IoT for Smart Home
VerifiedAdded on 2023/01/06
|15
|5166
|57
AI Summary
This report discusses the use of IoT technologies in smart homes, including the integration of smart phones, recent developments, vulnerability assessment, and challenges. It provides insights into the benefits and challenges of implementing IoT in smart homes.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
IoT for smart Home
1
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ABSTRACT
In this report, it has summarised about the IoT technologies used in smart homes. In order to
connect with electronic appliances through internet. The documentation can be determined the
smart phone for integration with IoT devices, user can access information or data in proper
manner. Furthermore, it can examine the role of cyber security which always support for
protecting and securing from unauthorised access. Thus, it has maintained the entire performance
and efficiency of IoT devices. within digital technology, there are various challenges occurred in
context of security so that implement suitable solution.
2
In this report, it has summarised about the IoT technologies used in smart homes. In order to
connect with electronic appliances through internet. The documentation can be determined the
smart phone for integration with IoT devices, user can access information or data in proper
manner. Furthermore, it can examine the role of cyber security which always support for
protecting and securing from unauthorised access. Thus, it has maintained the entire performance
and efficiency of IoT devices. within digital technology, there are various challenges occurred in
context of security so that implement suitable solution.
2
Contents
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Overview......................................................................................................................................3
Use of IOT in smart home...........................................................................................................4
Some recent developments with respect to use of IoT in smart Home.......................................6
Vulnerability assessment with respect to cyber security.............................................................7
Challenges and its solution........................................................................................................10
CONCLUSION..............................................................................................................................13
REFERENCES..............................................................................................................................14
3
INTRODUCTION...........................................................................................................................3
MAIN BODY..................................................................................................................................3
Overview......................................................................................................................................3
Use of IOT in smart home...........................................................................................................4
Some recent developments with respect to use of IoT in smart Home.......................................6
Vulnerability assessment with respect to cyber security.............................................................7
Challenges and its solution........................................................................................................10
CONCLUSION..............................................................................................................................13
REFERENCES..............................................................................................................................14
3
INTRODUCTION
IoT Smart homes appliances are connected to the internet and LAN, expands the smart home
through IoT. Various IoT devices are establishing the connection with network. It allows for user
to communicate with smart home, identifying the information or data through remotely activate
tasks. Smart home system achieved the great popularity in last decade as they also increasing the
comfort and quality of life. The report will discuss about the concept of smart phone with
integration of IoT services. It will identify the recent developments with respect to use of Internet
of things in Smart Home, identifying the check vulnerability in term of cyber-attack.
Furthermore, the documentation will describe about the challenges of IoT smart phone and their
accurate solutions.
MAIN BODY
Overview
The internet of things paradigm is based on the devices connected to the internet. Each and
every device are objects such as actuators, sensors and equipped with telecommunication
interface, processing and limited the storage of data. IoT devices are enabling for integration
with objects via internet, also establishing the between devices and people. Generally, IoT can be
used the modern technologies such as radio frequency identification, intelligence technology and
other sensor techniques (HaddadPajouh, Dehghantanha and Karimipour, 2019). It is mainly
providing the better processing and communication capabilities along with different algorithms.
It allows for established the integration of different element to operate into integrated units.
Furthermore, IoT for smart homes, which means that perform significant action in order to
connect with other equipment’s. The communication devices in network can be accessible to
user of their own location. In order to understand the significant role of IoT in smart homes. All
devices will be connected with smart controller for providing the user accessibility. The device
will be connected to router through internet and then turn into communicate with other users. In
some situation, it can be required the permission to be taken.
Use of IOT in smart home
Smart homes are a kind of convenient home set up system which is designed for
controlling different kinds of applications and devices automatically with the help of internet
4
IoT Smart homes appliances are connected to the internet and LAN, expands the smart home
through IoT. Various IoT devices are establishing the connection with network. It allows for user
to communicate with smart home, identifying the information or data through remotely activate
tasks. Smart home system achieved the great popularity in last decade as they also increasing the
comfort and quality of life. The report will discuss about the concept of smart phone with
integration of IoT services. It will identify the recent developments with respect to use of Internet
of things in Smart Home, identifying the check vulnerability in term of cyber-attack.
Furthermore, the documentation will describe about the challenges of IoT smart phone and their
accurate solutions.
