scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Internet of Things (IoT) of Smart Home: Privacy and Security

15 Feb 2019-International Journal of Computer Applications (Foundation of Computer Science (FCS), NY, USA)-Vol. 182, Iss: 39, pp 3-8
TL;DR: As IoT home devices become increasingly ubiquitous, study’s findings and recommendations contribute to the broader understanding of users’ evolving attitudes towards privacy in smart homes.
Abstract: The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide smart services in a ubiquitous manner to the individuals. organization and people are wide accepting and adopting the functionalities offered by the smart home applications. this can be because of the various advantages, in easing users’ everyday life and work, provided by the rising internet of Things (IoT) technologies and devices, equipped with sensors, cameras, or actuators, and able either to accumulate information from the environment or to perform proper tasks. the main features of smart homes embrace realtime monitoring, remote control, safety from intruders, gas/fire alarm, and so on. Since among smart homes, sensitive and personal data are managed, security and privacy solutions should be put in place, to protect users/businesses’ data against violation try still on guarantee the supply of reliable services. As IoT home devices become increasingly ubiquitous, study’s findings and recommendations contribute to the broader understanding of users’ evolving attitudes towards privacy in smart homes.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: The proposed IoT-based system for home automation can easily and efficiently control appliances over the Internet and support home safety with autonomous operation and can notably provide convenience, safety, and security for SH residents.
Abstract: Home automation systems have attracted considerable attention with the advancement of communications technology. A smart home (SH) is an Internet of Things (IoT) application that utilizes the Internet to monitor and control appliances using a home automation system. Lack of IoT technology usage, unfriendly user interface, limited wireless transmission range, and high costs are the limitations of existing home automation systems. Therefore, this study presents a cost-effective and hybrid (local and remote) IoT-based home automation system with a user-friendly interface for smartphones and laptops. A prototype called IoT@HoMe is developed with an algorithm to enable the monitoring of home conditions and automate the control of home appliances over the Internet anytime and anywhere. This system utilizes a node microcontroller unit (NodeMCU) as a Wi-Fi-based gateway to connect different sensors and updates their data to Adafruit IO cloud server. The collected data from several sensors (radio-frequency identification, ultrasonic, temperature, humidity, gas, and motion sensors) can be accessed via If This Then That (IFTTT) on users' devices (smartphones and/or laptops) over the Internet regardless of their location. A set of relays is used to connect the NodeMCU to homes under controlled appliances. The designed system is structured in a portable manner as a control box that can be attached for monitoring and controlling a real house. The proposed IoT-based system for home automation can easily and efficiently control appliances over the Internet and support home safety with autonomous operation. IoT@HoMe is a low cost and reliable automation system that reduces energy consumption and can notably provide convenience, safety, and security for SH residents.

125 citations


Cites background from "Internet of Things (IoT) of Smart H..."

  • ...protect users and corporate data from infringement while ensuring reliable services [28]....

    [...]

Journal ArticleDOI
TL;DR: A blockchain-based smart home gateway network that counters possible attacks on the gateway of smart homes and is implemented on the Ethereum blockchain technology and evaluated in terms of standard security measures including security response time and accuracy.
Abstract: With the advancement of Information and Communication Technology (ICT) and the proliferation of sensor technologies, the Internet of Things (IoT) is now being widely used in smart home for the purposes of efficient resource management and pervasive sensing. In smart homes, various IoT devices are connected to each other, and these connections are centered on gateways. The role of gateways in the smart homes is significant, however, its centralized structure presents multiple security vulnerabilities such as integrity, certification, and availability. To address these security vulnerabilities, in this paper, we propose a blockchain-based smart home gateway network that counters possible attacks on the gateway of smart homes. The network consists of three layers including device, gateway, and cloud layers. The blockchain technology is employed at the gateway layer wherein data is stored and exchanged in the form blocks of blockchain to support decentralization and overcome the problem from traditional centralized architecture. The blockchain ensures the integrity of the data inside and outside of the smart home and provides availability through authentication and efficient communication between network members. We implemented the proposed network on the Ethereum blockchain technology and evaluated in terms of standard security measures including security response time and accuracy. The evaluation results demonstrate that the proposed security solutions outperforms over the existing solutions.

91 citations


Cites background from "Internet of Things (IoT) of Smart H..."

  • ...[29] presented the impact of various security attacks on smart home and evaluated their impact as a low, moderate, and high to appropriate solutions for their mitigation....

    [...]

Journal ArticleDOI
TL;DR: A comprehensive review of the HEMS literature with reference to main concepts, configurations, and enabling technologies is presented and an overall overview of current and future trends in HEMS solutions and technologies is offered.
Abstract: Home energy management systems (HEMSs) help manage electricity demand to optimize energy consumption and distributed renewable energy generation without compromising consumers’ comfort HEMSs operate according to multiple criteria, including energy cost, weather conditions, load profiles, and consumer comfort They play an increasingly ubiquitous role in energy efficiency through the reduction of electricity consumption within residential and commercial smart grids This paper presents a comprehensive review of the HEMS literature with reference to main concepts, configurations, and enabling technologies In doing so, it also provides a summary of HEMS computing trends and popular communication technologies for demand response applications The ensuing survey offers the reader with an overall overview of current and future trends in HEMS solutions and technologies

80 citations


Cites background from "Internet of Things (IoT) of Smart H..."

