Skip to main content

Low-Cost Home Intrusion Detection System: Attacks and Mitigations

  • Conference paper
  • First Online:
International Conference on Information Systems and Intelligent Applications (ICISIA 2022)

Abstract

In the last decades, people headed to build smart homes to increase the security surrounding the homes and to prevent unauthorized users from entering secure places without permission based on using biometrics and many sensors. The Ultrasonic Sensor is one of the sensors that has widely been used to detect and measure the distance precisely of any intruder or object by using ultrasonic sound waves, and it’s considered as a low-cost system to build home IDS. By exploiting the home IDS vulnerabilities, the attackers can overcontrol the home and easily enter for different goals such as stealing, damaging their property, violating their privacy using only a single attack. Also, by exploiting the home IDS vulnerabilities the attackers can spread different attacks across the home IDS. Enhancing the security using smart technologies will not be enough, homeowners must use detection and prevention techniques and methods to reduce the effect of the possible attacks and prevent them from occurring. This paper addresses the detection of intruders in homes, the possible attacks on home IDS, and how to mitigate them as well.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Dimitrov A, Minchev D (2016) Ultrasonic sensor explorer. In: International Symposium on Electrical Apparatus and Technologies (SIELA)

    Google Scholar 

  2. Carullo A, Parvis M (2001) An ultrasonic sensor for distance measurement in automotive applications

    Google Scholar 

  3. Anthi E, Williams L, Slowinska M, Theodorakopoulos G, Burnap P (2019) A supervised intrusion detection system for smart home IoT devices. IEEE Internet Things J 6:9042–9053. https://doi.org/10.1109/JIOT.2019.2926365

    Article  Google Scholar 

  4. Zhmud VA, Kondratiev NO, Kuznetsov KA, Trubin VG, Dimitrov LV (2018) Application of ultrasonic sensor for measuring distances in robotics. J Phys Conf Ser. Institute of Physics Publishing

    Google Scholar 

  5. Irawan Y, Muhardi, Ordila R, Diandra R (2021) Automatic floor cleaning robot using arduino and ultrasonic sensor. J Robot Control (JRC) 2:240–243. https://doi.org/10.18196/jrc.2485

  6. Ajay TS, Ezhil R (2016) Detecting blind spot by using ultrasonic sensor. Int J Sci Technol Res 5:5

    Google Scholar 

  7. Varun KS, Kumar KA, Chowdary VR, Raju CSK (2018) Water level management using ultrasonic sensor (Automation). Int J Comput Sci Eng 6:799–804. https://doi.org/10.26438/ijcse/v6i6.799804

  8. Madhavan VR, van der Sande TPJ: Ultrasonic sensor-based mapping for an autonomous vehicle

    Google Scholar 

  9. El-Rewini Z, Sadatsharan K, Sugunaraj N, Selvaraj DF, Plathottam SJ, Ranganathan P (2020) Cybersecurity attacks in vehicular sensors. IEEE Sens J 20:13752–13767. https://doi.org/10.1109/JSEN.2020.3004275

  10. Xu W, Yan C, Jia W, Ji X, Liu J (2018) Analyzing and enhancing the security of ultrasonic sensors for autonomous vehicles. IEEE Internet Things J 5:5015–5029. https://doi.org/10.1109/JIOT.2018.2867917

    Article  Google Scholar 

  11. Zelle D, Plappert C, Rieke R, Scheuermann D, Krauß C (2022) ThreatSurf: A method for automated threat surface assessment in automotive cybersecurity engineering. Microprocess Microsyst 90. https://doi.org/10.1016/j.micpro.2022.104461

  12. Rugo A, Ardagna CA, el Ioini N (2023) A security review in the UAVNet era: threats, countermeasures, and gap analysis. ACM Comput Surv 55:1–35. https://doi.org/10.1145/3485272

    Article  Google Scholar 

  13. Security System Using Arduino Bluetooth Camera–Arduino Project Hub. https://create.arduino.cc/projecthub/amrmostaafaa/security-system-using-arduino-bluetooth-camera-616c4d. Accessed 5 Mar 2022

  14. Mahammad FS, Sudireddy SS (2021) An efficient home automation and security system using Arduino and 1-Sheeldin 2

    Google Scholar 

  15. Software | Arduino. https://www.arduino.cc/en/software. Accessed 5 Mar 2022

  16. Bhaskar M, Manjunatha P (2021) Signal jamming autonomous rover view project smart sericulture system using image processing view project signal jamming autonomous rover