MAIN BODY
Overview
The internet of things paradigm is based on the devices connected to the internet. Each and
every device are objects such as actuators, sensors and equipped with telecommunication
interface, processing and limited the storage of data. IoT devices are enabling for integration
with objects via internet, also establishing the between devices and people. Generally, IoT can be
used the modern technologies such as radio frequency identification, intelligence technology and
other sensor techniques (HaddadPajouh, Dehghantanha and Karimipour, 2019). It is mainly
providing the better processing and communication capabilities along with different algorithms.
It allows for established the integration of different element to operate into integrated units.
Furthermore, IoT for smart homes, which means that perform significant action in order to
connect with other equipment’s. The communication devices in network can be accessible to
user of their own location. In order to understand the significant role of IoT in smart homes. All
devices will be connected with smart controller for providing the user accessibility. The device
will be connected to router through internet and then turn into communicate with other users. In
some situation, it can be required the permission to be taken.
Use of IOT in smart home
Smart homes are a kind of convenient home set up system which is designed for
controlling different kinds of applications and devices automatically with the help of internet
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
though mobile or another kind of deivce which is connected though internet. Current location of
person does not matter. All the devices in a smart home are interconnected with each other with
the help of internet as internet helps the user in controlling different kinds of functions such as
lights, temperature, home theatre, secure access to home etc. Smart homes can be set up either
though wired or wireless systems (Mocrii, Chen and Musilek, 2018). IOT in smart homes helps
in maintenance of internet connections, managing mobile applications though remote and
incorporate different kinds of sensors within the system as well. Nowadays smart homes have
become a useful and important system that helps its users in convenient and automatic
maintenance of house. Internet of things in smart homes helps in uniting whole house though one
system within one network. IOT can easily help in turning off or switching off lights the moment
users enter the house as sensors can detect someone’s presence and turn on lights. IoT plays a
vital role in management of all the functions of smart homes. It especially helps in effective
working of sensors for proper working of other home appliances. It helps in embedding
computer intelligence which further provide different ways though which home condition can be
measured, functionality of all the devices within a smart home can also be checked (Kazmi and
et. al., 2017). IoT helps smart homes in controlling all the applications within a home from
anywhere in the world. IOT in smart homes is used for many different factors, some of them
have been explained below:
Monitoring and controlling: IoT in smart homes help the users in monitoring and controlling
all kinds of processes that take place at user’s home. It helps smart tomes to analyse the way in
which household works, it processes this data and then bring important and significant changes.
For example, with the help of smart home, users can add any kind of item within their shopping
list.
Energy and cost saving: Each and every device connected to smart home system has their own
energy consumption. Smart homes can easily adjust setting of devices in such a manner that it
can help the user in saving both energy and cost. Smart home system can also be allowed to do
anything or everything on their own so that then any kind of device is not in use then it can be
shut down which directly help in saving power consumption especially when no one is at home
5
person does not matter. All the devices in a smart home are interconnected with each other with
the help of internet as internet helps the user in controlling different kinds of functions such as
lights, temperature, home theatre, secure access to home etc. Smart homes can be set up either
though wired or wireless systems (Mocrii, Chen and Musilek, 2018). IOT in smart homes helps
in maintenance of internet connections, managing mobile applications though remote and
incorporate different kinds of sensors within the system as well. Nowadays smart homes have
become a useful and important system that helps its users in convenient and automatic
maintenance of house. Internet of things in smart homes helps in uniting whole house though one
system within one network. IOT can easily help in turning off or switching off lights the moment
users enter the house as sensors can detect someone’s presence and turn on lights. IoT plays a
vital role in management of all the functions of smart homes. It especially helps in effective
working of sensors for proper working of other home appliances. It helps in embedding
computer intelligence which further provide different ways though which home condition can be
measured, functionality of all the devices within a smart home can also be checked (Kazmi and
et. al., 2017). IoT helps smart homes in controlling all the applications within a home from
anywhere in the world. IOT in smart homes is used for many different factors, some of them
have been explained below:
Monitoring and controlling: IoT in smart homes help the users in monitoring and controlling
all kinds of processes that take place at user’s home. It helps smart tomes to analyse the way in
which household works, it processes this data and then bring important and significant changes.
For example, with the help of smart home, users can add any kind of item within their shopping
list.
