top of page
New_Logo_Aksha.png

Researching Cybersecurity Challenges in Smart Home UX

poster.jpg
Award_edited.png

Project Overview

Published Research: From Threats to Trust in Smart Home User Experiences

As part of my Computer Engineering thesis at the University of Wollongong Dubai (published in IEEE), I explored how cybersecurity threats impacted user trust and experience in Smart Home Energy Management Systems (HEMS). Using simulations and a genetic algorithm, I analyzed pricing attack vulnerabilities and designed detection and mitigation strategies to create a safer, more transparent, and user-friendly smart home experience.

Process Overview:

Project Overview

Published Research: From Threats to Trust in Smart Home User Experiences

As part of my Computer Engineering thesis at the University of Wollongong Dubai (published in IEEE), I explored how cybersecurity threats impacted user trust and experience in Smart Home Energy Management Systems (HEMS). Using simulations and a genetic algorithm, I analyzed pricing attack vulnerabilities and designed detection and mitigation strategies to create a safer, more transparent, and user-friendly smart home experience.

Project Type

Scientific Research

Tools Used

MATLAB (Simulations, Calculations & Data Visualization)

Microsoft Word (Report)

Duration

8 months

Team

Aksha Sajeev (Author & Researcher)

Dr. Haile Rajamani (Co-Author & Mentor)

Problem Definition

Cybersecurity Risks Undermining Trust in Smart Home Energy Systems

Smart Home Energy Management Systems (HEMS) have been proposed as a way of reducing energy consumption in households and for better utilization of electric grid resources.

In the race to become ‘sustainable cities’ and improve the cost and efficiency of energy consumption, more and more countries are slowly trying to shift towards this eco-friendly approach.

cyberattack.png

Problem Statement #1

Cyber-attacks on HEMS’ or multiple HEMS’ could lead to detrimental consequences on the smart electric grids as well as on smart homes.

low_sales.png

Problem Statement #2

Repeated attacks will eventually give birth to distrust among users resulting in a decrease in the sales of the HEMS.

research.png

Problem Statement #3

After researching over 15 scientific papers, it was concluded that very less research had been done on possible types of attacks and vulnerabilities for HEMS’.

Why is there very little research on the attacks on HEMS?

Cyber-attacks on HEMS is usually not considered because they are smaller systems that consume lesser energy. However, the below 2 examples prove that this problem cannot be ignored anymore, and must be thought about when setting up safety plans.

Solution

Objectives of this research

  • Investigate the cyber vulnerabilities in a HEMS operation within an ‘aggregator’ type market where an aggregator is involved with controlling the HEMS.

  • Simulate pricing cyber-attack on HEMS and evaluate both qualitatively and quantitatively the impact of this attack.

  • Develop suitable mitigating options.

Design Process

Understanding the HEMS architecture's vulnerabilities

To execute the objectives, the first step was to investigate all possible cyber vulnerabilities within the HEMS model. Research was also done to learn about different possible cyber-attacks that could take place. 

This HEMS model also involved a solar panel within the system for supplying energy.

  • Grid operator

    Communicates with the smart grid and provides the retailer with electricity prices.

    Retailer

    Could be the utility company, and ensures that the bills are met by all the consumers. It sends the pricing information to an aggregator.

    Aggregators

    They collect payment from the consumers and pay the retailer. The HEMS provides the aggregator with load profile and status information. Using this, the aggregator calculates a suitable electricity price and sends it to the HEMS.

    Smart Grid/Solar Panels

    Supplies electricity.

    Smart HEMS

    Smart HEMS may have applications installed that display the amount of energy consumed, the consumption prices and status of all the loads and load schedules which can be viewed on various display units such as mobile phones and laptops. Other general information such as weather, seasons, and temperature are also stored and updated daily.

    Smart Meter

    Records the electricity consumed and sends this data to HEMS and the utility.

    Loads

    The loads considered in this thesis are cooling systems (such as Air Conditioning), washing machines and EV chargers.

    Solar Panel

    Used to generate renewable energy and stores this energy into a battery. A controller is used to send status reports about the panel to HEMS.