    Google Scholar 

  17. Baanav B, Ravi Y, Kabir R, Mishra N, Boddupalli S, Ray S: AUTOHAL: an exploration platform for ranging sensor attacks on automotive systems

    Google Scholar 

  18. He Q, Meng X, Qu R (2020) Towards a severity assessment method for potential cyber attacks to connected and autonomous vehicles. J Adv Transp 2020. https://doi.org/10.1155/2020/6873273

  19. Gluck T, Kravchik M, Chocron S, Elovici Y, Shabtai A (2020) Spoofing attack on ultrasonic distance sensors using a continuous signal. Sensors (Switzerland) 20:1–19. https://doi.org/10.3390/s20216157

    Article  Google Scholar 

  20. Pandey T, Khare P: Bluetooth hacking and its prevention

    Google Scholar 

  21. Nasim R (2012) Security threats analysis in bluetooth-enabled mobile devices. Int J Netw Secur Its Appl 4:41–56. https://doi.org/10.5121/ijnsa.2012.4303

    Article  Google Scholar 

  22. Browning D, Kessler GC: Bluetooth hacking: a case study bluetooth hacking: a case study bluetooth hacking: a case study

    Google Scholar 

  23. Ibn Minar NBN (2012) Bluetooth security threats and solutions: a survey. Int J Distrib Parallel Syst 3:127–148. https://doi.org/10.5121/ijdps.2012.3110

  24. OConnor MT, Reeves D (2008) Bluetooth network-based misuse detection. In: Proceedings - Annual Computer Security Applications Conference, ACSAC. pp 377–391

    Google Scholar 

  25. Yan Q, Liu K, Zhou Q, Guo H, Zhang N (2020) SurfingAttack: interactive hidden attack on voice assistants using ultrasonic guided waves. Internet society

    Google Scholar 

  26. Park Y, Choi H, Cho S, Kim YG (2019) Security analysis of smart speaker: security attacks and mitigation. Comput Mater Contin 61:1075–1090. https://doi.org/10.32604/cmc.2019.08520

  27. Jin R, Wang B (2013) Malware detection for mobile devices using software-defined networking. In: 2013 Second GENI Research and Educational Experiment Workshop. 10.1109/.15

    Google Scholar 

  28. Canfora G, Mercaldo F, Medvet E, Visaggio CA (2015) Detecting Android malware using sequences of system calls. In: 3rd International Workshop on Software Development Lifecycle for Mobile, DeMobile 2015 - Proceedings. Association for Computing Machinery, Inc., pp 13–20

    Google Scholar 

  29. Riley R, Jiang X, Xu D: CERIAS Technical report 2007-01 an architectural approach to preventing code injection attacks an architectural approach to preventing code injection attacks

    Google Scholar 

  30. Snow KZ, Krishnan S, Monrose F: Google NP SHELLOS: enabling fast detection and forensic analysis of code injection attacks

    Google Scholar 

  31. Wang X, Chellappan S, Gu W, Yu W, Xuan D (2005) Search-based physical attacks in sensor networks. In: Proceedings–International Conference on Computer Communications and Networks, ICCCN 2005, pp 489–496. https://doi.org/10.1109/ICCCN.2005.1523922

  32. Aida K, Yamada K, Hotchi R, Kubo R (2021) Dynamic network path provisioning and selection for the detection and mitigation of data tampering attacks in networked control systems. IEEE Access 9:147430–147441. https://doi.org/10.1109/ACCESS.2021.3124024

    Article  Google Scholar 

  33. Wang X, Chellappan S, Gu W, Yu W, Xuan D: Search-based physical attacks in sensor networks

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meera Alblooshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alblooshi, M., Alhammadi, I., Alsuwaidi, N., Sedrani, S., Alaryani, A., Pavithran, D. (2023). Low-Cost Home Intrusion Detection System: Attacks and Mitigations. In: Al-Emran, M., Al-Sharafi, M.A., Shaalan, K. (eds) International Conference on Information Systems and Intelligent Applications. ICISIA 2022. Lecture Notes in Networks and Systems, vol 550. Springer, Cham. https://doi.org/10.1007/978-3-031-16865-9_54

Download citation

Publish with us

Policies and ethics