ABSTRACT
We examine the security of home smart locks: cyber-physical devices that replace traditional door locks with deadbolts that can be electronically controlled by mobile devices or the lock manufacturer's remote servers. We present two categories of attacks against smart locks and analyze the security of five commercially-available locks with respect to these attacks. Our security analysis reveals that flaws in the design, implementation, and interaction models of existing locks can be exploited by several classes of adversaries, allowing them to learn private information about users and gain unauthorized home access. To guide future development of smart locks and similar Internet of Things devices, we propose several defenses that mitigate the attacks we present. One of these defenses is a novel approach to securely and usably communicate a user's intended actions to smart locks, which we prototype and evaluate. Ultimately, our work takes a first step towards illuminating security challenges in the system design and novel functionality introduced by emerging IoT systems.
- IEEE Standard for Local and metropolitan area networks - Part 15.6: Wireless Body Area Networks, 2012. http://standards.ieee.org/findstds/standard/802.15.6--2012.html.Google Scholar
- August. http://august.com/.Google Scholar
- Lindsey Banks. Best bone conduction headphones of 2015. http://www.everydayhearing.com/hearing-technology/articles/bone-conduction-headphones/, July 2015.Google Scholar
- Lujo Bauer, Lorrie Faith Cranor, Michael K Reiter, and Kami Vaniea. Lessons learned from the deployment of a smartphone-based access-control system. In Symposium on Usable Privacy and Security (SOUPS), 2007. Google ScholarDigital Library
- Lujo Bauer, Scott Garriss, Jonathan M McCune, Michael K Reiter, Jason Rouse, and Peter Rutenbar. Device-enabled authorization in the grey system. In International Conference on Information Security, 2005. Google ScholarDigital Library
- Lujo Bauer, Scott Garriss, and Michael K Reiter. Detecting and resolving policy misconfigurations in access-control systems. ACM Transactions on Information and System Security (TISSEC), 2011. Google ScholarDigital Library
- Ioana Boureanu and Serge Vaudenay. Challenges in distance bounding. Security & Privacy, IEEE, 2015.Google ScholarCross Ref
- Eric Brewer. CAP twelve years later: How the "rules" have changed. Computer, 2012.Google Scholar
- Min Chen, Sergio Gonzalez, Athanasios Vasilakos, Huasong Cao, and Victor C Leung. Body area networks: A survey. Mobile networks and applications, 2011. Google ScholarDigital Library
- Danalock. http://www.danalock.com/.Google Scholar
- Tamara Denning and Tadayoshi Kohno. Empowering consumer electronic security and privacy choices: Navigating the modern home. In Symposium on Usable Privacy and Security (SOUPS), 2013.Google Scholar
- Saar Drimer and Steven J Murdoch. Keep your enemies close: Distance bounding against smartcard relay attacks. In USENIX Security, 2007. Google ScholarDigital Library
- CES 2012: Ericsson. https://www.youtube.com/watch?v=pJ5fSWspBpo.Google Scholar
- NFC Forum. http://nfc-forum.org/what-is-nfc/about-the-technology/.Google Scholar
- Behrang Fouladi and Sahand Ghanoun. Security evaluation of the Z-Wave wireless protocol. Black Hat USA, 2013.Google Scholar
- Aurélien Francillon, Boris Danev, Srdjan Capkun, Srdjan Capkun, and Srdjan Capkun. Relay attacks on passive keyless entry and start systems in modern cars. In NDSS, 2011.Google Scholar
- Lishoy Francis, Gerhard Hancke, Keith Mayes, and Konstantinos Markantonakis. Practical NFC peer-to-peer relay attack using mobile phones. In Radio Frequency Identification: Security and Privacy Issues. 2010. Google ScholarDigital Library
- Lishoy Francis, Gerhard P Hancke, Keith Mayes, and Konstantinos Markantonakis. Practical relay attack on contactless transactions by using NFC mobile phones. In Radio Frequency Identification: Security and Privacy Issues, 2010.Google ScholarCross Ref
- Grant Ho, Derek Leung, Pratyush Mishra, Ashkan Hosseini, Dawn Song, and David Wagner. Smart locks: Lessons for securing commodity internet of things devices. Technical Report UCB/EECS-2016--11, EECS Department, University of California, Berkeley, Mar 2016.Google ScholarDigital Library
- Kevo. http://www.kwikset.com/kevo/default.aspx.Google Scholar
