14 Home Networks

Routers

Many people have Internet service at home, and their Internet Service Provider (ISP) usually provides a router with Wi-Fi. Although there are many things to consider with securing your home network, two of the most important are enabling encryption, and having a unique password to access your router’s settings. Note, the password to access your router’s settings is likely (and should be) different from the password to join your Wi-Fi network.

Figure 14.1 Enable Encryption on WIFI router

Having encryption on your home Wi-Fi network is important for reasons we’ve discussed above, and once it is turned on (usually it’s installed turned on), we don’t want some unauthorized person to be able to turn it off; hence, the importance of having a good password on your router, as features such as encryption can be turned on & off in the router’s configuration.

Some routers come with an unique password configured by the ISP; however, some routers (as well as many other devices that connect to the Internet such as smart doorbells, cameras, etc.) come with a default password that is the same for every device the manufacturer makes. This password is listed in the device’s user manual, and the word “admin” is a common choice. If your device has a standard manufacturer’s password, you should change it. As this is a password that you will not use often, be sure to record the changed password in a logical and secure place. If you were given a user manual with your device, locate where in the documentation the default password is listed, and make a note there about your new password.

Whole Home WiFi Coverage

In many homes, a single router will provide a Wi-Fi signal to all parts of the home. In large homes, or homes (apartments) with concrete construction, sometimes the Wi-Fi signal is weak in certain parts of the home. The weak signal can be strengthened by either a:

  • Range Extender. If it’s just one room in the home with a weak signal, an extender may be the way to go. It extends the existing Wi-Fi network, so it’s a less expensive option than a mesh network, which will involve replacing the existing router.
  • Mesh Network. This is newer (and typically more expensive) technology that can provide whole home Wi-Fi coverage using 2 or more nodes. It provides a more seamless Wi-Fi connection when moving from room to room, and faster speeds.

If you search the Internet, you will be able to find many news articles comparing Wi-Fi range extenders to mesh networks, and you can do some additional research to determine what the best solution would be for your particular case.

Firewalls

Firewalls are hardware and/or software that inspects the Internet traffic coming into and out of a network or computer. It uses a set of rules (that can be configured) and it is designed to block malicious communications to your computer.

Your home router (hardware) likely provides some firewall capabilities.

Additionally, the Windows and Mac operating systems have built-in software firewalls. Windows Firewall comes turned on by default; however, macOS has its firewall turned off by default. In general, it’s a good idea to have a software firewall turned on, especially if you have a laptop you connect to public Wi-Fi.

Note, a firewall is meant to assist in preventing your computer from being infected with malware – it doesn’t provide any assistance in scanning or removing malware that is already on your computer – for that you need anti-virus / anti-malware software.

Network Devices (Home Automation)

Initially, most people’s home networks had just a few connected devices (e.g. a computer and perhaps a printer), this has changed dramatically in recent years.

Smart Devices

With the advent of home automation, many more devices need to connect to our home network. Typically these “smart” devices work just like their regular counterparts (e.g. a smart light switch works like a regular light switch, you can physically press the switch to turn the light on or off), and they also have smart features (e.g. you can program the switch to turn lights on or off at certain times, or use your computing device to turn the light on or off). Here are some examples of smart devices, with some features that these devices may have:

