Abstract
In the last decades, people headed to build smart homes to increase the security surrounding the homes and to prevent unauthorized users from entering secure places without permission based on using biometrics and many sensors. The Ultrasonic Sensor is one of the sensors that has widely been used to detect and measure the distance precisely of any intruder or object by using ultrasonic sound waves, and it’s considered as a low-cost system to build home IDS. By exploiting the home IDS vulnerabilities, the attackers can overcontrol the home and easily enter for different goals such as stealing, damaging their property, violating their privacy using only a single attack. Also, by exploiting the home IDS vulnerabilities the attackers can spread different attacks across the home IDS. Enhancing the security using smart technologies will not be enough, homeowners must use detection and prevention techniques and methods to reduce the effect of the possible attacks and prevent them from occurring. This paper addresses the detection of intruders in homes, the possible attacks on home IDS, and how to mitigate them as well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dimitrov A, Minchev D (2016) Ultrasonic sensor explorer. In: International Symposium on Electrical Apparatus and Technologies (SIELA)
Carullo A, Parvis M (2001) An ultrasonic sensor for distance measurement in automotive applications
Anthi E, Williams L, Slowinska M, Theodorakopoulos G, Burnap P (2019) A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J 6:9042–9053. https://doi.org/10.1109/JIOT.2019.2926365
Zhmud VA, Kondratiev NO, Kuznetsov KA, Trubin VG, Dimitrov LV (2018) Application of ultrasonic sensor for measuring distances in robotics. J Phys Conf Ser. Institute of Physics Publishing
Irawan Y, Muhardi, Ordila R, Diandra R (2021) Automatic floor cleaning robot using arduino and ultrasonic sensor. J Robot Control (JRC) 2:240–243. https://doi.org/10.18196/jrc.2485
Ajay TS, Ezhil R (2016) Detecting blind spot by using ultrasonic sensor. Int J Sci Technol Res 5:5
Varun KS, Kumar KA, Chowdary VR, Raju CSK (2018) Water level management using ultrasonic sensor (Automation). Int J Comput Sci Eng 6:799–804. https://doi.org/10.26438/ijcse/v6i6.799804
Madhavan VR, van der Sande TPJ: Ultrasonic sensor-based mapping for an autonomous vehicle
El-Rewini Z, Sadatsharan K, Sugunaraj N, Selvaraj DF, Plathottam SJ, Ranganathan P (2020) Cybersecurity attacks in vehicular sensors. IEEE Sens J 20:13752–13767. https://doi.org/10.1109/JSEN.2020.3004275
Xu W, Yan C, Jia W, Ji X, Liu J (2018) Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles. IEEE Internet Things J 5:5015–5029. https://doi.org/10.1109/JIOT.2018.2867917
Zelle D, Plappert C, Rieke R, Scheuermann D, Krauß C (2022) ThreatSurf: A method for automated threat surface assessment in automotive cybersecurity engineering. Microprocess Microsyst 90. https://doi.org/10.1016/j.micpro.2022.104461
Rugo A, Ardagna CA, el Ioini N (2023) A security review in the UAVNet era: threats, countermeasures, and gap analysis. ACM Comput Surv 55:1–35. https://doi.org/10.1145/3485272
Security System Using Arduino Bluetooth Camera–Arduino Project Hub. https://create.arduino.cc/projecthub/amrmostaafaa/security-system-using-arduino-bluetooth-camera-616c4d. Accessed 5 Mar 2022
Mahammad FS, Sudireddy SS (2021) An efficient home automation and security system using Arduino and 1-Sheeldin 2
Software | Arduino. https://www.arduino.cc/en/software. Accessed 5 Mar 2022
Bhaskar M, Manjunatha P (2021) Signal jamming autonomous rover view project smart sericulture system using image processing view project signal jamming autonomous rover
Baanav B, Ravi Y, Kabir R, Mishra N, Boddupalli S, Ray S: AUTOHAL: an exploration platform for ranging sensor attacks on automotive systems
He Q, Meng X, Qu R (2020) Towards a severity assessment method for potential cyber attacks to connected and autonomous vehicles. J Adv Transp 2020. https://doi.org/10.1155/2020/6873273
Gluck T, Kravchik M, Chocron S, Elovici Y, Shabtai A (2020) Spoofing attack on ultrasonic distance sensors using a continuous signal. Sensors (Switzerland) 20:1–19. https://doi.org/10.3390/s20216157
Pandey T, Khare P: Bluetooth hacking and its prevention
Nasim R (2012) Security threats analysis in bluetooth-enabled mobile devices. Int J Netw Secur Its Appl 4:41–56. https://doi.org/10.5121/ijnsa.2012.4303
Browning D, Kessler GC: Bluetooth hacking: a case study bluetooth hacking: a case study bluetooth hacking: a case study
Ibn Minar NBN (2012) Bluetooth security threats and solutions: a survey. Int J Distrib Parallel Syst 3:127–148. https://doi.org/10.5121/ijdps.2012.3110
OConnor MT, Reeves D (2008) Bluetooth network-based misuse detection. In: Proceedings - Annual Computer Security Applications Conference, ACSAC. pp 377–391
Yan Q, Liu K, Zhou Q, Guo H, Zhang N (2020) SurfingAttack: interactive hidden attack on voice assistants using ultrasonic guided waves. Internet society
Park Y, Choi H, Cho S, Kim YG (2019) Security analysis of smart speaker: security attacks and mitigation. Comput Mater Contin 61:1075–1090. https://doi.org/10.32604/cmc.2019.08520
Jin R, Wang B (2013) Malware detection for mobile devices using software-defined networking. In: 2013 Second GENI Research and Educational Experiment Workshop. 10.1109/.15
Canfora G, Mercaldo F, Medvet E, Visaggio CA (2015) Detecting Android malware using sequences of system calls. In: 3rd International Workshop on Software Development Lifecycle for Mobile, DeMobile 2015 - Proceedings. Association for Computing Machinery, Inc., pp 13–20
Riley R, Jiang X, Xu D: CERIAS Technical report 2007-01 an architectural approach to preventing code injection attacks an architectural approach to preventing code injection attacks
Snow KZ, Krishnan S, Monrose F: Google NP SHELLOS: enabling fast detection and forensic analysis of code injection attacks
Wang X, Chellappan S, Gu W, Yu W, Xuan D (2005) Search-based physical attacks in sensor networks. In: Proceedings–International Conference on Computer Communications and Networks, ICCCN 2005, pp 489–496. https://doi.org/10.1109/ICCCN.2005.1523922
Aida K, Yamada K, Hotchi R, Kubo R (2021) Dynamic network path provisioning and selection for the detection and mitigation of data tampering attacks in networked control systems. IEEE Access 9:147430–147441. https://doi.org/10.1109/ACCESS.2021.3124024
Wang X, Chellappan S, Gu W, Yu W, Xuan D: Search-based physical attacks in sensor networks
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Alblooshi, M., Alhammadi, I., Alsuwaidi, N., Sedrani, S., Alaryani, A., Pavithran, D. (2023). Low-Cost Home Intrusion Detection System: Attacks and Mitigations. In: Al-Emran, M., Al-Sharafi, M.A., Shaalan, K. (eds) International Conference on Information Systems and Intelligent Applications. ICISIA 2022. Lecture Notes in Networks and Systems, vol 550. Springer, Cham. https://doi.org/10.1007/978-3-031-16865-9_54
Download citation
DOI: https://doi.org/10.1007/978-3-031-16865-9_54
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-16864-2
Online ISBN: 978-3-031-16865-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)