  • ...To solve privacy issues relative to the use of cloud computing [37] with big data transmission, Fog and Edge computing have recently been gaining momentum [38]....

    [...]

Journal ArticleDOI
TL;DR: A simple secure smart home framework based on a refined version of blockchain called Consortium blockchain is described and highlighted, which highlights the limitations and opportunities of adopting such an architecture.
Abstract: Smart Home automation is increasingly gaining popularity among current applications of Internet of Things (IoT) due to the convenience and facilities it provides to the home owners. Sensors are employed within the home appliances via wireless connectivity to be accessible remotely by home owners to operate these devices. With the exponential increase of smart home IoT devices in the marketplace such as door locks, light bulbs, power switches etc, numerous security concerns are arising due to limited storage and processing power of such devices, making these devices vulnerable to several attacks. Due to this reason, security implementations in the deployment of these devices has gained popularity among researchers as a critical research area. Moreover, the adoption of traditional security schemes has failed to address the unique security concerns associated with these devices. Blockchain, a decentralised database based on cryptographic techniques, is gaining enormous attention to assure security of IoT systems. The blockchain framework within an IoT system is a fascinating substitute to the traditional centralised models, which has some significant concerns in fulfilling the demand of smart homes security. In this article, we aim to examine the security of smart homes by instigating the adoption of blockchain and exploring some of the currently proposed smart home architectures using blockchain technology. To present our findings, we describe a simple secure smart home framework based on a refined version of blockchain called Consortium blockchain. We highlight the limitations and opportunities of adopting such an architecture. We further evaluate our model and conclude with the results by designing an experimental testbed using a few household IoT devices commonly available in the marketplace.

47 citations


Cites background from "Internet of Things (IoT) of Smart H..."

  • ...As the number and heterogeneity of smart home devices are accelerating promptly, it is becoming increasingly challenging to maintain security of these devices [4]....

    [...]

Journal ArticleDOI
19 Feb 2021
TL;DR: A comprehensive review of research work on the existing technologies and applications of IoT in residential and commercial buildings and results show that the commercial building sector has received more attention compared to the residential building sector.
Abstract: Residential and commercial buildings are undergoing a dramatic change, and the Internet of Things (IoT) technologies are shaping the future of these buildings. Researchers have recently utilized IoT in a variety of applications and settings to transfer conventional buildings into smart, efficient, and secure buildings. While functional IoT approaches have been developed, there is still a need for improvement in IoT applications and operations to understand the full potential of this technology. This improvement can properly be done by bridging the gaps of the current literature to provide a building block for future studies. The objective of this paper is to present a comprehensive review of research work on the existing technologies and applications of IoT in residential and commercial buildings. For residential buildings, studies are divided to three major categories of home automation, intelligent energy management systems, and healthcare facilities. For commercial buildings, the current literature is divided to four categories of office buildings, healthcare facilities, educational buildings, and restaurants and retail facilities. Based on the review of each category, the trends, current benefits and risks, and future challenges of the IoT implementation in the built environments are identified and discussed. In particular, integration of various IoT technologies with different capabilities, data storage and processing, and privacy and security risks are identified as the main challenges for IoT implementation. In addition, our results show that the commercial building sector has received more attention compared to the residential building sector. By providing the directions for future research opportunities, this paper benefits IoT developers and researchers to properly identify their work boundaries and define their contributions.

41 citations

References
More filters
Journal ArticleDOI
01 Jan 2010
TL;DR: An adequate legal framework must take the underlying technology into account and would best be established by an international legislator, which is supplemented by the private sector according to specific needs and thereby becomes easily adjustable.
Abstract: The Internet of Things, an emerging global Internet-based technical architecture facilitating the exchange of goods and services in global supply chain networks has an impact on the security and privacy of the involved stakeholders. Measures ensuring the architecture's resilience to attacks, data authentication, access control and client privacy need to be established. An adequate legal framework must take the underlying technology into account and would best be established by an international legislator, which is supplemented by the private sector according to specific needs and thereby becomes easily adjustable. The contents of the respective legislation must encompass the right to information, provisions prohibiting or restricting the use of mechanisms of the Internet of Things, rules on IT-security-legislation, provisions supporting the use of mechanisms of the Internet of Things and the establishment of a task force doing research on the legal challenges of the IoT.

1,216 citations


"Internet of Things (IoT) of Smart H..." refers background in this paper

  • ...If vendors are not interested in ensuring that they send secure devices by default, and if the owner doesn't care about security, it is only a matter of time before the device is violated and part of So botnets to warn the market about this problem, Bricker both authors choose to knock them offline [32]....

