You are on page 1of 4

Smart Home Robot: System Discovery

Student Name
Course Name
Subject Name
Professor’s Name
Phone Number
Email Address

ABSTRACT Not only does a Smart house help to understand environmental


The developments of the previous half-century have made the conditions, but it also allows the user to monitor the home with
dream of a supernatural robot serving and protecting humanity the support of various video sensors and feed, as showing in
accessible. Smart house robots have infiltrated our lives with the figure 1. That is one of the smart home’s most significant
rapid growth of science and technology. Smart house robot, a new functions. Monitoring follows up on all home activities. The data
generation of robot in response to science and technology monitored contributes to decision-making. The user takes action
progress, is one form of smart mobile robot. The intelligent house depending on the practical information [2]. For example, if a gas
robot can control itself and adapt to the home environment. The leakage is detected, it will be monitored, and the information will
robot can execute functions of information learning and be transmitted to the customer for action. In recent times, the
interaction since it is equipped with numerous sensing devices. smart home has become much more popular, as daily lives
The Smart Home robot is an Internet of Things and artificial become easier thanks to the rapid development of technology.
intelligence combo whose tasks include house automation and Nearly all are digitalized and automatic.
maintenance elements. This document offers information about
cyber assaults in connection with an analysis of the linked ideas of
2. CYBER-ATTACKS ON SMART
smart house robotics. HOME SYSTEM
The design and deployment of smart production systems are
Keywords assumed to be separated from outside the world and the rest of the
Technology, smart system, smart home, cloud attacks, DDoS, company network. It does not necessarily mean, on the one hand,
robots, vulnerability that remote attackers do not have to be taken into account: distant
attackers use alternate ways that may be indirect (for example,
1. INTRODUCTION tainted logic automated or software modifications). On the other
Smart environments provide effective monitoring and health hand, maybe even more pertinently, the hypothesis that local
evaluation methods. With the development of technology, home assailants have full capacity means: because of the lack of
automation is quite simple and economical. Direct or continuous isolation among parts of a smart manufacturing system (e.g., all
control with the house system can increase the important PLCs and computers on a single flat network), almost every
improvement in the quality of life on a mobile device at any time. endpoint can trust, and any local attacker can do anything that
In smart home systems, the sensors can help sensitive they want.
environmental information. Sensitive environmental variables are
Attackers do not even sit back and hope to see a high-profile,
transmitted to a method based or account. The environmental
susceptible, smart web browser primed for attack by search
characteristics include the proportion of gases present in the
engines like Shodan. We feel it is more likely for a sophisticated
surrounding atmosphere, temperature, and the number of people
attacker profile than unusual attack paths such as those we cover
entering the house. The user might receive this alert information
in this comprehensive paper. This option is helpful because smart
regularly or at a specified interval of time. The alarm information
production systems live in an extensive interdependency while
can be communicated as a mail or text message [1].
manufactured with hardware. Only one minor portion of the issue
is hardware [2]. There are other elements: software, library,
developer, business connections, etc., such as software used to
produce other software, libraries offered by one company,
infrastructure providers working for various factories. There are
also more components of this system. The research explains how
this impacts the types of attacks feasible in smart production
processes, such as harmful industrial add-ons and custom IIoT
devices.
Once an attacker arrived in a smart production system, they have
different lateral travel opportunities that we believe were
previously undiscovered. In the robotic automation logic, we
uncovered security-critical design problems, which generate a
weakness (for which there are not yet automatic weakness
scanners) and low malevolent logic to be carried out [3].
It is not a smart production system in a vacuum [4]. There is a
Figure 1: Smart Home complicated network of machinery, components, and people that
threat actors can use to launch both traditional and non-
conventional attacks [5]. We expect this research to enhance data. This may offer substantial concerns to the privacy of
awareness amongst the individuals who operate smart production individuals, such as sensitive client information, which may lead
systems by drawing attention to the different attacks that must be to data being stolen or to the business end.
focused on, especially unusual.
2.1 Phishing
The modern implementation of the fully integrated automation
approach (TIA) created by Siemens since 1996 can be viewed as Phishing could be the first step in jeopardizing the process for
smart manufacturing systems. However, the diversity of smart customers and companies. Hackers would exploit customer
manufacturing systems makes it impossible, or even fruitless, to information to obtain important information about the firm, in this