Energy and cost saving: Each and every device connected to smart home system has their own
energy consumption. Smart homes can easily adjust setting of devices in such a manner that it
can help the user in saving both energy and cost. Smart home system can also be allowed to do
anything or everything on their own so that then any kind of device is not in use then it can be
shut down which directly help in saving power consumption especially when no one is at home
5
(Kazmi and et. al., 2017). So, it can be said that it is an important way of ways of cutting down
cost and save more energy.
Environmental impact: It can help in reducing emission of carbon dioxide done by most of
household devices like AC because of which negative impact upon environment increases. It can
also be said that IOT in smart homes can help in living a greener life.
Better security: IoT in smart homes has an important use which is to provide better security to
house and it helps in providing control of all the devices and applications installed within a home
to user regardless of a fact that they are inside or outside the house. All the security devices like
camera, smoke sensors, motion detectors work together and can inform the user whether
anything unusual is detected so that user can check what is going on inside the house so that
required action can be taken from anywhere in the world.
Comfort: Another important use of IoT in smart homes is that it helps in providing high level of
comfort to the user (Geneiatakis and et. al., 2017). It helps the user in simplifying any kind of
task and makes life simpler by providing all kinds of control of all the applications and devices
that are installed within a home in hands of user.
Insurance: As it has already been discussed that one of the main and prominent use of IoT in
Smart homes is security which is provided by this system. IoT smart homes can be insured and
smart sensors should be installed so that if there is problem in any device or application then it
can be easily detected and can prevent the system from further significant damages. For example,
water sensors can help in detecting leakages within pipes so that plumber can be called and
leakage can be treated before leaky pipe burst. Various kinds of insurance companies provide
discount to clients who implement IoT in smart Homes
So, it can be said that there are variety of uses of smart homes that has helped in making
lives of people much simpler and easier (Pirbhulal and et. al., 2017). Users can manage their
work despite of not being at home. For example, of user wants to do laundry and they are outside
their home then they can operate their washing machine outside their home though smart home
system and manage all the required functionalities of washing machine. It has not only helped in
saving energy and cost but has also helped in saving time of users and they need to take stress or
tension of reaching home as fast as they can for doing any kind of work. Not only this, if users
6
cost and save more energy.
Environmental impact: It can help in reducing emission of carbon dioxide done by most of
household devices like AC because of which negative impact upon environment increases. It can
also be said that IOT in smart homes can help in living a greener life.
Better security: IoT in smart homes has an important use which is to provide better security to
house and it helps in providing control of all the devices and applications installed within a home
to user regardless of a fact that they are inside or outside the house. All the security devices like
camera, smoke sensors, motion detectors work together and can inform the user whether
anything unusual is detected so that user can check what is going on inside the house so that
required action can be taken from anywhere in the world.
Comfort: Another important use of IoT in smart homes is that it helps in providing high level of
comfort to the user (Geneiatakis and et. al., 2017). It helps the user in simplifying any kind of
task and makes life simpler by providing all kinds of control of all the applications and devices
that are installed within a home in hands of user.
Insurance: As it has already been discussed that one of the main and prominent use of IoT in
Smart homes is security which is provided by this system. IoT smart homes can be insured and
smart sensors should be installed so that if there is problem in any device or application then it
can be easily detected and can prevent the system from further significant damages. For example,
water sensors can help in detecting leakages within pipes so that plumber can be called and
leakage can be treated before leaky pipe burst. Various kinds of insurance companies provide
discount to clients who implement IoT in smart Homes
So, it can be said that there are variety of uses of smart homes that has helped in making
lives of people much simpler and easier (Pirbhulal and et. al., 2017). Users can manage their
work despite of not being at home. For example, of user wants to do laundry and they are outside
their home then they can operate their washing machine outside their home though smart home
system and manage all the required functionalities of washing machine. It has not only helped in
saving energy and cost but has also helped in saving time of users and they need to take stress or
tension of reaching home as fast as they can for doing any kind of work. Not only this, if users
6
forget to turn off any device and it is dangerous then they can do it with the help of IoT in smart
home system (Singh and et. al., 2018). Due to advancement in technology use of IoT in smart
homes has become useful especially for people who are living in highly developed areas.
Some recent developments with respect to use of IoT in smart Home.
In recently, the first generation of smart homes had little to do with IoT technologies. It
was completely depending on the remote control and automation. A past decade, a futuristic
space where it could operate blinder from different smartphone. In 2019, it has identified the
majorly use of IoT technology in smart homes which implies in home devices such as sensor
datum. It automatically adjusts the regimes on the regular basis (Tawalbeh, Muheidat and
Quwaider, 2020). Sometimes, it helps for monitor the current location in real time and then turn
into heating on and off accordingly. This is recent innovation for smart homes for save both
energy and money.
By using IoT for smart homes, it provides the best level of control over household. No
only support for remote processing but also switch off and on appliances. The entire control can
be occurred in full range of functionality on web applications and mobile phone. For example-
recently developed the smart LF fridges that allows to pre-order extra ice production when still
in target for buying stuff for purpose of party. Afterwards, it also identifying the expiration dates
on the items.
Insider the smart intelligence expects to connect with multiple devices on planet to reach
50-million by 2025. Usually, it mainly includes smart appliances such as dryers, washers and
refrigerators. In additional, it will be required to maintain safety and security by using different
sensors, alarm, cameras and monitors. In this way, it consider as great of IoT for smart homes for
maintain the different tasks (Patrono and et.al., 2019). Beyond this, smart home IoT devices can
reduce the cost/price and conserve energy. Nowadays, there are several smart home IoT devices
hit the market and made in different way to gain more popularity. Amazon Echo is considering
as recent development which may use as smart home gadgets. It is automatically activated the
voice assistant, Alex and provide the better convenience for users.
In 2020, IoT devices and smart home automation has entered at homes, filled with
connected with different devices. It possible to make lives easier, convenient and more
7
home system (Singh and et. al., 2018). Due to advancement in technology use of IoT in smart
homes has become useful especially for people who are living in highly developed areas.
Some recent developments with respect to use of IoT in smart Home.
In recently, the first generation of smart homes had little to do with IoT technologies. It
was completely depending on the remote control and automation. A past decade, a futuristic
space where it could operate blinder from different smartphone. In 2019, it has identified the
majorly use of IoT technology in smart homes which implies in home devices such as sensor
datum. It automatically adjusts the regimes on the regular basis (Tawalbeh, Muheidat and
Quwaider, 2020). Sometimes, it helps for monitor the current location in real time and then turn
into heating on and off accordingly. This is recent innovation for smart homes for save both
energy and money.
By using IoT for smart homes, it provides the best level of control over household. No
only support for remote processing but also switch off and on appliances. The entire control can
be occurred in full range of functionality on web applications and mobile phone. For example-
recently developed the smart LF fridges that allows to pre-order extra ice production when still
in target for buying stuff for purpose of party. Afterwards, it also identifying the expiration dates
on the items.
Insider the smart intelligence expects to connect with multiple devices on planet to reach
50-million by 2025. Usually, it mainly includes smart appliances such as dryers, washers and
refrigerators. In additional, it will be required to maintain safety and security by using different
sensors, alarm, cameras and monitors. In this way, it consider as great of IoT for smart homes for
maintain the different tasks (Patrono and et.al., 2019). Beyond this, smart home IoT devices can
reduce the cost/price and conserve energy. Nowadays, there are several smart home IoT devices
hit the market and made in different way to gain more popularity. Amazon Echo is considering
as recent development which may use as smart home gadgets. It is automatically activated the
voice assistant, Alex and provide the better convenience for users.
In 2020, IoT devices and smart home automation has entered at homes, filled with
connected with different devices. It possible to make lives easier, convenient and more
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
comfortable. The advantage of smart homes is handling the more operations such as lighting,
temperature. Moreover, IoT devices provide the better security for home effectively and
efficiently.
IoT for smart home automation development
Internet of thing is considering as modern technology that enable connection of different
devices through internet. It also depending on the collection or data or information, which will be
monitoring, transferring information to other devices. It allows for specific action to
automatically activate whenever certain condition or situation arise. For Example- Smart kettle is
the best example that can be programmed to automatically turn off once it reaches to highest
temperature. It might have send a notification to other user on the basis of smart devices.
Nowadays, it has identified that various IoT devices are slowly but perform the different
role in daily lives of people. In fact, the market will be reached towards smart home automation
by 2020. It is not surprising when consider the better convenience and smart home device offers
better services (Almusaylim and Zaman, 2019). Since, IoT devices are established the
connection, which become easier to manage or control multiple operations. The smart home
devices also help in reducing price and energy. In currently, there is wide range of devices
powered by Internet of things (IoT). It is mainly including security systems, thermostats and
refrigerators. In additional, smarter devices are added and adopt smart features.
Vulnerability assessment with respect to cyber security
IoT technology has been anticipated to become as essential need or requirement in
development of smart homes, it offers better convenience and efficiency to home residents. in
this way, it can achieve the best quality of life. The application of IoT to smart homes, by
connecting with objects through internet (Jain and Singh, 2020). At certain level, it can be
increased the security as well as privacy related challenges in context of integrity, confidentiality
and authenticity. These are majorly developed vulnerable situation when exchanged data from
one device to another. The challenges make smart homes which extremely vulnerable to different
type of security attacks. As a result, IoT based smart homes being insecure. In this way, it is an
essential part for identifying possible security risk to represent the complete status of smart
8
temperature. Moreover, IoT devices provide the better security for home effectively and
efficiently.
IoT for smart home automation development
Internet of thing is considering as modern technology that enable connection of different
devices through internet. It also depending on the collection or data or information, which will be
monitoring, transferring information to other devices. It allows for specific action to
automatically activate whenever certain condition or situation arise. For Example- Smart kettle is
the best example that can be programmed to automatically turn off once it reaches to highest
temperature. It might have send a notification to other user on the basis of smart devices.
Nowadays, it has identified that various IoT devices are slowly but perform the different
role in daily lives of people. In fact, the market will be reached towards smart home automation
by 2020. It is not surprising when consider the better convenience and smart home device offers
better services (Almusaylim and Zaman, 2019). Since, IoT devices are established the
connection, which become easier to manage or control multiple operations. The smart home
devices also help in reducing price and energy. In currently, there is wide range of devices
powered by Internet of things (IoT). It is mainly including security systems, thermostats and
refrigerators. In additional, smarter devices are added and adopt smart features.
Vulnerability assessment with respect to cyber security
IoT technology has been anticipated to become as essential need or requirement in
development of smart homes, it offers better convenience and efficiency to home residents. in
this way, it can achieve the best quality of life. The application of IoT to smart homes, by
connecting with objects through internet (Jain and Singh, 2020). At certain level, it can be
increased the security as well as privacy related challenges in context of integrity, confidentiality
and authenticity. These are majorly developed vulnerable situation when exchanged data from
one device to another. The challenges make smart homes which extremely vulnerable to different
type of security attacks. As a result, IoT based smart homes being insecure. In this way, it is an
essential part for identifying possible security risk to represent the complete status of smart
8
homes. The deployment of IoT technology for building the effective smart homes with respect to
control processes, automation and other new vulnerabilities within cyber security.
Vulnerability assessment
It is based on the system review process for identification of security weakness in the
information system. In this way, it can be evaluated the system if it is susceptible to any
unknown vulnerable. Afterwards, assigns particular severity level and recommends the
mitigation action against them. A vulnerability assessment process can be intended to determine
threats, risks they pose. Generally, it involved the use of automated testing tool such as network
security scanner (Jeong and Park, 2019). As a result, it will be listed the vulnerability assessment
report. Each and every individual person who have faced the risk about cyber-attacks and also
advantage from vulnerability assessment. The security vulnerabilities can be enabled attacker to
access Information technology system and other smart phone applications. It is an essential for
business to identify the weakness before establishing the connection. The specific vulnerable
assessment along with management program that help for improving the security of entire
system.
In additional, vulnerability assessment mainly include penetration testing component to
identify the personnel, processes and procedures. it might be detected the network or system in
proper manner.
There are various type of vulnerability assessments as following:
Host assessment: it is based on the critical server assessment, which may be increased
the vulnerable to attack, if not completely adequately tested or not generated from
specific tested machine image.
Network and wireless assessment: this type of assessment is mainly focused on the
practices, policies to prevent unauthorised access of public as well as private network. In
order to provide the better network accessible resources.
Database assessment: The database or big data system for generating mis-
configurations, vulnerabilities. Through this, it can easily be identifying the rogue
database or insecure test environment. Afterwards, it may support for classifying the
sensitive data or information across the organization’s infrastructure.
9
control processes, automation and other new vulnerabilities within cyber security.
