Cyber-enabled burglary of smart homes

Computers & Security - Tập 110 - Trang 102418 - 2021
Duncan Hodges1
1Centre for Electronic Warfare, Information and Cyber, Cranfield Defence and Security, Cranfield University, Defence Academy of the United Kingdom, Shrivenham, United Kingdom, SN6 8LA

Tài liệu tham khảo

Ali, 2018, Cyber and physical security vulnerability assessment for IoT-based smart homes, Sensors (Switzerland), 18, 817, 10.3390/s18030817 Bennett, 1984 Bernasco, 2004, How do residential burglars select target areas?: A new approach to the analysis of criminal location choice, Br. J. Criminol., 45, 296, 10.1093/bjc/azh070 Blythe, 2021, A systematic review of crime facilitated by the consumer Internet of Things, Secur. J., 34, 97, 10.1057/s41284-019-00211-8 Bugeja, 2017, An analysis of malicious threat agents for the smart connected home, 557 Bullock K, Chowdhury R, Hollings P. Public concerns about organised crime. In 2009. Available from: https://web.archive.org/web/20200106124823/https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/116623/horr16-report.pdf Chan, 2008, A review of smart homes—Present state and future challenges, Comput. Methods Programs Biomed., 91, 55, 10.1016/j.cmpb.2008.02.001 Chen, 2017, Butler, not servant: a human-centric smart home energy management system, IEEE Commun. Mag., 55, 27, 10.1109/MCOM.2017.1600699CM Clare, 2011, Examination of systematic variations in burglars’ domain-specific perceptual and procedural skills, Psychol. Crime Law, 17, 199, 10.1080/10683160903025810 Clare, 2009, Formal evaluation of the impact of barriers and connectors on residential Burglars’ macro-level offending location choices, Aust. N. Z. J. Criminol., 42, 139, 10.1375/acri.42.2.139 Clarke, 1999, Hot products: understanding, anticipating and reducing demand for stolen goods Cohen, 1979, Social change and crime rate trends: a routine activity approach, Am. Sociol. Rev. [Internet], 44, 588, 10.2307/2094589 Conway, 2006, Terrorism and the internet: new media—new threat?, Parliam. Aff., 59, 283, 10.1093/pa/gsl009 Cornish, 2014 Coupe, 2006, Daylight and darkness targeting strategies and the risks of being seen at residential burglaries, Criminology, 44, 431, 10.1111/j.1745-9125.2006.00054.x Van Daele, 2012, Vander Beken T. Technische hulpmiddelen en doelwitselectie bij woninginbraak: een experimenteel onderzoek naar de invloed van Google Maps en Google Street View, Tijdschr voor Criminol, 54, 362 Damodaran, 2010, User responses to assisted living technologies (Alts) - a review of the literature, J. Integr. Care, 18, 25, 10.5042/jic.2010.0133 Demiris, 2004, Older adults’ attitudes towards and perceptions of ‘smart home’ technologies: a pilot study, Med. Inform. Internet Med., 29, 87, 10.1080/14639230410001684387 Elffers, 2008, Modelling crime flow between neighbourhoods in terms of distance and of intervening opportunities, Crime Prev. Community Saf, 10, 85, 10.1057/palgrave.cpcs.8150062 Elkin M. Crime in England and wales: year ending June 2019 [Internet]. Office for National Statistics. 2019 [cited 2020 Jan 6]. Available from: https://web.archive.org/web/20200106125230/https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/bulletins/crimeinenglandandwales/yearendingjune2019 Flatley J. Focus on property crime: year ending March 2016 [Internet]. Office for National Statistics. 2016 [cited 2019 Dec 22]. Available from: https://web.archive.org/web/20191222143433/https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/bulletins/focusonpropertycrime/yearendingmarch2016 Gai, 2018, Categorisation of security threats for smart home appliances van Gelder, 2017, Virtual burglary: exploring the potential of virtual reality to study burglary in action, J. Res. Crime Delinq. [Internet], 54, 29, 10.1177/0022427816663997 Geneiatakis, 2017, Security and privacy issues for an IoT based smart home, 1292 Ghirardello, 2018, Cyber security of smart homes: development of a reference architecture for attack surface analysis, 45 Hargreaves, 2013, Keeping