Wireless Home Technologies Create Security Risks

Wednesday, August 21, 2013

Christopher Barber


We are all committed to home technology. We have wireless networks and a whole host of devices. Along with the normal invasion of technology, many of us have home automation capabilities that enable us to check video cameras and adjust the temperature or control lights in our homes — all by simply using our mobile devices. The advancement of embedded devices that are wirelessly enabled provides convenience to many of us in our complex and interconnected world.

That sounds great. Doesn't it? Until you consider the security implications. 

With the products available for professional or DIY home automation, the security dangers start with the protocols used for wired and wireless connectivity. Even with devices that use WPA2 encryption when they connect to your home wireless network, a breach could only be a matter of time and interest. An attacker could eventually crack your authentication due to lack of proper passphrase or through social engineering techniques to discover the passphrase and other information about your home automation implementation.

However, more and more of these devices are using protocols such as Zigbee (IEEE 802.15.4) or Z-Wave which is a sub-gigahertz (900Mhz) protocol included in the G.9959 standard, that defines a set of guidelines for sub-1-GHz narrowband wireless devices. Both of these protocols utilize frequency ranges commonly known as the ISM (Industrial, Scientific, and Medical) bands.

How long will it be before the nefarious members of our world take advantage of this new attack landscape? As long as product development advances faster than security, it would not take long or be difficult. It would not be difficult for a hacker to figure out how to hack into your home and do more than just hack your desktop if you do not have the proper security measures in place.

Think about the implications. How about someone turning off the power to your home when planning to break in, potentially disabling lights, alarm systems and phones? How about someone remotely unlocking your house, whether you are home or not? I will leave the numerous other possibilities to your imagination. In closing, I hope you begin to think about and understand the dangers that are associated with the future of home automation systems, especially as technology continues to outpace security considerations.

Look for future blogs from me where I will continue this investigation by diving deeper into the devices and security mechanisms that these products utilize.

About the Author: Christopher is a threat analyst with the Solutionary Security Engineering Research Team (SERT). He is a Certified Information Systems Security Professional (CISSP) and a Certified Ethical Hacker (CEHv7) specializing in emerging threat intelligence, digital forensics and vulnerability research.

Possibly Related Articles:
Wireless risks Zigbee
Post Rating I Like this!
Mic Micac Your article is very exciting and informational. I am trying to decide on a career move and this has helped me with one aspect. Thank you so much!
web hosting reviews
Mic Micac This topic has always fascinated me. Thank you for writing an article that has great content and is well written. Well I am inspired by your writing style.
Mic Micac This subject has interested me for quite some time. I have just started researching it on the Internet and found your post to be informative. Thanks
Mic Micac Your approach to this topic is unique and informative. I am writing an article for our school paper and this post has helped me. Thanks.
Which Way To Pay
Mic Micac I am have been studying this topic for a long time. You have provided great information in you post and some things I have not seen in other content I have read by others.
mark lewis This is a tremendous article that had a bunch of great facts and unique content. Very good stuff, keep up this quality of work.
Mic Micac This topic has always been one of my favorite subjects to read about. I have found your post to be very rousing and full of good information. I will check your other articles shortly.
mark lewis I'm enthralled you posted this and really impressed with everything you provided here. I'll make sure to bookmark this for future reference.
mark lewis Very good information, I'll be sure to pass this along to my peer who was looking for info just like this, regarding a similar topic. Well done here.
sikawai duluan What to Look for in a Steam Mop : A reputable brand, Weight, Handle design and length, Mop head, Indicator Lights, Covers, On and off switch, Warm-up time, Attachment. Source http://www.steammopreviewspro.com
mark lewis Very good post with top notch quality. I liked how you portrayed your work and your main point here because that represents your skills as a blogger.
Leo nardz I am exploring this topic for a report I have to write. You have good content and I would like to know if you have any other posts about this?
Andy Bar Wireless technologies, vs. wired technologies is vulnerable for tapping, so it needs to have a higher security level.
Andy Bar I've wrote about it on my blog
abdul bari Chanessra I want to tell you how much I appreciated your clearly written and thought-provoking article. girlfriend activation system christian h. program http://ge.tt/30KeNpr1/v/0
Pankaj Rajput The Best Method to work whatsapp for pc and laptop please check here is article http://www.whatsappforpcfree.org/2014/07/download-whatsapp-for-pc.html
Cavdgadf Vdvndsf The music streaming service Spotify allows for immediate payment of a premium bid via Paysafecar http://www.pre-hackedgames.net/free-paysafecard-generator/

mark lewis Great material, as this was exactly what I was looking for. I'm really impressed and enthralled that you decided to share this with us. Regardless, it's truly one of your more outstanding works.
abdul bari Chanessra This is also a very good post which I really enjoyed reading. It is not everyday that I have the possibility to see something like this. girlfriend activation system purchase http://www.keyc.com/story/27971908/girlfriend-activation-system-review-teaches-obsession-story-secrets-steps-of-gfas-v2
abdul bari Chanessra You will find a lot of approaches after visiting your post. I was exactly searching for. Thanks for such post and please keep it up. Great work. https://www.rebelmouse.com/howtopottytrainatoddler/
Page: « < 1 - 2 > »
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.