  • Video Doorbells. Someone rings your doorbell, and you get a notification on your smartphone. You can see who is standing at your door, and talk to the person even if you aren’t home. These video doorbells can double as a security system, taking a picture of anyone who comes in range of the doorbell’s camera.
  • Smart Locks. Set codes for the keypad, so a key is no longer required. Create different codes for different people, and you can track who is unlocking the door, and when they do it. Want to remove someone’s access to your home, then just delete their access code. Worried you left home and forgot to lock the door – start the smart lock app on your phone and lock the door remotely. Do you forget to lock your door frequently – then set it to automatically lock after a certain time period has elapsed.
  • Smart TVs. Video streaming services such as Netflix provide on demand access to movies, documentaries, etc. A smart TV will have apps to access common streaming services, and also allow you to connect your phone or computer to the TV so you can view your photos or computer screen on the larger TV screen.
  • Smart Lighting. Smart wall light switches work like a normal light switch, but can be turned on or off using your computing device, and also can be programmed to automatically turn lights on or off at certain times of the day. Smart light bulbs are similar, but you leave the old light switch always turned on, and turn the smart bulb on and off through the app or a secondary switch.
  • Smart Thermostats. Do you like to cool your home down just before bed, and would like it to warm up just before you get up in the morning – then install a smart thermostat.
a smart thermostat with a digital temperature reading. Section discusses home appliances that can now be programmable
Figure 14.2 Smart Thermostat
  • Smart Smoke Alarms. Battery low in your smoke detector – then get a message sent to your phone reminding you to change it. Did one of your smoke detectors go off – get a text message with the details.
  • Smart Appliances. Is your washer or dryer finished with your clothes – then get a text message reminding you to take out your clothes before they get wrinkled.
  • Smart Speakers (with microphones). Don’t want to use your phone or your watch to control your home automation, then give it a voice command instead. “Answer the phone” when it rings, or just to “Set the timer for 3 minutes” are just two of many possibilities.

The above list is just a sample of some of the smart devices that are available.

Mass-market Home Automation Ecosystems

Home automation has been around for many years; however, many early systems were often very expensive. With the introduction of the mass-market systems, home automation prices have dropped substantially.

Some of the more dominant companies with home automation ecosystems (and corresponding voice assistants) are:

  • Apple HomeKit (Siri)
  • Google Home Assistant (Hey Google)
  • Amazon Alexa (Alexa)

These ecosystems have corresponding apps for your smartphone, as well as voice assistants. So if you have your bedroom light on a smart light switch, then to turn off the light you could either:

  • Go to the light switch and turn it off, or
  • Go to the app on your smartphone or smartwatch and turn off the light, or
  • Issue a voice command, e.g. “Siri, turn off the bedroom light”

When you purchase a smart device (such as a video doorbell, smart lock, etc.) remember to check which ecosystems it will work with. Some devices will work with all 3 of the systems listed above, others only work with 1 or 2 of those ecosystems.

Security Considerations

One of the conveniences of a smart home is that it can be set up to be accessed remotely (i.e. you don’t need to be in your home to control it). So if you are sitting down to dinner at a restaurant and then wonder if you remembered to lock your home’s front door, an app on your smartphone can be used to see if the door is unlocked, and if so, you can lock it without needing to leave your restaurant seat. This convenience (remote access), also means you want to give consideration to a number of things to keep your home automation system secure. Consider the following:

  • Default Password. If any of your home automation devices come with a “default” password (one set at the factory and it’s the same password for every device), make sure you change this password.
  • Strong Password. Don’t use the same password you use for all your accounts, and don’t use something that is easily guessed. You want to keep hackers out of your home automation devices (especially important if you have home automation cameras inside your house.
  • Keep Firmware Updated. For each of your smart devices, if you see on the corresponding app that a firmware update is available, be sure to install it, it may be an update that fixes a security vulnerability.
  • Consider a 2nd Wi-Fi Network. If your router allows you to set up two different Wi-Fi networks, consider setting one up for your computing devices (phone/tablet/computer), and a second network for all the home automation devices to connect to. Separating your home automation devices on a separate network from your computing devices will increase security.
  • Background Listening. If you can give a command to your smart speaker, phone or tablet without pushing a button (to activate the voice assistant), then your device has been set up to always listen to what you say (this feature can also be turned off). When it is always listening, the device waits for you to say the activation word (e.g. the voice assistant name, such as Siri or Google or Alexa), and then the device assumes the next words you say will be some sort of command it can execute.

If you want to test if this feature is enabled, try saying something like “Alexa, what time is it?

Background listening can be considered a security issue as sometimes logs of everything that was said within the device’s listening range are kept for the purpose of increasing the accuracy of the voice recognition commands; however, there have been instances of law enforcement and intelligence agencies requesting access to specific people’s logs.

Media Attributions

License

Icon for the Creative Commons Attribution 4.0 International License

Current & Emerging Computing Technology Copyright © 2022 by Don Bentley is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book