- Ziv Kfir and Avishai Wool. Picking virtual pockets using relay attacks on contactless smartcard. In Security and Privacy for Emerging Areas in Communications Networks (SecureComm), 2005. Google ScholarDigital Library
- Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, and Jesse Walker. Challenges in access right assignment for secure home networks. In HotSec, 2010.Google Scholar
- Benoıt Latré, Bart Braem, Ingrid Moerman, Chris Blondia, and Piet Demeester. A survey on wireless body area networks. Wireless Networks, 2011. Google ScholarDigital Library
- Albert Levi, Erhan Çetintaş, Murat Aydos, Cetin Kaya Koç, and M Ufuk Çuglayan. Relay attacks on Bluetooth authentication and solutions. In Computer and Information Sciences (ISCIS). 2004.Google Scholar
- Lockitron. https://lockitron.com/.Google Scholar
- Farhad Manjoo. The August Smart Lock Shows Why You Should Stick with Dumb Keys. http://bits.blogs.nytimes.com/2014/10/14/the-august-smartlock-shows-why-you-should-stick-with-dumb-keys/, Oct 2014.Google Scholar
- Mercedes-Benz. http://techcenter.mercedes-benz.com/en/keylessgo/detail.html.Google Scholar
- Elinor Mills. Drones can be hijacked via GPS spoofing attack. http://www.cnet.com/news/drones-can-be-hijacked-via-gps-spoofing-attack/, June 2012.Google Scholar
- Nest. https://nest.com/.Google Scholar
- Okidokeys. https://www.okidokeys.com/.Google Scholar
- Yossef Oren and Angelos D Keromytis. From the aether to the ethernet--attacking the internet using broadcast digital television. In USENIX Security, 2014. Google ScholarDigital Library
- Kasper Bonne Rasmussen and Srdjan Capkun. Realization of RF distance bounding. In USENIX Security, 2010. Google ScholarDigital Library
- Mike Ryan. Bluetooth: With low energy comes low security. In WOOT, 2013. Google ScholarDigital Library
- M Seyedi, Behailu Kibret, Daniel TH Lai, and Michael Faulkner. A survey on intrabody communications for body area network applications. IEEE Transactions on Biomedical Engineering, 2013.Google ScholarCross Ref
- Nils Ole Tippenhauer, Christina Pöpper, Kasper Bonne Rasmussen, and Srdjan Capkun. On the requirements for successful GPS spoofing attacks. In ACM Conference on Computer & Communications Security (CCS), 2011. Google ScholarDigital Library
- Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, and Srdjan-Capkun. Attacks on public WLAN-based positioning systems. In Proceedings of the 7th International Conference on Mobile systems, applications, and services, 2009. Google ScholarDigital Library
- Blase Ur, Jaeyeon Jung, and Stuart Schechter. The current state of access control for smart devices in homes. In Workshop on Home Usable Privacy and Security (HUPS), 2013.Google Scholar
- Blase Ur, Jaeyeon Jung, and Stuart Schechter. Intruders versus intrusiveness: teens' and parents' perspectives on home-entryway surveillance. In ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014. Google ScholarDigital Library
- Lin Zhong, Dania El-Daye, Brett Kaufman, Nick Tobaoda, Tamer Mohamed, and Michael Liebschner. Osteoconduct: Wireless body-area communication based on bone conduction. In Proceedings of the ICST 2nd International Conference on Body Area Networks, 2007. Google ScholarDigital Library
Index Terms
- Smart Locks: Lessons for Securing Commodity Internet of Things Devices
Recommendations
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
Smart cyber-physical systems: beyond usable security to security ergonomics by design
SEsCPS '17: Proceedings of the 3rd International Workshop on Software Engineering for Smart Cyber-Physical SystemsSecuring cyber-physical systems is hard. They are complex infrastructures comprising multiple technological artefacts, designers, operators and users. Existing research has established the security challenges in such systems as well as the role of ...
Customized blockchain-based architecture for secure smart home for lightweight IoT
Highlights- A novel Blockchain-based solution for secure smart home systems, using a combined hyperledger fabric and hyperledger composer.
AbstractSafeguarding security and privacy remains a major challenge with regards to the Internet of Things (IoT) primarily due to the large scale and distribution of IoT networks. The information systems in Smart Homes are mainly based on ...
Comments