Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review

被引:7
作者
Ansari, Adeeb Mansoor [1 ]
Nazir, Mohammed [1 ]
Mustafa, Khurram [1 ]
机构
[1] Jamia Millia Islamia, Dept Comp Sci, New Delhi, India
关键词
Systematic literature review; Smart home; Automation apps; Vulnerabilities; Threats; Challenges; DETECTING INTERACTIONS; SECURITY; MODEL; SMT;
D O I
10.1007/s10922-024-09803-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The smart home is one of the most significant applications of Internet of Things (IoT). Smart home is basically the combination of different components like devices, hub, cloud, and smart apps. These components may often be vulnerable, and most likely to be exploited by attackers. Being the main link among all the components to establish communication, the compromised smart apps are the most threatening to smart home security. The existing surveys covers vulnerabilities and issues of smart homes and its components in various perspectives. Still, there is a gap to understand and organize the smart apps, security issues and their impact on smart homes and its stakeholders. The paper presents a systematic literature review on the smart apps related vulnerabilities, their possible threats and current state of the art of the available security mechanisms. In our survey we observed that currently research focuses on rules interaction and access control issue. The conclusive findings reveal the fact that available security mechanisms are not widely applicable and incur overheads to developers and users. The critical review of pertinent literature shows that these mechanisms are not enough to address the issues effectively. Therefore, a generalized and robust solution is essentially required to tackle the issues at their origin. We summarized the insights of our SLR, highlighting current scenario and future directions of research in this domain.
引用
收藏
页数:62
相关论文
共 101 条
[1]   Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes [J].
Ali, Bako ;
Awad, Ali Ismail .
SENSORS, 2018, 18 (03)
[2]  
[Anonymous], 2022, Word2vec/Glove/Doc2Vec
[3]  
[Anonymous], 2017, LXC: Linux container tools
[4]  
Antonakakis M, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1093
[5]  
Apthorpe N, 2017, Arxiv, DOI arXiv:1708.05044
[6]  
Arzt S, 2014, ACM SIGPLAN NOTICES, V49, P259, DOI [10.1145/2666356.2594299, 10.1145/2594291.2594299]
[7]   Design and Implementation of a Contextual-Based Continuous Authentication Framework for Smart Homes [J].
Ashibani, Yosef ;
Kauling, Dylan ;
Mahmoud, Qusay H. .
APPLIED SYSTEM INNOVATION, 2019, 2 (01) :1-20
[8]  
Austin P.L., What will smart homes look like 10 years from now?
[9]   If This Then What? Controlling Flows in IoT Apps [J].
Bastys, Iulia ;
Balliu, Musard ;
Sabelfeld, Andrei .
PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, :1102-1119
[10]   Secure Smart Homes: Opportunities and Challenges [J].
Batalla, Jordi Mongay ;
Vasilakos, Athanasios ;
Gajewski, Mariusz .
ACM COMPUTING SURVEYS, 2017, 50 (05)