Securing the operation of Smart Home Systems: a literature review

被引:1
作者
Amraoui N. [1 ]
Zouari B. [1 ]
机构
[1] Mediatron Research Laboratory, Higher School of Communications of Tunis, University of Carthage, Technology City of Communications, El Ghazala, Ariana
关键词
Cybersecurity; Home automation; Internet of Things; Smart Home Systems; User authentication;
D O I
10.1007/s40860-021-00160-3
中图分类号
学科分类号
摘要
Smart Home Systems (SHSs) represent one of the most prevailing Internet of Things (IoT) applications. While IoT-based SHSs can be user-driven or automatically operated, their unauthorized or unexpected operation brings new security and safety concerns that did not exist in legacy homes. This paper provides a review of the state-of-the-art approaches for securing the operation of SHSs. We first present security threats that may lead to unauthorized/unexpected operation of an SHS for both types of operation. Then, we review existing security approaches for each type of operation. Finally, we draw some conclusions and raise open research issues based on this review. © 2021, The Author(s), under exclusive licence to Springer Nature Switzerland AG.
引用
收藏
页码:67 / 74
页数:7
相关论文
共 52 条
  • [1] Alghayadh F., Debnath D., A hybrid intrusion detection system for smart home security, 2020 IEEE International Conference on Electro Information Technology (EIT)., pp. 319-323, (2020)
  • [2] Alrumayh A.S., Lehman S.M., Tan C.C., Context aware access control for home voice assistant in multi-occupant homes, Pervasive Mob Comput, 67, (2020)
  • [3] Amraoui N., Besrour A., Ksantini R., Zouari B., Implicit and continuous authentication of smart home users, International Conference on Advanced Information Networking and Applications, pp. 1228-1239, (2019)
  • [4] Arias-Cabarcos P., Almenarez F., Trapero R., Diaz-Sanchez D., Marin A., Blended identity: pervasive IdM for continuous authentication, IEEE Secur Priv, 13, 3, pp. 32-39, (2015)
  • [5] Arif S., Khan M.A., Rehman S.U., Kabir M.A., Imran M., Investigating smart home security: is blockchain the answer?, IEEE Access, 8, pp. 117802-117816, (2020)
  • [6] Celik Z.B., Fernandes E., Pauley E., Tan G., McDaniel P., Program analysis of commodity IoT applications for security and privacy: challenges and opportunities, ACM Comput Surv (CSUR), 52, 4, pp. 1-30, (2019)
  • [7] Celik Z.B., McDaniel P., Tan G., Soteria: Automated IoT safety and security analysis, 2018 { USENIX } Annual Technical Conference ({ USENIX } { ATC } 18), pp. 147-158, (2018)
  • [8] Celik Z.B., Tan G., McDaniel P.D., Iotguard: Dynamic Enforcement of Security and Safety Policy in Commodity Iot, (2019)
  • [9] Chi H., Zeng Q., Du X., Yu J., Cross-app interference threats in smart homes: Categorization, detection and handling, 2020 50Th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)., pp. 411-423, (2020)
  • [10] Chuck M., Smart Home Technology Hits 69 Technical Report, Mediapost, (2019)