Exposing the vulnerabilities of smart homes
Can we trust that smart home devices are safely handling and protecting the sensitive data they have access to? An international team of researchers has investigated this issue, unearthing previously undisclosed security and privacy concerns that have real-world implications.
Smart homes are becoming increasingly interconnected, comprising an array of consumer-oriented Internet of Things (IoT) devices ranging from smartphones and smart TVs to virtual assistants and CCTV cameras. These devices have cameras, microphones and other ways of sensing what is happening in our most private spaces — our homes.
Led by IMDEA Networks and Northeastern University in collaboration with NYU Tandon School of Engineering, Universidad Carlos III de Madrid (UC3M), IMDEA Software, the University of Calgary and the International Computer Science Institute, the research team looked into the intricacies of local network interactions between 93 IoT devices and mobile apps. Their study, titled ‘In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes’, was presented at the ACM Internet Measurement Conference (ACM IMC’23) in Montreal, Canada.
“When we think of what happens between the walls of our homes, we think of it as a trusted, private place. In reality, we find that smart devices in our homes are piercing that veil of trust and privacy — in ways that allow nearly any company to learn what devices are in your home, to know when you are home, and learn where your home is,” said David Choffnes, Associate Professor of Computer Science and Executive Director of the Cybersecurity and Privacy Institute at Northeastern University.
“These behaviours are generally not disclosed to consumers, and there is a need for better protections in the home.”
The study’s findings illuminated new threats associated with the inadvertent exposure of sensitive data by IoT devices within local networks using standard protocols such as UPnP or mDNS. These threats include the exposure of unique device names, universally unique identifiers (UUIDs) and even household geolocation data, all of which can be harvested by companies involved in surveillance capitalism without user awareness.
According to Vijay Prakash, a PhD student from NYU Tandon who co-authored the paper, the team found evidence of IoT devices inadvertently exposing at least one piece of PII (personally identifiable information), such as a unique hardware address (MAC), UUID or unique device name, in thousands of real-world smart homes. Any single PII is useful for identifying a household, but combining three of them together makes a house very unique and easily identifiable, Prakash said.
“For comparison, if a person is fingerprinted using the simplest browser fingerprinting technique, they are as unique as one in 1500 people. If a smart home with all three types of identifiers is fingerprinted, it is as unique as one in 1.12 million smart homes,” Prakash said.
These local network protocols can be employed as side channels to access data that is supposedly protected by several mobile app permissions, such as household locations.
“A side channel is a sneaky way of indirectly accessing sensitive data. For example, Android app developers are supposed to request and obtain users’ consent to access data like geolocation. However, we have shown that certain spyware apps and advertising companies do abuse local network protocols to silently access such sensitive information without any user awareness. All they have to do is kindly ask for it [from] other IoT devices deployed in the local network using standard protocols like UPnP,” said Narseo Vallina-Rodriguez, Associate Research Professor of IMDEA Networks and co-founder of AppCensus.
“Our study shows that the local network protocols used by IoT devices are not sufficiently protected and expose sensitive information about the home and the use we make of the devices. This information is being collected in an opaque way and makes it easier to create profiles of our habits or socioeconomic level,” added Juan Tapiador, Professor at UC3M.
The impact of the research extends far beyond academia. The team’s findings underscore the imperative for manufacturers, software developers, IoT and mobile platform operators, and policymakers to take action to enhance the privacy and security guarantees of smart home devices and households. The research team responsibly disclosed these issues to vulnerable IoT device vendors and to Google’s Android Security Team, already triggering security improvements in some of these products.
Smooth running for Vic's first all-electric hospital
Honeywell has won a 25-year contract to provide building automation solutions for the new Melton...
The significance of data management in mining
This article explores how advanced data management and electrical solutions can transform mining...
The role of digital twins in shaping sustainable grids
To meet the government's target of net-zero carbon emissions by 2050, the energy sector must...