Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities
Intelligent voice assistants are internet-connected devices, which listen to their environment and react to spoken user commands in order to retrieve information from the internet, control appliances in the household, or notify the user of incoming messages, reminders, and the like. With their incre...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Riga Technical University
2020-10-01
|
Series: | Complex Systems Informatics and Modeling Quarterly |
Subjects: | |
Online Access: | https://csimq-journals.rtu.lv/article/view/4254 |
id |
doaj-50f614c68b384a6096c8f9c35ba73264 |
---|---|
record_format |
Article |
spelling |
doaj-50f614c68b384a6096c8f9c35ba732642020-12-07T08:22:15ZengRiga Technical UniversityComplex Systems Informatics and Modeling Quarterly2255-99222020-10-01024153010.7250/csimq.2020-24.022336Smart Home Voice Assistants: A Literature Survey of User Privacy and Security VulnerabilitiesKhairunisa Sharif0Bastian Tenbergen1Department of Computer Science, State University of New York at Oswego, Oswego, NY 13126Department of Computer Science, State University of New York at Oswego, Oswego, NY 13126Intelligent voice assistants are internet-connected devices, which listen to their environment and react to spoken user commands in order to retrieve information from the internet, control appliances in the household, or notify the user of incoming messages, reminders, and the like. With their increasing ubiquity in smart homes, their application seems only limited by the imagination of developers, who connect these off-the-shelf devices to existing apps, online services, or appliances. However, since their inherent nature is to observe the user in their home, their ubiquity also raises concern of security and user privacy. To justify the trust placed into the devices, the devices must be secure from unauthorized access and the back-end infrastructure tasked with speech-to-text analysis, command interpretation, and connection to other services and appliances must maintain confidentiality of data. To investigate existing possible vulnerabilities, approaches to mitigate them, as well as general considerations in this emerging field, we supplement the findings of a recent study with results from a systematic literature review. We were able to compile a list of six main types of user privacy vulnerabilities, partially confirming previous findings, but also finding additional issues. We discuss these vulnerabilities, their associated attack vectors, and possible mitigations users can take to protect themselves.https://csimq-journals.rtu.lv/article/view/4254intelligent voice assistantsvirtual assistantssmart homeprivacysecuritysystematic literature reviewalexacortanasiriamazon echogoogle assistantapple homepod |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Khairunisa Sharif Bastian Tenbergen |
spellingShingle |
Khairunisa Sharif Bastian Tenbergen Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities Complex Systems Informatics and Modeling Quarterly intelligent voice assistants virtual assistants smart home privacy security systematic literature review alexa cortana siri amazon echo google assistant apple homepod |
author_facet |
Khairunisa Sharif Bastian Tenbergen |
author_sort |
Khairunisa Sharif |
title |
Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities |
title_short |
Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities |
title_full |
Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities |
title_fullStr |
Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities |
title_full_unstemmed |
Smart Home Voice Assistants: A Literature Survey of User Privacy and Security Vulnerabilities |
title_sort |
smart home voice assistants: a literature survey of user privacy and security vulnerabilities |
publisher |
Riga Technical University |
series |
Complex Systems Informatics and Modeling Quarterly |
issn |
2255-9922 |
publishDate |
2020-10-01 |
description |
Intelligent voice assistants are internet-connected devices, which listen to their environment and react to spoken user commands in order to retrieve information from the internet, control appliances in the household, or notify the user of incoming messages, reminders, and the like. With their increasing ubiquity in smart homes, their application seems only limited by the imagination of developers, who connect these off-the-shelf devices to existing apps, online services, or appliances. However, since their inherent nature is to observe the user in their home, their ubiquity also raises concern of security and user privacy. To justify the trust placed into the devices, the devices must be secure from unauthorized access and the back-end infrastructure tasked with speech-to-text analysis, command interpretation, and connection to other services and appliances must maintain confidentiality of data. To investigate existing possible vulnerabilities, approaches to mitigate them, as well as general considerations in this emerging field, we supplement the findings of a recent study with results from a systematic literature review. We were able to compile a list of six main types of user privacy vulnerabilities, partially confirming previous findings, but also finding additional issues. We discuss these vulnerabilities, their associated attack vectors, and possible mitigations users can take to protect themselves. |
topic |
intelligent voice assistants virtual assistants smart home privacy security systematic literature review alexa cortana siri amazon echo google assistant apple homepod |
url |
https://csimq-journals.rtu.lv/article/view/4254 |
work_keys_str_mv |
AT khairunisasharif smarthomevoiceassistantsaliteraturesurveyofuserprivacyandsecurityvulnerabilities AT bastiantenbergen smarthomevoiceassistantsaliteraturesurveyofuserprivacyandsecurityvulnerabilities |
_version_ |
1724397822986420224 |