    [...]

Ovidiu Vermesan1, Peter Friess
30 Jun 2013
TL;DR: The book builds on the ideas put forward by the European research Cluster on the Internet of Things Strategic Research Agenda and presents global views and state of the art results on the challenges facing the research, development and deployment of IoT at the global level.
Abstract: The book aims to provide a broad overview of various topics of the Internet of Things (IoT) from the research and development priorities to enabling technologies, architecture, security, privacy, interoperability and industrial applications. It is intended to be a standalone book in a series that covers the Internet of Things activities of the IERC ? Internet of Things European Research Cluster from technology to international cooperation and the global "state of play". The book builds on the ideas put forward by the European research Cluster on the Internet of Things Strategic Research Agenda and presents global views and state of the art results on the challenges facing the research, development and deployment of IoT at the global level.

767 citations


"Internet of Things (IoT) of Smart H..." refers background in this paper

  • ...This comes together with the emergence of a cloud system or cloud computing that has a transition from the Internet to IPv6 to handle limited capacity [3]....

    [...]

  • ...In 2014, the view of the Internet of things has evolved along with the development of technology and the incorporation of several technologies, ranging from wireless communication to the Internet, and from embedded systems to microelectromechanical systems (MEMS), this means that all fields in the world will contribute to building the Internet of things [3]....

    [...]

Journal ArticleDOI
TL;DR: This paper aims to present some of the most representative threats to the smart home/smart grid environment and presents promising security countermeasures with respect to the identified specific security goals for each presented scenario.
Abstract: The electricity industry is now at the verge of a new era—an era that promises, through the evolution of the existing electrical grids to smart grids, more efficient and effective power management, better reliability, reduced production costs, and more environmentally friendly energy generation. Numerous initiatives across the globe, led by both industry and academia, reflect the mounting interest around not only the enormous benefits but also the great risks introduced by this evolution. This paper focuses on issues related to the security of the smart grid and the smart home, which we present as an integral part of the smart grid. Based on several scenarios, we aim to present some of the most representative threats to the smart home/smart grid environment. The threats detected are categorized according to specific security goals set for the smart home/smart grid environment, and their impact on the overall system security is evaluated. A review of contemporary literature is then conducted with the aim of presenting promising security countermeasures with respect to the identified specific security goals for each presented scenario. An effort to shed light on open issues and future research directions concludes this paper.

484 citations


"Internet of Things (IoT) of Smart H..." refers background in this paper

  • ...Where the potential impact is said to be [13]:...

    [...]

  • ...Finally, malicious software attacks, are attacks aiming to exploit internal vulnerabilities to modify, destroy and steal information or gain unauthorized access to system resources [13]....

    [...]

  • ...Table 1 Smart Home Security Issues [13]...

    [...]

Journal ArticleDOI
TL;DR: After surveying existing solutions for enhancing IoT security, key future requirements for trusted Smart Home systems are identified and a gateway architecture is selected as the most appropriate for resource-constrained devices, and for high system availability.
Abstract: Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic environments, human issues may be as important as technical issues. After surveying existing solutions for enhancing IoT security, the paper identifies key future requirements for trusted Smart Home systems. A gateway architecture is selected as the most appropriate for resource-constrained devices, and for high system availability. Two key technologies to assist system auto-management are identified. Firstly, support for system auto-configuration will enhance system security. Secondly, the automatic update of system software and firmware is needed to maintain ongoing secure system operation.

308 citations


"Internet of Things (IoT) of Smart H..." refers background in this paper

  • ...The target is an IoT device with a weak security system, especially devices whose username and password have not been changed [30]....

    [...]

Proceedings ArticleDOI
07 Dec 2015
TL;DR: This paper proposes that software defined networking technology be used to dynamically block/quarantine devices, based on their network activity and on the context within the house such as time-of-day or occupancy-level, which can augment device-centric security for the emerging smart-home.
Abstract: The increasing uptake of smart home appliances, such as lights, smoke-alarms, power switches, baby monitors, and weighing scales, raises privacy and security concerns at unprecedented scale, allowing legitimate and illegitimate entities to snoop and intrude into the family's activities. In this paper we first illustrate these threats using real devices currently available in the market. We then argue that as more such devices emerge, the attack vectors increase, and ensuring privacy/security of the house becomes more challenging. We therefore advocate that device-level protections be augmented with network-level security solutions, that can monitor network activity to detect suspicious behavior. We further propose that software defined networking technology be used to dynamically block/quarantine devices, based on their network activity and on the context within the house such as time-of-day or occupancy-level. We believe our network-centric approach can augment device-centric security for the emerging smart-home.

283 citations


"Internet of Things (IoT) of Smart H..." refers background in this paper

  • ...Secure data management in various devices, security enhancement in smart home systems and applications [17], and network system security and privacy control for home intelligence and IoT devices [18]....

    [...]