A Problem Analysis of Smart Home Automation: Toward Secure and Usable Communication-Based Authorization

被引:2
作者
Tay, Siok Wah [1 ,2 ]
Zhang, Ning [2 ]
Aljanah, Salem [2 ,3 ]
机构
[1] Multimedia Univ, Fac Informat Sci & Technol FIST, Bukit Beruang 75450, Melaka, Malaysia
[2] Univ Manchester, Dept Comp Sci, Manchester M13 9PL, Lancs, England
[3] Imam Mohammad Ibn Saud Islamic Univ IMSIU, Coll Comp & Informat Sci, Riyadh 11432, Saudi Arabia
关键词
Smart homes; Internet of Things; Authorization; Safety; Privacy; Performance evaluation; Artificial intelligence; Home automation; Access control; authorisation; Internet of Things (IoT); smart home automation; IOT; AUTHENTICATION; MULTILEVEL; INTERNET; THINGS;
D O I
10.1109/ACCESS.2024.3359442
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of the Internet of Things (IoT) and Artificial Intelligence (AI) have led to the rising popularity of Smart Home Automation (SHAuto). SHAuto uses a variety of interconnected smart devices to provide life-enhancing services such as smart energy control, smart entertainment, smart healthcare, and so on. If these devices are compromised, sensitive data may be disclosed and the compromised devices or other connected devices may be maliciously controlled, threatening the privacy and safety of home occupants. Therefore, controlling access to devices in SHAuto is of paramount importance. However, due to the characteristics of the SHAuto environment, this has become a challenging issue. As a first step towards addressing this challenging issue, this paper provides a comprehensive problem analysis of SHAuto. The problem analysis consists of two parts. The first part is an in-depth analysis of various SHAuto use case scenarios covering three aspects, i.e., device control modes, automation modes, and device communications. This analysis has led to the formulation of a generic model for SHAuto. Based on this model, the second part analyses potential vulnerabilities and threats in relation to authorisation. The comprehensive problem analysis has led to a hypothesis that access to the devices can be controlled by governing device communications and the specification of a set of requirements for the design of secure and usable communication-based access control solutions for SHAuto environments.
引用
收藏
页码:18103 / 18121
页数:19
相关论文
共 82 条
  • [1] Abdullah Amir, 2020, New Paradigm in Decision Science and Management. Proceedings of ICDSM 2018. Advances in Intelligent Systems and Computing (AISC 1030), P293, DOI 10.1007/978-981-13-9330-3_30
  • [2] Agarwal Preeti, 2020, Smart CitiesOpportunities and Challenges. Select Proceedings of ICSC 2019. Lecture Notes in Civil Engineering (LNCE 58), P231, DOI 10.1007/978-981-15-2545-2_21
  • [3] A Multifactor Multilevel and Interaction Based (M2I) Authentication Framework for Internet of Things (IoT) Applications
    Aljanah, Salem
    Zhang, Ning
    Tay, Siok Wah
    [J]. IEEE ACCESS, 2022, 10 : 47965 - 47996
  • [4] A Survey on Smart Home Authentication: Toward Secure, Multi-Level and Interaction-Based Identification
    AlJanah, Salem
    Zhang, Ning
    Tay, Siok Wah
    [J]. IEEE ACCESS, 2021, 9 : 130914 - 130927
  • [5] Alshehri A, 2016, 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), P530, DOI [10.1109/CIC.2016.79, 10.1109/CIC.2016.081]
  • [6] amazon, AWS IoT for the Connected Home
  • [7] amazon, What is the Internet of Things (IoT)
  • [8] [Anonymous], 2016, Cloud Customer Architecture for IoT
  • [9] [Anonymous], 2017, P 2017 23 INT C AUTO
  • [10] Big Data and Personalisation for Non-Intrusive Smart Home Automation
    Asaithambi, Suriya Priya R.
    Venkatraman, Sitalakshmi
    Venkatraman, Ramanathan
    [J]. BIG DATA AND COGNITIVE COMPUTING, 2021, 5 (01) : 1 - 21