As we move through the twenty-first century, technology continues to advance at an alarming rate. Technology is taking over the lives of everyone, and it is hard to get by without using computers or networks during the course of a typical day. One new development is the advent of the “smart home”. “A smart home or building is a home or building, usually a new one, that is equipped with special structured wiring to enable occupants to remotely control or program an array of automated home electronic devices by entering a single command” (Redriksson, 2005). This new technology could lead to new security concerns as the world becomes more interconnected via the World Wide Web.
Just think about all of the electronic devices in your home, and then imagine controlling them by a remote control, a cell phone, or a computer from within the home or from across the country or possibly the world. Examples of what can be accomplished by using this technology include: arming a home security system, adjusting a thermostat, turning appliances on or off, controlling lighting, and programming a home theater system (Redriksson, 2005). All of these activities can be controlled from afar using Powerline Carrier Systems technology (Redriksson, 2005). Vendela Redriksson explains this technology in 2005:
“Powerline Carrier Systems (PCS) is used to send coded signals along a home's existing electric wiring to programmable switches, or outlets. These signals convey commands that correspond to ‘addresses' or locations of specific devices, and that control how and when those devices operate. A PCS transmitter, for instance, can send a signal along a home's wiring, and a receiver plugged into any electric outlet in the home could receive that signal and operate the appliance to which it is attached.”
And this technology in the home will network together the electric devices connecting them to a computer that has access to the internet. Will this make every “smart home” a target for crackers?
As more and more people gain access to the internet, the number of attacks over the internet increases at an exponential rate. Computer users with a malicious intent may decide to focus on these new “smart home” networks by creating havoc in peoples' residences. If the owner can control the home remotely through the use of a laptop, what is there to stop a technically proficient cracker from doing the same? Having the controller computer in the residence accessible by remote access will leave the computer susceptible to cracking attempts. Any vital information retained on this controller computer may be compromised in attacks against the smart home adding the potential for identity theft. Many people conduct home-based businesses or personal banking using their home computers. So any financial information, digital photos, or other personal data may be taken or destroyed by the mischievous user. Also, the user may tap into the home network and create havoc with the Powerline Carrier System technology. If the house is setup to control the thermostat, a cracker can use her advance skill to adjust the temperature of the residence while the dwellers are in it, increasing utility bills and decreasing their sense of security.
What can be done to protect the smart home? As with any computer, the controller computer should be protected using layered security (Ciampa, 2007, p. 19). This can be done by installing a hardware-based or software-based firewall and employing an internet security protection program that includes anti-spyware and anti-virus programs. Another ideal solution would be to allow the remote access to this controller computer only when the home-owners are away from the residence. This could involve blocking a port on the computer or using an interface program available through the Powerline Carrier System technology to disable remote access upon arrival to the home. If a potential homeowner wishes to purchase a smart home or employ the technology in her current home, she should educate herself on computer security awareness in order to keep her family's personal information secure and not allow a user with malicious intent to take control of her home. Crackers are whetting their appetite with all of the potential targets that the future holds through the push for smart home technology. Future users of this technology must first be educated in security principles in order to safeguard their families and their homes.
References: