Susceptibility of a Smart Home to Intentional Electromagnetic Interference Attacks
DOI:
https://doi.org/10.53555/nneee.v2i12.173Keywords:
Smart Homes, ElectroMagnetic Interference,, Intentional ElectroMagnetic Interference, Cost AssessmentAbstract
Technology advancements are shaping the construction industry gradually. Smart homes have become a reality and in some cases a trend due to these advancements. Although the literature includes multitude of efforts addressing the technologies used in smart homes, integration processes, and privacy issues, little exists about their vulnerability to Intentional ElectroMagnetic Interference (IEMI). In an attempt to address this gap, the purpose of this paper is to investigate the proliferation of smart home technologies, their susceptibility to IEMI attacks, currently available mechanisms of defense, and to provide a cost assessment model of the most suited protection approaches to be adopted by the construction industry. To that end, the adopted research methodology collected and analyzed a set of relevant peer reviewed publication within the domain, and developed different construction cost estimates utilizing standard reference books, like RSMeans, and direct contact with system suppliers. The outcomes of the aforementioned methodology yielded two potential protection methods, namely full protection of the home shell; and partial protection for essential components while providing a detection system of potential attacks. The average achieved costs per square foot range from $7.91 to $20.11 depending on the selection of material and type of finish. It is instigated that the outcomes of this research provide a much needed knowledge about the propensity of smart homes to IMEI attacks and provide a guidance cost estimate for protection mechanism. It also provides a better understanding for home owners regarding their decisions.
References
. Jones, Nick, “The Future Smart Home: 500 Smart Objects Will Enable New Business Opportunities”, Gartner.com, 2014.
. Aldrich, K. F., “Smart Homes: Past, Present and Future”, R. Harper, Ed., Inside the Smart Home. London: Springer London, 2003, pp. 17-39.
. California Emerging Technology Fund (CETF). (2008) CETF page on Smart Housing Initiatives. [Online], Retrieved December 8, 2015. Available: http://www.cetfund.org/investments/initiative-smart-housing
. Neighborhood housing and community Development. (2008). Neighborhood housing and community Development page on S.M.A.R.T. Housing Policy. [Online]. Retrieved December 8, 2015. Available: https://www.austintexas.gov/sites/default/files/files/Housing/Application_Center/SMART_Housing/smart_guide_0708.pdf
. Weiser, M., Gold, R., & Brown, J. S.. “The origins of ubiquitous computing research at PARC in the late 1980s,” IBM Systems
Journal, vol. 38 (4), pp. 693-695, 1999.
. Zhao, H. and Wu, D., “Definition, Function, and Framework Construction of a Smart Road,” in Proc. International Symposium on Frontiers of Road and Airport Engineering, 2015, pp. 204-218.
. Ofei-Amoh, R. and Syal, M., "Installation Aspects of Smart Grid," Practice Periodical on Structural Design and Construction,vol. 18(1), pp. 56-66, 2013.
. iControl Networks. (2015). iControl Networks page on 2015 State of The Smart Home Report. [Online], Retrieved September 21, 2015. Available: iControl Insights Blog: http://www.icontrol.com/blog/2015-state-of-the-smart-home-report/
. Greenough, J. (2015). Business Insider page on The American Smart Home Market: 2015 [Slide Deck]. [Online], Retrieved
September 21, 2015. Available: http://www.businessinsider.com/the-american-smart-home-market-2015-slide-deck-2015-8
. Backstrom, M., “The threat from intentional EMI against the civil technical infrastructure,” in ESW2006, 3rd European Survivability Workshop, Toulouse, France, 2006.
. Radasky, W., & Savage, E., “Intentional Electromagnetic Interference (IEMI) and Its Impact on the U.S. Power Grid,”Metatech Corporation, Goleta, CA, Meta-R-323, 2010.
. Radasky, W. A. (2014). IEEE Spectrum page on Electromagnetic Warfare Is Here. [Online], Retrieved October 24, 2015. Available: http://spectrum.ieee.org/aerospace/military/electromagnetic-warfare-is-here/
. Wilk, M. W., & Radasky, A. W., “Intentional Electromagnetic Interference (IEMI)–Background and Status of the Standardization Work in the International Electrotechnical Commission (IEC),” in Proc. 27th URSI Gen. Assem., Maastricht, Olanda, 2002, p. 27.
