Published December 30, 2024 | Version CC-BY-NC-ND 4.0
Journal article Open

Augmenting Security of Smart Homes

  • 1. Assistant Professor, Department of CSE, Vasavi College of Engineering, Hyderabad (Telangana), India.

Contributors

Contact person:

  • 1. Assistant Professor, Department of CSE, Vasavi College of Engineering, Hyderabad (Telangana), India.
  • 2. Professor, Department of CSE, Chaitanya Bharathi Institute of Technology, Hyderabad (Telangana), India.
  • 3. Assistant Professor, Department of CSE, Chaitanya Bharathi Institute of Technology, Hyderabad (Telangana), India.

Description

Abstract: The development of new technology and people's propensity to rely on it more and more each year have led to enormous advancements in human technology. The idea of the Internet of Things (IOT) and later "Smart Homes" was one such enormous step. The surge in the smart home sector is due to the introduction of extremely practical and affordable technologies. However, the expanded use has also created a new set of security and privacy risks for those who rely on smart home technology. This article covers the basic idea of smart homes and IOT devices, as well as any current risks and any previous countermeasures that have been suggested.

Files

I1065099922.pdf

Files (414.8 kB)

Name Size Download all
md5:5e536168c0d597d3177f95c4353854e8
414.8 kB Preview Download

Additional details

Identifiers

Dates

Accepted
2024-12-15
Manuscript received on 25 August 2024 | Revised Manuscript received on 13 December 2024 | Manuscript Accepted on 15 December 2024 | Manuscript published on 30 December 2024.

