New research reveals alarming privacy and security threats in Smart Homes

(Nanowerk News) An international team of researchers, led by IMDEA Networks and Northeastern University in collaboration with NYU Tandon School of Engineering, Universidad Carlos III de Madrid, IMDEA Software, University of Calgary, and the International Computer Science Institute, has unveiled groundbreaking findings on the security and privacy challenges posed by the ever-growing prevalence of opaque and technically complex Internet of Things (IoT) devices in smart homes.

Key Takeaways

  • In light of the alarming privacy and security threats unveiled in smart homes, the researchers emphasize the need for a clearer definition of Endpoint Privilege Management, urging manufacturers, developers, and policymakers to enhance security measures for IoT devices in smart homes. The study exposes serious concerns surrounding local network security and privacy, highlighting the inadvertent exposure of Personally Identifiable Information (PII) by IoT devices and the potential misuse of local network protocols as side-channels for unauthorized access, underscoring the urgency for comprehensive measures to safeguard smart homes
  • IoT devices in smart homes can inadvertently expose Personally Identifiable Information (PII) such as unique hardware addresses and UUIDs, making households easily identifiable.
  • Local network protocols can act as side-channels, allowing unauthorized access to supposedly protected data like household locations, without user consent.
  • Researchers call on manufacturers, developers, and policymakers to improve security measures for IoT devices in smart homes.
  • The research has already led to security improvements in some IoT products after the team disclosed their findings to vulnerable vendors and Google's Android Security Team. The core PAM tools, including Privileged Account Management and Access Control, should be integrated into smart home devices to enhance security and protect against unauthorized access.
  • smart home
    A group of researchers from several international universities and research centres analyze the local network interactions of IoT devices and mobile apps, and demonstrate that a variety of security and privacy threats exist. (Image: IMDEA Networks)

    Smart Homes: Trusted and Secure Environments?

    Smart homes are becoming increasingly interconnected, comprising an array of consumer-oriented IoT devices ranging from smartphones and smart TVs to virtual assistants and CCTV cameras. These devices have cameras, microphones, and other ways of sensing what is happening in our most private spaces—our homes. An important question is, can we trust that these devices in our homes are safely handling and protecting the sensitive data they have access to?
    “When we think of what happens between the walls of our homes, we think of it as a trusted, private place. In reality, we find that smart devices in our homes are piercing that veil of trust and privacy—in ways that allow nearly any company to learn what devices are in your home, to know when you are home, and learn where your home is. These behaviours are generally not disclosed to consumers, and there is a need for better protections in the home,” said David Choffnes, Associate Professor of Computer Science and Executive Director of the Cybersecurity and Privacy Institute at Northeastern University.
    The research team’s extensive study, titled “In the Room Where It Happens: Characterizing Local Communication and Threats in Smart Homes”, was presented this week at the ACM Internet Measurement Conference (ACM IMC’23) in Montreal (Canada). The paper delves for the first time into the intricacies of local network interactions between 93 IoT devices and mobile apps, revealing a plethora of previously undisclosed security and privacy concerns with actual real-world implications.
    While most users typically view local networks as a trusted and safe environment, the study’s findings illuminate new threats associated with the inadvertent exposure of sensitive data by IoT devices within local networks using standard protocols such as UPnP or mDNS. These threats include the exposure of unique device names, UUIDs, and even household geolocation data, all of which can be harvested by companies involved in surveillance capitalism without user awareness.
    According to Vijay Prakash, PhD student from NYU Tandon who co-authored the paper, “analysing the data collected by IoT Inspector, we found evidence of IoT devices inadvertently exposing at least one PII (Personally Identifiable Information), like unique hardware address (MAC), UUID, or unique device names, in thousands of real world smart homes. Any single PII is useful for identifying a household, but combining all three of them together makes a house very unique and easily identifiable. For comparison, if a person is fingerprinted using the simplest browser fingerprinting technique, they are as unique as one in 1.500 people. If a smart home with all three types of identifiers is fingerprinted, it is as unique as one in 1.12 million smart homes.”
    These local network protocols can be employed as side-channels to access data that is supposedly protected by several mobile app permissions such as household locations. “A side channel is a sneaky way of indirectly accessing sensitive data. For example, Android app developers are supposed to request and obtain users’ consent to access data like geolocation. However, we have shown that certain spyware apps and advertising companies do abuse local network protocols to silently access such sensitive information without any user awareness. All they have to do is kindly asking for it to other IoT devices deployed in the local network using standard protocols like UPnP.”, said Narseo Vallina-Rodriguez, Associate Research Professor of IMDEA Networks and co-founder of AppCensus.
    “Our study shows that the local network protocols used by IoT devices are not sufficiently protected and expose sensitive information about the home and the use we make of the devices. This information is being collected in an opaque way and makes it easier to create profiles of our habits or socioeconomic level,” adds Juan Tapiador, professor at UC3M.

    The Wider Implications

    The impact of this research extends far beyond academia. The findings underscore the imperative for manufacturers, software developers, IoT and mobile platform operators, and policymakers to take action to enhance the privacy and security guarantees of smart home devices and households. The research team responsibly disclosed these issues to vulnerable IoT device vendors and to Google’s Android Security Team, already triggering security improvements in some of these products.
    Source: University of Twente (Note: Content may be edited for style and length)
    We curated a list with the (what we think) 10 best robotics and AI podcasts – check them out!
    SmartWorlder logo
    Also check out our Smartworlder section with articles on smart tech, AI and more.