Abstract
Nowadays, smart home devices like Amazon Echo and Google Home have reached mainstream popularity. Being in the homes of users, these devices are intrinsically intrusive, being able to access details such as users’ name, gender, home address, calendar appointments and others. There are growing concerns about indiscriminate data collection and invasion of user privacy in smart home devices, but studies show that perceived benefits are exceeding perceived risks when it comes to consumers. As a result, consumers are placing a lot of trust in these devices, sometimes without realizing it. Improper trust assumptions and security controls can lead to unauthorized access and control of the devices, which can result in serious consequences. In this paper, we explore the behaviour of devices such as Amazon Echo and Google Home in a smart home setting with respect to trust relationships and propose a trust model to improve these relationships among all the involved actors. We have evaluated how trust was built and managed from the initial set-up phase to the normal operation phase, during which we performed a number of interaction tests with different types of users (i.e. owner, guests). As a result, we were able to assess the effectiveness of the provided security controls and identify potential relevant security issues. In order to address the identified issues, we defined a trust model and propose a solution based on it for further securing smart home systems.




Similar content being viewed by others
Notes
References
Aufner, P.: The IoT security gap: a look down into the valley between threat models and their implementation. Int. J. Inf. Secur. 19, 3–14 (2020). https://doi.org/10.1007/s10207-019-00445-y
Bastos, D., Shackleton, M., El-Moussa, F.: Internet of things: a survey of technologies and security risks in smart home and city environments. In: IET Conference Proceedings, pp. 30(7)–30(7)(1) (2018)
Chung, H., Iorga, M., Voas, J., Lee, S.: Alexa, can i trust you? Computer 50(9), 100 (2017)
Chung, H., Park, J., Lee, S.: Digital forensic approaches for amazon alexa ecosystem. Digit. Invest. 22, S15–S25 (2017)
Erickson, J.: Trust metrics. In: International Symposium on Collaborative Technologies and Systems, CTS’09, pp. 93–97. IEEE (2009)
Fernandez-Gago, C., Moyano, F., Lopez, J.: Modelling trust dynamics in the internet of things. Inf. Sci. 396, 72–82 (2017)
Ferraris, D., Daniel, J., Fernandez-Gago, C., Lopez, J.: A segregated architecture for a trust-based network of internet of things. In: 2019 16th IEEE Annual Consumer Communications and Networking Conference (CCNC) (CCNC 2019). Las Vegas, USA (2019)
Ferraris, D., Fernandez-Gago, C., Lopez, J.: A trust-by-design framework for the internet of things. In: 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp. 1–4. IEEE (2018)
Ferraris, D., Fernandez-Gago, C.: TrUStAPIS: a trust requirements elicitation method for IoT. Int. J. Inf. Secur. 19, 111–127 (2020). https://doi.org/10.1007/s10207-019-00438-x
Ford, M., Palmer, W.: Alexa, are you listening to me? An analysis of Alexa voice service network traffic. Pers. Ubiquit. Comput. 23(1), 67–79 (2019)
Ganchev, I., Ji, Z., O’Droma, M.: A generic IoT architecture for smart cities IET (2014)
Giesler, M., Fischer, E.: Iot stories: the good, the bad and the freaky. GfK Market. Intell. Rev. 10(2), 25–30 (2018)
Hoffman, L.J., Lawson-Jenkins, K., Blum, J.: Trust beyond security: an expanded trust model. Commun. ACM 49(7), 94–101 (2006)
Hoy, M.B.: Alexa, Siri, Cortana, and more: an introduction to voice assistants. Med. Ref. Serv. Quart. 37(1), 81–88 (2018)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)
Jose, A.C., Malekian, R.: Smart home automation security: a literature review. SmartCR 5(4), 269–285 (2015)
Kepuska, V., Bohouta, G.: Next-generation of virtual personal assistants (microsoft cortana, apple Siri, Amazon Alexa and Google home). In: 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), pp. 99–103. IEEE (2018)
Lei, X., Tu, G.H., Liu, A.X., Ali, K., Li, C.Y., Xie, T.: The Insecurity of Home Digital Voice Assistants—Amazon Alexa as a Case Study (2017). arXiv preprint arXiv:1712.03327
