8 pages/≈2200 words
Smart Home Systems Security Risks Assignment Paper (Research Proposal Sample)
The task was to write a research proposal on the risks associated with smart home systems security. The sample analyses the risks in the format of a research papersource..
Smart Home Systems Security Risks
Smart home systems security risks
Home automation system allows homeowners access and control devices in their homes from any location in the globe by using a mobile device. In home automation, almost everything including appliances, cooling system, lights, and heating system are linked to a controllable network that can be operated from a remote area. When it comes to home security, the home automation system includes the house locks, every window and door, surveillance cameras and smoke detectors among others. Home automation is generally a move towards the ‘Internet of Things’ (IoT) where each item get assigned an IP address which enables it to be supervised and accessed from a remote distance ( Farhan & Universiti Tun Hussein Onn Malaysia, 2009). Home automation allows homeowners to manage their smart home both from within and from a far distance.
In the move to achieve energy efficient and smart homes, among the greatest barriers which have been identified is the achievement of security in IoT environments. An investigation needs to be done to make it straight on how to the risks associated with use and misuse of both end-users and customers information can be handled and how the integration of security improvement measures in the design can be done. In this research, I am going to analyze the risks associated with home systems security and methodologies for mitigating the risks. Some of the probable dangers related to home automation include systems threats and chances of occurrence and potential impacts. The risk analysis will be done basing on a qualitative approach called the Information Security Risk Analysis (ISRA) where the risks of the system are exposed and reviewed basing on availability, integrity and the confidentiality of the system
Background and related research
A recently conducted research indicated that two among eight people living in Sweden have the feeling that they are not well informed with the knowledge and control of how they use energy (Flick & Morehouse, 2011). The research further indicated that among ten people, four of them are willing to increase their awareness and gain better control on their rate of consumption. The appropriate solution was identified as the provision of feedback on energy consumption to every householder through the smart home automation system. Research indicates that householder can reduce up to 20% of their energy consumption through such feedback (Farhan & Universiti Tun Hussein Onn Malaysia, 2009). In home automation, a network of communication extends the IoT by including daily item and sensors. Home automation is becoming an attraction to many suppliers, providers of infrastructure, and both software and hardware third party vendors. Due to the increasing number of home automation users, the challenge of complexity and heterogeneity of the largely integrated devices and services has become rampant; this has necessitated the development of appliances which are connected to software to counter these challenges.
A joint research conducted on some of the leading industrial actors dealing with home automation which is a popular interface in the automation system of smart homes, it was found that it is possible to control the smart devices in a transparent manner real time. Municipalities, property owners and other stakeholders in the third party category can also observe the consumption rate of energy and remotely regulate electronic equipment found in the building (Meyer, 2008). The background of this study is prompted by the fact that in an ecosystem that is largely integrated, understanding the dangers associated with the use of information on end users such as tenants, customers and partners are not clear.
Due to the increased computerization of homes and the increase in the use of smart televisions, and management of energy systems in buildings there has been an increase in the computer security threats the impacts they have on home residents ought to be assessed. Research shows that the competences of the home-based technology make it easy for novel attacks and also allow traditional attacks to have new results. The risks posed by cloud computing in the management of home recourse extends to the sharing of data, external household services and the home; this is through core indicators which have a relation to risks, cost, efficiency, and trust (Meyer, 2008). Smart home environments which are occupied by human users have a high risk of potential sensitivity data regarding traffic.
The main source of risk in the home automation system was is the risk connected with software components mostly the mobile devices and the smartphone applications. Other risks connected with software components include the connected devices, API, Cloud server and In-house gateway. The software weaknesses show the risk of attacks which take advantage of the vulnerabilities. Some common examples of the software vulnerability in the home automation include; the irregular deployment of the authentication procedure which leads to the risk of unauthorized access to the security system. The second example is inadequate access to control policy and configuration; this leads to the risk of unauthorized functions modification. Insufficient accountability and logging settings can cause the system events to remain unregistered thus leading to huge problems in handling bug fixing. The risk of insufficient settings on confidentiality and authentication within different connected sensors relates to problems with critical information which can be spread between the in-house gateway and devices. The insufficient settings risk includes commands having the instructions either to turn on or off electronic devices like the surveillance cameras and alarms (Flick & Morehouse, 2011). The risks that are connected to hardware commonly involves theft, the sabotage of SHAS devices and servers and manipulation
Security wise, human actors stand for a link which is weak in all computer-based systems of information. Research indicates that human form a limitation that is difficult to handle in analyzing the computerization systems. This challenge posed by humans is also a confirmed case when it comes to SHAS. The most common human risk is the deployment of passwords which are not strong enough; such risks can be mitigated by the use of verification tools and policies on enforcement passwords. When user accounts are configured of all defaults, they become a weak point for attempts by hackers. Since a major characteristic of automation in the smart home is the regulatory controls system appliances which in most cases cannot be managed by the use of ordinary computers but through the use of tablets and phones, from the security point of view, this has the implication that various ne...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
- Using Blogs in Teaching ESL/EFL WritingDescription: The purpose of this research is to investigate how tutors teaching ESL/EFL can use blogs as one of the most effective ways of improving their students’ writing skills....2 pages/≈550 words| APA | Technology | Research Proposal |
- Radio Waves and its Applications in the Modern WorldDescription: Given data on radio and waves to show with illustrations the concept of radio waves and how the are applicable in the modern world....10 pages/≈2750 words| 15 Sources | APA | Technology | Research Proposal |
- Chemical Engineering: Characterization of HgS/CdS Core-Shell Nanocomposite Using Photoacoust. . .Description: Chemical Engineering Research Proposal: Characterization of HgS/CdS Core-Shell Nanocomposite Using Photoacoustic ...9 pages/≈2475 words| 10 Sources | APA | Technology | Research Proposal |