Security and Privacy Challenges for theIOT-based Smart Homes with Limited Resources and Adoption Immaturity

Keywords: Internet of Things (IoT), smart homes, risk assessments, security


Abstract Views: 222

The   Internet   of   Things (IoT) is technically a developing model looking  at the  connectivity of different devices  or  “things”  to each other, as well as with the users and also with the Internet.   IoT   is   projected   to   be   an important necessity for the advancement of intelligent smart homes to   facilitate   home owners because   it provides opportuneness and effectiveness in   order to   help   them attain an improved quality of life. The incorporation of IoT into smart homes entails integrating devices with the Internet.  Even  though  it  offers  many advantages  to the users,  it also poses new  security  and  privacy  challenges based  on connectivity,  confidentiality, integrity, authenticity, resource limitation,   and   adoption   immaturity. These challenges make the IoT-based smart   homes   with   limited   resources enormously susceptible to    diverse forms of security vulnerabilities.  Thus, it   is   pivotal   to detect the probable security threats to establish a comprehensive and secure   status   of smart IOT-based homes.   This paper incorporates the security risk assessment    approach in    order to evaluate the potential security and privacy risks and challenges faced by smart homes.  The basic goal of this study is to identify and point up diverse security and privacy threats to smart homes and to unveil the risks for their residents.   The   paper   also   presents methods to   mitigate   the recognized dangers. This study provides     a foundation to future applications aimed at refining the security necessities of the IoT-based smart homes.


Download data is not yet available.


H. Lin and N. W. J. I. Bergmann, "IoT privacy and security challenges for smart home environments," vol. 7, no. 3, p. 44, 2016.

M. Park, H. Oh, and K. J. S. Lee, "Security risk measurement for information leakage in IoT-based smart homes from a situational awareness perspective," Sensors,vol. 19, no. 9, p. 2148, 2019.

B. Ali and A. I. J. s. Awad, "Cyber and physical security vulnerability assessment for IoT-based smart homes," Sensors,vol. 18, no. 3, p. 817, 2018.

A. Jacobsson, M. Boldt, and B. J. F. G. C. S. Carlsson, "A risk analysis of a smart home automation system," Future Generation Computer Systems,vol. 56, pp. 719-733, 2016.

S. J. Darby, "Smart technology in the home: time for more clarity," Building Research & Information,vol. 46, no. 1, pp. 140-147, 2018.

Y. Liu, S. Hu, and T.-Y. Ho, "Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks," in 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 2014, pp. 183-190: IEEE.

J. M. D. Delgadoet al., "Robotics and automated systems in construction: Understanding industry-specific challenges for adoption," Journal of Building Engineering,vol. 26, pp. 100868, 2019.

L. Satpathy, L,Smart housing: technology to aid aging in place-new opportunities and challenges[Doctoral dissertation]. Department of Architecture, 2006.

H. Yang, W. Lee, and H. J. J. o. S. Lee, "IoT smart home adoption: the importance of proper level automation," Journal of Sensors, vol. 2018, pp. 1-10, 2018.

S. Wadhwani, U. Singh, P. Singh, S. J. I. R. J. o. E. Dwivedi, and Technology, "Smart home automation and security system using Arduino and IOT," International Research Journal of Engineering and Technology (IRJET),vol. 5, no. 2, pp. 1357-1359, 2018.

L. Chhaya, P. Sharma, G. Bhagwatikar, and A. J. E. Kumar, "Wireless sensor network based smart grid communications: Cyber-attacks, intrusion detection system and topology control," Electronics,vol. 6, no. 1, pp. 1-5, 2017.

W. H.Hassan, "Current research on Internet of Things (IoT) security: A survey," Computer Networks,vol. 148, pp. 283-294, 2019.

B. Mahajan, (2021, March 15), Civiconcepts,Home automation system and technologies.

D. Geneiatakis, I. Kounelis, R. Neisse, I. Nai-Fovino, G. Steri, and G. Baldini, "Security and privacy issues for an IoT based smart home," in 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017, pp. 1292-1297: IEEE.