References

  • Alam, M.R.; Reaz, M.B.I.; Ali, M.A.M. A Review of Smart Homes—Past, present, and future. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 2012, 42, 1190–1203. DOI: https://doi.org/10.1109/TSMCC.2012.2189204
  • Lin, H., & Bergmann, N. (2016). IoT privacy andsecurity challenges for smart home environments. Information, 7(3), 44. DOI: https://doi.org/10.3390/info7030044
  • . Price Waterhouse Coopers (PwC). Information Security Breaches Survey 2015; HM Government: London, UK, 2015. https://www.pwc.co.uk/assets/pdf/2015-isbs-technical-report-blue03.pdf
  • Patton, M.; Gross, E.; Chinn, R.; Forbis, S.; Walker, L.; Hsinchun, C. Uninvited connections: A study of vulnerable devices on the Internet of Things (IoT). In Proceedings of the 2014 IEEE JointIntelligence and Security Informatics Conference (JISIC), The Hague, The Netherlands, 24–26 September 2014; pp. 232–235. DOI: https://doi.org/10.1109/JISIC.2014.43
  • Pecorella, T., Pierucci, L., & Nizzi, F. (2018). "Network Sentiment" Framework to Improve Security and Privacy for Smart Home. Future Internet, 10(12), 125. https://doi.org/10.3390/fi10120125
  • Park, Y.; Park, T.; Park, M.; Han, J. How to Secure Push Button Configuration for Remote Control of Devices. In Proceedings of the 10th International Conference on Remote Engineering and Virtual Instrumentation (REV), Sydney, Australia, 6–8 February 2013. DOI: https://doi.org/10.1109/REV.2013.6502906
  • Han, J., & Park, T. (2017). Security-Enhanced Push Button Configuration for Home Smart Control. Sensors, 17(6), 1334. DOI: https://doi.org/10.3390/s17061334
  • Shelby, Z.; Bormann, C. 6lowpan: The Wireless Embedded Internet; John Wiley & Sons: New York, NY, USA, 2011; Volume 43. https://www.wiley.com/enus/6LoWPAN%3A+The+Wireless+Embedded+Internet-p9781119965343
  • Yue, Q.; Maode, M. An authentication and key establishment scheme to enhance security for m2m in6lowpans. In Proceedings of the 2015 IEEE International Conference on Communication Workshop (ICCW), London, UK, 8–12 June 2015; pp. 2671–2676. DOI: https://doi.org/10.1109/ICCW.2015.7247582
  • V. Karri and J. S. Daniel Lim, "Method and Device to Communicate via SMS After a Security Intrusion", 1st International Confe-rence on Sensing Technology, Palmerston North, New Zealand, (2005) November 21- 23. https://www.academia.edu/20866609/Method_and_Device_to_Comm unicate_via_SMS_After_a_Security_Intrusion
  • Bangali, J., & Shaligram, A. (2013). Design and Implementation of Security Systems for Smart Home based on GSM technology. International Journal of Smart Home, 7(6), 201-208. https://gvpress.com/journals/IJSH/vol7_no6/19.pdf
  • Robles, R. J., Kim, T. H., Cook, D., & Das, S. (2010). A review on security in smart home development. International Journal of Advanced Science and Technology, 15. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=f07 fd4d666c9fe05e49501884054f6041d554ad5
  • Fernandes, E., Jung, J., & Prakash, A. (2016, May). Security analysis of emerging smart home applications. In 2016 IEEE symposium on security and privacy (SP) (pp. 636-654). IEEE. DOI: https://doi.org/10.1109/SP.2016.44
  • Jiang, L., Liu, D. Y., & Yang, B. (2004, August). Smart home research. In Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 04EX826)(Vol. 2, pp. 659-663). IEEE. DOI: https://doi.org/10.1109/ICMLC.2004.1382266
  • Davidoff, S., Lee, M. K., Yiu, C., Zimmerman, J., & Dey, A. K. (2006, September). Principles of smart home control. In International conference on ubiquitous computing (pp. 19-34). Springer, Berlin, Heidelberg. DOI: https://doi.org/10.1007/11853565_2
  • Aloul, F., Al-Ali, A. R., Al-Dalky, R., Al- Mardini, M., & El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid andClean Energy, 1(1), 1-6. https://www.ijsgce.com/uploadfile/2012/1011/20121011121836539.pd f
  • Lee, C., Zappaterra, L., Choi, K., & Choi, H. A. (2014, October). Securing smart home: Technologies, security challenges, and security requirements. In 2014 IEEE Conference on Communications and Network Security (pp. 67-72). IEEE. DOI: https://doi.org/10.1109/CNS.2014.6997467
  • Yoon, S., Park, H., & Yoo, H. S. (2015). Security issues on smarthome in IoT environment. In Computer science and its applications (pp. 691- 696). Springer, Berlin, Heidelberg. DOI: https://doi.org/10.1007/978-3-662-45402-2_97
  • Raza, S., Trabalza, D., & Voigt, T. (2012, May). 6LoWPAN compressed DTLS for CoAP. In 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems (pp. 287- 289). IEEE. DOI: https://doi.org/10.1109/DCOSS.2012.55
  • Theoharidou, M., Tsalis, N., Gritzalis, D. (2017). Smart Home Solutions: Privacy Issues. In: van Hoof, J., Demiris, G., Wouters, E. (eds) Handbook of Smart Homes, Health Care and Well-Being. Springer, Cham. https://doi.org/10.1007/978-3-319-01583-5_5
  • Parvin, N., Jain, P. K., & Ajnar, D. S. (2019). Automated and Secured Smart Home through FPGA Controller. In International Journal of Innovative Technology and Exploring Engineering (Vol. 8, Issue 11, pp. 1341–1345). DOI: https://doi.org/10.35940/ijitee.j9662.0981119
  • Sei-Youen Oh, Aeri Lee, Authentication and Access Control Methods for Secured Smart Home IoT Service Environmen. (2019). In International Journal of Recent Technology and Engineering (Vol. 8, Issue 2S6, pp. 330–335). DOI: https://doi.org/10.35940/ijrte.b1063.0782s619
  • Sharma, R. (2019). Security & Privacy Challenges in Smart Home. In International Journal of Engineering and Advanced Technology (Vol. 8, Issue 6, pp. 3169–3171). DOI: https://doi.org/10.35940/ijeat.f9268.088619
  • Kumar, M., & Pandey, K. M. (2023). The Impact of IoT on Smart Home Energy Management. In International Journal of Soft Computing and Engineering (Vol. 13, Issue 5, pp. 7–12). DOI: https://doi.org/10.35940/ijsce.d3647.13051123
  • Gupta, S. K. (2022). Smart Grid System in India. In Indian Journal of Energy and Energy Resources (Vol. 1, Issue 4, pp. 5–6). DOI: https://doi.org/10.54105/ijeer.c1018.081422