Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2021 Sep 25;21(19):6399.
doi: 10.3390/s21196399.

PRASH: A Framework for Privacy Risk Analysis of Smart Homes

Affiliations

PRASH: A Framework for Privacy Risk Analysis of Smart Homes

Joseph Bugeja et al. Sensors (Basel). .

Abstract

Smart homes promise to improve the quality of life of residents. However, they collect vasts amounts of personal and sensitive data, making privacy protection critically important. We propose a framework, called PRASH, for modeling and analyzing the privacy risks of smart homes. It is composed of three modules: a system model, a threat model, and a set of privacy metrics, which together are used for calculating the privacy risk exposure of a smart home system. By representing a smart home through a formal specification, PRASH allows for early identification of threats, better planning for risk management scenarios, and mitigation of potential impacts caused by attacks before they compromise the lives of residents. To demonstrate the capabilities of PRASH, an executable version of the smart home system configuration was generated using the proposed formal specification, which was then analyzed to find potential attack paths while also mitigating the impacts of those attacks. Thereby, we add important contributions to the body of knowledge on the mitigations of threat agents violating the privacy of users in their homes. Overall, the use of PRASH will help residents to preserve their right to privacy in the face of the emerging challenges affecting smart homes.

Keywords: IoT; attack taxonomy; privacy; privacy metrics; risk analysis; smart home; system model; threat model.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
The components of a smart home. At the center are the users, particularly the smart home residents. Users interact with their home via the hardware layer, typically through mobile devices. The network layer is responsible for implementing the communication and providing connectivity between the users and their homes. Data and software represent crosscutting components as data are generated, collected, processed, and exchanged at different layers, and software, which can include machine learning models, is integrated in the different conceptual layers.
Figure 2
Figure 2
Taxonomy of privacy attacks on the smart home structured, according to the entities they target. Hardware layer attacks target the physical components; network layer attacks target the communication and connectivity; and user layer attacks target the smart home users. Attacks also compromise the software and data that are present across the different conceptual layers of the smart home.
Figure 3
Figure 3
A schematic illustration of the smart home model’s components, including the logical relationships between them. Items indicated in bold represent the main attributes of the system model. Dotted boxes indicate abstract concepts.
Figure 4
Figure 4
A smart home configuration generated using Alloy. The smart home setup consists of 4 nodes (ConnectedToy, VideoDoorbell, MobileDevice, Cloud), 3 users (Child, Parent, ServiceProvider), and 4 links (Link0-Link3) that interconnect users to nodes, and vice versa. All the relations between the different model components is displayed in the form of labelled arrows.
Figure 5
Figure 5
Attack tree with the attacker’s goal being that of profiling the house occupants.
Figure 6
Figure 6
Radar chart indicating the risk level associated with each smart home component, including the risk score adjusted for the hacker and nation state actor. This figure shows that the highest risk (risk score > 7) is that of an attack targeting the ConnectedToy. Therefore, the most priority should be put on securing the ConnectedToy.

References

    1. Bugeja J., Jacobsson A., Davidsson P. Internet of Things A to Z. John Wiley & Sons, Ltd.; Hoboken, NJ, USA: 2018. Smart Connected Homes; pp. 359–384. Chapter 13.
    1. Zion Market Research Global Smart Home Market Worth USD 53.45 Billion by 2022. [(accessed on 19 April 2021)]. Available online: https://www.zionmarketresearch.com/news/smart-home-market.
    1. Ling Z., Luo J., Xu Y., Gao C., Wu K., Fu X. Security vulnerabilities of internet of things: A case study of the smart plug system. IEEE Internet Things J. 2017;4:1899–1909. doi: 10.1109/JIOT.2017.2707465. - DOI
    1. Notra S., Siddiqi M., Gharakheili H.H., Sivaraman V., Boreli R. An experimental study of security and privacy risks with emerging household appliances; Proceedings of the 2014 IEEE Conference on Communications and Network Security; San Francisco, CA, USA. 29–31 October 2014; pp. 79–84.
    1. Sivaraman V., Chan D., Earl D., Boreli R. Smart-phones attacking smart-homes; Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks; Darmstadt, Germany. 18–20 July 2016; pp. 195–200.

LinkOut - more resources