Smart home security: challenges, issues and solutions at different IoT layers

被引:0
作者
Haseeb Touqeer
Shakir Zaman
Rashid Amin
Mudassar Hussain
Fadi Al-Turjman
Muhammad Bilal
机构
[1] University of Engineering and Technology ,Department of Computer Science
[2] University of Wah,Department of Computer Science
[3] Research center for AI and IoT,Department of Artificial Intelligence Engineering
[4] Near East University,Department of Computer Engineering
[5] Hankuk University of Foreign Studies,undefined
来源
The Journal of Supercomputing | 2021年 / 77卷
关键词
Smart cities; Smart home; Security; IoT; Protocols;
D O I
暂无
中图分类号
学科分类号
摘要
The Internet of Things is a rapidly evolving technology in which interconnected computing devices and sensors share data over the network to decipher different problems and deliver new services. For example, IoT is the key enabling technology for smart homes. Smart home technology provides many facilities to users like temperature monitoring, smoke detection, automatic light control, smart locks, etc. However, it also opens the door to new set of security and privacy issues, for example, the private data of users can be accessed by taking control over surveillance devices or activating false fire alarms, etc. These challenges make smart homes feeble to various types of security attacks and people are reluctant to adopt this technology due to the security issues. In this survey paper, we throw light on IoT, how IoT is growing, objects and their specifications, the layered structure of the IoT environment, and various security challenges for each layer that occur in the smart home. This paper not only presents the challenges and issues that emerge in IoT-based smart homes but also presents some solutions that would help to overcome these security challenges.
引用
收藏
页码:14053 / 14089
页数:36
相关论文
共 72 条
  • [1] Abdul-Ghani HA(2018)A comprehensive IoT attacks survey based on a building-blocked reference model Int J Adv Comput Sci Appl (IJACSA) 9 355-373
  • [2] Konstantas D(2016)Mitigation of black hole attacks in routing protocol for low power and lossy networks Secur Commun Networks 9 5143-5154
  • [3] Mahyoub M(2018)A detection and prevention technique for man in the middle attack in fog computing Procedia Comput Sci 141 24-31
  • [4] Firoz A(2019)A review on smart home present state and challenges: linked to context-awareness internet of things (IoT) Wirel Networks 25 3193-3204
  • [5] Young-Bae K(2012)Stuxnet: What has changed? Futur Internet 4 672-687
  • [6] Farouq A(2019)An adaptive resource allocation model with anti-jamming in IoT network IEEE Access 7 93250-93258
  • [7] Tarek S(2018)Security and privacy in wireless IoT IEEE Wirel Commun 25 10-11
  • [8] Shakshuki EM(2019)A decentralized privacy-preserving healthcare blockchain for IoT Sensors 19 326-132
  • [9] Almusaylim ZA(2018)Intrusion detection systems for IoT-based smart environments: a survey J Cloud Comput 7 21-267
  • [10] Noor Z(2011)The internet of things: how the next evolution of the internet is changing everything Cisco Int J Internet 3 123-82743