Home automation systems that control domestic lighting, heating, window blinds or door locks offer opportunities for third parties to intrude on the privacy of the inhabitants and gain considerable insight into their behavioural patterns.
This is the conclusion reached by IT security expert Christoph Sorge and his research team at Saarland University. Even data transmitted from encrypted systems can provide information useful to potential burglars. Professor Sorge, who holds the juris Professorship in Legal Informatics at Saarland University, and his research group are currently studying ways to make home automation systems more secure.
Frederik Möllers from Sorge’s team will be presenting the results at the ACM Conference on Security and Privacy in Wireless and Mobile Networks in Oxford on 25 July.
Regulating heating systems to save energy, adjusting lighting levels based on the time of day, watering house plants automatically, and raising or lowering blinds at the required times – the benefits of today’s smart home automation systems are numerous and they are becoming increasingly popular with homeowners.
However, studies by the research group led by Professor Christoph Sorge have shown that these wireless systems can also pose a security risk. ‘Many of the systems do not provide adequate security against unwanted third-party access and therefore threaten the privacy of the inhabitants,’ says Sorge, an expert for IT security, data protection and encryption technology at Saarland University. Sorge and his team have examined how susceptible the systems are to attack.
For the purposes of their study, the researchers took on the role of a malicious attacker. ‘Using a simple mini-PC no bigger in size than a packet of cigarettes we eavesdropped on the wireless home automation systems (HASs) of two volunteers and were thus able to determine just how much information a conventional wireless HAS reveals about its user,’ explains Sorge.
No other information about the users was available to the research group. The result: ‘Non-encrypted systems provide large quantities of data to anyone determined enough to access the data, and the attacker requires no prior knowledge about the system, nor about the user being spied on,’ says Professor Sorge.
‘The data acquired by the attacker can be analysed to extract system commands and status messages, items which reveal a lot about the inhabitants’ behaviour and habits. We were able to determine absence times and to identify home ventilation and heating patterns,’ explains the expert in legal informatics.
The analysis enabled the research group to build up profiles of the inhabitants. Even systems that use encryption technology can supply information to third parties: ‘The results indicate that even when encrypted communication is used, the number of messages exchanged is enough to provide information on absence times,’ says Sorge. Potential attacks can be directed against the functionality of the system or the privacy of the inhabitants. ‘An attacker with malicious intent could use this sort of information to plan a burglary,’ says Sorge.
‘A great deal still needs to be done to make wireless home automation systems secure. Improved data encryption and concealment technologies would be an important step towards protecting the privacy of HAS users,’ explains Professor Sorge. He and his group are currently working on developing technology of this type in collaboration with the University of Paderborn as part of a research project funded by the Federal Ministry of Economics and Energy.
The research work into home automation systems began with a Master’s degree thesis by Andreas Hellmann, who was supervised by Professor Sorge while still at the University of Paderborn. With his research group now based at Saarland University, Professor Sorge is currently continuing research in this area with his research assistant Frederik Möllers, who will be presenting the results of their recent study in Oxford on 25 July.
Background: Christoph Sorge is an expert for IT security, data privacy, secure communications, encryption technologies, electronic signatures, and the use of IT systems in the legal sector. He holds a professorship endowed by juris GmbH at the Institute for Legal Informatics at Saarland University where he and his team teach and conduct research work at the interface of technology and law. Prior to taking up his position in Saarbrücken, Sorge held a Junior Professorship in Network Security at the University of Paderborn.
Contact: Professor Christoph Sorge:
Phone: +49 (0)681 302-5122 (Office: -5120), E-mail: email@example.com
German Version of the press release: https://www.idw-online.de/de/news597128
A press photograph is available at http://www.uni-saarland.de/pressefotos and can be used at no charge. Please read and comply with the conditions of use.
Note for radio journalists: Studio-quality telephone interviews can be conducted with researchers at Saarland University using broadcast audio IP codec technology (IP direct dial or via the ARD node 106813020001). Interview requests should be addressed to the university’s Press and Public Relations Office (+49 (0)681 302-2601 or -64091).
Claudia Ehrlich | Universität des Saarlandes
World's thinnest hologram paves path to new 3-D world
18.05.2017 | RMIT University
Internet of things made simple: One sensor package does work of many
11.05.2017 | Carnegie Mellon University
An international team of physicists has monitored the scattering behaviour of electrons in a non-conducting material in real-time. Their insights could be beneficial for radiotherapy.
We can refer to electrons in non-conducting materials as ‘sluggish’. Typically, they remain fixed in a location, deep inside an atomic composite. It is hence...
Two-dimensional magnetic structures are regarded as a promising material for new types of data storage, since the magnetic properties of individual molecular building blocks can be investigated and modified. For the first time, researchers have now produced a wafer-thin ferrimagnet, in which molecules with different magnetic centers arrange themselves on a gold surface to form a checkerboard pattern. Scientists at the Swiss Nanoscience Institute at the University of Basel and the Paul Scherrer Institute published their findings in the journal Nature Communications.
Ferrimagnets are composed of two centers which are magnetized at different strengths and point in opposing directions. Two-dimensional, quasi-flat ferrimagnets...
An Australian-Chinese research team has created the world's thinnest hologram, paving the way towards the integration of 3D holography into everyday...
In the race to produce a quantum computer, a number of projects are seeking a way to create quantum bits -- or qubits -- that are stable, meaning they are not much affected by changes in their environment. This normally needs highly nonlinear non-dissipative elements capable of functioning at very low temperatures.
In pursuit of this goal, researchers at EPFL's Laboratory of Photonics and Quantum Measurements LPQM (STI/SB), have investigated a nonlinear graphene-based...
Dental plaque and the viscous brown slime in drainpipes are two familiar examples of bacterial biofilms. Removing such bacterial depositions from surfaces is...
23.05.2017 | Event News
22.05.2017 | Event News
17.05.2017 | Event News
23.05.2017 | Physics and Astronomy
23.05.2017 | Life Sciences
23.05.2017 | Medical Engineering