Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Review of Security and Privacy-Based IoT Smart Home Access Control Devices

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) represents a network framework comprising identifiable entities that interact through the Internet. One of its applications is the smart home, where household devices can be remotely monitored and controlled. This has led to an increased demand for reliable security solutions in IoT systems. Security presents a significant challenge in IoT smart home devices and must be carefully considered. Unauthorized access to a smart home system, facilitated by means such as jamming or replay attacks, could pose risks by manipulating sensors and controls, potentially allowing unauthorized entry. This review paper concentrates specifically on the security and privacy aspects of IoT smart home access control devices. It begins with a concise overview of smart home security and privacy, then delves into various techniques within the smart home system taxonomy, such as authentication, access control, blockchain, and cryptography-based methods. Furthermore, the paper compares the advantages and disadvantages of these techniques. It also examines various types of attacks on smart home IoT access control systems and evaluates risk factors such as methodologies, attack frequency, severity, probability, and ranking. Finally, the paper discusses challenges, applications, conclusions, and future directions.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Data Availability

Not Applicable.

References

  1. Peng, Z., Kato, T., Takahashi, H., Kinoshita, T. (2015). Intelligent home security system using agent-based IoT Devices. In Consumer electronics (GCCE), IEEE 4th global conference on. IEEE (pp. 313–314)

  2. Jose, A. C., & Malekian, R. (2017). Improving smart home security: Integrating logical sensing into smart home. IEEE Sensors Journal, 17(13), 4269–4286.

    Article  Google Scholar 

  3. Yogeshwaran, K., Ramesh, C., Udayakumar, E., Srihari, K., Mohanty, S.N. (2021). An IoT‐Based multi access control and surveillance for home security. Integration of Cloud Computing with Internet of Things: Foundations, Analytics, and Applications. 153–64.

  4. Qashlan, A., Nanda, P., He, X. (2020). Security and privacy implementation in smart home: attributes based access control and smart contracts. In 2020 IEEE 19th International conference on trust, security, and privacy in computing and communications (TrustCom) IEEE (pp. 951–958)

  5. Tao, M., Zuo, J., Liu, Z., Castiglione, A., & Palmieri, F. (2018). Multi-layer cloud architectural model and ontology-based security service framework for IoT-based smart homes. Future Generation Computer Systems, 78, 1040–1051.

    Article  Google Scholar 

  6. Ghayvat, H., Mukhopadhyay, S., Gui, X., & Suryadevara, N. (2015). WSN-and IOT-based smart homes and their extension to smart buildings. Sensors, 15(5), 10350–10379.

    Article  Google Scholar 

  7. Shouran, Z., Ashari, A., & Priyambodo, T. (2019). Internet of things (IoT) of smart home: Privacy and security. International Journal of Computer Applications, 182(39), 3–8.

    Article  Google Scholar 

  8. Sharma, P. K., Park, J. H., Jeong, Y. S., & Park, J. H. (2019). Shsec: Sdn-based secure smart home network architecture for the Internet of things. Mobile Networks and Applications, 24(3), 913–924.

    Article  Google Scholar 

  9. Bhide, V. H., Wagh, S. (2015). i-learningIoT: an intelligent self-learning system for home automation using IoT. In Communications and signal processing (ICCSP), international conference on. IEEE (pp. 1763–1767)

  10. Tanwar, S., Patel, P., Patel, K., Tyagi, S., Kumar, N., Obaidat, M.S. (2017). An advanced Internet of Things-based security alert system for smart homes. In 2017 international conference on computer, information and telecommunication systems (CITS), IEEE (pp. 25–29)

  11. Jabbar, W. A., Kian, T. K., Ramli, R. M., Zubir, S. N., Zamrizaman, N. S., Balfaqih, M., Shepelev, V., & Alharbi, S. (2019). Design and fabrication of smart home with the Internet of Things enabled automation system. IEEE Access, 7, 144059–144074.

