Internet of Things (IoT) of Smart Home: Privacy and Security
Citations
125 citations
Cites background from "Internet of Things (IoT) of Smart H..."
...protect users and corporate data from infringement while ensuring reliable services [28]....
[...]
91 citations
Cites background from "Internet of Things (IoT) of Smart H..."
...[29] presented the impact of various security attacks on smart home and evaluated their impact as a low, moderate, and high to appropriate solutions for their mitigation....
[...]
80 citations
Cites background from "Internet of Things (IoT) of Smart H..."
...To solve privacy issues relative to the use of cloud computing [37] with big data transmission, Fog and Edge computing have recently been gaining momentum [38]....
[...]
47 citations
Cites background from "Internet of Things (IoT) of Smart H..."
...As the number and heterogeneity of smart home devices are accelerating promptly, it is becoming increasingly challenging to maintain security of these devices [4]....
[...]
41 citations
References
1,216 citations
"Internet of Things (IoT) of Smart H..." refers background in this paper
...If vendors are not interested in ensuring that they send secure devices by default, and if the owner doesn't care about security, it is only a matter of time before the device is violated and part of So botnets to warn the market about this problem, Bricker both authors choose to knock them offline [32]....
[...]
767 citations
"Internet of Things (IoT) of Smart H..." refers background in this paper
...This comes together with the emergence of a cloud system or cloud computing that has a transition from the Internet to IPv6 to handle limited capacity [3]....
[...]
...In 2014, the view of the Internet of things has evolved along with the development of technology and the incorporation of several technologies, ranging from wireless communication to the Internet, and from embedded systems to microelectromechanical systems (MEMS), this means that all fields in the world will contribute to building the Internet of things [3]....
[...]
484 citations
"Internet of Things (IoT) of Smart H..." refers background in this paper
...Where the potential impact is said to be [13]:...
[...]
...Finally, malicious software attacks, are attacks aiming to exploit internal vulnerabilities to modify, destroy and steal information or gain unauthorized access to system resources [13]....
[...]
...Table 1 Smart Home Security Issues [13]...
[...]
308 citations
"Internet of Things (IoT) of Smart H..." refers background in this paper
...The target is an IoT device with a weak security system, especially devices whose username and password have not been changed [30]....
[...]
283 citations
"Internet of Things (IoT) of Smart H..." refers background in this paper
...Secure data management in various devices, security enhancement in smart home systems and applications [17], and network system security and privacy control for home intelligence and IoT devices [18]....
[...]