define them in “crisp.” From the point of view of security case, information about the power supply, without appropriately
research, it is difficult to access a fully functional system suitably destroying the facts or payment receipts. With this data, the
generic and implemented under actual settings because the hacker would use social engineering. On the other hand,
concept of the smart manufacturing “generic” or “reference” does employees may face various hazards, such as fraudulent emails or
not truly exist [5]. Therefore, any security analysis — evens the communications that appear like real emails. Employees may
one — should be regarded with the salt grain: Conclusions like provide personal information that may lead to a hack [8]. The
“All smart production systems are unsafe,” or, worse, attacks are risks that arise undoubtedly concern a Smart Grid client, who may
ready for use as “the way to secure smart systems” is easily harm clients mentally and financially by disclosing the
reached. information on unknown sources and not knowing the
implications of such risks. However, it is an essential worry when
it comes to security precautions against phishing attempts.
2.2 Denial-of-Service
Denial-of-Service (DoS) is a strategic attack that is then a part of
the DoS attack. Concerning the Smart Grid, leading services are
provided for Smart Grids, which means that a Denial-of-Service
attack is available. The connectivity of the Smart Grid has to be
safe and reliable. The link connections must be dependable and
secure as the Smart Grid distributes the connecting to numerous
devices using decentralized architectural systems in a greater area.
When the Smart Grid is attacked (Dos), the loss is substantial. The
attack on Denial-of-Service affects the interference and is a
common means of attacking the OSI model’s application and
data-link layers [9]. Hackers may adjust the MAC address and
Figure 2: Attacks on Smart Home System utilize a hacker tool like Tsunami Backdoor, allowing hackers to
flood the network with normal network connections. Hacker’s
MAC address may also be modified. In addition, the OSI-Model
It is tough to defend a smart production system since the provides a network- and transportation layer security protocol like
environment itself is complicated. It is necessary to focus on TCP, SSL, and IPv6; however, methods are vulnerable from the
“keeping attackers out,” but this is the standard recommendation network infrastructure of Smart Grid. However, the assault (DoS)
for decades, no matter the system. Such a strategy is not future- is carried out mostly in the OSI Model Application Layer since
proof since, compared with conventional, static applications, there the Application Lays allow the sending and reception of data. If
is a tendency to expand connection and flexible set-up with the attack (DoS) happens, the communication system may stop
flexible plants [6]. It affects security rules so that each endpoint or reacting to different devices regarding the smart grid.
machine in a production plant is recognized, and the floor is open
to a more detailed approach. It affects security practices as 2.3 Malware spreading
showing in figure 2. As we will illustrate, networking Malware spreading, which is the main issue, can be the main risk
communication from an industrial robot, for example, may not facing the Smart Grid. Infecting organizing servers and infected
come from the software which is trustworthy because it may be devices can generate malware that may be spoken of by attackers.
misleading or misused. The difficulty is that there is currently no The attacker can alter the functioning of devices and systems by
straightforward verifying and signing of the information and utilizing malware propagation, which will enable an attacker to
services transmitted to such complex systems. gain access to sensitive information collection.
Some smart devices do not have system hardening (provide
various protection techniques to secure them). Many may even
2.4 Eavesdropping and traffic analysis
have defined passwords or passwords discovered in device Spoofing assaults are types of eavesdropping and traffic analysis.
software without encryption. By monitoring the network, an attacker may get sensitive data.
Because of the huge network that it comprises, the Smart Grid has
For some connected device producers, security is not a top
numerous network nodes, and the network devices to the bigger
concern, and all it takes is a vulnerable device for hackers to get
network cannot be maintained without this risk. The Smart Grid
access to private or sensory data, leaving the whole local network
poses the greatest chance that data will be stolen and is the main
in danger.
concern for the data security of the entire world. During a civil
These proposals are possible common risks that could threaten
war on 25 December 2015, a cyber-attack breakout took place. A
smart grids effectively. Smart Grids could potentially take several
power plant in Ivano-Frankivsk, Ukraine, focused cyber-attacks
hazards, which might harm organizations and regular users [7].
which had an important influence in the dark on 80,000 of those
Not only can these threats harm customers’ homes when they use
the Internet, while opponents might gather information from their
who were exposed to risk, compared to one million, 400,000 (1,4 3.3 Hardware
million) of them.
The system of hardware has six pieces. ATMEGA328
The cyber-attack was carried out with a spear-phishing email and Microcontrollers are available, such as a sensor, smoke sensor,
