You are on page 1of 4

2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE 2021)

2021 IEEE 2nd International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE) | 978-1-6654-1540-8/20/$31.00 ©2021 IEEE | DOI: 10.1109/ICBAIE52039.2021.9389849

Smart Home Security Analysis System Based on The


Internet o f Things
Rui Yu X iaohua Z hang*
D epartm ent o f C om puter Science and T echnology State Grid Shandong E lectric Pow er W eifang Pow er Supply
O cean U niversity o f China Com pany
Q ingdao, Shandong, C hina W eifang, Shandong, China
yurui@ stu.ouc.edu.cn C o rre sp o n d in g author: 1041740457@ qq.com

M inyuan Z hang
D epartm ent o f Com puter Science and Technologry Ocean
U niversity o f C hina
Q ingdao, Shandong, C hina
zhangm inyuan@ stu.ouc.edu.cn

Abstract—In recent years, the Internet of Things technology "mining" malware directly captures them. The attack method of
has developed rapidly and has a wide range of applications in the equipment computing resources has not been taken seriously.
fields of smart home, Internet of Vehicles, and Industrial Internet Manufacturers want to control costs, most of the IoT devices
of Things. Most of the emerging smart devices have relatively on the market have very limited computing resources and
simple architectures, and security vulnerabilities may exist in the performance. It is not feasible to use complex security software
perception layer, transport layer, and application layer. At on the device, and add new security protection equipment to
present, most of the security analysis frameworks for IoT devices the home network.
require additional high-performance devices. At the same time,
the emerging "mining" malware and other attack methods that This paper puts forward a smart home security analysis
directly plunder the computing resources of the device have not system based on home routers by studying a variety of smart
received attention. In response to the above problems, this paper home devices. The system can effectively detect and defend the
designs and implements a smart home security analysis system. current contact attacks that smart homes may suffer, such as
Our experiments show that the system can effectively detect and firmware implantation attacks, non-contact attacks and attacks
defend against contactless attacks that smart homes may suffer, on computing resources. At the same time, plug-ins can be used
and has a small impact on home network performance. The to cover possible vulnerabilities in the future. The system
system can better solve the contradiction between smart home supports the protection of home network security without
network security requirements and device performance
adding any external devices. This paper designs simulation
limitations.
experiments to test devices such as "smart speakers", and
Keywords-Internet o f Things; Smart Home Security; Malware "smart routers". Our experiments show that the system detects
Detection; Firmware Security and mitigates common attacks effectively, and has a small
impact on home network performance.
I. In t r o d u c t io n
II. Re l a t ed Wo r k
The Internet of Things (IoT) is a system composed of
interconnected computing devices, machinery, objects, animals In 2015, Subramanyan [2] used symbolic execution to
or people, and can transmit data through the network to achieve detect the security of the information flow in the firmware. In
direct interaction between things. In recent years, as the 2017, DeMarinis [3] conducted a multi-dimensional analysis of
Internet of Things technology continues to heat up, more and the network traffic of IoT devices and proved that it is feasible
more smart home devices have provided convenience to to build a policy-based malicious traffic restriction framework.
people's lives. However, in the past few years, the security Lau [4] found that Amazon Echo smart speakers exposed
vulnerabilities of smart home devices have been exploded. debugging interfaces, which can directly implant backdoor
Smart home devices have been compromised and turned into programs into smart speakers to realize remote control and
"monitoring devices" or used to launch DDoS (Distributed monitoring of the speakers. Zhang [5] found that it is possible
Denial of Service) attacks [1]. to use ultrasonic waves that cannot be heard by humans to
attack smart speakers to achieve complete control of smart
Although the research on the security of smart home speaker devices. The advantage is that the user cannot detect
systems is gradually increasing, it is still in its infancy. At the existence of the attack, and the disadvantage is also obvious
present, there are many IoT devices on the market, but the that the attack can not be too far away.
protection functions of these IoT devices are very lacking. For
firmware vulnerabilities, we can only wait for manufacturers to III. Th e De s i g n of Sm a r t H o m e Se c u r it y An a l y s is
repair and update the firmware. However, most of the current Sy s t e m
security analysis frameworks for IoT devices require additional The smart home security analysis system model
high-performance devices. At the same time, the emerging implemented in this paper is shown in Fig. 1. The system
978-1-6654-1540-8/21/$31.00 ©2021 IEEE
596

Authorized licensed use limited to: Carleton University. Downloaded on May 28,2021 at 15:02:44 UTC from IEEE Xplore. Restrictions apply.
mainly includes the traffic capture module, the traffic analysis detection module mainly detects "mining" malware, monitors
module, the system detection module, and the warning the progress of the system in real time, restricts abnormal
notification module. The traffic capture module captures the processes that occur, and sends notifications to users through
traffic passing through the router, which is used in the next the warning notification module. The warning notification
traffic analysis module. The traffic analysis module will module sends warning notifications to users. When the system
perform matching analysis on the captured traffic to determine detects an attack or a vulnerability that cannot be handled, it
whether the traffic is malicious traffic or unexpected traffic, can promptly notify users of the existence of security risks
and the captured traffic is cleaned and reissued. The system

The traffic analysis


module

Protocol analysis
Inflow
Inflow
Implant attack analysis

Outflow <=■ Outflow

The System Detection Module


System performance testing

r> Exploit detection


Plugin
V
library
> Repair

Figure 1. The process of smart home security analysis system.

