Review of Smart-Home Security Using the Internet of Things

被引:5
作者
Vardakis, George [1 ]
Hatzivasilis, George [2 ]
Koutsaki, Eleftheria [1 ]
Papadakis, Nikos [1 ]
机构
[1] Hellen Mediterranean Univ, Dept Elect & Comp Engn, Estavromenos Campus, Iraklion 71410, Greece
[2] Tech Univ Crete, Dept Elect & Comp Engn, Kounoupidiana Campus, Khania 73100, Greece
基金
欧盟地平线“2020”;
关键词
smart home; security; privacy; resilience; IOT; ATTACKS; THREATS; ISSUES; AUTHENTICATION; TAXONOMY; PROTOCOL; POWER;
D O I
10.3390/electronics13163343
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet of Things (IoT) continues to revolutionize the way we interact with our living spaces, the concept of smart homes has become increasingly prevalent. However, along with the convenience and connectivity offered by IoT-enabled devices in smart homes comes a range of security challenges. This paper explores the landscape of smart-home security. In contrast to similar surveys, this study also examines the particularities of popular categories of smart devices, like home assistants, TVs, AR/VR, locks, sensors, etc. It examines various security threats and vulnerabilities inherent in smart-home ecosystems, including unauthorized access, data breaches, and device tampering. Additionally, the paper discusses existing security mechanisms and protocols designed to mitigate these risks, such as encryption, authentication, and intrusion-detection systems. Furthermore, it highlights the importance of user awareness and education in maintaining the security of smart-home environments. Finally, the paper proposes future research directions and recommendations for enhancing smart-home security with IoT, including the development of robust security best practices and standards, improved device authentication methods, and more effective intrusion-detection techniques. By addressing these challenges, the potential of IoT-enabled smart homes to enhance convenience and efficiency while ensuring privacy, security, and cyber-resilience can be realized.
引用
收藏
页数:35
相关论文
共 177 条
[1]   Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach [J].
Abbas, Syed Ghazanfar ;
Vaccari, Ivan ;
Hussain, Faisal ;
Zahid, Shahzaib ;
Fayyaz, Ubaid Ullah ;
Shah, Ghalib A. ;
Bakhshi, Taimur ;
Cambiaso, Enrico .
SENSORS, 2021, 21 (14)
[2]  
Abdalla P.A., 2020, P 8 INT S DIG FOR SE, P1
[3]  
Abdi N, 2019, PROCEEDINGS OF THE FIFTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2019), P451
[4]  
Abdul-Ghani HA, 2018, INT J ADV COMPUT SC, V9, P355
[5]   Detecting Forwarding Misbehavior in Clustered IoT Networks [J].
Abhishek, Nalam Venkata ;
Tandon, Anshoo ;
Lim, Teng Joon ;
Sikdar, Biplab .
Q2SWINET'18: PROCEEDINGS OF THE 14TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2018, :1-6
[6]  
Abrishamchi M.N., 2017, P 2 EAI INT SUMM SMA, P1
[7]  
Ahemd MM, 2017, 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), P104, DOI 10.1109/COMTECH.2017.8065757
[8]  
Ahlawat B, 2020, Int J Sci Technol Res., V9, P6771
[9]   Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks [J].
Ahmed, Firoz ;
Ko, Young-Bae .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) :5143-5154
[10]  
Alam I, 2017, 2017 INTERNATIONAL CONFERENCE ON OPEN SOURCE SYSTEMS & TECHNOLOGIES (ICOSST), P35, DOI 10.1109/ICOSST.2017.8279002