ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Smart Locks in the Internet of Things

Updated on December 9, 2016

The Internet of Things (IoT) is referred as the internetworking of physical devices and vehicles, defined as “connected” or “smart” devices. They are embedded with electronics and software that enable the collection and exchange of data between them.

IoT has been touted as many things in the past years. From nanny cams to look over our children, smart meters that control all selected appliances in our house or smart locks that allow you to open the front door of your house using your smartphone, IoT has become an integral part of our lives.

It seems like IoT has revolutionized our world (which is most probably the case) and has only brought solutions to our daily problems. Most people do not realize that with all these new connected devices, comes a major issue which is actually the fact that they are “connected”. This raises many potential ones regarding security and ethics.

If we look closely to a specific branch of new devices, smart locks, we can easily find issues from the fact that they are connected. A big majority of these new locks are built such that one can open his own door without the use of a key. This includes using a smartphone, a smartwatch, or any device that is already being carried by an individual. The lock can be opened via a Wifi, Bluetooth or NFC connection at the door, via a website request from anywhere or even via text message. These smart locks are built to make our lives easier as they let us open the door without the need of an extra item being carried, as well as letting temporary guests into our home. However, having this whole environment connected brings a few different issues to this solution.

The first and main issue is the security behind the smart locks. The majority of smart devices have all of the information and communication encrypted. John Oliver talks in large of encryption in one of his segments on “Last week Tonight with John Oliver”[1]. In it, he shows that if we are able to get control of a “connected” device like the car, we are able to have physical consequences to the use of it. In the same sense, for our smart lock, if the security is not strong enough, a user could be locked out of his house or even worst, an unwanted guest could be granted access to it.

The problem that arises is that there is already cases of smart locks and other devices being hacked. Here is an article on CNET, a website about tech product reviews, news and more, about the hack of a smart lock.

They show that following a presentation on smart locks vulnerabilities, they were able to replicate them and hack into one before the manufacturer sent an update a few days after the presentation. This shows that even though manufacturers are quick to fix issues, there is still new ways of hacking into smart devices and having access to them.

This brings up the issue which is the ethical part of having all this data about devices gathered and stored. Even though it is useful to keep it to be able to log activity in a home, the fact that it is available can be an invasion of privacy because there is always the possibility of having this information stolen and used for malicious ends. All this data is associated with a user or a location and therefore it is not only data about a specific device but more about the users themselves.

To counteract this main issue of security and its consequences, there are more and more ways that are being found to make any connected device more secure. John Oliver talked a lot about the encryption behind all our lives. However, in a more serious environment, Alan Grau wrote, in the IEEE spectrum website, an article, “How to Build a Safer Internet of Things”, presenting the vulnerabilities of IoT and some possible solutions. He writes about firewalls, device management software, that communicates with security management systems, and finally, for older systems, the use of additional security hardware put in place to intercept malicious activities.

To conclude we can see that the smart locks are a branch of smart devices that is beneficial for its users. However, it has its limitations, especially regarding the security around it and its related consequences.


    0 of 8192 characters used
    Post Comment

    No comments yet.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)