Page 140 - Kaleidoscope Academic Conference Proceedings 2021
P. 140

2021 ITU Kaleidoscope Academic Conference




           device, and then can modify the device ID to control other   The security level of hardware does not meet the security
           users' devices horizontally and beyond authority.   requirements of storing biological information, for
                                                              example, a trusted execution environment or special security
           Replay attack. Some protocols did  not consider security   chip is not used.
           factors at the beginning of design, which may lead to replay
           attacks.                                           There are no hardware control privacy options, such as
                                                              buttons to turn off the built-in microphone and camera of the
           Network traffic analysis attack. The attacker can analyze   IoT-domotics device.
           the network  traffic generated  by the  device to obtain
           sensitive information such as the user's home environment or   3.2.4   Privacy risks for networks
           privacy.
                                                              Network eavesdropping and traffic analysis. By analyzing
           3.2   Privacy risks                                the sensor traffic, an attacker can access the original location
                                                              data by locating the transmission device and eavesdropping
           3.2.1   Privacy risks for service subsystems       on the location information  transmission channel  without
                                                              authorization, and obtain  personal  privacy information
           No authorization or accurate authorization. In the IoT-  related to the  location information through computational
           domotics scenario, the business ordered by an IoT-domotics   inference.
           user will be used by other IoT-domotics users, and the users
           will be able to collect Personally Identifiable Information   4.  SECURITY AND PRIVACY CONTROLS
           (PII)  [11]  by  default  without knowing it.  Collection of          FOR IOT-DOMOTICS
           children’s  PII without the authorization of the child’s
           guardian.                                          4.1   Principles for IoT-domotics controls

           3.2.2   Privacy risks for IoT-domotics gateway     Considering the characteristics of the IoT-domotics, before
                                                              giving a specific analysis of the privacy and security controls
           Not authorized by the user. The built-in applications of an   of the IoT-domotics, the following principles are important
           IoT-domotics gateway  lack  a  user interaction interface,   for IoT-domotics controls.
           which cannot well show the privacy policy and obtain IoT-
           domotics users authorization.                      Different levels of security for different services. There are
                                                              natural  physical boundaries  between the domotics
           The PII stored locally in the IoT-domotics gateway is not   environment and  outside environment, and the security
           encrypted. The account password is stored in plain text.   requirements are often different  inside  and outside  the
                                                              physical boundaries.
           Missing or insufficient access control mechanism. Lack of
           access control and authentication mechanism for the USB   Easy security settings for users. The security settings of
           peripheral interface of the IoT-domotics gateway causes the   devices and services in the domotics environment should be
           application to have unrestricted access to the NAS device   user-friendly.  Complicated and expensive  solutions would
           through the USB peripheral interface of the IoT-domotics   hinder the application of security measures.
           gateway to obtain pictures and files.
                                                              Failsafe domotics devices.  In case of a failure,  domotics
           3.2.3   Privacy risks for IoT-domotics devices and physical   devices must be set in a state that cannot cause harm to the
                  entities                                    inhabitants or the building. A failing system must not block
                                                              the use of other devices.
           Not authorized by the user. The application may not be
           able to show  the user its privacy  policy and obtain  IoT-  Restricted  access to content services.  According to
           domotics  users authorization. Smart  TVs, cameras,  voice   whether the accessed content is suitable for minors, different
           speakers, microphones and  other  devices and applications   levels of permissions of the delivered content should be set.
           have  default  monitoring and collection  of PII in the
           background.                                        Consideration for children. The independence of children's
                                                              privacy should be fully respected. Children's privacy should
           Lack of effective access control mechanism. The installed   only be processed with the consent or authorization of the
           third-party application can access the PII stored in the IoT-  child's guardian.
           domotics device. Family members can access other family
           members' PII when using an IoT-domotics device.    Scenario-specific  privacy  preferences.  Depending  on
                                                              whether the service is applied only with inhabitants in  a
           Network  traffic is intercepted and eavesdropped  on.   domotics environment, the intensity of privacy protection is
           When the wearable device starts the Bluetooth broadcast, the   often different.
           attacker can indirectly locate the location  of the end  user
           through monitoring. Devices with RFID tags are scanned,   Based on the above principles, security and privacy controls
           located and tracked. Privacy information is seen and stolen.   of IoT-domotics are considered, as in Table 2.





                                                           – 78 –
   135   136   137   138   139   140   141   142   143   144   145