Vulnerability assessment
It is based on the system review process for identification of security weakness in the
information system. In this way, it can be evaluated the system if it is susceptible to any
unknown vulnerable. Afterwards, assigns particular severity level and recommends the
mitigation action against them. A vulnerability assessment process can be intended to determine
threats, risks they pose. Generally, it involved the use of automated testing tool such as network
security scanner (Jeong and Park, 2019). As a result, it will be listed the vulnerability assessment
report. Each and every individual person who have faced the risk about cyber-attacks and also
advantage from vulnerability assessment. The security vulnerabilities can be enabled attacker to
access Information technology system and other smart phone applications. It is an essential for
business to identify the weakness before establishing the connection. The specific vulnerable
assessment along with management program that help for improving the security of entire
system.
In additional, vulnerability assessment mainly include penetration testing component to
identify the personnel, processes and procedures. it might be detected the network or system in
proper manner.
There are various type of vulnerability assessments as following:
Host assessment: it is based on the critical server assessment, which may be increased
the vulnerable to attack, if not completely adequately tested or not generated from
specific tested machine image.
Network and wireless assessment: this type of assessment is mainly focused on the
practices, policies to prevent unauthorised access of public as well as private network. In
order to provide the better network accessible resources.
Database assessment: The database or big data system for generating mis-
configurations, vulnerabilities. Through this, it can easily be identifying the rogue
database or insecure test environment. Afterwards, it may support for classifying the
sensitive data or information across the organization’s infrastructure.
9
Application scans: It can be identified the security vulnerabilities in the web application.
At some point, automated scan on the dynamic analysis of source code.
These are identified the different vulnerabilities within IoT modern technologies. It has been
occurred when establishing the connection from one device to another. Hijacking is a type of
wireless connection which mainly create a vulnerability where attacker can inject harmful code.
Afterwards, it can be executed by other mobile application.
Vulnerabilities Assessment related to IT risk, cyber security
Most vulnerability assessments can be assigned on the basis of risk-level within each
cyber threat. The majorly risk can have a priority and their impact assigned to them. Sometimes,
it helps for distribution channel focus on the cyber threats. Otherwise, it could be created the
most impactful problem or issue within smart homes. In this way, it is important part for
concerned about the vulnerability management in term of IT security (Sharma and Sharma,
2020). The vulnerability assessment information or data that always help for IT teams to check
availability of authorised person. if in case, it has been identified third party involvement, to
prioritize vulnerabilities for take action, which often means remediation. For instances,
uncovered vulnerability is considering as low impact and low likelihood for occurring. Another
way, it would require to fix the critical vulnerability risk, threat itself. In order to improve IT
business processes.
The vulnerabilities assessment can be identified by using automated vulnerability
scanning software. This is becoming useful for provide leverage database, identifying the
potential flaws within network system. Generally, it has been occurred when accessed the data or
information through smart devices. Comprehensively, it also performed the scanning process
through IoT technologies. Once the scans have been completed, platform will report on all
problem or issue which may be identified. Afterwards, it will be suggested to implement suitable
action and remove all necessary threats, risk in term of cyber security.
Challenges and its solution
In past decade, there was a breeze of IoT everywhere and individual people was talking
about the specific vision of 2020 where 20 million of IoT devices would be generated. In 2019, it
has been rapidly evolved IoT environment where each and every people use them. The modern
10
At some point, automated scan on the dynamic analysis of source code.
These are identified the different vulnerabilities within IoT modern technologies. It has been
occurred when establishing the connection from one device to another. Hijacking is a type of
wireless connection which mainly create a vulnerability where attacker can inject harmful code.
Afterwards, it can be executed by other mobile application.
Vulnerabilities Assessment related to IT risk, cyber security
Most vulnerability assessments can be assigned on the basis of risk-level within each
cyber threat. The majorly risk can have a priority and their impact assigned to them. Sometimes,
it helps for distribution channel focus on the cyber threats. Otherwise, it could be created the
most impactful problem or issue within smart homes. In this way, it is important part for
concerned about the vulnerability management in term of IT security (Sharma and Sharma,
2020). The vulnerability assessment information or data that always help for IT teams to check
availability of authorised person. if in case, it has been identified third party involvement, to
prioritize vulnerabilities for take action, which often means remediation. For instances,
uncovered vulnerability is considering as low impact and low likelihood for occurring. Another
way, it would require to fix the critical vulnerability risk, threat itself. In order to improve IT
business processes.