    Article  Google Scholar 

  12. Abdulla, A. L., Abdulraheem, A. S., Salih, A. A., Sadeeq, M. A., Ahmed, A. J., Ferzor, B. M., Sardar, O. S., & Mohammed, S. I. (2020). Internet of things and smart home security. Technology Report Kansai University, 62(5), 2465–2476.

    Google Scholar 

  13. Al-Mutawa, R.F., Eassa, F.A. (2020). A smart home system based on the Internet of things. arXiv preprint arXiv:2009.05328.

  14. Jacobsson, A., Boldt, M., & Carlsson, B. (2016). A risk analysis of a smart home automation system. Future Generation Computer Systems, 56, 719–733.

    Article  Google Scholar 

  15. Yang, A., Zhang, C., Chen, Y., Zhuansun, Y., & Liu, H. (2019). Security and privacy of smart home systems based on the internet of things and stereo matching algorithms. IEEE Internet of Things Journal, 7(4), 2521–2530.

    Article  Google Scholar 

  16. Chang, H. H., Chiu, W. Y., Sun, H., & Chen, C. M. (2018). User-centric multiobjective approach to privacy preservation and energy cost minimization in smart home. IEEE Systems Journal, 13(1), 1030–1041.

    Article  Google Scholar 

  17. Liu, H., Li, C., Jin, X., Li, J., Zhang, Y., Gu, D. (2017). Smart solution, poor protection: An empirical study of security and privacy issues in developing and deploying smart home devices. In Proceedings of the 2017 workshop on Internet of things security and privacy (pp. 13–18)

  18. Lin, H., & Bergmann, N. M. (2016). IoT privacy and security challenges for smart home environments. Information, 7(3), 44.

    Article  Google Scholar 

  19. Brauchli, A., Li, D. (2015). A solution-based analysis of attack vectors on smart home systems. In 2015 International conference on cyber security of smart cities, industrial control system and communications (SSIC), IEEE (pp. 1–6)

  20. Bugeja, J., Jacobsson, A., Davidsson, P. (2016). On privacy and security challenges in smart connected homes. In 2016 European intelligence and security informatics conference (EISIC), IEEE (pp. 172–175)

  21. Ma, Q., Huang, H., Zhang, W., Qiu, M. (2020). Design of Smart Home System Based on Collaborative Edge Computing and Cloud Computing. In International conference on algorithms and architectures for parallel processing. Springer, Cham (pp. 355–366)

  22. Zimmermann, V., Bennighof, M., Edel, M., Hofmann, O., Jung, J., von Wick, M. (2018). ‘Home, smart home’–exploring end users’ mental models of smart homes. Mensch und computer 2018-workshopband.

  23. Qashlan, A., Nanda, P., He, X., & Mohanty, M. (2021). Privacy-Preserving mechanism in smart home using blockchain. IEEE Access, 9, 103651–103669.

    Article  Google Scholar 

  24. Domb, M. (2019). Smart home systems based on the Internet of Things. In Internet of Things (IoT) for Automated and Smart Applications. IntechOpen.

  25. Yassine, A., Singh, S., Hossain, M. S., & Muhammad, G. (2019). IoT big data analytics for smart homes with fog and cloud computing. Future Generation Computer Systems, 91, 563–573.

    Article  Google Scholar 

  26. Shuai, M., Yu, N., Wang, H., & Xiong, L. (2019). Anonymous authentication scheme for the smart home environment with provable security. Computers & Security, 86, 132–146.

    Article  Google Scholar 

  27. Jiang, L., Li, T., Li, X., Atiquzzaman, M., Ahmad, H., & Wang, X. (2018). Anonymous communication via anonymous identity-based encryption and its application in IoT. Wireless Communications and Mobile Computing., 2018, 6809796.

    Article  Google Scholar 

  28. Fakroon, M., Alshahrani, M., Gebali, F., & Traore, I. (2020). Secure remote anonymous user authentication scheme for the smart home environment. Internet of Things., 9, 100158.

    Article  Google Scholar 

  29. Iqbal, W., Abbas, H., Deng, P., Wan, J., Rauf, B., Abbas, Y., & Rashid, I. (2020). ALAM: Anonymous lightweight authentication mechanism for SDN-enabled smart homes. IEEE Internet of Things Journal, 8(12), 9622–9633.

