Survey on smart homes: Vulnerabilities, risks, and countermeasures

被引:44
作者
Hammi, Badis [1 ]
Zeadally, Sherali [2 ]
Khatoun, Rida [3 ]
Nebhen, Jamel [4 ]
机构
[1] EPITA Engn Sch, Le Kremlin Bicetre, France
[2] Univ Kentucky, Lexington, KY USA
[3] Inst Mines Telecom Paris, Paris, France
[4] Prince Sattam Bin Abdulaziz Univ, Al Kharj, Saudi Arabia
关键词
Home; IoT; Security; Vulnerability; Attack; Threat; Solution; IOT SECURITY; AUTHENTICATION SCHEME; INTERNET; THINGS; BLOCKCHAIN; SYSTEM; FRAMEWORK; NETWORK; PRIVACY; ATTACKS;
D O I
10.1016/j.cose.2022.102677
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last few years, the explosive growth of Internet of Things (IoT) has revolutionized the way we live and interact with each other as well as with various types of systems and devices which form part of the Information Communication Technology (ICT) infrastructure. IoT is having a significant impact on various application domains including healthcare, smart home, transportation, energy, agriculture, manufacturing, and many others. We focus on the smart home environment which has attracted a lot of attention from both academia and industry recently. The smart home provides a lot of convenience to home users but it also opens up various risks that threaten both the security and privacy of the users. In contrast to previous works on smart home security and privacy, we present an overview of smart homes from both academic and industry perspectives. Next we discuss the security requirements, challenges and threats associated with smart homes. Finally, we discuss countermeasures that can be deployed to mitigate the identified threats. (C) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:25
相关论文
共 161 条
  • [1] Ahmed S.H., 2021, J. Contemp. Archit, V8, P489
  • [2] IoT and the Risk of Internet Exposure: Risk Assessment using Shodan Queries
    Albataineh, Areej
    Alsmadi, Izzat
    [J]. 2019 IEEE 20TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2019,
  • [3] Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes
    Ali, Bako
    Awad, Ali Ismail
    [J]. SENSORS, 2018, 18 (03):
  • [4] Alohali Bashar, 2014, 2014 6th Computer Science and Electronic Engineering Conference (CEEC). Proceedings, P115, DOI 10.1109/CEEC.2014.6958565
  • [5] SoK: Security Evaluation of Home-Based IoT Deployments
    Alrawi, Omar
    Lever, Chaz
    Antonakakis, Manos
    Monrose, Fabian
    [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1362 - 1380
  • [6] Customized blockchain-based architecture for secure smart home for lightweight IoT
    Ammi, Meryem
    Alarabi, Shatha
    Benkhelifa, Elhadj
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (03)
  • [7] [Anonymous], 2020, WORST PASSW 2018
  • [8] [Anonymous], 2001, FIPS PUB, DOI [10.1007/b137765, DOI 10.1007/B137765]
  • [9] [Anonymous], 2016, Internet security threat report
  • [10] [Anonymous], 2017, 2017 26 INT C COMPUT