W. Ali, G. Dustgeer, M. Awais, and M. A. Shah, "IoT based smart home: Security challenges, security requirements and solutions," in 2017 23rd International Conference on Automation and Computing (ICAC), 2017, pp. 1-6: IEEE.

R. Heartfieldet al., "A taxonomy of cyber-physical threats and impact in the smart home," vol. 78, pp. 398-428, 2018.

P. Anand, Y. Singh, A. Selwal, P. K. Singh, R. A. Felseghi, and M. S. J. E. Raboaca, "IoVT: internet of vulnerable things? Threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart Grids," vol. 13, no. 18, p. 4813, 2020.

H. Zadran,AmazingArchitecture,2017. on 6 March 2018)

Security and Privacy Challenges for the IOT-based

D. Mocrii, Y. Chen, and P. J. I. o. T. Musilek, "IoT-based smart homes: A review of system architecture, software, communications, privacy and security," Internet of Things,vol. 1, pp. 81-98, 2018.

Y. Yang, L. Wu, G. Yin, L. Li, and H. J. I. I. o. T. J. Zhao, "A survey on security and privacy issues in Internet-of-Things,"IEEE Internet of Things Journal,vol. 4, no. 5, pp. 1250-1258, 2017.

M. Tao, J. Zuo, Z. Liu, A. Castiglione,and F. J. F. G. C. S. Palmieri, "Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes," Future Generation Computer Systems,vol. 78, pp. 1040-1051, 2018.

J. M. Castelo Gómez, J. Roldán Gómez, J. Carrillo Mondéjar, and J. L. J. E. Martínez Martínez, "Non-Volatile Memory Forensic Analysis in Windows 10 IoT Core," vol. 21, no. 12, pp. 1141, 2019.

S. Falas, C. Konstantinou, and M. K. J. a. p. a. Michael, "A Modular End-to-End Framework for Secure Firmware Updates on Embedded Systems," arXiv preprint arXiv: 2007.09071,2020.

S. Chege, G. Wanyembi, and C. Nyamboga, "IT and Business Strategies in the Kenyan Leading Organizations," International Journal of Scientific and Technical Research in Engineering, vol. 41, no. 1, 2019.

R. Budhrani, R. J. I. J. O. A. N. Sridaran, and Applications, "Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools," International Journal Of Advanced Networking & Applications,pp. 137-150, 2015.

S. Manandhar, K. Moran, K. Kafle, R. Tang, D. Poshyvanyk, and A. Nadkarni, "Towards a natural perspective of smart homes for practical security and safety analyses," in 2020 IEEE Symposium on Security and Privacy (SP), 2020, pp.482-499: IEEE.

S. A. Al-Qaseemi, H. A. Almulhim, M. F. Almulhim, and S. R. Chaudhry, "IoT architecture challenges and issues: Lack of standardization," in 2016 Future technologies conference (FTC), 2016, pp. 731-738: IEEE.

N. Komninos, E. Philippou, A. J. I. C. S. Pitsillides, and Tutorials, "Survey in smart grid and smart home security: Issues, challenges and countermeasures," EEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1933-1954, 2014.

G.-W. Lee, S.-H. Na, K.-H. Kim, and E.-N. Huh, "Cloud-based smart home system (CbSH) architecture design for virtual home gateway and cloud interworking," in International Conference on Convergence Technology, 2013, vol. 2, no. 1, pp. 1572-1573: 한국융합학회.

C. Paul, A. Ganesh, and C. Sunitha, "An overview of IoT based smart homes," in 2018 2nd International Conference on Inventive Systems and Control (ICISC), 2018, pp. 43-46: IEEE.

How to Cite
Gondal, F. K. (2021). Security and Privacy Challenges for theIOT-based Smart Homes with Limited Resources and Adoption Immaturity. Innovative Computing Review, 1(1), 43–59.