    Article  Google Scholar 

  30. Luo, H., Wang, C., Luo, H., Zhang, F., Lin, F., & Xu, G. (2021). G2F: A secure user authentication for rapid smart home IoT management. IEEE Internet of Things Journal., 8(13), 10884–10895.

    Article  Google Scholar 

  31. Raniyal, M.S., Woungang, I., Dhurandher, S.K. (2018). An RSA-based user authentication scheme for smart homes using smart cards. In International conference on intelligent, secure, and dependable systems in distributed and cloud environments, Springer, Cham (pp. 16–29)

  32. Shivraj, V.L., Rajan, M.A., Singh, M., Balamuralidhar, P. (2015). One-time password authentication scheme based on elliptic curves for the Internet of Things (IoT). In 2015 5th National symposium on information technology: towards new smart world (NSITNSW) IEEE (pp. 1–6)

  33. Kaur, D., & Kumar, D. (2021). Cryptanalysis and improvement of a two-factor user authentication scheme for smart home. Journal of Information Security and Applications, 58, 102787.

    Article  Google Scholar 

  34. Baruah, B., & Dhal, S. (2018). A two-factor authentication scheme against FDM attack in IFTTT-based Smart Home System. Computers & Security, 77, 21–35.

    Article  Google Scholar 

  35. Nimmy, K., Sankaran, S., Achuthan, K. (2018). A novel multi-factor authentication protocol for smart home environments. In International conference on information systems security. Springer, Cham (pp. 44–63)

  36. Gowthami, J., Shanthi, N. (2018). Multi-factor based user authentication scheme for lightweight iot devices. In the 2018 international conference on intelligent computing and communication for smart world (I2C2SW). IEEE (pp. 89–99)

  37. Liu, W., Wang, X., & Peng, W. (2019). Secure remote multi-factor authentication scheme based on chaotic map zero-knowledge proof for crowdsourcing the Internet of things. IEEE Access, 8, 8754–8767.

    Article  Google Scholar 

  38. Farooq, S.M., Hussain, S.S., Ustun, T.S. (2019). Elliptic curve digital signature algorithm (ECDSA) certificate-based authentication scheme for advanced metering infrastructure. In 2019 Innovations in power and advanced computing technologies (i-PACT) IEEE 1 (pp. 1–6)

  39. Mahmood, K., et al. (2016). A lightweight message authentication scheme for Smart Grid communications in the power sector. Computers and Electrical Engineering, 52, 114–124.

    Article  Google Scholar 

  40. Kang, D., Jung, J., Kim, H., Lee, Y., & Won, D. (2018). Efficient and secure biometric-based user authenticated key agreement scheme with anonymity. Secure Communication Network, 2018, 9046064. https://doi.org/10.1155/2018/9046064

    Article  Google Scholar 

  41. Li, X., Niu, J., Kumari, S., Wu, F., Sangaiah, A. K., & Choo, K. K. R. (2018). A three-factor anonymous authentication scheme for wireless sensor networks in internet of Things environments. Journal of Network and Computer Applications, 103, 194–204. https://doi.org/10.1016/j.jnca.2017.07.001

    Article  Google Scholar 

  42. Punithavathi, P., Geetha, S., Karuppiah, M., Islam, S. K. H., Hassan, M. M., & Choo, K. K. R. (2019). A lightweight machine learning-based authentication framework for smart IoT devices’. Information Sciences, 484, 255–268. https://doi.org/10.1016/j.ins.2019.01.073

    Article  Google Scholar 

  43. Joseph, T., Kalaiselvan, S. A., Aswathy, S. U., Radhakrishnan, R., & Shamna, A. R. (2021). A multimodal biometric authentication scheme based on feature fusion for improving security in a cloud environment. Journal of Ambient Intelligence and Humanized Computing, 12(6), 6141–6149.

