Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities

Intelligent voice assistants are internet-connected devices, which listen to their environment and react to spoken user commands in order to retrieve information from the internet, control appliances in the household, or notify the user of incoming messages, reminders, and the like. With their incre...

Full description

Bibliographic Details
Main Authors: Khairunisa Sharif, Bastian Tenbergen
Format: Article
Language:English
Published: Riga Technical University 2020-10-01
Series:Complex Systems Informatics and Modeling Quarterly
Subjects:
Online Access:https://csimq-journals.rtu.lv/article/view/4254
id doaj-50f614c68b384a6096c8f9c35ba73264
record_format Article
spelling doaj-50f614c68b384a6096c8f9c35ba732642020-12-07T08:22:15ZengRiga Technical UniversityComplex Systems Informatics and Modeling Quarterly2255-99222020-10-01024153010.7250/csimq.2020-24.022336Smart Home Voice Assistants: A Literature Survey of User Privacy and Security VulnerabilitiesKhairunisa Sharif0Bastian Tenbergen1Department of Computer Science, State University of New York at Oswego, Oswego, NY 13126Department of Computer Science, State University of New York at Oswego, Oswego, NY 13126Intelligent voice assistants are internet-connected devices, which listen to their environment and react to spoken user commands in order to retrieve information from the internet, control appliances in the household, or notify the user of incoming messages, reminders, and the like. With their increasing ubiquity in smart homes, their application seems only limited by the imagination of developers, who connect these off-the-shelf devices to existing apps, online services, or appliances. However, since their inherent nature is to observe the user in their home, their ubiquity also raises concern of security and user privacy. To justify the trust placed into the devices, the devices must be secure from unauthorized access and the back-end infrastructure tasked with speech-to-text analysis, command interpretation, and connection to other services and appliances must maintain confidentiality of data. To investigate existing possible vulnerabilities, approaches to mitigate them, as well as general considerations in this emerging field, we supplement the findings of a recent study with results from a systematic literature review. We were able to compile a list of six main types of user privacy vulnerabilities, partially confirming previous findings, but also finding additional issues. We discuss these vulnerabilities, their associated attack vectors, and possible mitigations users can take to protect themselves.https://csimq-journals.rtu.lv/article/view/4254intelligent voice assistantsvirtual assistantssmart homeprivacysecuritysystematic literature reviewalexacortanasiriamazon echogoogle assistantapple homepod
collection DOAJ
language English
format Article
sources DOAJ
author Khairunisa Sharif
Bastian Tenbergen
spellingShingle Khairunisa Sharif
Bastian Tenbergen
Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities
Complex Systems Informatics and Modeling Quarterly
intelligent voice assistants
virtual assistants
smart home
privacy
security
systematic literature review
alexa
cortana
siri
amazon echo
google assistant
apple homepod
author_facet Khairunisa Sharif
Bastian Tenbergen
author_sort Khairunisa Sharif
title Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities
title_short Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities
title_full Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities
title_fullStr Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities
title_full_unstemmed Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities
title_sort smart home voice assistants: a literature survey of user privacy and security vulnerabilities
publisher Riga Technical University
series Complex Systems Informatics and Modeling Quarterly
issn 2255-9922
publishDate 2020-10-01
description Intelligent voice assistants are internet-connected devices, which listen to their environment and react to spoken user commands in order to retrieve information from the internet, control appliances in the household, or notify the user of incoming messages, reminders, and the like. With their increasing ubiquity in smart homes, their application seems only limited by the imagination of developers, who connect these off-the-shelf devices to existing apps, online services, or appliances. However, since their inherent nature is to observe the user in their home, their ubiquity also raises concern of security and user privacy. To justify the trust placed into the devices, the devices must be secure from unauthorized access and the back-end infrastructure tasked with speech-to-text analysis, command interpretation, and connection to other services and appliances must maintain confidentiality of data. To investigate existing possible vulnerabilities, approaches to mitigate them, as well as general considerations in this emerging field, we supplement the findings of a recent study with results from a systematic literature review. We were able to compile a list of six main types of user privacy vulnerabilities, partially confirming previous findings, but also finding additional issues. We discuss these vulnerabilities, their associated attack vectors, and possible mitigations users can take to protect themselves.
topic intelligent voice assistants
virtual assistants
smart home
privacy
security
systematic literature review
alexa
cortana
siri
amazon echo
google assistant
apple homepod
url https://csimq-journals.rtu.lv/article/view/4254
work_keys_str_mv AT khairunisasharif smarthomevoiceassistantsaliteraturesurveyofuserprivacyandsecurityvulnerabilities
AT bastiantenbergen smarthomevoiceassistantsaliteraturesurveyofuserprivacyandsecurityvulnerabilities
_version_ 1724397822986420224