    Battery

    The battery stores the energy produced by the solar panel. It provides this same energy to the smart home by discharging during peak hours and charges up through the solar panel. A charge controller provides charge and status information of the battery to the HEMS.

    Customers

    The HEMS allows the customers living in the smart homes to modify the load schedules and preferences and also provides remote control over the devices. The customers pay directly to the aggregators.

  • Point 1

    The pricing information sent from the retailer to the aggregators can be attacked and manipulated.

    Point 2

    This same pricing information can be sent to the HEMS system which can again be falsified. The load profile and status information sent back by the HEMS to the aggregators can also be attacked and changed.

    Point 3

    The status & scheduling information from the solar panels and the battery sent to the HEMS can be attacked too, convincing the HEMS system that the battery is not charged. These attacks may not allow the system to shift to the battery during peak hours, leading to an increase in electric bills.

    Point 4

    The meter readings from the smart meter to the HEMS can be attacked and the data can be manipulated, leading to wrong calculations of the electricity consumption costs.

    Point 5

    The performance & scheduling information sent by the loads to the HEMS can be falsified and their energy consumption rates can be falsely increased, leading to an increase in the prices.

    Point 6

    The hacker can also take control of the system by impersonating the customers. He/she can change the load schedule, preferences and instructions for a short while and send this information to the HEMS.

Process Methodology

Once the attack points were narrowed down, it was time to design a simulation test rig made on MATLAB, and also simulate the schedulable loads, solar panel, grid & battery, and calculate the unit price. After simulating the model, an optimization technique was used to create an optimized (that consumed less energy) HEMS model.

  • Genetic-part1.png

    Genetic Algorithm uses the concept of biological evolution on constrained or unconstrained optimization problems to produce an optimized solution. The algorithm randomly selects individuals from a population that has been created by modifying individual solutions (that are grouped together) repeatedly. Based on certain optimizing constraints, the selected individuals are used as parents to produce offspring for a new population. This process is repeated multiple times using sorting & swapping to finally generate an “evolved” or “optimized” solution.

Simulating a cyber-attack on unit pricing

For this test rig, one type of cyber-attack was simulated. This attack targeted the unit price data. The attack was carried out in various ways: (a) Arrange unit price in ascending order (b) in descending order (c) Flip the unit price completely

Testing

Introducing detection techniques

4 detection techniques were used to calculate the difference between the predicted optimized grid & values vs the newly designed attacked grid & values.

rearrange (descending).png

If the predicted unit price and the attacked unit prices were graphed, it is very easy to detect the changes and conclude that an attack has taken place.

Impact

Consequences of the attacks

  • The changes in the cost and energy may lead the loads to shift their schedules to a new time period since these loads will be trying to accommodate the changes into their optimization algorithms.

  • If the attack targets multiple smart homes at the same time, all their appliances may try to schedule during the same time frame, leading to a sudden rise in energy consumption on a whole.

Proposed Solutions

Mitigation techniques

Several mitigation techniques can be used to prevent the attacks from affecting the HEMS and disrupting the cost and energy consumption.

time.png

Scheduling Constraints

The HEMS model maintains a stable, user-controlled experience, ensuring that even during attacks, energy usage stays within familiar, scheduled limits.

alert.png

Generating Alert System

Unexpected outcomes can trigger alerts to both users and aggregators, ensuring transparency and quick action.

forcefollowold.png

Forcing the Algorithm to Follow the Historical Data Pattern

If an attack is detected, the system reverts to familiar historical patterns, maintaining a consistent and trusted user experience.

Insights

Key Takeaways

01

This was a scientific thesis that took me the entire 4th year of my undergrad degree! However, I realized it can be applied in the field of UX as well, since it displays my in-depth research skills.

02

I graduated during COVID, so I never got a chance to display my work in person, and instead presented my paper in an online forum organized by IEEE. I am also very grateful to my mentor and co-author of this paper, Dr Haile Rajamani, who guided me through every step of the way.

03

Publishing this paper in IEEE was a cherry on the top of my degree, but it was not so fun cutting down an extensive 80 page thesis into a 6 page report for publishing!

bottom of page