Bluetooth device as weak link for smart home security
Закрыть
Articolul precedent
Articolul urmator
108 4
Ultima descărcare din IBN:
2024-04-19 11:17
Căutarea după subiecte
similare conform CZU
004.8 (310)
Искусственный интеллект (307)
SM ISO690:2012
JALBĂ, Angela. Bluetooth device as weak link for smart home security. In: Sesiune națională cu participare internațională de comunicări științifice studențești, Ed. 27, 15 februarie - 15 martie 2023, Chișinău. Chișinău, Republica Moldova: Centrul Editorial-Poligrafic al USM, 2023, Ediția 27, Vol.1, pp. 100-102. ISBN 978-9975-62-547-0.
EXPORT metadate:
Google Scholar
Crossref
CERIF

DataCite
Dublin Core
Sesiune națională cu participare internațională de comunicări științifice studențești
Ediția 27, Vol.1, 2023
Sesiunea "Sesiunea naţională cu participare internațională de comunicări ştiinţifice studenţeşti"
27, Chișinău, Moldova, 15 februarie - 15 martie 2023

Bluetooth device as weak link for smart home security

CZU: 004.8

Pag. 100-102

Jalbă Angela
 
Moldova State University
 
 
Disponibil în IBN: 23 februarie 2024


Rezumat

The usage of intelligent household gadgets has been increasing rapidly in recent times. The desire to improve the quality of life was the reason for the idea of a “smart home”. It is often said that there are two sides to every coin. The comfort of using advanced technology is contingent upon ensuring its security. In contemporary society, safeguarding personal and informational privacy is highly pertinent. The safety of a home and its occupants is crucial and highly relevant. First, let’s define what is meant by a “smart home”. A smart home is an automated control system that connects all the appliances in a house to form a unified ecosystem. These devices communicate with each other using a variety of wireless protocols, including Bluetooth, Wi-Fi, Zigbee, and Z-Wave. The smart home system is typically divided into a centralized and decentralized management system. In a centralized smart home system, all management is conducted through a single module, also known as a controller. This allows for intricate and thoughtful automation, as you only need to program the controller and then connect all other devices to it, enabling you to centrally manage all devices. In a non-centralized smart home system, the devices are typically autonomous and operate independently of each other. The control for each device is local, meaning it is managed within the device itself. Smart home devices can communicate with each other wirelessly using a variety of protocols, including Bluetooth and other wireless technologies of communication. These protocols allow for the exchange of data between various devices such as sensors, cameras, locks, and other appliances, enabling them to work together as a unified system. A Bluetooth connection is established between two devices. When the devices are in range of each other, they can start exchanging data. Bluetooth operates at 2.4GHz and uses radio wave signals to transmit data. There are several Bluetooth communication protocols that are used to exchange data between devices, such as: When two devices establish a Bluetooth connection, they can exchange data when they are within range of each other. Bluetooth operates using radio waves at a frequency of 2.4GHz. There are different Bluetooth communication protocols that are used to facilitate data exchange between devices, such as: • Bluetooth Low Energy (BLE): a low-power version of Bluetooth that is commonly used in smart home devices because it can operate on small batteries for long periods of time. • Bluetooth Mesh: a networking protocol that enables large numbers of smart home devices to communicate with each other in a mesh network, rather than relying on a centralized hub. • Classic Bluetooth: an earlier version of Bluetooth that is still used in some smart home devices, such as speakers and headphones. Data transfer between devices in a smart home system using Bluetooth involves the exchange of data packets, which contain information used to establish a connection and transmit commands and data between devices. Bluetooth also employs encryption protocols to ensure the security of data transfer between devices. These protocols help prevent unauthorized access to smart home devices and protect against potential security breaches. By using encryption, Bluetooth can provide a secure method of data transfer, which is essential for maintaining the privacy and safety of smart home users. A centralized smart home management system is more vulnerable to hacking than a non-centralized one. If a hacker gains access to the control module of a centralized system, they can potentially control the entire system. In contrast, in a non-centralized system, a hacker would need to hack and control each individual device, which is much more difficult. However, even a non-centralized system is not foolproof, as there are ways for a hacker to bypass security measures such as facial recognition or voice commands. When a smart home system has been hacked, it can compromise the safety of people inside the house. Therefore, it’s important to take measures to secure smart home systems, including using strong passwords, regularly updating firmware and software, and using trusted devices and applications. Furthermore, the vulnerability of the smart home system can also arise from the use of outdated hardware or software. Old devices and software versions may not have the latest security updates and patches, leaving them susceptible to cyber-attacks. In addition, the use of default passwords or weak passwords can also expose the smart home system to hacking. Another vulnerability is the potential for privacy invasion. Smart home devices collect a vast amount of data, including personal information, usage patterns, and behavior. This information can be accessed by third-party entities, such as manufacturers or service providers, who may use it for their own purposes or sell it to other parties. This can lead to privacy breaches and a violation of the user’s rights. Overall, the security vulnerabilities in the smart home system require careful consideration and management. It is crucial to implement strong security measures, such as authentication, encryption, and regular updates, to protect the system from external threats. It is also important to be aware of the potential privacy risks and take measures to safeguard personal data. Conclusion: Make sure to use strong passwords and update the firmware devices regularly. Also, use security software and firewalls to protect home network. It is important to teach every family member basic security rules, such as not clicking on suspicious links or opening suspicious attachments. With proper precautions and awareness, we can feel the benefits of a smart home without compromising our safety and privacy.