Abstract
There are many concerns that come along with the Internet of Things that should be addressed because of its growing popularity. One major concern is the security issues related to connected devices. Connected toys are a category of IoT devices that are commonly overlooked when considering these issues, yet they are just as susceptible to attacks as any other device. This paper will look at recent incidents related to security issues involving connected toys and establish a framework with the intention of providing manufacturers with a set of standards that must be adhered to before a device can be marketed. The affected products in the discussed incidents are then tested against the proposed framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dobbins, D.: Analysis of Security Concerns & Privacy Risks of Children’s Smart Toys. Washington University in Saint Louis (2015). https://sever.wustl.edu/degreeprograms/cyber-security-management/SiteAssets/Dobbins%20-%20SmartToy_Security_Final%20Revised%209-28-15.pdf
Elgan, M.: This is Why Tech Toys Are Dangerous, 7 December 2015. http://www.computerworld.com/article/3012173/security/this-is-why-tech-toys-are-dangerous.html
Emery, D.: My Friend Cayla’ Doll Records Children’s Speech, Is Vulnerable to Hackers, 24 February 2017. http://www.snopes.com/2017/02/24/my-friend-cayla-doll-privacy-concerns/
Gibbs, S.: Hackers Can Hijack Wi-Fi Hello Barbie to Spy on Your Children, 26 November 2015. https://www.theguardian.com/technology/2015/nov/26/hackers-can-hijack-wi-fi-hello-barbie-to-spy-on-your-children
Gonsalves, A.: Baby Monitor Hack Highlights Manufacturers’ Security Shortfalls, 15 August 2013. http://www.csoonline.com/article/2133852/privacy/baby-monitor-hack-highlights-manufacturers-security-shortfalls.html
Gray, S.: How Industry Can Protect Privacy in the Age of Connected Toys, 1 December 2016. https://iapp.org/news/a/how-industry-can-protect-privacy-in-the-age-of-connected-toys/
Greenburg, A.: This Hacked Kids’ Toy Opens Garage Doors in Seconds, 4 June 2015. https://www.wired.com/2015/06/hacked-kids-toy-opens-garage-doors-seconds
Hern, A.: CloudPets Stuffed Toys Leak Details of Half a Million Users, 28 February 2017. https://www.theguardian.com/technology/2017/feb/28/cloudpets-data-breach-leaks-details-of-500000-children-and-adults
Holloway, D.: The internet of toys. Commun. Res. Pract. 2(4), 506–519 (2016). http://www.tandfonline.com/doi/abs/10.1080/22041451.2016.1266124
Federal Trade Commission: Children’s Online Privacy Protection Act of 1998. Children’s Online Privacy Protection Rule. https://www.ftc.gov/enforcement/rules/rulemaking-regulatory-reform-proceedings/childrens-online-privacy-protection-rule
Kirk, J.: Data Breach at Toy Maker VTech Leaked Photos of Children, Parents, 30 November 2015. http://www.computerworld.com/article/3010513/security/data-breach-at-toy-maker-vtech-leaked-photos-of-children-parents.html
Kirk, J.: Toy Maker VTech Says Breach Hit 6.4 Million Kids’ Accounts, 1 December 2015. http://www.computerworld.com/article/3011166/security/toy-maker-vtech-says-breach-hit-64-million-kids-accounts.html#tk.drr_mlt
Michael, K.: High-Tech Child’s Play in the Cloud: be safe and aware of the difference between virtual and real. IEEE Consum. Electron. Mag. 5(1), 123–128 (2015). http://ieeexplore.ieee.org/abstract/document/7353284/authors
Korolov, M.: VTech Not Backing Down on Terms Change After Data Breach, 19 February 2016. http://www.csoonline.com/article/3035021/security/vtech-not-backing-down-on-terms-change-after-data-breach.html
Larson, S.: Stuffed Toys Leak Millions of Voice Recordings From Kids and Parents, 27 February 2017. http://money.cnn.com/2017/02/27/technology/cloudpets-data-leak-voices-photos/index.html
Moini, C.: Protecting privacy in the era of smart toys: does hello barbie have a duty to report. Catholic Univ. J. Law Technol. 25(2), 4 (2017). Article No. 4. http://scholarship.law.edu/cgi/viewcontent.cgi?article=1040&context=jlt&sei-redir=1&referer=https%3A%2F%2Fscholar.google.com%2Fscholar%3Fstart%3D20%26q%3Dhacked%2Bchildren%2527s%2Btoys%26hl%3Den%26as_sdt%3D0%2C33#search=%22hacked%20childrens%20toys%22
National Institute of Standards and Technologies, NIST. https://www.nist.gov/about-nist
NIST Special Publication 800-53 (Rev. 4). National Vulnerability Database. https://nvd.nist.gov/800-53/Rev4. Accessed 23 June 2017
Peterson, A.: Hello (hackable) Barbie, 4 December 2015. https://www.washingtonpost.com/news/the-switch/wp/2015/12/04/hello-hackable-barbie/?utm_term=.e774edd5573a
Rouse, M.: Advanced Encryption Standard (AES). http://searchsecurity.techtarget.com/definition/Advanced-Encryption-Standard
Secure Hash Algorithm (SHA). Techopedia.com. https://www.techopedia.com/definition/10328/secure-hash-algorithm-sha
Smith: Security Flaws Found in Fisher-Price Smart Teddy Bear and Kid’s GPS Tracker Watch, 2 February 2016. http://www.networkworld.com/article/3028827/security/security-flaws-found-in-fisher-price-smart-teddy-bear-and-kids-gps-tracker-watch.html
Stanslav, M., Beardsley, T.: HACKING IoT: A Case Study on Baby Monitor Exposures and Vulnerabilities. Rapid7.com. https://www.rapid7.com/docs/Hacking-IoT-A-Case-Study-on-Baby-Monitor-Exposures-and-Vulnerabilities.pdf
Spring, T.: Hello Kitty Database of 3.3 Million Breached Credentials Surfaces, 9 January 2017. https://threatpost.com/hello-kitty-database-of-3-3-million-breached-credentials-surfaces/122932
Storm, D.: Hello Kitty Hack Exposes 3.3 Million Users, Joins Hello Barbie in Putting Kids at Risk, 22 December 2015. http://www.computerworld.com/article/3017974/security/hello-kitty-hack-exposes-3-3-million-users-joins-hello-barbie-in-putting-kids-at-risk.html#tk.drr_mlt
Unknown: Connected Dolls and Tell-Tale Teddy Bears: Why We Need to Manage the Internet of Toys, 23 March 2017. https://ec.europa.eu/jrc/en/news/why-we-need-manage-internet-toys
Unknown: Children’s Messages in CloudPets Data Breach, 28 February 2017. http://www.bbc.com/news/technology-39115001
The White House: Cybersecurity-Executive Order 13636, 12 February 2013. https://obamawhitehouse.archives.gov/issues/foreign-policy/cybersecurity/eo-13636
Zunnurhain, K.: Vulnerabilities with internet of things. In: Proceedings of International Conference on Security and Management (SAM) (2016). http://search.proquest.com/docview/1806999232?pq-origsite=gscholar
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Haynes, J., Ramirez, M., Hayajneh, T., Bhuiyan, M.Z.A. (2017). A Framework for Preventing the Exploitation of IoT Smart Toys for Reconnaissance and Exfiltration. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_53
Download citation
DOI: https://doi.org/10.1007/978-3-319-72395-2_53
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72394-5
Online ISBN: 978-3-319-72395-2
eBook Packages: Computer ScienceComputer Science (R0)