energy visible? Exploring how householders interact with feedback from smart energy monitors in the longer term, Energy Policy, 52, 126, 10.1016/j.enpol.2012.03.027 Haupert, 2018, Honey, I shrunk your app security: the state of android app hardening, 69 Hearnden, 2004, Decision-making by house burglars: Offenders’ perspectives Heartfield, 2018, A taxonomy of cyber-physical threats and impact in the smart home, Comput. Secur., 78, 398, 10.1016/j.cose.2018.07.011 Huang, 2018, Systematically understanding the cyber attack business: a survey, ACM Comput. Surv., 51, 10.1145/3199674 Jacobsson, 2016, A risk analysis of a smart home automation system, Futur. Gener. Comput. Syst., 56, 719, 10.1016/j.future.2015.09.003 Kearns, 2005, Victim and perpetrator accounts of interpersonal transgressions: self-serving or relationship-serving biases?, Person. Soc. Psychol. Bull. [Internet], 31, 321, 10.1177/0146167204271594 Klobas, 2019, How perceived security risk affects intention to use smart home devices: a reasoned action explanation, Comput. Secur., 87, 10.1016/j.cose.2019.101571 Langton, 2017, Residential burglary target selection: an analysis at the property-level using Google Street View, Appl. Geogr., 86, 292, 10.1016/j.apgeog.2017.06.014 Langworthy, 1992, Spatial evolution of a sting clientele, J. Crim. Justice, 20, 135, 10.1016/0047-2352(92)90004-S Leclerc, 2013, How house burglars decide on targets: a computer-based scenario approach, In: Cognition and Crime. Routledge;, 50 Leitão, 2019, Anticipating smart home security and privacy threats with survivors of intimate partner abuse, 527 Leukfeldt, 2016, Applying routine activity theory to cybercrime: a theoretical and empirical analysis, Deviant. Behav. [Internet], 37, 263, 10.1080/01639625.2015.1012409 Liu, 2019, A review of the smart world, Futur. Gener. Comput. Syst., 96, 678, 10.1016/j.future.2017.09.010 Loukas, 2015 Lurigio, 1987, Are all victims alike? The adverse, generalized, and differential impact of crime, Crime Delinq., 33, 452, 10.1177/0011128787033004003 Manky, 2013, Cybercrime as a service: a very modern business, Comput. Fraud. Secur, 2013, 9, 10.1016/S1361-3723(13)70053-8 Marikyan, 2019, A systematic review of the smart home literature: a user perspective, Technol. Forecast. Soc. Change, 138, 139, 10.1016/j.techfore.2018.08.015 Mayhew, 2020, Combating domestic abuse inflicted in smart societies, 347, 10.1007/978-3-030-35746-7_16 McGuire, 2013, Cyber-enabled crimes - fraud and theft, Cyber Crime A Rev. Evid. Res. Rep. 75 Metropolitan Police. 2018- 2019 Crime statistics [Internet]. 2019 [cited 2020 Jan 4]. Available from: https://www.met.police.uk/sd/stats-and-data/met/year-end-crime-statistics/ Microsoft. Azure IoT reference architecture - Azure Reference Architectures | Microsoft Docs [Internet]. 2020 [cited 2021 Mar 12]. Available from: https://docs.microsoft.com/en-us/azure/architecture/reference-architectures/iot Mulcahy, 2019, Are households ready to engage with smart home technology?, J. Mark. Manag., 35, 1370, 10.1080/0267257X.2019.1680568 Mullins, 2011, Islamist terrorism and australia: an empirical examination of the “Home-Grown” threat, Terror Polit Violence, 23, 254, 10.1080/09546553.2010.535717 Nee, 2015, Understanding expertise in burglars: From pre-conscious scanning to action and beyond, Aggress Violent Behav., 53, 10.1016/j.avb.2014.12.006 Nee, 2019, Learning on the job: studying expertise in residential burglars using virtual environments*, Criminology [Internet], 57, 481, 10.1111/1745-9125.12210 Nee, 2006, Expert decision making in burglars, Br. J. Criminol., 46, 935, 10.1093/bjc/azl013 Nee, 1988, Residential burglary in the republic of ireland: a situational perspective, Howard. J. Crim. Justice, 27, 105, 10.1111/j.1468-2311.1988.tb00609.x Nee, 2000, Examining burglars’ target selection: Interview, experiment or ethnomethodology?, Psychol. Crime Law, 6, 45, 10.1080/10683160008410831 Nee, 2015, Review of expertise and its general implications for correctional psychology and