A. The traffic capture module Netfilter framework to capture traffic. The Netfilter framework
sets up five monitoring points [6]. At each monitoring point,
The traffic capture module collects the data packets that developers can write their own callback functions (HOOK) to
need to be inspected, and delivers them to the traffic analysis analyze and process the traffic flowing there. The location of
module for further processing. This module mainly uses the the monitoring points are shown in Fig. 2.

-Message entry- — Message export-

After the network data packet enters the IP layer, it first TABLE I. Ca l l b a c k f u n c t io n r e t u r n v a l u e a n d c o r r e s po n d in g
passes through the PRE_ROUTING point to determine whether OPERATION.
the destination address is local. If it is, it will be transferred
Function
from the LOCA_IN point to the upper layer protocol stack, return value
Operation
otherwise, it will pass through the FORWARD point and flow
NF_DROP Drop this packet
out via POST_ROUTUNG. The data packet sent by this
machine passes through LOCA_OUT point and flows out NF_ACCEPT Keep this packet
through POST_ROUTUNG. At the same time, after the Hook
NF_STOLEN Ignore this packet
function completes the verification of the data packet, it can
return different values to perform different operations on the Insert data packet into
NF_QUEUE
user space
data packet. The return value and corresponding operation are Call this callback
shown in tab. I . NF_REPEAT
function again

597

Authorized licensed use limited to: Carleton University. Downloaded on May 28,2021 at 15:02:44 UTC from IEEE Xplore. Restrictions apply.
The traffic capture module mainly obtains data packets at • In the first method, the risk information is sent to the
the two hooks PRE_ROUTING and POST_ROUTUNG. Then, owner's mailbox by email to remind the owner that a
the traffic analysis module will be invoked to perform certain device has a security risk, and the owner is
statistical analysis on the captured data packets. requested to perform the corresponding repair
operation.
B. The traffic analysis module
• The second method is page jump notification. This
This module analyzes the amount, content, and protocol method is used in emergency situations. All pages
types of traffic passing through smart home devices, and accessed by the user are redirected to the alert
determines whether the data packet contains malicious content, information page.
abnormal protocols, or whether there is abnormal flow in the
flow through it, whether there is abnormal increase in flow, etc. IV. Ev a l u a t io n

After the traffic is acquired, the traffic analysis module first In order to verify the actual effect of the smart home
classifies and recognizes the protocol, address, main content, security analysis system, this paper installs the analysis system
etc. in the data packet for subsequent detection and analysis. If on the experimental router and selects smart home devices
the device has monitoring capabilities, such as smart speakers, from different manufacturers and models to connect to the
smart TVs, smart cameras, etc., the module detects router. The performance experiment selects common network
implantation attack and extracts fingerprints from fingerprint operations of ordinary users to verify the impact of the system
database for matching identification. If the device does not on home network performance.
have monitoring components, the protocol of the device needs
A. The Equipment
to be screened. After passing the protocol detection, malicious
content and illegal IP screening will be carried out. After all the The details of the smart router equipped with the security
above checks are passed, it is necessary to perform statistics on analysis system is shown in tab. II.
recent traffic to determine whether there is a short-term surge
TABLE II. THE DETAILS OF THE SMART ROUTER.
in traffic, and finally decide whether to release the traffic.
C. The System Detection Module Model NETGEAR WNDR4300
WLAN
The main function of the system detection module has two Atheros AR9344
Hardware
parts:
CPU MHz 560
• The first part is aimed at "mining" malicious files, real-
RAM MB 128
time detection of system performance, and system
timing tasks to find suspicious items. Flash MB 128NAND
• The second part is explores the possible weaknesses of Release OpenWrt Chaos Calmer
the system and the smart home devices connected to
The Linux
the local launch hotspot. For the vulnerabilities that 3.18.29
kernel version
have been exposed, the verification scripts and
The details of the laptop used in the attack experiment
mitigation scripts are specially written, and they are
platform is shown in tab. III.
regularly checked and repaired.
The first part is the detection of "mining" malicious files. TABLE III. Th e d e t a il s o f t h e l a pt o p .
The main purpose of "mining" malicious files obtain benefits
by plundering the computing resources of the device. In order Brand Name Hasee
to maximize the benefits, the device's CPU is generally fully Model
utilized. The detection method of this module is filtering the K670E-G6E3
Number
processes that restart frequently, and obtaining their CPU CPU Intel i5 8400
occupancy rate to distinguish whether they are "mining"
malicious files. The second part is device vulnerability CPU MHz 2.8GHz
detection. This module plays a role by maintaining the POC RAM 8GB
plug-in library and the corresponding repair plug-in library. It Hard Drive
is necessary to regularly write POC scripts and corresponding 256GB+1TB
Capacity
repair scripts for vulnerabilities that burst on the network. The details of the Smart speaker is shown in tab. IV.
D. The warning notification module
TABLE IV. Th e d e t a il s o f t h e Sm a r t Sp e a k e r .
The warning notification module is responsible for sending
reports to users after receiving risk messages from other CPU Allwinner R16
modules. This module needs to notify users as quickly as
Architecture ARMv7
possible so that users can find risks and take measures as early
as possible. This module adopts two notification methods RAM 256MB
according to different security risk levels to improve the Operating
OpenWrt
success rate of users receiving notifications System
The Linux
Linux 3.4
kernel version

