SMART HOME SYSTEM SECURITY RISK ASSESSMENT

Authors

  • OLGA MOROZOVA National Aerospace University “Kharkiv Aviation Institute”
  • ARTEM TETSKYI National Aerospace University “Kharkiv Aviation Institute”
  • ANDRII NICHEPORUK Khmelnytskyi National University
  • DENUS KRUVAK Khmelnytskyi National University
  • VITALII TKACHOV Kharkiv National University of Radio Electronics

DOI:

https://doi.org/10.31891/CSIT-2021-5-11

Keywords:

security risk assessment, smart home, critical information object, threats

Abstract

The concept of the Internet of Things became the basis of the fourth industrial revolution, which allowed to transfer the processes of automation to a new saber. As a result, automation systems, such as smart homes, healthcare systems and car control systems, have become widespread. The developers of such systems primarily focus their efforts on the functional component, leaving safety issues in the background. However, when designing and operating IoT systems, it is equally important to assess potential bottlenecks and develop complete and comprehensive strategies to mitigate and eliminate the negative effects of cyberattacks.

The purpose of this study is to identify possible cyber threats and assess their impact on critical information objects in the smart home system. To achieve this goal, the three-level architecture of the smart home system is considered and a review of known cyber threats for each level is conducted. The critical information objects in the smart home system are the containers in which the information objects are stored, the risk assessment criteria and the cyber threat scenarios. The information security risks of the smart home system were assessed using the OCTAVE Allegro methodology for the information object that presents the information collected by the smart home sensors.

Downloads

Published

2022-04-14

How to Cite

MOROZOVA, O. ., TETSKYI, A. ., NICHEPORUK, A. ., KRUVAK, D. ., & TKACHOV, V. . (2022). SMART HOME SYSTEM SECURITY RISK ASSESSMENT. Computer Systems and Information Technologies, (3), 81–88. https://doi.org/10.31891/CSIT-2021-5-11