Security in smart home environment: issues, challenges, and countermeasures - a survey

被引:1
作者
Saad R.M.A. [1 ,2 ]
Al Soufy K.A.M. [1 ]
Shaheen S.I. [2 ]
机构
[1] Department of Electrical Engineering, Faculty of Engineering, Ibb University, Ibb
[2] Department of Computer Engineering, Faculty of Engineering, Cairo University, Giza
关键词
internet of things; IoT; malware; security attacks; smart home;
D O I
10.1504/IJSN.2023.129887
中图分类号
学科分类号
摘要
The accelerated spread of the IoT and rapid development of modern communication networks and technologies have connected the physical world with computational elements in the smart home environment. The smart home is based on IoT technology which facilitates device observing in order to increase the availability of various tools for securing home automation. Thus, it has been used as a feature of the future wireless sensor network to be able to operate without human intervention. However, it is vulnerable to vulnerabilities and security threats. Due to interconnected, heterogeneous, and dynamic nature of the smart home, challenges related to security, authentication, and confidentiality are created. In this paper attacks on the security of smart homes are investigated to assess their impact on the security of the system as a whole. The technologies and security solutions in such environment are also identified. Therefore, current security measures are discussed to counter such security attacks. Copyright © 2023 Inderscience Enterprises Ltd.
引用
收藏
页码:1 / 9
页数:8
相关论文
共 52 条
[11]  
Bagci I.E., Roedig U., Martinovic I., Schulz M., Hollick M., Using channel state information for tamper detection in the internet of things, Proceedings of the 31st Annual Computer Security Applications Conference, (2015)
[12]  
Batalla J.M., Mastorakis G., Mavromoustakis C.X., Pallis E., Beyond the Internet of Things, Everything Interconnected, (2017)
[13]  
Bugeja A.J.J., Davidsson P., On privacy and security challenges in smart connected homes, IEEE, (2016)
[14]  
Classen J., Chen J., Steinmetzer D., Hollick M., Knightly E., The spy next door: eavesdropping on high throughput visible light communications, Proceedings of the 2nd International Workshop on Visible Light Communications Systems, (2015)
[15]  
Dey S., Hossain A., Session-key establishment and authentication in a smart home network using public key cryptography, IEEE Sensors Letters, 3, 4, pp. 1-4, (2019)
[16]  
Du X., Chen H-H., Zhu L., Li J., Chang Z., Security and privacy in wireless IoT, IEEE Wireless Communications, 25, 6, pp. 10-11, (2018)
[17]  
Editor S.Z., Internet of Things Security and Data Protection, (2019)
[18]  
Fakhri D., Mutijarsa K., Secure IoT communication using blockchain technology, the 2018 International Symposium on Electronics and Smart Devices (ISESD), (2018)
[19]  
Gavra V-D., Dobra I-M., Pop O.A., A survey on threats and security solutions for IoT, the 2020 43rd International Spring Seminar on Electronics Technology (ISSE), (2020)
[20]  
HaddadPajouh H., Dehghantanha A., Parizi R.M., Aledhari M., Karimipour H., A survey on internet of things security: requirements, challenges, and solutions, Internet of Things, 14, (2019)