    Article  Google Scholar 

  44. Gope, P., Amin, R., Islam, S. K. H., Kumar, N., & Bhalla, V. K. (2018). ‘‘Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Generation Computing Systems, 83, 629–637. https://doi.org/10.1016/j.future.2017.06.023

    Article  Google Scholar 

  45. Mbarek, B., Ge, M., & Pitner, T. (2021). Trust-based authentication for smart home systems. Wireless Personal Communications, 117(3), 2157–72.

    Article  Google Scholar 

  46. Alqahtani, F., Al-Makhadmeh, Z., Tolba, A., & Said, O. (2020). TBM: A trust-based monitoring security scheme to improve the service authentication in the Internet of Things communications. Computer Communications, 150, 216–225.

    Article  Google Scholar 

  47. Kim, E., Keum, C. (2017). Trustworthy gateway system providing IoT trust domain of the smart home. In 2017 Ninth international conference on ubiquitous and future networks (ICUFN) IEEE (pp. 551–553)

  48. Ding, S., Cao, J., Li, C., Fan, K., & Li, H. (2019). A novel attribute-based access control scheme using blockchain for IoT. IEEE Access, 7, 38431–38441.

    Article  Google Scholar 

  49. Bhatt, S., Pham, T. K., Gupta, M., Benson, J., Park, J., & Sandhu, R. (2021). Attribute-based access control for aws internet of things and secure industries of the future. IEEE Access, 9, 107200–23.

    Article  Google Scholar 

  50. Xia, Z., Zhang, L., & Liu, D. (2016). Attribute-based access control scheme with efficient revocation in cloud computing. China Communications, 13(7), 92–99.

    Article  Google Scholar 

  51. Chowdhury, R., Ould-Slimane, H., Talhi, C., Cheriet, M. (2017). Attribute-based encryption for preserving smart home data privacy. In International conference on smart homes and health telematics, Springer, Cham (pp. 185–197)

  52. Patel, S.M., Kanawade, S.Y. (2017). Internet of Things based smart home with Intel Edison. In Proceedings of international conference on communication and networks. Springer, Singapore (pp. 385–392)

  53. Alshahrani, M., & Traore, I. (2019). Secure mutual authentication and automated access control for IoT smart home using cumulative keyed-hash chain. Journal of Information Security and applications, 45, 156–75.

    Article  Google Scholar 

  54. Kavin, B. P., Ganapathy, S., Kanimozhi, U., & Kannan, A. (2020). An enhanced security framework for secured data storage and communications in the cloud using ECC, access control, and LDSA. Wireless Personal Communications, 115(2), 1107–1135.

    Article  Google Scholar 

  55. Yan, H., Wang, Y., Jia, C., Li, J., Xiang, Y., & Pedrycz, W. (2019). IoT -FBAC: Function-based access control scheme using identity-based encryption in IoT. Future Generation Computer Systems, 95, 344–53.

    Article  Google Scholar 

  56. Zhang, J., Cheng, Z., Cheng, X., & Chen, B. (2021). OAC-HAS: Outsourced access control with hidden access structures in fog-enhanced IoT systems. Connection Science, 33(4), 1060–76.

    Article  Google Scholar 

  57. Zhong, H., Zhu, W., Xu, Y., & Cui, J. (2018). Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Computing, 22(1), 243–251.

    Article  Google Scholar 

  58. Fan, K., Xu, H., Gao, L., Li, H., & Yang, Y. (2019). Efficient and privacy-preserving access control scheme for fog-enabled IoT. Future Generation Computer Systems, 99, 134–142.

    Article  Google Scholar 

  59. Yundong, F., Xiaoping, W., Jiasheng, W. (2017). Multi-authority attribute-based encryption access control scheme with hidden policy and constant length ciphertext for cloud storage. In 2017 IEEE Second international conference on data science in cyberspace (DSC) IEEE (pp. 205–212)

  60. Li, J., Chen, N., & Zhang, Y. (2019). Extended file hierarchy access control scheme with attribute-based encryption in cloud computing. IEEE Transactions on Emerging Topics in Computing, 9(2), 983–993.

    Article  Google Scholar 

  61. Malani, S., Srinivas, J., Das, A. K., Srinathan, K., & Jo, M. (2019). Certificate-based anonymous device access control scheme for IoT environment. IEEE Internet of Things Journal, 6(6), 9762–9773.

