Securing the operation of Smart Home Systems: a literature review

被引:1
作者
Amraoui N. [1 ]
Zouari B. [1 ]
机构
[1] Mediatron Research Laboratory, Higher School of Communications of Tunis, University of Carthage, Technology City of Communications, El Ghazala, Ariana
关键词
Cybersecurity; Home automation; Internet of Things; Smart Home Systems; User authentication;
D O I
10.1007/s40860-021-00160-3
中图分类号
学科分类号
摘要
Smart Home Systems (SHSs) represent one of the most prevailing Internet of Things (IoT) applications. While IoT-based SHSs can be user-driven or automatically operated, their unauthorized or unexpected operation brings new security and safety concerns that did not exist in legacy homes. This paper provides a review of the state-of-the-art approaches for securing the operation of SHSs. We first present security threats that may lead to unauthorized/unexpected operation of an SHS for both types of operation. Then, we review existing security approaches for each type of operation. Finally, we draw some conclusions and raise open research issues based on this review. © 2021, The Author(s), under exclusive licence to Springer Nature Switzerland AG.
引用
收藏
页码:67 / 74
页数:7
相关论文
共 52 条
  • [11] Dutta S., Chukkapalli S.S.L., Sulgekar M., Krithivasan S., Das P.K., Joshi A., Et al., Context sensitive access control in smart home environments, 6Th IEEE International Conference on Big Data Security on Cloud (Bigdatasecurity 2020), (2020)
  • [12] Gamundani A.M., Phillips A., Muyingi H.N., An overview of potential authentication threats and attacks on internet of things (IoT): A focus on smart home applications, 2018 IEEE International Conference on Internet of Things (Ithings) and IEEE Green Computing and Communications (Greencom) and IEEE Cyber, Physical and Social Computing (Cpscom) and IEEE Smart Data (Smartdata)., pp. 50-57, (2018)
  • [13] Ghosh N., Chandra S., Sachidananda V., Elovici Y., SoftAuthZ: a context-aware, behavior-based authorization framework for home IoT, IEEE Internet Things J, 6, 6, pp. 10773-10785, (2019)
  • [14] Gomez C., Chessa S., Fleury A., Roussos G., Preuveneers D., Internet of things for enabling smart environments: a technology-centric perspective, J Ambient Intell Smart Environ, 11, 1, pp. 23-43, (2019)
  • [15] Guth J., Breitenbucher U., Falkenthal M., Fremantle P., Kopp O., Leymann F., Reinfurt L., A detailed analysis of IoT platform architectures: Concepts, similarities, and differences, Internet of Everything, pp. 81-101, (2018)
  • [16] Hakak S., Khan W.Z., Gilkar G.A., Imran M., Guizani N., Securing smart cities through blockchain technology: architecture, requirements, and challenges, IEEE Netw, 34, 1, pp. 8-14, (2020)
  • [17] Han J.-H., Jeon Y.S., Kim J.N., Security considerations for secure and trustworthy smart home system in the IoT environment, 2015 International Conference on Information and Communication Technology Convergence, pp. 1116-1118, (2015)
  • [18] Jiang H., Cai C., Ma X., Yang Y., Liu J., Smart home based on WiFi sensing: a survey, IEEE Access, 6, pp. 13317-13325, (2018)
  • [19] Kong H., Lu L., Yu J., Chen Y., Tang F., Continuous authentication through finger gesture interaction for smart homes using WiFi, IEEE Trans Mob Comput, (2020)
  • [20] Kumari S., Khan M.K., Atiquzzaman M., User authentication schemes for wireless sensor networks: a review, Ad Hoc Netw, 27, pp. 159-194, (2015)