The Smart Home Revolution: Risks and Opportunities

Smart devices are simply a part of the modern world. They keep you connected and even respond to your questions and needs. According to research from Metova, about 90 percent of homes have some type of smart device, with 70% of homes owning a voice-controlled system.[1] This revolution of the home’s ability to be smart and connected presents both risk and opportunity for developers of the technology.

Consumers Drive Demand

Home automation is a trend on the rise for new homes and renovations. From lighting, to temperature control to security systems, homeowners want this technology, as it makes their life easier. They want to be able to change the settings of their home or turn something on and off with a tap or by voice. That is made possible by their smart devices, either from an app on a smartphone or voice activation to Google Home or Amazon Alexa.

Smart Devices Present Risk of Hacking

These consumer desires are changing the spaces in which people live. They want everything connected, and often overlook security. But they should still be wary, because IoT attacks increased by 280% in the first half of 2017 per a Gartner study.[2] Most of this was due to the Mirai malware attack. Hackers are sophisticated in the 21st century, and there will be new viruses that come along. There’s also the threat of hackers using IoT devices in a Distributed Denial of Service (DDoS), too. The ZigBee communication protocol is another popular application by attackers, as it allows them to join the secure home network.[3]

Looking for a Way In

Stories in the news often startle viewers with families sharing stories of baby monitors being hacked or other devices. Hackers aren’t interested in hearing your baby sleeping. It’s an entry into the network, where personal information can be found and swiped.

Much of what’s being researched and studied right now looks at each individual IoT device. However, the true smart home is built on interoperability, with an Alexa or Google Home device as the integrator. Homeowners tell Alexa to dim the lights and turn the AC up.

Integrated Systems Create Unique Risks

A study from the IoT/CPS Security Research at the University of Michigan looked at a connected system.[4] The research found two major areas of weakness: excessive privileges and insecure messaging.

Applications have permission to take actions, and these privileges are grouped rather than individual. For example, an app could have permission to both lock and unlock a door, even if it didn’t need to do both. This comes back to the development of the system and its permission design. The study found that 55% of applications reviewed had more functions that it needed.

The communication between apps is also a source of risk. It’s very much like texting or IM’ing. Part of that information is secure like PIN codes or passwords. Back to the door lock example, the app may have permission to unlock it, but it also may communicate the pin code. These apps, again, have a vulnerability related to the design of the software.

Addressing Risk in the Integrated Smart Home

While risk is inherent in the smart home, so is opportunity. An integrated smart home has a lot of appeal to homeowners, which will only grow as technology becomes more sophisticated and less expensive. The key to addressing risk is in the design and configuration. Developers must think not just of digital assistants and their role in the infrastructure but how all the smart devices will integrate and work together.

This technology is actually very young, even though it’s hard for a significant portion of the population to remember life before smartphones. New technology is always evolving, and there are strides that can be made from the design standpoint. The crux of this problem is that smart homes focus more on convenience and not enough on security. There is a way to find a happy medium.

Applications should have permission limitations that help control what it’s allowed to do, and permissions should not be the same across the board. If the digital assistant is your control center, how it interacts with other IoT devices matters immensely. This creates lots of communications, which are another weak spot, so messaging between devices also needs to be encoded and protected.

Integrators Can Educate

For integrators of the technology, you have the power to educate users on secure configurations. Explain that, yes, Alexa can do tasks for you without putting you at risk. Just as with any other platform, data privacy can be determined by the user. Making sure homeowners understand this and providing recommendations is key.

How a smart home accesses and uses data dictates the risk. Design and configuration make the difference, which goes back to the application designers and the brands that install them. And while convenience is necessary, security doesn’t need to be compromised. Finding that ideal balance will make smart homes even smarter.

[1] https://metova.com/infographic-the-connected-home/

[2] http://www.gartner.com/newsroom/id/3185623

[3] https://www.blackhat.com/docs/us-15/materials/us-15-Zillner-ZigBee-Exploited-The-Good-The-Bad-And-The-Ugly-wp.pdf

[4] https://iotsecurity.eecs.umich.edu/

Follow us on social media for the latest updates in B2B!

Image

Latest

Stop Guessing: How Reality Capture Improves Construction Productivity
January 20, 2026

Construction projects lose time and money when teams rely on assumptions. Someone says a section is “done,” another trade arrives, and then problems appear: wrong levels, missing openings, clashing services, or unfinished areas. That leads to rework, delays, and arguments. Reality capture helps because it replaces opinions with clear evidence. Reality capture means using tools…

Read More
Human Trafficking
National Human Trafficking Prevention Month
January 20, 2026

School Safety Today podcast, presented by Raptor Technologies. In this episode of School Safety Today, host Dr. Amy Grosso speaks with Kelly Brickl, a trainer with SPEAK UP, in recognition of National Human Trafficking Prevention Month. During the conversation, Brickl shares data, real-world warning signs, and explains how age-appropriate, research-based prevention curricula can empower…

Read More
college
A One-Year College Alternative: How Pega6 Is Preparing to Train AI-First, Job-Ready Talent
January 19, 2026

The traditional four-year college model is facing growing pressure as rising tuition, shifting labor market demands, and new technological realities expose gaps between education and employment outcomes. Confidence in the traditional college pathway is eroding among parents, students, and employers as rising costs and persistent skills gaps collide with the reality that many new…

Read More
radio
Where Experience Meets the Extreme: John F5VHQ at the World’s Most Isolated Radio Outpost
January 16, 2026

For some operators, Bouvet Island is the final frontier. For John (F5VHQ), it is a challenge that stands apart even after decades of DXpedition experience. A veteran of more than twenty years in the field and Vice President of the Clipperton DX Club, John joins the multinational 3Y0K team with both experience and conviction….

Read More