Back to Search Start Over

User experiences with simulated cyber-physical attacks on smart home IoT.

Authors :
Huijts, N. M. A.
Haans, A.
Budimir, S.
Fontaine, J. R. J.
Loukas, G.
Bezemskij, A.
Oostveen, A.
Filippoupolitis, A.
Ras, I.
IJsselsteijn, W. A.
Roesch, E. B.
Source :
Personal & Ubiquitous Computing. Dec2023, Vol. 27 Issue 6, p2243-2266. 24p.
Publication Year :
2023

Abstract

With the Internet of Things (IoT) becoming increasingly prevalent in people's homes, new threats to residents are emerging such as the cyber-physical attack, i.e. a cyber-attack with physical consequences. In this study, we aimed to gain insights into how people experience and respond to cyber-physical attacks to their IoT devices. We conducted a naturalistic field experiment and provided 9 Dutch and 7 UK households, totalling 18 and 13 participants respectively, with a number of smart devices for use in their home. After a period of adaptation, simulated attacks were conducted, leading to events of varying noticeability (e.g., the light going on or off once or several times). After informing people simulated attacks had occurred, the attacks were repeated one more time. User experiences were collected through interviews and analysed with thematic analyses. Four relevant themes were identified, namely (1) the awareness of and concern about privacy and security risks was rather low, (2) the simulated attacks made little impression on the participants, (3) the participants had difficulties with correctly recognizing simulated attacks, and (4) when informed about simulated attacks taking place; participants noticed more simulated attacks and presented decision rules for them (but still were not able to identify and distinguish them well—see Theme 3). The findings emphasise the need for training interventions and an intrusion detection system to increase detection of cyber-physical attacks. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
16174909
Volume :
27
Issue :
6
Database :
Academic Search Index
Journal :
Personal & Ubiquitous Computing
Publication Type :
Academic Journal
Accession number :
174534974
Full Text :
https://doi.org/10.1007/s00779-023-01774-5