{"title":"基于智能家居系统攻击向量分析的解决方案","authors":"Andreas Brauchli, Depeng Li","doi":"10.1109/SSIC.2015.7245682","DOIUrl":null,"url":null,"abstract":"The development and wider adoption of smart home technology also created an increased requirement for safe and secure smart home environments with guaranteed privacy constraints. After a short survey of privacy and security in the more broad smart-world context this paper lists, analyzes and ranks possible attack vectors or entry points into a smart home system and proposes solutions to remedy or diminish the risk of compromised security or privacy. Further, we evaluate the usability impacts resulting from the proposed solutions. The smart home system used for the analysis in this paper is a digitalSTROM installation, a home-automation solution that is quickly gaining popularity in central Europe, the findings, however, aim to be as solution independent as possible.","PeriodicalId":242945,"journal":{"name":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":"{\"title\":\"A solution based analysis of attack vectors on smart home systems\",\"authors\":\"Andreas Brauchli, Depeng Li\",\"doi\":\"10.1109/SSIC.2015.7245682\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The development and wider adoption of smart home technology also created an increased requirement for safe and secure smart home environments with guaranteed privacy constraints. After a short survey of privacy and security in the more broad smart-world context this paper lists, analyzes and ranks possible attack vectors or entry points into a smart home system and proposes solutions to remedy or diminish the risk of compromised security or privacy. Further, we evaluate the usability impacts resulting from the proposed solutions. The smart home system used for the analysis in this paper is a digitalSTROM installation, a home-automation solution that is quickly gaining popularity in central Europe, the findings, however, aim to be as solution independent as possible.\",\"PeriodicalId\":242945,\"journal\":{\"name\":\"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-09-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"18\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SSIC.2015.7245682\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SSIC.2015.7245682","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A solution based analysis of attack vectors on smart home systems
The development and wider adoption of smart home technology also created an increased requirement for safe and secure smart home environments with guaranteed privacy constraints. After a short survey of privacy and security in the more broad smart-world context this paper lists, analyzes and ranks possible attack vectors or entry points into a smart home system and proposes solutions to remedy or diminish the risk of compromised security or privacy. Further, we evaluate the usability impacts resulting from the proposed solutions. The smart home system used for the analysis in this paper is a digitalSTROM installation, a home-automation solution that is quickly gaining popularity in central Europe, the findings, however, aim to be as solution independent as possible.