Uncovering security vulnerabilities in the Belkin WeMo home automation ecosystem
Date
06/06/2019Metadata
Show full item recordAbstract
The popularity of smart home devices is growing as consumers begin to recognize their potential to improve the quality of domestic life. At the same time, serious vulnerabilities have been revealed over recent years, which threaten user privacy and can cause financial losses. The lack of appropriate security protections in these devices is thus of increasing concern for the Internet of Things (IoT) industry, yet manufacturers’ ongoing efforts remain superficial. Hence, users continue to be exposed to serious weaknesses. In this paper, we demonstrate that this is also the case of home automation applications, as we uncover a set of previously undocumented security issues in the Belkin WeMo ecosystems. In particular, we first reverse engineer both the mobile app that enables users to control smart appliances and the communication logic implemented by WeMo devices. This enables us to compromise the passphrase guarding the communication over the local wireless network, opening the possibility of eavesdropping on user traffic. We further reveal how an attacker can present a fake device to a WeMo user, through which cross-site scripting can be exploited in order to mislead the user into disclosing private information. Lastly, we provide a set of security guidelines that can be followed to remedy the vulnerabilities identified.
Citation
Liu , H , Spink , T & Patras , P 2019 , Uncovering security vulnerabilities in the Belkin WeMo home automation ecosystem . in 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops . , 8730685 , Institute of Electrical and Electronics Engineers (IEEE) , pp. 894-899 , SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of Things , Kyoto , Japan , 11/03/19 . https://doi.org/10.1109/PERCOMW.2019.8730685 workshop
Publication
2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops
Type
Conference item
Rights
Copyright © 2019 IEEE. This work has been made available online in accordance with publisher policies or with permission. Permission for further reuse of this content should be sought from the publisher or the rights holder. This is the author created accepted manuscript following peer review and may differ slightly from the final published version. The final published version of this work is available at https://doi.org/10.1109/PERCOMW.2019.8730685.
Collections
Items in the St Andrews Research Repository are protected by copyright, with all rights reserved, unless otherwise indicated.