software from the Trojan horse, called Black Energy. This mighty gas sensor, robot, GSM Modem, ZigBee, and camera. There are
malware was able to delete data, damaged hard drives, and control also sensors available. For controlling and monitoring activities,
affected systems. The cyberattack intensified when the attacker the ATMEGA 328 microprocessor is used. It is used to read the
launched the corporation’s organized Denial-of-Service (DoS) sensor’s measuring value, enter a step-motor and LED module
attack, paralyzing the power plant management phone line. As a control input, analog-digital converters, and data transmissions for
result, users could not contact the disruption (DoS attack). The the sensor value flow. The microprocessor transmits the sensor’s
cyberattack not only stole the information but also disrupted a analog electrical signal to digital. After the microprocessor
nation’s essential infrastructure, which evolved immensely and receives a digital signal, the value is sent by the wireless network
decisively. The circumstance is undoubtedly the most disastrous from the sensors to the robot.
incidence since many people have had hard cold weather without
electricity.
3. SYSTEM ARCHITECTURE 4. RELATED WORKS AND SUMMARY
For the smart home system, robotics is an intriguing technology.
Figure 1 shows the architecture of the system. There are major
The robot’s components are a camera, the GSM modem, the
blocks concerned: the sensors, the system of WSN, the camera,
ZigBee Module. Researchers started to employ interior
and the robot. Sensors: S1- sensor of temperature, S2- sensor
environment robots with cameras. The security cameras on robots
LPG, S3- sensor of smoke.
can be relocated to other locations for new viewpoints of
photography—a camera used in an emergency to communicate
images to the user. We have introduced a smart home system with
Robotics and WSN, development and implementation. The
architecture and realization using WSN and the smart home robot
where our robot and our surroundings are intelligent collaborators.
The system has effectively addressed several inconveniences of
conventional systems by lowering the complexity of the circuit,
electricity usage, and management but ensuring flexible and
accurate environmental maintenance. Engineering has always
sought to build smart home systems tools and methodologies.
Meanwhile, researchers are continually seeking very popular and
efficient techniques for the intelligent home system. In recent
years, robotics and WSN in the intelligent home system are
becoming popular generally. Smart home systems Wireless
Sensor Networks (WSNs) can collect data after an incident such
as gas explosion or smoke detectors or any user order. The
technical challenges of employing a network such as installation,
operation of the system and information collection using a
wireless communication include ensuring that power is supplied at
the sensor network, minimizing costs. Robotics robots are often
Figure 2: Architecture of Smart Home used for household purposes in the realm of rapid development.
The WSN System offers information storage, sensor monitoring
in an intelligent home, tasks sent by the user, and task monitoring
5. REFERENCES
by the robot.
3.1 Autonomous Mode
Each room under surveillance employs several installed sensors,
which gather and transmit an alarm daily in an emergency. The
home server analyses the website data and gives users the facts to
make decisions. The robots take the proper measures when an
accident happens [4]. To view the smart house, a camera is
employed. A camera could cover a part of the room. Excessive
power consumption reduces the shutdown of cameras in typical
settings. The camera networks focused on the accident position
and sent photographs to the safety cabin when the mishap or
accident. In emergency cases, GSM MODEM is utilized to deliver
the SMS to the owner.
3.2 User Control Mode
Users can operate the robot through a PC and conduct user-
specified operations. RFID reader serves the door opening system
service in user mode.
[1] T. A. A. Abdullah and W. Ali, “A Review of Cyber Security Challenges, Attacks and Solutions for Internet of Things Based Smart
Home,” International Journal of Computer Science and Network Security, vol. 19, no. 9, 2019.
[2] O. Golubchikov and M. Thornbush, “Artificial Intelligence and Robotics in Smart City Strategies and Planned Smart
Development,” Smart Cities, pp. 1-12, 2020.
[3] M. B. Yassein, I. Hmeidi and F. Shatnawi, “Smart Home Is Not Smart Enough to Protect You - Protocols, Challenges and Open
Issues,” Procedia Computer Science, vol. 160, pp. 134-141, 2019.
[4] M. Lia, W. Gub, W. Chenc and Y. He, “Smart Home: Architecture, Technologies and Systems,” Procedia Computer Science, vol.
131, pp. 393-400, 2018.
[5] X. Liu and W. Zhang, “Research on the Bionic Product Design of Smart Home Robots for the Urban Youth,” in In Proceedings of
The 20th International Conference, Hong Kong, 2020.
[6] W. Gu, Y. He and W. Chen, “Smart Home: Architecture, Technologies and Systems,” Procedia Computer Science, vol. 131, pp.
393-400, 2018.
[7] J. M. Batalla and F. Gonciarz, “Deployment of smart home management system at the edge: mechanisms and protocols,” Neural
Computing and Applications, p. 1301–1315, 2019.
[8] P. Simoens and M. Dragone, “The Internet of Robotic Things: A review of concept, added value and applications,” International
Journal of Advanced Robotic Systems, vol. 15, no. 1, 2018.
[9] L.-C. Hsu, C.-K. Yang and J.-Y. Lai, “Evaluation of the Established IoT Smart Home Robot Teaching Module Based on
Embedded Thematic-Approach Strategy,” Mathematical Problems in Engineering, 2020.

You might also like