Security and Privacy Challenges for theIOT-based Smart Homes with Limited Resources and Adoption Immaturity
Abstract
Abstract Views: 222The Internet of Things (IoT) is technically a developing model looking at the connectivity of different devices or “things” to each other, as well as with the users and also with the Internet. IoT is projected to be an important necessity for the advancement of intelligent smart homes to facilitate home owners because it provides opportuneness and effectiveness in order to help them attain an improved quality of life. The incorporation of IoT into smart homes entails integrating devices with the Internet. Even though it offers many advantages to the users, it also poses new security and privacy challenges based on connectivity, confidentiality, integrity, authenticity, resource limitation, and adoption immaturity. These challenges make the IoT-based smart homes with limited resources enormously susceptible to diverse forms of security vulnerabilities. Thus, it is pivotal to detect the probable security threats to establish a comprehensive and secure status of smart IOT-based homes. This paper incorporates the security risk assessment approach in order to evaluate the potential security and privacy risks and challenges faced by smart homes. The basic goal of this study is to identify and point up diverse security and privacy threats to smart homes and to unveil the risks for their residents. The paper also presents methods to mitigate the recognized dangers. This study provides a foundation to future applications aimed at refining the security necessities of the IoT-based smart homes.
Downloads
References
H. Lin and N. W. J. I. Bergmann, "IoT privacy and security challenges for smart home environments," vol. 7, no. 3, p. 44, 2016. https://doi.org/10.3390/info7030044
M. Park, H. Oh, and K. J. S. Lee, "Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective," Sensors,vol. 19, no. 9, p. 2148, 2019. https://doi.org/10.3390/s19092148
B. Ali and A. I. J. s. Awad, "Cyber and physical security vulnerability assessment for IoT-based smart homes," Sensors,vol. 18, no. 3, p. 817, 2018. https://doi.org/10.3390/s18030817
A. Jacobsson, M. Boldt, and B. J. F. G. C. S. Carlsson, "A risk analysis of a smart home automation system," Future Generation Computer Systems,vol. 56, pp. 719-733, 2016. https://doi.org/10.1016/j.future.2015.09.003
S. J. Darby, "Smart technology in the home: time for more clarity," Building Research & Information,vol. 46, no. 1, pp. 140-147, 2018. https://doi.org/10.1080/09613218.2017.1301707
Y. Liu, S. Hu, and T.-Y. Ho, "Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks," in 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2014, pp. 183-190: IEEE.
J. M. D. Delgadoet al., "Robotics and automated systems in construction: Understanding industry-specific challenges for adoption," Journal of Building Engineering,vol. 26, pp. 100868, 2019. https://doi.org/10.1016/j.jobe.2019.100868
L. Satpathy, L,Smart housing: technology to aid aging in place-new opportunities and challenges[Doctoral dissertation]. Department of Architecture, 2006.
H. Yang, W. Lee, and H. J. J. o. S. Lee, "IoT smart home adoption: the importance of proper level automation," Journal of Sensors, vol. 2018, pp. 1-10, 2018. https://doi.org/10.1155/2018/6464036
S. Wadhwani, U. Singh, P. Singh, S. J. I. R. J. o. E. Dwivedi, and Technology, "Smart home automation and security system using Arduino and IOT," International Research Journal of Engineering and Technology (IRJET),vol. 5, no. 2, pp. 1357-1359, 2018.
L. Chhaya, P. Sharma, G. Bhagwatikar, and A. J. E. Kumar, "Wireless sensor network based smart grid communications: Cyber-attacks, intrusion detection system and topology control," Electronics,vol. 6, no. 1, pp. 1-5, 2017.
W. H.Hassan, "Current research on Internet of Things (IoT) security: A survey," Computer Networks,vol. 148, pp. 283-294, 2019. https://doi.org/10.1016/j.comnet.2018.11.025
B. Mahajan, (2021, March 15), Civiconcepts,Home automation system and technologies.https://civiconcepts.com/blog/home-automation-system-and-technologies
D. Geneiatakis, I. Kounelis, R. Neisse, I. Nai-Fovino, G. Steri, and G. Baldini, "Security and privacy issues for an IoT based smart home," in 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017, pp. 1292-1297: IEEE.