    Article  Google Scholar 

  62. Kumar, P., & Chouhan, L. (2021). A secure authentication scheme for IoT applications in smart homes. Peer-To-Peer Networking and Applications, 14(1), 420–38.

    Article  Google Scholar 

  63. Fan, K., Tian, Q., Wang, J., Li, H., & Yang, Y. (2017). Privacy protection-based access control scheme in cloud-based services. China Communications, 14(1), 61–71.

    Article  Google Scholar 

  64. Chaudhry, S. A., Yahya, K., Al-Turjman, F., & Yang, M. H. (2020). A secure and reliable device access control scheme for IoT-based sensor cloud systems. IEEE Access, 8, 139244–54.

    Article  Google Scholar 

  65. Mbarek, B., Ge, M., Pitner, T. (2020). Blockchain-Based Access Control for IoT in Smart Home Systems. In International conference on database and expert systems applications, Springer, Cham (pp. 17–32)

  66. Ammi, M., Alarabi, S., & Benkhelifa, E. (2021). Customized blockchain-based architecture for secure smart home for lightweight IoT. Information Processing & Management, 58(3), 102482.

    Article  Google Scholar 

  67. Khan, M. A., Abbas, S., Rehman, A., Saeed, Y., Zeb, A., Uddin, M. I., Nasser, N., & Ali, A. (2020). A machine learning approach for blockchain-based smart home network security. IEEE Network, 35(3), 223–229.

    Article  Google Scholar 

  68. Minoli, D. (2020). Positioning of blockchain mechanisms in IOT-powered smart home systems: A gateway-based approach. Internet of Things, 10, 100147.

    Article  Google Scholar 

  69. Dang, T.L., Nguyen, M.S. (2018). An approach to data privacy in a smart home using blockchain technology. In 2018 International Conference on Advanced Computing and Applications (ACOMP), IEEE (pp. 58–64)

  70. Malik, A., Sharma, B. (2021). Layered safety model for iot services through blockchain. Machine learning approaches for convergence of iot and blockchain (pp. 35–56)

  71. Mukherjee, A., Balachandra, M., Pujari, C., Tiwari, S., Nayar, A., Payyavula, S.R. (2021). Unified smart home resource access along with authentication using Blockchain technology. Global transitions proceedings. 2(1), (pp. 29–34). https://www.sciencedirect.com/science/article/pii/S2666285X21000054

  72. Reyna, A., Martín, C., Chen, J., Soler, E., & Díaz, M. (2018). On blockchain and its integration with IoT. Challenges and opportunities. Future generation computer systems, 88, 173–190.

    Article  Google Scholar 

  73. Lyu, Q., Zheng, N., Liu, H., Gao, C., Chen, S., & Liu, J. (2019). Remotely access “my” smart home in private: An anti-tracking authentication and key agreement scheme. IEEE Access, 7, 41835–41851.

    Article  Google Scholar 

  74. Poh, G. S., Gope, P., & Ning, J. (2019). PrivHome: Privacy-preserving authenticated communication in a smart home environment. IEEE Transactions on Dependable and Secure Computing, 18(3), 1095–1107.

    Google Scholar 

  75. Dey, S., & Hossain, A. (2019). Session-key establishment and authentication in a smart home network using public key cryptography. IEEE Sensors Letters, 3(4), 1–4.

    Article  Google Scholar 

  76. Shukla, D. K., Dwivedi, V. K., & Trivedi, M. C. (2021). Encryption algorithm in cloud computing. Materials Today: Proceedings, 37, 1869–1875.

    Google Scholar 

  77. Gangireddy, V. K., Kannan, S., & Subburathinam, K. (2021). Implementation of enhanced blowfish algorithm in a cloud environment. Journal of Ambient Intelligence and Humanized Computing, 12(3), 3999–4005.

    Article  Google Scholar 

  78. Hegde, R., & Soumyasri, S. M. (2021). Novel Technique for Securing IoT Systems by using Multiple ECC and Ceaser Cipher Cryptography. International Journal Computation Science Mobil Computation (IJCSMC), 10(2), 1–8.

