Table 2.
Security risks identified by performing the information risk assessment in terms of the possible impacts and the risk score.
Threat ID | Possible Impacts (Risks) | Risk Scores |
---|---|---|
Unauthorized access to the main smart home system | ||
1 | Unauthorized execution of operations | 41 |
Loss of control over smart home system | ||
Adversary can take photos, record conversations, and track locations | ||
2 | Attacker can control the smart phone remotely | 41 |
Attacker can make calls and access the phone microphone and camera | ||
Sensor measurements are manipulated to infiltrate the home system | ||
3 | Non-presence tracking leads to home break-in | 39 |
Financial losses | ||
Attacker identifies the weakest device with known vulnerabilities | ||
4 | Attacker takes control of smart home systems | 39 |
Financial losses | ||
Attacker finds a way to access the main system | ||
5 | Attacker changes the system configuration and adding back doors | 39 |
Financial losses | ||
System resources are exhausted via constant self-replication | ||
6 | Possibility of bringing the system down, making it ultimately unusable | 39 |
Possibility of injecting new security vulnerabilities into the system | ||
Difficulty in setting up the smart home system correctly | ||
7 | Misuse of SH systems with the possibility of malfunction | 36 |
Financial losses | ||
User privacy violation | ||
8 | 34 | |
Financial losses | ||
User privacy violation | ||
9 | Breaking into the smart home if it is vacant | 34 |
Financial losses | ||
User privacy violation | ||
10 | Loss of information | 23 |
Damage to reputation |