criminology, Aggress Violent. Behav., 20, 1, 10.1016/j.avb.2014.12.002 Nee, 2015, New methods for examining expertise in burglars in natural and simulated environments: preliminary findings, Psychol. Crime Law, 21, 507, 10.1080/1068316X.2014.989849 Nicholls, 2020, Social impacts and control in the smart home, Nat. Energy, 5, 180, 10.1038/s41560-020-0574-0 Nurse, 2016, Towards a usable framework for modelling security and privacy risks in the smart home, 255 Oravec, 2017, Kill switches, remote deletion, and intelligent agents: Framing everyday household cybersecurity in the internet of things, Technol. Soc., 51, 189, 10.1016/j.techsoc.2017.09.004 Park, 2019, Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective, Sensors, 19, 2148, 10.3390/s19092148 Percival, 2006, Big brother or brave new world? Telecare and its implications for older people's independence and social inclusion, Crit. Soc. Policy, 26, 888, 10.1177/0261018306068480 Piasecki S, Urquhart L, McAuley D. Defence against dark artefacts: an analysis of the assumptions underpinning smart home cybersecurity standards. SSRN Electron J [Internet]. 2019; Available from: https://www.ssrn.com/abstract=3463799 Piza, 2014, Analyzing the influence of micro-level factors on CCTV camera effect, J. Quant. Criminol, 30, 237, 10.1007/s10940-013-9202-5 Sanders, 2017, Exploring and understanding differences between deliberate and impulsive male and female burglars, Crime Delinq. [Internet], 63, 1547, 10.1177/0011128716660519 Sent, 2018, Rationality and bounded rationality: you can't have one without the other, Eur. J. Hist. Econ. Thought [Internet], 25, 1370, 10.1080/09672567.2018.1523206 Sha, 2008, Cyber-physical systems: a new frontier, 1 SmartThings. SmartThings Developers | Documentation [Internet]. 2020 [cited 2021 Mar 12]. Available from: https://smartthings.developer.samsung.com/docs/platform-basics.html Statista. Crime clearance rate in the United States in 2018 [Internet]. 2018 [cited 2020 Jan 4]. Available from: https://web.archive.org/web/20200106130539/https://www.statista.com/statistics/194213/crime-clearance-rate-by-type-in-the-us/ Sturgess, 2018, A capability-oriented approach to assessing privacy risk in smart home ecosystems, 37 Sugawara, 2020, Light Commands: Laser-Based Audio Injection on Voice-Controllable Systems, 2631 Taylor, 1988, The role of cues in simulated residential burglary, Br. J. Criminol., 28, 396, 10.1093/oxfordjournals.bjc.a047736 Thomas TL. Al qaeda and the internet: the danger of “Cyberplanning” [Internet]. 2003 Jan. Available from: https://apps.dtic.mil/sti/citations/ADA485810 Tibbetts PS. Terrorist use of the internet and related information technologies [Internet]. 2002 May. Available from: https://apps.dtic.mil/sti/citations/ADA403802 Tilley, 2011, Income disparities of burglary risk: security availability during the crime drop, Br. J. Criminol., 51, 296, 10.1093/bjc/azr010 Tseloni, 2010, Exploring the international decline in crime rates, Eur. J. Criminol., 7, 375, 10.1177/1477370810367014 Tzezana, 2016, Scenarios for crime and terrorist attacks using the internet of things, Eur. J. Futur. Res., 4, 18, 10.1007/s40309-016-0107-z Vandeviver, 2014, Applying google maps and google street view in criminological research, Crime Sci., 3, 13, 10.1186/s40163-014-0013-2 Weiser M. Ubiquitous computing. Computer (Long Beach Calif). 1993 Oct;26(10):71–2. Williams, 2016, Guardians upon high: an application of routine activities theory to online identity theft in Europe at the country and individual level, Br. J. Criminol. [Internet], 56, 21, 10.1093/bjc/azv011 Winchester S, Jackson H. Residential burglary: the limits of prevention. In: Home Office Research Study No 74 London: Home Office. 1982. Wright, 1996, Burglars on the job: Streetlife and residential break-ins, UPNE; Yar, 2005, The Novelty of ‘Cybercrime.’, Eur. J. Criminol. [Internet], 2, 407, 10.1177/147737080556056 Zheng, 2018, User perceptions of smart home IoT privacy, Proc. ACM Human-Comput. Interact, 2, 1, 10.1145/3274469