A Problem Analysis of Smart Home Automation: Toward Secure and Usable Communication-Based Authorization

被引:2
作者
Tay, Siok Wah [1 ,2 ]
Zhang, Ning [2 ]
Aljanah, Salem [2 ,3 ]
机构
[1] Multimedia Univ, Fac Informat Sci & Technol FIST, Bukit Beruang 75450, Melaka, Malaysia
[2] Univ Manchester, Dept Comp Sci, Manchester M13 9PL, Lancs, England
[3] Imam Mohammad Ibn Saud Islamic Univ IMSIU, Coll Comp & Informat Sci, Riyadh 11432, Saudi Arabia
关键词
Smart homes; Internet of Things; Authorization; Safety; Privacy; Performance evaluation; Artificial intelligence; Home automation; Access control; authorisation; Internet of Things (IoT); smart home automation; IOT; AUTHENTICATION; MULTILEVEL; INTERNET; THINGS;
D O I
10.1109/ACCESS.2024.3359442
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of the Internet of Things (IoT) and Artificial Intelligence (AI) have led to the rising popularity of Smart Home Automation (SHAuto). SHAuto uses a variety of interconnected smart devices to provide life-enhancing services such as smart energy control, smart entertainment, smart healthcare, and so on. If these devices are compromised, sensitive data may be disclosed and the compromised devices or other connected devices may be maliciously controlled, threatening the privacy and safety of home occupants. Therefore, controlling access to devices in SHAuto is of paramount importance. However, due to the characteristics of the SHAuto environment, this has become a challenging issue. As a first step towards addressing this challenging issue, this paper provides a comprehensive problem analysis of SHAuto. The problem analysis consists of two parts. The first part is an in-depth analysis of various SHAuto use case scenarios covering three aspects, i.e., device control modes, automation modes, and device communications. This analysis has led to the formulation of a generic model for SHAuto. Based on this model, the second part analyses potential vulnerabilities and threats in relation to authorisation. The comprehensive problem analysis has led to a hypothesis that access to the devices can be controlled by governing device communications and the specification of a set of requirements for the design of secure and usable communication-based access control solutions for SHAuto environments.
引用
收藏
页码:18103 / 18121
页数:19
相关论文
共 82 条
  • [21] Funk M, 2018, INT J DES, V12, P53
  • [22] Geneiatakis D, 2017, 2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1292, DOI 10.23919/MIPRO.2017.7973622
  • [23] Girish Aniketh, 2023, IMC '23: Proceedings of the 2023 ACM on Internet Measurement Conference, P437, DOI 10.1145/3618257.3624830
  • [24] Hanna S., 2018, IIC endpoint security best practices. Guide d'usage
  • [25] Meeting IoT platform requirements with open pub/sub solutions
    Happ, Daniel
    Karowski, Niels
    Menzel, Thomas
    Handziski, Vlado
    Wolisz, Adam
    [J]. ANNALS OF TELECOMMUNICATIONS, 2017, 72 (1-2) : 41 - 52
  • [26] Identifying factors influencing consumers' intent to install mobile applications
    Harris, Mark A.
    Brookshire, Robert
    Chin, Amita Goyal
    [J]. INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (03) : 441 - 450
  • [27] hivemq, 2015, Persistent Session and Queuing Messages-MQTT Essentials
  • [28] hivemq, 2019, MQTT Topics, Wildcards, & Best Practices-MQTT Essentials
  • [29] HomeSeer, Home Controller Systems For Every Need & Budget bar HomeSeer
  • [30] Hu V., 2019, Tech. Rep. NIST Special Publication (SP), V800-162