Open Access
ARTICLE
Security Analysis of Smart Speaker: Security Attacks and Mitigation
Youngseok Park1, Hyunsang Choi1, Sanghyun Cho1, Young-Gab Kim2,*
1 Naver Corp., 6 Buljeong-ro, Jeongja-dong, Bundang-gu, Gyeonggi-do, Korea.
2 Sejong University, 209, Neungdong-ro, Gwangjin-gu, Seoul, 05006, Korea.
* Corresponding Author: Young-Gab Kim. Email: alwaysgabi@sejong.ac.kr.
Computers, Materials & Continua 2019, 61(3), 1075-1090. https://doi.org/10.32604/cmc.2019.08520
Abstract
The speech recognition technology has been increasingly common in our lives. Recently, a number of commercial smart speakers containing the personal assistant system using speech recognition came out. While the smart speaker vendors have been concerned about the intelligence and the convenience of their assistants, but there have been little mentions of the smart speakers in security aspects. As the smart speakers are becoming the hub for home automation, its security vulnerabilities can cause critical problems. In this paper, we categorize attack vectors and classify them into hardware-based, network-based, and software-based. With the attack vectors, we describe the detail attack scenarios and show the result of tests on several commercial smart speakers. In addition, we suggest guidelines to mitigate various attacks against smart speaker ecosystem.
Keywords
Cite This Article
APA Style
Park, Y., Choi, H., Cho, S., , Y.K. (2019). Security analysis of smart speaker: security attacks and mitigation . Computers, Materials & Continua, 61(3), 1075-1090. https://doi.org/10.32604/cmc.2019.08520
Vancouver Style
Park Y, Choi H, Cho S, YK. Security analysis of smart speaker: security attacks and mitigation . Comput Mater Contin. 2019;61(3):1075-1090 https://doi.org/10.32604/cmc.2019.08520
IEEE Style
Y. Park, H. Choi, S. Cho, and Y.K. "Security Analysis of Smart Speaker: Security Attacks and Mitigation ," Comput. Mater. Contin., vol. 61, no. 3, pp. 1075-1090. 2019. https://doi.org/10.32604/cmc.2019.08520
Citations