598

Authorized licensed use limited to: Carleton University. Downloaded on May 28,2021 at 15:02:44 UTC from IEEE Xplore. Restrictions apply.
B. Experimental Results selected to simulate the real scenario. The "mining" malware
In the non-contact attack experiment, in order to approach scrlPt is modified and uPloaded to the device through scp. The
the real usage scenario, the open source botnet virus Mirai[7] is final experimental results are shown in tab. V

TABLE V. N o n -c o n t a c t a t t a c k d ef en se r esu l t .

Equipment Protocol Attack Method Result


Smart HTTP Command Injection Success
Router(TP-
Link) HTTP Stack Overflow Success
Smatr TCP DDos Mirai Success
Router(NETG
EAR) HTTP "Mining" Malware Success

The system is built in a home wireless router and needs to


analyze and process the passing traffic. This is equivalent to V. CONCLUTION
adding a step to the normal network access, which will affect This paper designs and implements a router-based smart
the throughput of the original network. In order to cover the home security analysis system. Our experiments show that the
network operations of users who use the network daily, four smart home security analysis system can effectively detect and
different performance test items are designed. The results are defend against the attacks, and it can use plug-ins to cover
shown in tab. VI. possible vulnerabilities in the future.
• Using the ping command to test the response time of The next step will consider introducing machine learning
the network. algorithms into the system, so that abnormal traffic can be
• Using the system ftp command to download a specific identified more accurately.
file, and counting the total time and average download
speed. Re f e r en c es

• Using the system wget command to download files, [1] Antonakakis, Manos, et al. "Understanding the mirai botnet." 26th
and counting the total time and average download {USENIX} security symposium ({USENIX} Security 17). 2017.
speed. [2] Subramanyan, Pramod, et al. "Verifying information flow properties of
firmware using symbolic execution." 2016 Design, Automation & Test
• Using a browser to open frequently used web pages in Europe Conference & Exhibition (DATE). IEEE, 2016.
and calculating the average time consumption.
[3] DeMarinis, Nicholas, and Rodrigo Fonseca. "Toward usable network
traffic policies for IoT devices in consumer networks." Proceedings of
TABLE VI. Th e r esul t of Sy s t e m pe r f o r m a n c e Te s t . the 2017 Workshop on Internet of Things Security and Privacy. 2017.
[4] Lau, Josephine, Benjamin Zimmerman, and Florian Schaub. "Alexa, are
Result
you listening? privacy perceptions, concerns and privacy-seeking
Test Item The system is The system is behaviors with smart speakers." Proceedings of the ACM on Human-
turned on not turned on Computer Interaction 2.CSCW (2018): 1-31.
pmg 22.951ms 24.287ms [5] hang, Guoming, et al. "Dolphinattack: Inaudible voice commands."
Proceedings of the 2017 ACM SIGSAC Conference on Computer and
3.32s 3.91s
ftp Communications Security. 2017.
(9.34MB/s) (7.93MB/s)
[6] Yang, Yang, and Wang Yonggang. "A software implementation for a
6.52s 7.53s
wget hybrid firewall using linux netfilter." 2010 Second World Congress on
(10.41MB/s) (9.02MB/s) Software Engineering. Vol. 1. IEEE, 2010.
browser 10.91s 11.22s [7] GITHUB. Mirai Source Code. https://github.com/jgamblin/Mirai-
Source-Code.

599

Authorized licensed use limited to: Carleton University. Downloaded on May 28,2021 at 15:02:44 UTC from IEEE Xplore. Restrictions apply.

You might also like