338 research outputs found

    Extrapolation and Prediction of User Behaviour from Wireless Home Automation Communication

    Get PDF
    Wireless home automation systems are becoming increasingly popular. They can help users save energy and increase the comfort.However, this increased convenience also comes with new attack vectors. Many available systems provide little to no security. In this paper, we explore the possibilities of passive attacks against these systems. We exemplarily investigate two real-world installations of off-the-shelf home automation systems to see what amount of information can be obtained by a passive adversary.Our results show that the systems provide no privacy. They leak information about the users' habits as well as their presence and can be abused to plan burglaries. Furthermore, we conclude that even encrypted communication does not fully protect against the attack presented here. In particular, it is still possible to predict user presence and absence even if individual actions cannot be identified

    Energy efficient technologies in the East Midlands: project report

    Get PDF
    Report on a project which ran from January 2010 to February 2011 which sought to increase the energy efficiency of businesses by facilitating interest-free loans from the Carbon Trust to install energy efficient technologies. The report is a quasi-evaluation, covering performance of the project, outcomes and lessons learned

    Networked Occupancy Sensor System

    Get PDF
    Energy is often wasted on systems that are used to provide services such as light, heating, air conditioning and ventilation. If these services were intelligently controlled, there is potential for significant improvements in energy conservation. A system including room sensors, database, and webserver was designed, constructed, and implemented over the course of this project. Sensors report occupancy and light status and temperature. Real-time room data is available via the webserver and is archived in the database. The system is networked via Ethernet and powered using the power over Ethernet (802.3af) standard

    Challenges of Implementing Automatic Dependent Surveillance Broadcast in the Nextgen Air Traffic Management System

    Get PDF
    The Federal Aviation Administration is in the process of replacing the current Air Traffic Management (ATM) system with a new system known as NextGen. Automatic Dependent Surveillance-Broadcast (ADS-B) is the aircraft surveillance protocol currently being introduced as a part of the NextGen system deployment. The evolution of ADS-B spans more than two decades, with development focused primarily on increasing the capacity of the Air Traffic Control (ATC) system and reducing operational costs. Security of the ADS-B communications network has not been a high priority, and the inherent lack of security measures in the ADS-B protocol has come under increasing scrutiny as the NextGen ADS-B implementation deadline draws near. The research conducted in this thesis summarizes the ADS-B security vulnerabilities that have been under recent study. Thereafter, we survey both the theoretical and practical efforts which have been conducted concerning these issues, and review possible security solutions. We create a classification of the ADS-B security solutions considered and provide a ranking of the potential solutions. Finally, we discuss the most compatible approaches available, given the constraints of the current ADS-B communications system and protocol
    • …
    corecore