User experiences with simulated cyber-physical attacks on smart home IoT

Author:

Huijts N. M. A.ORCID,Haans A.,Budimir S.,Fontaine J. R. J.,Loukas G.,Bezemskij A.,Oostveen A.,Filippoupolitis A.,Ras I.,IJsselsteijn W. A.,Roesch E. B.

Abstract

AbstractWith the Internet of Things (IoT) becoming increasingly prevalent in people’s homes, new threats to residents are emerging such as the cyber-physical attack, i.e. a cyber-attack with physical consequences. In this study, we aimed to gain insights into how people experience and respond to cyber-physical attacks to their IoT devices. We conducted a naturalistic field experiment and provided 9 Dutch and 7 UK households, totalling 18 and 13 participants respectively, with a number of smart devices for use in their home. After a period of adaptation, simulated attacks were conducted, leading to events of varying noticeability (e.g., the light going on or off once or several times). After informing people simulated attacks had occurred, the attacks were repeated one more time. User experiences were collected through interviews and analysed with thematic analyses. Four relevant themes were identified, namely (1) the awareness of and concern about privacy and security risks was rather low, (2) the simulated attacks made little impression on the participants, (3) the participants had difficulties with correctly recognizing simulated attacks, and (4) when informed about simulated attacks taking place; participants noticed more simulated attacks and presented decision rules for them (but still were not able to identify and distinguish them well—see Theme 3). The findings emphasise the need for training interventions and an intrusion detection system to increase detection of cyber-physical attacks.

Funder

Nederlandse Organisatie voor Wetenschappelijk Onderzoek

Engineering and Physical Sciences Research Council

FWO

Publisher

Springer Science and Business Media LLC

Subject

Management Science and Operations Research,Computer Science Applications,Hardware and Architecture,Library and Information Sciences

Reference35 articles.

1. Loukas G (2015) Cyber-physical attacks: a growing invisible threat. Elsevier, London

2. Heartfield R, Loukas G, Budimir S et al (2018) A taxonomy of cyber-physical threats and impact in the smart home. Comput Secur 78:398–428. https://doi.org/10.1016/j.cose.2018.07.011

3. Gebel M (2019) A California woman says her family experienced ‘sheer terror’ after their Nest security camera was hacked, warning them of a North Korean missile attack. In: Business Insider. https://www.businessinsider.nl/nest-camera-hacked-north-korea-missile-attack-2019-1?international=true&r=US. Accessed 19 Jun 2021

4. Gibbs S (2014) Q&A: Who is watching my home webcam? The Guardian

5. Noor P (2019) Ring hackers are reportedly watching and talking to strangers via in-home cameras. The Guardian

Cited by 1 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3