W. Ali, G. Dustgeer, M. Awais, and M. A. Shah, "IoT based smart home: Security challenges, security requirements and solutions," in 2017 23rd International Conference on Automation and Computing (ICAC), 2017, pp. 1-6: IEEE. https://doi.org/10.10.23919/IConAC.2017.8082057
R. Heartfieldet al., "A taxonomy of cyber-physical threats and impact in the smart home," vol. 78, pp. 398-428, 2018.https://doi.org/10.1016/j.cose.2018.07.011
P. Anand, Y. Singh, A. Selwal, P. K. Singh, R. A. Felseghi, and M. S. J. E. Raboaca, "IoVT: internet of vulnerable things? Threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart Grids," vol. 13, no. 18, p. 4813, 2020. https://doi.org/10.3390/en13184813
H. Zadran,AmazingArchitecture,2017.http://amazingarchitecture.net/2017/05/19/elegant-home-plan-design-ideas/(accessed on 6 March 2018)
Security and Privacy Challenges for the IOT-based
D. Mocrii, Y. Chen, and P. J. I. o. T. Musilek, "IoT-based smart homes: A review of system architecture, software, communications, privacy and security," Internet of Things,vol. 1, pp. 81-98, 2018.https://doi.org/10.1016/j.iot.2018.08.009
Y. Yang, L. Wu, G. Yin, L. Li, and H. J. I. I. o. T. J. Zhao, "A survey on security and privacy issues in Internet-of-Things,"IEEE Internet of Things Journal,vol. 4, no. 5, pp. 1250-1258, 2017.https://doi.org/1010.1109/JIOT.2017.2694844
M. Tao, J. Zuo, Z. Liu, A. Castiglione,and F. J. F. G. C. S. Palmieri, "Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes," Future Generation Computer Systems,vol. 78, pp. 1040-1051, 2018. https://doi.org/10.1016/j.future.2016.11.011
J. M. Castelo Gómez, J. Roldán Gómez, J. Carrillo Mondéjar, and J. L. J. E. Martínez Martínez, "Non-Volatile Memory Forensic Analysis in Windows 10 IoT Core," vol. 21, no. 12, pp. 1141, 2019.https://doi.org/10.3390/e21121141
S. Falas, C. Konstantinou, and M. K. J. a. p. a. Michael, "A Modular End-to-End Framework for Secure Firmware Updates on Embedded Systems," arXiv preprint arXiv: 2007.09071,2020.
S. Chege, G. Wanyembi, and C. Nyamboga, "IT and Business Strategies in the Kenyan Leading Organizations," International Journal of Scientific and Technical Research in Engineering, vol. 41, no. 1, 2019.
R. Budhrani, R. J. I. J. O. A. N. Sridaran, and Applications, "Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools," International Journal Of Advanced Networking & Applications,pp. 137-150, 2015.
S. Manandhar, K. Moran, K. Kafle, R. Tang, D. Poshyvanyk, and A. Nadkarni, "Towards a natural perspective of smart homes for practical security and safety analyses," in 2020 IEEE Symposium on Security and Privacy (SP), 2020, pp.482-499: IEEE.
S. A. Al-Qaseemi, H. A. Almulhim, M. F. Almulhim, and S. R. Chaudhry, "IoT architecture challenges and issues: Lack of standardization," in 2016 Future technologies conference (FTC), 2016, pp. 731-738: IEEE.
N. Komninos, E. Philippou, A. J. I. C. S. Pitsillides, and Tutorials, "Survey in smart grid and smart home security: Issues, challenges and countermeasures," EEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1933-1954, 2014.https://doi.org/1010.1109/COMST.2014.2320093
G.-W. Lee, S.-H. Na, K.-H. Kim, and E.-N. Huh, "Cloud-based smart home system (CbSH) architecture design for virtual home gateway and cloud interworking," in International Conference on Convergence Technology, 2013, vol. 2, no. 1, pp. 1572-1573: 한국융합학회.
C. Paul, A. Ganesh, and C. Sunitha, "An overview of IoT based smart homes," in 2018 2nd International Conference on Inventive Systems and Control (ICISC), 2018, pp. 43-46: IEEE.https://doi.org/1010.1109/ICISC.2018.8398858
Copyright (c) 2021 Farzana Kausar
This work is licensed under a Creative Commons Attribution 4.0 International License.