Insert Your Title Here
FirstName Surname† Department Name Institution/University Name City State Country [email protected]
SMART HOME ROBOT
FirstName Surname Department Name Institution/University Name City State Country [email protected]
FirstName Surname Department Name Institution/University Name City State Country [email protected]
ABSTRACT
Smart home robots can provide specific chores in the home. It provides the capability for interacting and responding to individuals at home. The key integration point includes use of voice control support. This can help in extending controlling robots for providing awareness and functionality.Robots are becoming mainstream in closely interacting with families and households in several ways. However, robot technology is insecure in a variety of ways posing serious threat to the owners and animals that it operates around. This paper describes the key components used in the architecture of a Smart home robot. It further discovers critical vulnerabilities and cybersecurity issues and highlights the countermeasures that can prevent the cyberattacks.
KEYWORDS
DDoS attack, Wireless connection, Gateway Software, Local network and Wireless chips
ACM REFERENCE FORMAT
J. Pierce, 2019. Lamps, Curtains, Robots: 3 scenarios for the future of the smart home. In Proceedings of the 2019 on Creativity and Cognition (pp. 423-424).
INTRODUCTION
Smart home robot is considered as the other hand and soul of the home system. It provides the owner with some level of empathetic interaction. The control unit and interface provides the capability for controlling the smart home technologies. This provides the ability for predicting the environmental needs of the owner.
The following sections include the elaborate discussion on system architecture of Smart Home Robots, their vulnerabilities and cyberattacks. The main components of the system include IoT Device, gateway software, app, cloud and internal and external connections. The major vulnerability issues include weak authentication, weak default configuration, weak cryptography, insecure communication and privacy issues. Cyberattacks that the system can suffer due to these vulnerabilities include Man in the middle attack, Distributed denial of service attack, device hijacking and data and identity theft. The countermeasures to prevent the cyberattacks are included in the last section.
SYSTEM ARCHITECTURE
Components
IoT Device
The device includes sensors that can help in monitoring the surrounding environments. It is connected with the software with the use of wireless connection
Gateway Software
The software is used for connecting with the device on the local network. It provides basic functionality with basic functions for implementation and onboarding the devices.
Smarthome Application
It provides a quick way for using computing devices. This can be used for performing multiple functions within the local network
Cloud Software
This software provides a simple way for applications to create user accounts in accessing the system with the use of a local network.
Internal and external connections
The internal connection includes ports that will be used inside the box for the internal connection to the sensor, wireless chips and input device. It is selected for specific wireless standards and sensors.
The external connection can be used for continuous data downloads, connecting with another device and firmware updates. It includes use of a USB connection inside the box and it provides the ability for addressing the IoT device.
Key technologies
The key technology includes use of sensing technology that consists of basic-resolution cameras and low-range sensors. Along with these sensors, this uses a vision system that can help in achieving greater level of autonomy that can help in accomplishing tasks with better accuracy and faster speed.
THREATS, VULNERABILITIES AND ATTACKS
Weak Default Configuration
Smart home robots come with features which can be programmed through robot’s software services. If these features are not securely configured for authorized users or lack password protection, they are susceptible to attacks. Insecure features and features with default passwords are difficult to be protected or disabled. This can enable attacker to abuse the functionality of robot since default passwords are publicly available. System misconfigurations and gaps can also be exploited by attackers to gain access into the robot network and access sensitive information. If the servers and operating systems are not upgraded, the vulnerabilities of the robots can easily be exploited by attackers to carry out attacks and steal valuable information.
These vulnerabilities pose serious threat as it offers an easy point of entry to attackers to exploit the system. Server configurations in enabled state allow attackers to determine the robot system flaws and gives them access to extra information. The threats and attacks on smart home robot are possible due to these vulnerabilities include malware attacks, ransomware and phishing attacks.
Weak or Missing Authorization
Users should be authorized to use any system including robots. If the robot system fails to guard against unauthorized access, the attackers can easily use some features without valid credentials and control the robot from remote location. Services like mobile applications, computer software and internet services can be remotely accessed and thus critical functions like programming of robots, receiving external commands, returning robot information can be exploited.
Network Vulnerability
The servers and equipment become vulnerable if no physical protection and no software protection is in place for the smart home robot through upgrades and patches. Unpatched Operating systems are vulnerable to viruses like malware, social engineering attacks. Malware includes Trojans, worms that can be installed on servers or robot connected to network. Malware can provide remote control to an attacker through infected robot, send spam and steal sensitive data. Social engineering attacks are caused when users unintentionally give away personal information like username and password. This attack involves malicious activities through human interactions. Attackers psychologically manipulate legitimate users into making security mistakes or giving up sensitive...