Journal Screenshot

International Journal of Academic Research in Business and Social Sciences

Open Access Journal

ISSN: 2222-6990

Security Analysis And Feasibility of Smart Entrance System in Smart Home Applications

Rizzo Mungka Anak Rechie, Amir Firdaus bin Saib, Lucyantie Mazalan, Yusnani Mohd Yussoff

http://dx.doi.org/10.6007/IJARBSS/v11-i12/12005

Open access

Technology advancement, especially in the area of Internet of Things has enabled many high-end applications to be developed. The complexity of the applications will continue to grow with the coming of 5G technology. The technology has improved our life. However, there are many security issues that exist together with the advancement. This paper first discussed on the security issues focusing on IoT and Home Digital Voice Assistant (HDVA) applications. Outcome from the study shows an alarming security issue. To prevent one of the security issues, a Secure Smart Entrance system is designed and implemented using Alexa; a type of home device voice assistant, Raspberry Pi and RFID. The developed system is designed and implemented to study and validate the vulnerability issues in the IoT applications that utilize HDVA devices. The analysis on the energy consumption and feasibility of the Secure Smart Entrance System using HDVA is presented in this paper. The results show an acceptable amount of energy and is therefore suitable for future IoT related applications. Further study will focus on the security analysis using the developed system.

Alhadlaq, A., Tang, J., Almaymoni, M., & Korolova, A. (2015). Privacy in the Amazon Alexa skills ecosystem. Star, 217(11).
Barrett, B. (2017). Amazon Alexa Hits 10,000 Skills. Retrieved from https://www.wired.com/2017/02/amazon-alexa-hits-10000-skills-plenty-room-grow/
Cho, G., Choi, J., Kim, H., Hyun, S., & Ryoo, J. (2018, August). Threat modeling and analysis of voice assistant applications. In International Workshop on Information Security Applications (pp. 197-209). Springer, Cham.
Clinton, I., Cook, L., & Banik, S. (2016). A survey of various methods for analyzing the amazon echo. The Citadel, The Military College of South Carolina.
Costin, A. (2016). Security of cctv and video surveillance systems: Threats, vulnerabilities, attacks, and mitigations. In Proceedings of the 6th international workshop on trustworthy embedded devices (pp. 45-54).
Diao, W., Liu, X., Zhou, Z., & Zhang, K. (2014). Your voice assistant is mine: How to abuse speakers to steal information and control your phone. In Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices (pp. 63-74).
Fahmy, S., Nasir, A., & Shamsuddin, N. (2012). Wireless network attack: Raising the awareness of Kampung WiFi residents. In 2012 International Conference on Computer & Information Science (ICCIS) (Vol. 2, pp. 736-740). IEEE.
Feng, H., Fawaz, K., & Shin, K. G. (2017). Continuous authentication for voice assistants. In Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking (pp. 343-355).
Garcia, A. (2020). Best Home Security Systems that Work with Alexa. Retrieved from https://www.safehome.org/security-systems/best/alexa/.
Haack, W., Severance, M., Wallace, M., & Wohlwend, J. (2017). Security analysis of the amazon echo. Allen Institute for Artificial Intelligence, 11.
Home, V. S. (2016). Vivint Smart Home Launches Integration with Amazon Echo to Create Comprehensive, Voice-Controlled Smart Homes. Retrieved from https://www.vivint.com/company/newsroom/press/vivint-and-amazon-echo.
Lei, X., Tu, G. H., Liu, A. X., Li, C. Y., & Xie, T. (2018). The insecurity of home digital voice assistants-vulnerabilities, attacks and countermeasures. In 2018 IEEE Conference on Communications and Network Security (CNS) (pp. 1-9). IEEE.
Leong, R. (2018). Analyzing the privacy attack landscape for amazon alexa devices. Imperial College London, Tech. Rep.
Namboodiri, V., Aravinthan, V., Mohapatra, S. N., Karimi, B., & Jewell, W. (2013). Toward a secure wireless-based home area network for metering in smart grids. IEEE Systems Journal, 8(2), 509-520.
Newswire, P. R. (2020). China's Smart Home Market, Forecast to 2026 - Policies, Initiatives, and IoT Driving Smart Homes. Retrieved from https://finance.yahoo.com/news/chinas-smart-home-market-forecast-174500282.html
Overstreet, D., Wimmer, H., & Haddad, R. J. (2019). Penetration Testing of the Amazon Echo Digital Voice Assistant Using a Denial-of-Service Attack. In 2019 SoutheastCon (pp. 1-6). IEEE.
Ruiz, E., Avelar, R., & Wang, X. (2018, May). Protecting remote controlling apps of smart-home-oriented IOT devices. In Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings (pp. 212-213).
Singh, M., Khan, M. A., Singh, V., Patil, A., & Wadar, S. (2015). Attendance management system. In 2015 2nd International Conference on Electronics and Communication Systems (ICECS) (pp. 418-422). IEEE.
Watkins, D. (2017). Strategy Analytics: Amazon, Google to Ship Nearly 3 Million Digital Voice Assistant Devices in 2017. Retrieved from https://www.prnewswire.com/news-releases/strategy-analytics-amazon-google-to-ship-nearly-3-million-digital-voice-assistant-devices-in-2017-300339381.html.
Zhang, N., Mi, X., Feng, X., Wang, X., Tian, Y., & Qian, F. (2019). Dangerous skills: Understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems. In 2019 IEEE Symposium on Security and Privacy (SP) (pp. 1381-1396). IEEE.

In-Text Citation: (Rechie et al., 2021)
To Cite this Article: Rechie, R. M. A., Saib, A. F. bin, Mazalan, L., & Yussoff, Y. M. (2021). Security Analysis And Feasibility of Smart Entrance System in Smart Home Applications. International Journal of Academic Research in Business and Social Sciences, 11(12), 2644–2653.