Home automation systems that control domestic lighting, heating, window blinds or door locks offer opportunities for third parties to intrude on the privacy of the inhabitants and gain considerable insight into their behavioural patterns.
This is the conclusion reached by IT security expert Christoph Sorge and his research team at Saarland University. Even data transmitted from encrypted systems can provide information useful to potential burglars. Professor Sorge, who holds the juris Professorship in Legal Informatics at Saarland University, and his research group are currently studying ways to make home automation systems more secure.
Frederik Möllers from Sorge’s team will be presenting the results at the ACM Conference on Security and Privacy in Wireless and Mobile Networks in Oxford on 25 July.
Regulating heating systems to save energy, adjusting lighting levels based on the time of day, watering house plants automatically, and raising or lowering blinds at the required times – the benefits of today’s smart home automation systems are numerous and they are becoming increasingly popular with homeowners.
However, studies by the research group led by Professor Christoph Sorge have shown that these wireless systems can also pose a security risk. ‘Many of the systems do not provide adequate security against unwanted third-party access and therefore threaten the privacy of the inhabitants,’ says Sorge, an expert for IT security, data protection and encryption technology at Saarland University. Sorge and his team have examined how susceptible the systems are to attack.
For the purposes of their study, the researchers took on the role of a malicious attacker. ‘Using a simple mini-PC no bigger in size than a packet of cigarettes we eavesdropped on the wireless home automation systems (HASs) of two volunteers and were thus able to determine just how much information a conventional wireless HAS reveals about its user,’ explains Sorge.
No other information about the users was available to the research group. The result: ‘Non-encrypted systems provide large quantities of data to anyone determined enough to access the data, and the attacker requires no prior knowledge about the system, nor about the user being spied on,’ says Professor Sorge.
‘The data acquired by the attacker can be analysed to extract system commands and status messages, items which reveal a lot about the inhabitants’ behaviour and habits. We were able to determine absence times and to identify home ventilation and heating patterns,’ explains the expert in legal informatics.
The analysis enabled the research group to build up profiles of the inhabitants. Even systems that use encryption technology can supply information to third parties: ‘The results indicate that even when encrypted communication is used, the number of messages exchanged is enough to provide information on absence times,’ says Sorge. Potential attacks can be directed against the functionality of the system or the privacy of the inhabitants. ‘An attacker with malicious intent could use this sort of information to plan a burglary,’ says Sorge.
‘A great deal still needs to be done to make wireless home automation systems secure. Improved data encryption and concealment technologies would be an important step towards protecting the privacy of HAS users,’ explains Professor Sorge. He and his group are currently working on developing technology of this type in collaboration with the University of Paderborn as part of a research project funded by the Federal Ministry of Economics and Energy.
The research work into home automation systems began with a Master’s degree thesis by Andreas Hellmann, who was supervised by Professor Sorge while still at the University of Paderborn. With his research group now based at Saarland University, Professor Sorge is currently continuing research in this area with his research assistant Frederik Möllers, who will be presenting the results of their recent study in Oxford on 25 July.
Background: Christoph Sorge is an expert for IT security, data privacy, secure communications, encryption technologies, electronic signatures, and the use of IT systems in the legal sector. He holds a professorship endowed by juris GmbH at the Institute for Legal Informatics at Saarland University where he and his team teach and conduct research work at the interface of technology and law. Prior to taking up his position in Saarbrücken, Sorge held a Junior Professorship in Network Security at the University of Paderborn.
Contact: Professor Christoph Sorge:
Phone: +49 (0)681 302-5122 (Office: -5120), E-mail: firstname.lastname@example.org
German Version of the press release: https://www.idw-online.de/de/news597128
A press photograph is available at http://www.uni-saarland.de/pressefotos and can be used at no charge. Please read and comply with the conditions of use.
Note for radio journalists: Studio-quality telephone interviews can be conducted with researchers at Saarland University using broadcast audio IP codec technology (IP direct dial or via the ARD node 106813020001). Interview requests should be addressed to the university’s Press and Public Relations Office (+49 (0)681 302-2601 or -64091).
Claudia Ehrlich | Universität des Saarlandes
LAMA 2.0 accelerates more than just numerical applications
21.06.2016 | Fraunhofer-Institut für Algorithmen und Wissenschaftliches Rechnen SCAI
Researchers open hairy new chapter in 3-D printing
20.06.2016 | Massachusetts Institute of Technology
Physicists in Innsbruck have realized the first quantum simulation of lattice gauge theories, building a bridge between high-energy theory and atomic physics. In the journal Nature, Rainer Blatt‘s and Peter Zoller’s research teams describe how they simulated the creation of elementary particle pairs out of the vacuum by using a quantum computer.
Elementary particles are the fundamental buildings blocks of matter, and their properties are described by the Standard Model of particle physics. The...
A year and a half on the outer wall of the International Space Station ISS in altitude of 400 kilometers is a real challenge. Whether a primordial bacterium...
Researchers at Case Western Reserve University have developed a way to swiftly and precisely control electron spins at room temperature.
A physics experiment performed at the National Institute of Standards and Technology (NIST) has enhanced scientists' understanding of how free neutrons decay...
Chemically the same, graphite and diamonds are as physically distinct as two minerals can be, one opaque and soft, the other translucent and hard. What makes...
09.06.2016 | Event News
24.05.2016 | Event News
20.05.2016 | Event News
24.06.2016 | Materials Sciences
24.06.2016 | Physics and Astronomy
24.06.2016 | Physics and Astronomy