Home automation systems that control domestic lighting, heating, window blinds or door locks offer opportunities for third parties to intrude on the privacy of the inhabitants and gain considerable insight into their behavioural patterns.
This is the conclusion reached by IT security expert Christoph Sorge and his research team at Saarland University. Even data transmitted from encrypted systems can provide information useful to potential burglars. Professor Sorge, who holds the juris Professorship in Legal Informatics at Saarland University, and his research group are currently studying ways to make home automation systems more secure.
Frederik Möllers from Sorge’s team will be presenting the results at the ACM Conference on Security and Privacy in Wireless and Mobile Networks in Oxford on 25 July.
Regulating heating systems to save energy, adjusting lighting levels based on the time of day, watering house plants automatically, and raising or lowering blinds at the required times – the benefits of today’s smart home automation systems are numerous and they are becoming increasingly popular with homeowners.
However, studies by the research group led by Professor Christoph Sorge have shown that these wireless systems can also pose a security risk. ‘Many of the systems do not provide adequate security against unwanted third-party access and therefore threaten the privacy of the inhabitants,’ says Sorge, an expert for IT security, data protection and encryption technology at Saarland University. Sorge and his team have examined how susceptible the systems are to attack.
For the purposes of their study, the researchers took on the role of a malicious attacker. ‘Using a simple mini-PC no bigger in size than a packet of cigarettes we eavesdropped on the wireless home automation systems (HASs) of two volunteers and were thus able to determine just how much information a conventional wireless HAS reveals about its user,’ explains Sorge.
No other information about the users was available to the research group. The result: ‘Non-encrypted systems provide large quantities of data to anyone determined enough to access the data, and the attacker requires no prior knowledge about the system, nor about the user being spied on,’ says Professor Sorge.
‘The data acquired by the attacker can be analysed to extract system commands and status messages, items which reveal a lot about the inhabitants’ behaviour and habits. We were able to determine absence times and to identify home ventilation and heating patterns,’ explains the expert in legal informatics.
The analysis enabled the research group to build up profiles of the inhabitants. Even systems that use encryption technology can supply information to third parties: ‘The results indicate that even when encrypted communication is used, the number of messages exchanged is enough to provide information on absence times,’ says Sorge. Potential attacks can be directed against the functionality of the system or the privacy of the inhabitants. ‘An attacker with malicious intent could use this sort of information to plan a burglary,’ says Sorge.
‘A great deal still needs to be done to make wireless home automation systems secure. Improved data encryption and concealment technologies would be an important step towards protecting the privacy of HAS users,’ explains Professor Sorge. He and his group are currently working on developing technology of this type in collaboration with the University of Paderborn as part of a research project funded by the Federal Ministry of Economics and Energy.
The research work into home automation systems began with a Master’s degree thesis by Andreas Hellmann, who was supervised by Professor Sorge while still at the University of Paderborn. With his research group now based at Saarland University, Professor Sorge is currently continuing research in this area with his research assistant Frederik Möllers, who will be presenting the results of their recent study in Oxford on 25 July.
Background: Christoph Sorge is an expert for IT security, data privacy, secure communications, encryption technologies, electronic signatures, and the use of IT systems in the legal sector. He holds a professorship endowed by juris GmbH at the Institute for Legal Informatics at Saarland University where he and his team teach and conduct research work at the interface of technology and law. Prior to taking up his position in Saarbrücken, Sorge held a Junior Professorship in Network Security at the University of Paderborn.
Contact: Professor Christoph Sorge:
Phone: +49 (0)681 302-5122 (Office: -5120), E-mail: email@example.com
German Version of the press release: https://www.idw-online.de/de/news597128
A press photograph is available at http://www.uni-saarland.de/pressefotos and can be used at no charge. Please read and comply with the conditions of use.
Note for radio journalists: Studio-quality telephone interviews can be conducted with researchers at Saarland University using broadcast audio IP codec technology (IP direct dial or via the ARD node 106813020001). Interview requests should be addressed to the university’s Press and Public Relations Office (+49 (0)681 302-2601 or -64091).
Claudia Ehrlich | Universität des Saarlandes
Magnetic fields provide a new way to communicate wirelessly
01.09.2015 | University of California - San Diego
'Magic' sphere for information transfer
24.08.2015 | Lomonosov Moscow State University
The leaves of the lotus flower, and other natural surfaces that repel water and dirt, have been the model for many types of engineered liquid-repelling surfaces. As slippery as these surfaces are, however, tiny water droplets still stick to them. Now, Penn State researchers have developed nano/micro-textured, highly slippery surfaces able to outperform these naturally inspired coatings, particularly when the water is a vapor or tiny droplets.
Enhancing the mobility of liquid droplets on rough surfaces could improve condensation heat transfer for power-plant heat exchangers, create more efficient...
Longer, more severe, and hotter droughts and a myriad of other threats, including diseases and more extensive and severe wildfires, are threatening to transform some of the world's temperate forests, a new study published in Science has found. Without informed management, some forests could convert to shrublands or grasslands within the coming decades.
"While we have been trying to manage for resilience of 20th century conditions, we realize now that we must prepare for transformations and attempt to ease...
A University of Oklahoma astrophysicist and his Chinese collaborator have found two supermassive black holes in Markarian 231, the nearest quasar to Earth, using observations from NASA's Hubble Space Telescope.
The discovery of two supermassive black holes--one larger one and a second, smaller one--are evidence of a binary black hole and suggests that supermassive...
A team of European researchers have developed a model to simulate the impact of tsunamis generated by earthquakes and applied it to the Eastern Mediterranean. The results show how tsunami waves could hit and inundate coastal areas in southern Italy and Greece. The study is published today (27 August) in Ocean Science, an open access journal of the European Geosciences Union (EGU).
Though not as frequent as in the Pacific and Indian oceans, tsunamis also occur in the Mediterranean, mainly due to earthquakes generated when the African...
In mountainous regions earthquakes often cause strong landslides, which can be exacerbated by heavy rain. However, after an initial increase, the frequency of these mass wasting events, often enormous and dangerous, declines, in fact independently of meteorological events and aftershocks.
These new findings are presented by a German-Franco-Japanese team of geoscientists in the current issue of the journal Geology, under the lead of the GFZ...
20.08.2015 | Event News
20.08.2015 | Event News
19.08.2015 | Event News
01.09.2015 | Press release
01.09.2015 | Materials Sciences
01.09.2015 | Materials Sciences