Mahmoud, R., Yousuf, T., Aloul, F., Zualkernan, I.: Internet of things (IoT) security: current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341. IEEE (2015)
Moyano, F., Fernandez-Gago, C., Lopez, J.: A conceptual framework for trust models. In: 9th International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2012. vol. 7449 of Lectures Notes in Computer Science, pp. 93-104. Springer (2012)
Nieto, A., Rios, R., Lopez, J.: Iot-forensics meets privacy: towards cooperative digital investigations. Sensors 18(2), 492 (2018)
Notra, S., Siddiqi, M., Gharakheili, H.H., Sivaraman, V., Boreli, R.: An experimental study of security and privacy risks with emerging household appliances. In: IEEE Conference on Communications and Network Security (CNS), pp. 79–84. IEEE (2014)
Ozawa, S., Ban, T., Hashimoto, N., Nakazato, J., Shimamura, J.: A study of iot malware activities using association rule learning for darknet sensor data. Int. J. Inf. Secur. 19(1), 83–92 (2020)
Park, M.J., James, J.I.: Preliminary study of a Google home mini (2020). arXiv preprint arXiv:2001.04574
Park, J.S., Moon, M., Hwang, S., Yeom, K.: CASS: a context-aware simulation system for smart home. In: 5th ACIS International Conference on Software Engineering Research, Management and Applications (SERA 2007). IEEE (2007)
Pavlidis, M.: Designing for trust. In: CAiSE (Doctoral Consortium), pp. 3–14 (2011)
Purington, A., Taft, J.G., Sannon, S., Bazarova, N.N., Taylor, S.H.: Alexa is my new BFF: social roles, user satisfaction, and personification of the Amazon echo. In: Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 2853–2859. ACM (2017)
Roman, R., Najera, P., Lopez, J.: Securing the internet of things. Computer 44(9), 51–58 (2011)
Roman, R., Zhou, J., Lopez, J.: On the features and challenges of security and privacy in distributed internet of things. Comput. Netw. 57(10), 2266–2279 (2013)
Ronen, E., Shamir, A.: Extended functionality attacks on IoT devices: the case of smart lights. In: IEEE European Symposium on Security and Privacy (EuroS&P), pp. 3–12. IEEE (2016)
Ronen, E., Shamir, A., Weingarten, A.O., O’Flynn, C.: IoT goes nuclear. In: IEEE Symposium on Creating a ZigBee chain reaction Security and Privacy (SP), pp. 195–212 (2017)
Sciuto, A., Saini, A., Forlizzi, J., Hong, J.I. (2018). Hey Alexa, What’s Up? A mixed-methods studies of in-home conversational agent usage. In: Proceedings of the 2018 Designing Interactive Systems Conference, pp. 857–868
Shayesteh, B., Hakami, V., Akbari, A.: A trust management scheme for IoT-enabled environmental health/accessibility monitoring services. Int. J. Inf. Secur. 19(1), 93–110 (2020)
Voigt, P., Von dem Bussche, A.: The EU General Data Protection Regulation (GDPR). A Practical Guide, 1st edn. Springer, Cham (2017)
Wiederhold, B.K.: Alexa, are you my mom? The role of artificial intelligence in child development. Cyberpsychol. Behav. Soc. Netw. 21, 471–472 (2018)
Yan, Z., Zhang, P., Vasilakos, A.V.: A survey on trust management for internet of things. J. Netw. Comput. Appl. 42, 120–134 (2014)
Ye, M., et al.: Security analysis of internet-of-things: a case study of august smart lock. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE (2017)
Zhang, N., Mi, X., Feng, X., Wang, X., Tian, Y., Qian, F.: Understanding and mitigating the security risks of voice-controlled third-party skills on Amazon alexa and Google home (2018). arXiv preprint arXiv:1805.01525
Acknowledgements
This work has been supported by the EU project H2020-MSCA-RISE-2017 under grant agreement No. 777996 (Sealed-GRID) and the EU H2020-SU-ICT-03-2018 Project No. 830929 CyberSec4Europe (cybersec4europe.eu). This work reflects only the authors view, and the Research Executive Agency is not responsible for any use that may be made of the information it contains.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
All authors declare that they have no conflict of interest.
Ethical approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ferraris, D., Bastos, D., Fernandez-Gago, C. et al. A trust model for popular smart home devices. Int. J. Inf. Secur. 20, 571–587 (2021). https://doi.org/10.1007/s10207-020-00519-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-020-00519-2