Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3289100.3289114acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsdeConference Proceedingsconference-collections
research-article

A Survey on the Security of Smart Homes: Issues and Solutions

Published: 18 October 2018 Publication History

Abstract

Today we are witnessing a new concept that is growing fast: The Internet of Things (IoT). We can see all devices we use in any field, are transformed into a smarter version such as smart homes, smart beds, smart coffee machines and smart everything. According to the American Research Firm Gartner there will be nearly 50 billion connected devices in 2020. However, the security aspect is still at the top of the prioritized tasks in this concept.
In this paper we present a review about some categories of popular security issues in the IoT and the solutions proposed by other researchers to these issues. In addition, we investigated security attacks in smart homes and identified some possible security solutions in those environments.

References

[1]
L. Satpathy, "SMART HOUSING: TECHNOLOGY TO AID AGING IN PLACE - NEW OPPORTUNITIES AND CHALLENGES," p. 192.
[2]
M. R. Palattella et al., "Standardized Protocol Stack for the Internet of (Important) Things," IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 1389--1406, 2013.
[3]
A. Gaddam, K. Kaur, G. Sen Gupta, and S. C. Mukhopadhyay, "Determination of sleep quality of inhabitant in a smart home using an intelligent bed sensing system," 2010, pp. 1613--1617.
[4]
A.-D. Floarea and V. Sgarciu, "Smart refrigerator: A next generation refrigerator connected to the IoT," 2016, pp. 1--6.
[5]
S. Gao, Y. Qian, F. Cao, and L. Wang, "The design of smart window control system based on GSM network," 2011, pp. 1297--1299.
[6]
M. Ye, N. Jiang, H. Yang, and Q. Yan, "Security analysis of Internet-of-Things: A case study of august smart lock," 2017, pp. 499--504.
[7]
A. Prasetio, S. R. Akbar, and B. Priyambadha, "Implementation of semantic system in the smart home lights device based on agent," 2017, pp. 93--99.
[8]
I. Alam, S. Khusro, and M. Naeem, "A review of smart TV: Past, present, and future," 2017, pp. 35--41.
[9]
A. Singh and D. M. Shrivastava, "Overview of Attacks on Cloud Computing," vol. 1, no. 4, p. 3, 2012.
[10]
M. Masdari and M. Jalali, "A survey and taxonomy of DoS attacks in cloud computing: DoS attacks in cloud computing," Security and Communication Networks, vol. 9, no. 16, pp. 3724--3751, Nov. 2016.
[11]
D. A. R. Wati and D. Abadianto, "Design of face detection and recognition system for smart home security application," 2017, pp. 342--347.
[12]
B. L. Risteska Stojkoska and K. V. Trivodaliev, "A review of Internet of Things for smart home: Challenges and solutions," Journal of Cleaner Production, vol. 140, pp. 1454--1464, Jan. 2017.
[13]
S. Lee, J. Kim, and T. Shon, "User privacy-enhanced security architecture for home area network of Smartgrid," Multimedia Tools and Applications, vol. 75, no. 20, pp. 12749--12764, Oct. 2016.
[14]
T. Mantoro, M. A. Ayu, and S. M. binti Mahmod, "Securing the authentication and message integrity for Smart Home using smart phone," 2014, pp. 985--989.
[15]
A. R. Abdallah and X. Shen, "Lightweight Lattice-based Homomorphic Privacy-Preserving Aggregation Scheme for Home Area Networks", in Proc. WCSP, 2014.
[16]
X. Hong, C. Yang, and C. Rong, "Smart Home Security Monitor System," 2016, pp. 247--251.
[17]
M. Young and R. Boutaba, "Overcoming Adversaries in Sensor Networks: A Survey of Theoretical Models and Algorithmic Approaches for Tolerating Malicious Interference," IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 617--641, 2011.
[18]
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," 2005, p. 46.
[19]
T. Pecorella, L. Brilli, L. Muchhi, "The role of physical layer security in iot A Novel Perspective".
[20]
S. H. Chae, W. Choi, J. H. Lee, and T. Q. S. Quek, "Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone," IEEE Transactions on Information Forensics and Security, vol. 9, no. 10, pp. 1617--1628, Oct. 2014.
[21]
M. Demirbas and Youngwhan Song, "An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks," 2006, pp. 564--570.
[22]
Top IoT Vulnerabilities, Available: https://www.owasp.org/index.php/Top_IoT_Vulnerabilities, May 18, 2016.
[23]
T. Bhattasali and R. Chaki, "A Survey of Recent Intrusion Detection Systems for Wireless Sensor Network," in Advances in Network Security and Applications, vol. 196, D. C. Wyld, M. Wozniak, N. Chaki, N. Meghanathan, and D. Nagamalai, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 268--280.
[24]
H. Kim, "Protection Against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer," 2008, pp. 796--801.
[25]
A. Dvir, T. Holczer, and L. Buttyan, "VeRA - Version Number and Rank Authentication in RPL," 2011, pp. 709--714.
[26]
J. Granjal, E. Monteiro, and J. S. Silva, "Enabling Network-Layer Security on IPv6 Wireless Sensor Networks," 2010, pp. 1--6.
[27]
P. N. Mahalle, B. Anggorojati, N. R. Prasad, and R. Prasad, "Identity Establishment and Capability Based Access Control (IECAC) Scheme for Internet of Things," p. 5.
[28]
S. Raza, D. Trabalza, and T. Voigt, "6LoWPAN Compressed DTLS for CoAP," 2012, pp. 287--289.
[29]
S. Raza, T. Voigt, and V. Jutvik, "Lightweight IKEv2: A Key Management Solution for both the Compressed IPsec and the IEEE 802.15.4 Security," p. 2.
[30]
M. Brachmann, S. L. Keoh, O. G. Morchon, and S. S. Kumar, "End-to-End Transport Security in the IP-Based Internet of Things," 2012, pp. 1--5.
[31]
M. Sethi, J. Arkko, and A. Keranen, "End-to-end security for sleepy smart object networks," 2012, pp. 964--972.
[32]
D. Conzon, T. Bolognesi, P. Brizzi, A. Lotito, R. Tomasi, and M. A. Spirito, "The VIRTUS Middleware: An XMPP Based Architecture for Secure IoT Communications," 2012, pp. 1--6.
[33]
C. H. Liu, B. Yang, T. Liu, Efficient naming, addressing and profile services in internet of things sensory environments, Ad Hoc Networks, 2014.

Cited By

View all
  • (2023)"I... caught a person casing my house... and scared him off:" The Use of Security-Focused Smart Home Devices by People with DisabilitiesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581007(1-16)Online publication date: 19-Apr-2023

Index Terms

  1. A Survey on the Security of Smart Homes: Issues and Solutions

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICSDE'18: Proceedings of the 2nd International Conference on Smart Digital Environment
      October 2018
      214 pages
      ISBN:9781450365079
      DOI:10.1145/3289100
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      In-Cooperation

      • University of Houston

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 18 October 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Connected devices
      2. Internet of Things (IoT)
      3. Security issues
      4. Smart home

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ICSDE'18

      Acceptance Rates

      ICSDE'18 Paper Acceptance Rate 32 of 80 submissions, 40%;
      Overall Acceptance Rate 68 of 219 submissions, 31%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)81
      • Downloads (Last 6 weeks)5
      Reflects downloads up to 09 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)"I... caught a person casing my house... and scared him off:" The Use of Security-Focused Smart Home Devices by People with DisabilitiesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581007(1-16)Online publication date: 19-Apr-2023

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media