Susceptibility of a Smart Home to Intentional Electromagnetic Interference Attacks
DOI:
https://doi.org/10.53555/nneee.v2i12.173Keywords:
Smart Homes, ElectroMagnetic Interference,, Intentional ElectroMagnetic Interference, Cost AssessmentAbstract
Technology advancements are shaping the construction industry gradually. Smart homes have become a reality and in some cases a trend due to these advancements. Although the literature includes multitude of efforts addressing the technologies used in smart homes, integration processes, and privacy issues, little exists about their vulnerability to Intentional ElectroMagnetic Interference (IEMI). In an attempt to address this gap, the purpose of this paper is to investigate the proliferation of smart home technologies, their susceptibility to IEMI attacks, currently available mechanisms of defense, and to provide a cost assessment model of the most suited protection approaches to be adopted by the construction industry. To that end, the adopted research methodology collected and analyzed a set of relevant peer reviewed publication within the domain, and developed different construction cost estimates utilizing standard reference books, like RSMeans, and direct contact with system suppliers. The outcomes of the aforementioned methodology yielded two potential protection methods, namely full protection of the home shell; and partial protection for essential components while providing a detection system of potential attacks. The average achieved costs per square foot range from $7.91 to $20.11 depending on the selection of material and type of finish. It is instigated that the outcomes of this research provide a much needed knowledge about the propensity of smart homes to IMEI attacks and provide a guidance cost estimate for protection mechanism. It also provides a better understanding for home owners regarding their decisions.
References
. Jones, Nick, “The Future Smart Home: 500 Smart Objects Will Enable New Business Opportunities”, Gartner.com, 2014.
. Aldrich, K. F., “Smart Homes: Past, Present and Future”, R. Harper, Ed., Inside the Smart Home. London: Springer London, 2003, pp. 17-39.
. California Emerging Technology Fund (CETF). (2008) CETF page on Smart Housing Initiatives. [Online], Retrieved December 8, 2015. Available: http://www.cetfund.org/investments/initiative-smart-housing
. Neighborhood housing and community Development. (2008). Neighborhood housing and community Development page on S.M.A.R.T. Housing Policy. [Online]. Retrieved December 8, 2015. Available: https://www.austintexas.gov/sites/default/files/files/Housing/Application_Center/SMART_Housing/smart_guide_0708.pdf
. Weiser, M., Gold, R., & Brown, J. S.. “The origins of ubiquitous computing research at PARC in the late 1980s,” IBM Systems
Journal, vol. 38 (4), pp. 693-695, 1999.
. Zhao, H. and Wu, D., “Definition, Function, and Framework Construction of a Smart Road,” in Proc. International Symposium on Frontiers of Road and Airport Engineering, 2015, pp. 204-218.
. Ofei-Amoh, R. and Syal, M., "Installation Aspects of Smart Grid," Practice Periodical on Structural Design and Construction,vol. 18(1), pp. 56-66, 2013.
. iControl Networks. (2015). iControl Networks page on 2015 State of The Smart Home Report. [Online], Retrieved September 21, 2015. Available: iControl Insights Blog: http://www.icontrol.com/blog/2015-state-of-the-smart-home-report/
. Greenough, J. (2015). Business Insider page on The American Smart Home Market: 2015 [Slide Deck]. [Online], Retrieved
September 21, 2015. Available: http://www.businessinsider.com/the-american-smart-home-market-2015-slide-deck-2015-8
. Backstrom, M., “The threat from intentional EMI against the civil technical infrastructure,” in ESW2006, 3rd European Survivability Workshop, Toulouse, France, 2006.
. Radasky, W., & Savage, E., “Intentional Electromagnetic Interference (IEMI) and Its Impact on the U.S. Power Grid,”Metatech Corporation, Goleta, CA, Meta-R-323, 2010.
. Radasky, W. A. (2014). IEEE Spectrum page on Electromagnetic Warfare Is Here. [Online], Retrieved October 24, 2015. Available: http://spectrum.ieee.org/aerospace/military/electromagnetic-warfare-is-here/
. Wilk, M. W., & Radasky, A. W., “Intentional Electromagnetic Interference (IEMI)–Background and Status of the Standardization Work in the International Electrotechnical Commission (IEC),” in Proc. 27th URSI Gen. Assem., Maastricht, Olanda, 2002, p. 27.
. Parfenov, V. Y., Zdoukov, L. N., Radasky, W. A., & Ianoz, M., “Conducted IEMI Threats for Commercial Buildings,” IEEE Transactions on Electromagnetic Compatibility, vol. 46 (3), pp. 404-411, 2004.
. Kasmi, C., Lopes-Esteves, J., Picard, N., Renard, M., Beillard, B., Martinod, E., et al., “Event Logs Generated by an Operating System Running on a COTS Computer During IEMI Exposure,” IEEE Transactions on Electromagnetic Compatibility, vol. 56 (3), pp. 1723-1726, 2014.
. Leach, R. and Alexander, M.B., “Electronic System Failures and Anomalies Attributed to Electromagnetic Interference,” NASA, MSFC, Alabama, NASA Reference Publication 1374, 1995.
. Schriner, D., “Radio Frequency Weapons and Proliferation: Potential Impact on the Economy,” J. E. Hearing, Interviewer, 1998.
. Fachot, M. “iecetch page on TC work to help thwart potential threats: Preventing electromagnetic interference from nuclear
and other weapons. [Online], Retrieved September 25, 2015. Available: http://iecetech.org/issue/2013-10/TC-work-to-help-thwart-potential-threats
. (2015) The International Electrotechnical Commission (IEC) website. [Online]. Available: http://www.iec.ch/dyn/www/f?p=103:7:0::::FSP_ORG_ID:1387
. Brauer, F., Fahlbusch, S., ter Haseborg, J., & Potthast, S., “Investigation of Hardening Measures for IT Equipment against Radiated and Conducted IEMI,“ IEEE Transactions on Electromagnetic Compatibility, vol. 54(5), pp. 1055, 2012.
. Dawson, J. F., Flintoft, D. I., Marvin, A. C., & Garbe, H., “A Cost-Efficient System for Detecting an Intentional Electromagnetic Interference (IEMI) Attack,” in Proc. International Symposium on Electromagnetic Compatibility (EMC Europe 2014), Gothenburg, Sweden, 2014.
. Emprimus. (2015). Emprimus page on Electromagnetic Threat Detection. [Online], Retrieved October 26, 2015. Available: Emprimus.com.
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.