. Parfenov, V. Y., Zdoukov, L. N., Radasky, W. A., & Ianoz, M., “Conducted IEMI Threats for Commercial Buildings,” IEEE Transactions on Electromagnetic Compatibility, vol. 46 (3), pp. 404-411, 2004.
. Kasmi, C., Lopes-Esteves, J., Picard, N., Renard, M., Beillard, B., Martinod, E., et al., “Event Logs Generated by an Operating System Running on a COTS Computer During IEMI Exposure,” IEEE Transactions on Electromagnetic Compatibility, vol. 56 (3), pp. 1723-1726, 2014.
. Leach, R. and Alexander, M.B., “Electronic System Failures and Anomalies Attributed to Electromagnetic Interference,” NASA, MSFC, Alabama, NASA Reference Publication 1374, 1995.
. Schriner, D., “Radio Frequency Weapons and Proliferation: Potential Impact on the Economy,” J. E. Hearing, Interviewer, 1998.
. Fachot, M. “iecetch page on TC work to help thwart potential threats: Preventing electromagnetic interference from nuclear
and other weapons. [Online], Retrieved September 25, 2015. Available: http://iecetech.org/issue/2013-10/TC-work-to-help-thwart-potential-threats
. (2015) The International Electrotechnical Commission (IEC) website. [Online]. Available: http://www.iec.ch/dyn/www/f?p=103:7:0::::FSP_ORG_ID:1387
. Brauer, F., Fahlbusch, S., ter Haseborg, J., & Potthast, S., “Investigation of Hardening Measures for IT Equipment against Radiated and Conducted IEMI,“ IEEE Transactions on Electromagnetic Compatibility, vol. 54(5), pp. 1055, 2012.
. Dawson, J. F., Flintoft, D. I., Marvin, A. C., & Garbe, H., “A Cost-Efficient System for Detecting an Intentional Electromagnetic Interference (IEMI) Attack,” in Proc. International Symposium on Electromagnetic Compatibility (EMC Europe 2014), Gothenburg, Sweden, 2014.
. Emprimus. (2015). Emprimus page on Electromagnetic Threat Detection. [Online], Retrieved October 26, 2015. Available: Emprimus.com.
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Terms & Condition
Submission -
Author can submit the manuscript through our online submission process or email us at the designated email id in contact details.
The other mode of submission not accepted than online and email.
Before submission please read the submission guidelines.
NN Publication accepts only article submitted in pdf/doc/docx/rtf file format. Another format except given file formats will no be considered .
Author will be responsible for the error mistakes in the submission files. The minor changes can be done without any cost after publication. But for major changes NN Publication may charges you the editing charges.
Publication (Online) -
The online publication is scheduled on last date of every month, but it can be delayed by 24 to 48 hours due to editorial process if huge number of articles comes to publish in single issue.
Automatic notificatation email will be sent to the all users on publication of an issue, so its author’s duty to check their email inbox or SPAM folder to get this notification.
After publication of article author can not withdraw their article.
If editor’s found any issue after publication of article then the NN Publication have the authority to remove the article from online website.
No refund will be provided after online publication of article.
Publication (Print) -
The print copy publication are sent as per the author’s request after 2 weeks of online publication of that issue.
NN Publication will ship the article by India Post and provide the consignment number on dispatch of print copy.
NN Publication follows all the guidelines of delivery provided by IndiaPost and hence not responsible for delay in delivery due to any kind of reasons.
Refund of hard copy will not be provided after dispatch or print of the journal.
NN Publication will be responsible for raise a complain if there is any issue occurs in delivery, but still will not be responsible for providing the refund.
NN Publication will be responsible to resend the print copy only and only if the print copy is lost or print copy is damaged in delivery / or there is delay more than 6 months.
According to India Post the delivery should be completed with in 1-3 weeks after dispatch of articles.
Privacy Policy-
NN Publicationl uses the email ids of authors and editors and readers for sending editorial or publication notification only, we do not reveal or sell the email ids to any other website or company.