    Article  Google Scholar 

  79. Peter, S., Gopal, R.K. (2016). Multi-level authentication system for smart home security analysis and implementation. In 2016 international conference on inventive computation technologies (ICICT), IEEE, 2, (pp. 1–7)

  80. Chifor, B. C., Bica, I., Patriciu, V. V., & Pop, F. (2018). A security authorization scheme for smart home Internet of Things devices. Future Generation Computer Systems, 86, 740–749.

    Article  Google Scholar 

  81. Henriques, M. S., Vernekar, N. K. (2017). Using symmetric and asymmetric cryptography to secure communication between devices in IoT. In 2017 international conference on iot and application (ICIOT) IEEE (pp. 1–4)

  82. Abdulla, L. S., Mahmood, M. K., Salih, A. F., & Karim, S. M. (2021). Analysis and evaluation of symmetric key ciphers for Internet of Things smart home. Indonesian Journal of Electrical Engineering and Computer Science, 22(2), 1191–1198.

    Article  Google Scholar 

  83. Manikandan, G., Perumal, R. (2020). Symmetric cryptography for secure communication in IoT. Materials Today: Proceedings.

  84. Buchanan, W. J., Li, S., & Asif, R. (2017). Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3–4), 187–201.

    Article  Google Scholar 

  85. Dutta, I.K., Ghosh, B., Bayoumi, M. (2019). Lightweight cryptography for the internet of insecure things: A survey. In 2019 IEEE 9th annual computing and communication workshop and conference (CCWC), IEEE (pp. 0475–0481)

  86. Iqbal, W., Abbas, H., Rauf, B., Abbas, Y., Amjad, F., & Hemani, A. (2021). PCSS: Privacy-preserving communication scheme for SDN enabled smart homes. IEEE Sensors Journal, 22(18), 17677–17690.

    Article  Google Scholar 

  87. Syal, R. (2019). A comparative analysis of lightweight cryptographic protocols for smart home. Emerging research in computing, information, communication and applications (pp. 663–669). Singapore: Springer.

    Chapter  Google Scholar 

  88. Xiao, Y., Jia, Y., Liu, C., Alrawais, A., Rekik, M., & Shan, Z. (2020). HomeShield: A credential-less authentication framework for smart home systems. IEEE Internet of Things Journal, 7(9), 7903–18.

    Article  Google Scholar 

  89. Ashibani, Y., Mahmoud, Q.H. (2017). An efficient and secure scheme for smart home communication using identity-based encryption. In 2017 IEEE 36th international performance computing and communications conference (IPCCC) IEEE (pp. 1–7)

  90. Bandung, Y. (2018). Design of secure IoT platform for smart home system. In 2018 5th international conference on information technology, computer, and electrical engineering (ICITACEE) (pp. 114–119)

  91. Sowjanya, K., Dasgupta, M., Ray, S., & Obaidat, M. S. (2019). An efficient elliptic curve cryptography-based without pairing KPABE for the Internet of Things. IEEE Systems Journal, 14(2), 2154–2163.

    Article  Google Scholar 

  92. Satapathy, U., Mohanta, B.K., Jena, D., Sobhanayak, S. (2018). An ECC-based lightweight authentication protocol for mobile phones in smart homes. In 2018 IEEE 13th international conference on industrial and information systems (ICIIS) IEEE (pp. 303–308)

Download references

Funding

There is no funding for this study.

Author information

Authors and Affiliations

Authors

Contributions

All the authors have participated in writing the manuscript and have revised the final version. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Sirisha Uppuluri.

Ethics declarations

Conflict of interest

Authors declare that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants and/or animals performed by any of the authors.

Informed Consent

There is no informed consent for this study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Uppuluri, S., Lakshmeeswari, G. Review of Security and Privacy-Based IoT Smart Home Access Control Devices. Wireless Pers Commun (2024). https://doi.org/10.1007/s11277-024-11405-8

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11277-024-11405-8

Keywords