Skip to main content
. 2018 Mar 8;18(3):817. doi: 10.3390/s18030817

Table 2.

Security risks identified by performing the information risk assessment in terms of the possible impacts and the risk score.

Threat ID Possible Impacts (Risks) Risk Scores
Unauthorized access to the main smart home system
1 Unauthorized execution of operations 41
Loss of control over smart home system
Adversary can take photos, record conversations, and track locations
2 Attacker can control the smart phone remotely 41
Attacker can make calls and access the phone microphone and camera
Sensor measurements are manipulated to infiltrate the home system
3 Non-presence tracking leads to home break-in 39
Financial losses
Attacker identifies the weakest device with known vulnerabilities
4 Attacker takes control of smart home systems 39
Financial losses
Attacker finds a way to access the main system
5 Attacker changes the system configuration and adding back doors 39
Financial losses
System resources are exhausted via constant self-replication
6 Possibility of bringing the system down, making it ultimately unusable 39
Possibility of injecting new security vulnerabilities into the system
Difficulty in setting up the smart home system correctly
7 Misuse of SH systems with the possibility of malfunction 36
Financial losses
User privacy violation
8 34
Financial losses
User privacy violation
9 Breaking into the smart home if it is vacant 34
Financial losses
User privacy violation
10 Loss of information 23
Damage to reputation