Susceptibility of a Smart Home to Intentional Electromagnetic Interference Attacks

Authors

  • Sukhrob Davlyatov Department of Technology, Ball State University, USA
  • Tarek Mahfouz Department of Technology, Ball State University, USA
  • James W. Jones Department of Technology, Ball State University, USA
  • Sherif Attallah Department of Technology, Ball State University, USA

DOI:

https://doi.org/10.53555/nneee.v2i12.173

Keywords:

Smart Homes, ElectroMagnetic Interference,, Intentional ElectroMagnetic Interference, Cost Assessment

Abstract

Technology advancements are shaping the construction industry gradually. Smart homes have become a reality and in some cases a trend due to these advancements. Although the literature includes multitude of efforts addressing the technologies used in smart homes, integration processes, and privacy issues, little exists about their vulnerability to Intentional ElectroMagnetic Interference (IEMI). In an attempt to address this gap, the purpose of this paper is to investigate the proliferation of smart home technologies, their susceptibility to IEMI attacks, currently available mechanisms of defense, and to provide a cost assessment model of the most suited protection approaches to be adopted by the construction industry. To that end, the adopted research methodology collected and analyzed a set of relevant peer reviewed publication within the domain, and developed different construction cost estimates utilizing standard reference books, like RSMeans, and direct contact with system suppliers. The outcomes of the aforementioned methodology yielded two potential protection methods, namely full protection of the home shell; and partial protection for essential components while providing a detection system of potential attacks. The average achieved costs per square foot range from $7.91 to $20.11 depending on the selection of material and type of finish. It is instigated that the outcomes of this research provide a much needed knowledge about the propensity of smart homes to IMEI attacks and provide a guidance cost estimate for protection mechanism. It also provides a better understanding for home owners regarding their decisions.

References

. Jones, Nick, “The Future Smart Home: 500 Smart Objects Will Enable New Business Opportunities”, Gartner.com, 2014.

. Aldrich, K. F., “Smart Homes: Past, Present and Future”, R. Harper, Ed., Inside the Smart Home. London: Springer London, 2003, pp. 17-39.

. California Emerging Technology Fund (CETF). (2008) CETF page on Smart Housing Initiatives. [Online], Retrieved December 8, 2015. Available: http://www.cetfund.org/investments/initiative-smart-housing

. Neighborhood housing and community Development. (2008). Neighborhood housing and community Development page on S.M.A.R.T. Housing Policy. [Online]. Retrieved December 8, 2015. Available: https://www.austintexas.gov/sites/default/files/files/Housing/Application_Center/SMART_Housing/smart_guide_0708.pdf

. Weiser, M., Gold, R., & Brown, J. S.. “The origins of ubiquitous computing research at PARC in the late 1980s,” IBM Systems

Journal, vol. 38 (4), pp. 693-695, 1999.

. Zhao, H. and Wu, D., “Definition, Function, and Framework Construction of a Smart Road,” in Proc. International Symposium on Frontiers of Road and Airport Engineering, 2015, pp. 204-218.

. Ofei-Amoh, R. and Syal, M., "Installation Aspects of Smart Grid," Practice Periodical on Structural Design and Construction,vol. 18(1), pp. 56-66, 2013.

. iControl Networks. (2015). iControl Networks page on 2015 State of The Smart Home Report. [Online], Retrieved September 21, 2015. Available: iControl Insights Blog: http://www.icontrol.com/blog/2015-state-of-the-smart-home-report/

. Greenough, J. (2015). Business Insider page on The American Smart Home Market: 2015 [Slide Deck]. [Online], Retrieved

September 21, 2015. Available: http://www.businessinsider.com/the-american-smart-home-market-2015-slide-deck-2015-8

. Backstrom, M., “The threat from intentional EMI against the civil technical infrastructure,” in ESW2006, 3rd European Survivability Workshop, Toulouse, France, 2006.

. Radasky, W., & Savage, E., “Intentional Electromagnetic Interference (IEMI) and Its Impact on the U.S. Power Grid,”Metatech Corporation, Goleta, CA, Meta-R-323, 2010.

. Radasky, W. A. (2014). IEEE Spectrum page on Electromagnetic Warfare Is Here. [Online], Retrieved October 24, 2015. Available: http://spectrum.ieee.org/aerospace/military/electromagnetic-warfare-is-here/

. Wilk, M. W., & Radasky, A. W., “Intentional Electromagnetic Interference (IEMI)–Background and Status of the Standardization Work in the International Electrotechnical Commission (IEC),” in Proc. 27th URSI Gen. Assem., Maastricht, Olanda, 2002, p. 27.

. Parfenov, V. Y., Zdoukov, L. N., Radasky, W. A., & Ianoz, M., “Conducted IEMI Threats for Commercial Buildings,” IEEE Transactions on Electromagnetic Compatibility, vol. 46 (3), pp. 404-411, 2004.

. Kasmi, C., Lopes-Esteves, J., Picard, N., Renard, M., Beillard, B., Martinod, E., et al., “Event Logs Generated by an Operating System Running on a COTS Computer During IEMI Exposure,” IEEE Transactions on Electromagnetic Compatibility, vol. 56 (3), pp. 1723-1726, 2014.

. Leach, R. and Alexander, M.B., “Electronic System Failures and Anomalies Attributed to Electromagnetic Interference,” NASA, MSFC, Alabama, NASA Reference Publication 1374, 1995.

. Schriner, D., “Radio Frequency Weapons and Proliferation: Potential Impact on the Economy,” J. E. Hearing, Interviewer, 1998.

. Fachot, M. “iecetch page on TC work to help thwart potential threats: Preventing electromagnetic interference from nuclear

and other weapons. [Online], Retrieved September 25, 2015. Available: http://iecetech.org/issue/2013-10/TC-work-to-help-thwart-potential-threats

. (2015) The International Electrotechnical Commission (IEC) website. [Online]. Available: http://www.iec.ch/dyn/www/f?p=103:7:0::::FSP_ORG_ID:1387

. Brauer, F., Fahlbusch, S., ter Haseborg, J., & Potthast, S., “Investigation of Hardening Measures for IT Equipment against Radiated and Conducted IEMI,“ IEEE Transactions on Electromagnetic Compatibility, vol. 54(5), pp. 1055, 2012.

. Dawson, J. F., Flintoft, D. I., Marvin, A. C., & Garbe, H., “A Cost-Efficient System for Detecting an Intentional Electromagnetic Interference (IEMI) Attack,” in Proc. International Symposium on Electromagnetic Compatibility (EMC Europe 2014), Gothenburg, Sweden, 2014.

. Emprimus. (2015). Emprimus page on Electromagnetic Threat Detection. [Online], Retrieved October 26, 2015. Available: Emprimus.com.

Published

2015-12-31

How to Cite

Davlyatov, S., Mahfouz, T., Jones, J. W., & Attallah, S. (2015). Susceptibility of a Smart Home to Intentional Electromagnetic Interference Attacks. Journal of Advance Research in Electrical & Electronics Engineering (ISSN 2208-2395), 2(12), 01-09. https://doi.org/10.53555/nneee.v2i12.173