EISIC). http://dx.doi.org/10.1109/eisic.2016.044

Chen, S., Liu, T., Gao, F., Ji, J., Xu, Z., & Qian, B. et al. (2017). Butler, not servant: A human-centric smart home energy management system. IEEE Communications Magazine, 55(2), 27-33. http://dx.doi.org/10.1109/mcom.2017.1600699cm

Chitnis, S., Deshpande, N., & Shaligram, A. (2016). An investigative study for smart home security: Issues, challenges and countermeasures. Wireless Sensor Network, 8(4), 61-68. http://dx.doi.org/10.4236/wsn.2016.84006

European Union Agency for Network and Information Security [ENISA]. (2015). Security and resilience of smart home environments good practices and recommendations. Heraklion, Greece: ENISA.

Fernandes, E., Jung, J., & Prakash, A. (2016). Security analysis of emerging smart home applications. In 2016 IEEE Symposium on Security And Privacy (SP). http://dx.doi.org/10.1109/sp.2016.44

Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., & Wagner, D. (2016). Smart locks. In Proceedings Of The 11Th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16. http://dx.doi.org/10.1145/2897845.2897886

Holzleitner, M., & Reichl, J. (2017). European provisions for cyber security in the smart grid – an overview of the NIS-directive. E&I, Elektrotechnik und Informationstechnik, 134(1), 14-18. http://dx.doi.org/10.1007/s00502-017-0473-7

Hosek, J., Masek, P., Kovac, D., Ries, M., & Kröpfl, F. (2014). IP home gateway as universal multi-purpose enabler for smart home services. E&I, Elektrotechnik und Informationstechnik, 131(4-5), 123-128. http://dx.doi.org/10.1007/s00502-014-0209-x

hue: Your personal wireless lighting system. (2017). Retrieved 12 July 2017, from http://www2.meethue.com/en-in/about-/

IT Services: Stanford WebAuth. (2017). Webauth.stanford.edu. Retrieved 13 July 2017, from http://webauth.stanford.edu

Jacobsson, A., Boldt, M., & Carlsson, B. (2016). A risk analysis of a smart home automation system. Future Generation Computer Systems, 56, 719-733. http://dx.doi.org/10.1016/j.future.2015.09.003

Kerberos: The network authentication protocol. (2017). Retrieved from https://web.mit.edu/kerberos

Kubitza, T., Voit, A., Weber, D., & Schmidt, A. (2016). An IoT infrastructure for ubiquitous notifications in intelligent living environments. In Proceedings of The 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct - Ubicomp '16. http://dx.doi.org/10.1145/2968219.2968545

SAML Single Sign-On Solutions - SAML SSO Identity Provider, SAML Service Provider. (2017). Retrieved from https://www.onelogin.com/saml

Saurugg, H. & Pichlmayr, J. (2013). “Smart“, vernetzung und komplexität – ein plädoyer für einen kritischeren umgang mit dem thema vernetzung. E&I, Elektrotechnik Und Informationstechnik, 130(4-5), 103-108. http://dx.doi.org/10.1007/s00502-013-0139-z

Wendzel, S. (2016). How to increase the security of smart buildings? Communications of the ACM, 59(5), 47-49. http://dx.doi.org/10.1145/2828636

Your home may be smart, but is it intelligent? It can be with IBM Watson IoT and cognitive computing. (2017). Retrieved from https://www.ibm.com/internet-of-things/iot-zones/iot-home/

Zhang, X., Adhikari, R., Pipattanasomporn, M., Kuzlu, M., & Rahman, S. (2016). Deploying IoT devices to make buildings smart: Performance evaluation and deployment experience. In 2016 IEEE 3Rd World Forum on Internet of Things (WF-IoT). http://dx.doi.org/10.1109/wf-iot.2016.7845464




DOI: http://dx.doi.org/10.18046/syt.v15i43.2710

Refbacks

  • There are currently no refbacks.

Comments on this article

View all comments


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.