{"id":226,"date":"2008-03-17T22:57:31","date_gmt":"2008-03-18T06:57:31","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/03\/17\/226\/"},"modified":"2008-03-17T22:58:56","modified_gmt":"2008-03-18T06:58:56","slug":"226","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/03\/17\/226\/","title":{"rendered":"Security Review: Wireless Home Automation Systems"},"content":{"rendered":"<p>Summary:Home automation systems in general attempt to enable home owners to have a &#8220;smart&#8221; house. Instead of light switches you have integrated panels that control everything from your lights, to your shades, to your entertainment system, climate control, alarm system, motorized locks, etc. Some specific examples of such systems like those offered by Control4 use wireless communications between the panels and devices they control. Some also have integration with cell phone applications. One of the selling points for these systems is that they improve security.<\/p>\n<p><!--more--><\/p>\n<p>Assets<\/p>\n<p>&#8211; The security of your home.<\/p>\n<p>&#8211; The proper and desired functionality of your home automation<\/p>\n<p>Adversaries<\/p>\n<p>&#8211; Any malicious individuals wanting to gain access to your home by exploiting home automation.<\/p>\n<p>&#8211; Vandals or pranksters who wish to disrupt the functioning of your home automation system<\/p>\n<p>Weaknesses:<\/p>\n<p>&#8211; Information is communicated wirelessly from control panels in your home to the devices they control. These can be security cameras, motorized locks, an alarm system, or even something benign like climate control. As far as information is available, the communication is done over z-wave which is a publicly described protocol for appliance networking. This means that the devices in the home will be susceptible to outside interference and signals. (Z-wave uses something called &#8216;home codes&#8217; which is a 32 bit sig that all the devices are marked with to make sure they only communicate with devices with the same &#8216;home code.&#8217; However it is noted in the specification that an attacker could easily forge the home code and join the network of z-wave devices). Even if some sort of crypto is used on top, if it is not done properly it will be susceptible to replay, man in the middle, and all the other classic forms of attack.<\/p>\n<p>&#8211; Furthermore, the cell phone application can take one of two forms. It is either a web application that a user with a data-enabled mobile device can use (and thus has to be considered for security as any web app would &#8211; except in this case alarm systems and security camera feeds are involved), or it is an application somehow attempting to authenticate via the use of cell phone. In the latter case, the only identifying information conceivable is that stored on the SIM card &#8211; but as we have already seen, we can clone these!<\/p>\n<p>Defenses:<\/p>\n<p>&#8211; Real security with good crypto MUST be used for appliance networks. Luckily this problem has been long solved in computer networks \ud83d\ude42<\/p>\n<p>&#8211; I question the validity of making resources as sensitive as security camera feeds available via web applications that are visible on the internet &#8211; chances are there is a security flaw somewhere and an attacker can see in your house.<\/p>\n<p>Risk Analysis:<\/p>\n<p>I think the risks here are quite real. Individuals with such expensive integrated home automation systems probably have very nice houses, and these systems can in fact give potential adversaries more avenues for attack.<\/p>\n<p>Conclusion:<\/p>\n<p>I am not trying to say these systems are &#8220;bad.&#8221; I think the idea is extremely cool, but to boast about how they improve security seems strange when they have potentially only weakened it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary:Home automation systems in general attempt to enable home owners to have a &#8220;smart&#8221; house. Instead of light switches you have integrated panels that control everything from your lights, to your shades, to your entertainment system, climate control, alarm system, &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/03\/17\/226\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":51,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,9,5],"tags":[],"class_list":["post-226","post","type-post","status-publish","format-standard","hentry","category-physicalsecurity","category-privacy","category-security-reviews"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/51"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=226"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/226\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}