The vulnerabilities assessment can be identified by using automated vulnerability
scanning software. This is becoming useful for provide leverage database, identifying the
potential flaws within network system. Generally, it has been occurred when accessed the data or
information through smart devices. Comprehensively, it also performed the scanning process
through IoT technologies. Once the scans have been completed, platform will report on all
problem or issue which may be identified. Afterwards, it will be suggested to implement suitable
action and remove all necessary threats, risk in term of cyber security.
Challenges and its solution
In past decade, there was a breeze of IoT everywhere and individual people was talking
about the specific vision of 2020 where 20 million of IoT devices would be generated. In 2019, it
has been rapidly evolved IoT environment where each and every people use them. The modern
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
technologies are considering the concept of IoT and also identifying the different application in
smart homes.
According to survey, there are more than 50% population willing to invest money in smart
home devices and other appliances. In this way, it has rapidly increasing use of IoT in global
marketplace (Jeong and Park, 2019). IoT is the most widely deployed in smart homes and
automate perform different tasks. Usually, the smart homes devices are transforming TV, doors,
refrigerator and make it easier for people. It allows for business to provide best IoT devices.
Challenges
Internet of things promises various convenience for end-user as apparent within smart
homes. It has been increasing privacy as well as security issues. In this way, it concerns about the
overall system because not much work is done for infrastructure design pattern. From WannaCry
incident, it is apparent that IoT devices are providing the great opportunities for attackers to
launch excessive attacks. Afterwards, it can be identified the commercial available devices such
as motion sensor, smoke alarm and other analyzer. This will help for generating a signal against
threat or risk. In case if it has been occurred malicious action towards smart home devices.
The IoT in smart homes that are interconnected with multiple devices in great way to
identify vulnerable in term of security threats, risk. The sensor, used a lot of sensitive
information so that it become easier for attacker to track or monitor activities of system (Jeong
and Park, 2019). Afterward, hacker can use malicious source code for purpose of attacks. In
additional, security and privacy issues are apparent. It will be continuously persisting and
increase demand of attention towards awareness from IoT technology.
Unfortunately, Denial of service is one of the most common attacks for IoT for smart
homes. It makes the web server to increase the large amount of traffic. Since, IoT involved the
multiple devices such as huge network of sensor connected with the internet. Afterwards, Denial
of service attack can harm the overall system. Sometimes, it may consider as serious problem or
issue that effects on the network system. Including some additional security challenges within
IoT for smart home.
The rise of Botnets: in recently, it has been developed the issue of botnets among multiple IoT
devices. It may exist when hackers remotely control internet connection through different device
11
smart homes.
According to survey, there are more than 50% population willing to invest money in smart
home devices and other appliances. In this way, it has rapidly increasing use of IoT in global
marketplace (Jeong and Park, 2019). IoT is the most widely deployed in smart homes and
automate perform different tasks. Usually, the smart homes devices are transforming TV, doors,
refrigerator and make it easier for people. It allows for business to provide best IoT devices.
Challenges
Internet of things promises various convenience for end-user as apparent within smart
homes. It has been increasing privacy as well as security issues. In this way, it concerns about the
overall system because not much work is done for infrastructure design pattern. From WannaCry
incident, it is apparent that IoT devices are providing the great opportunities for attackers to
launch excessive attacks. Afterwards, it can be identified the commercial available devices such
as motion sensor, smoke alarm and other analyzer. This will help for generating a signal against
threat or risk. In case if it has been occurred malicious action towards smart home devices.
The IoT in smart homes that are interconnected with multiple devices in great way to
identify vulnerable in term of security threats, risk. The sensor, used a lot of sensitive
information so that it become easier for attacker to track or monitor activities of system (Jeong
and Park, 2019). Afterward, hacker can use malicious source code for purpose of attacks. In
additional, security and privacy issues are apparent. It will be continuously persisting and
increase demand of attention towards awareness from IoT technology.
Unfortunately, Denial of service is one of the most common attacks for IoT for smart
homes. It makes the web server to increase the large amount of traffic. Since, IoT involved the
multiple devices such as huge network of sensor connected with the internet. Afterwards, Denial
of service attack can harm the overall system. Sometimes, it may consider as serious problem or
issue that effects on the network system. Including some additional security challenges within
IoT for smart home.
The rise of Botnets: in recently, it has been developed the issue of botnets among multiple IoT
devices. It may exist when hackers remotely control internet connection through different device
11
and use them for illegal purpose. It could have their device as part of botnet without prior
knowledge of this thing. Sometimes, it has increased the problem but can be managed through
real time security solution.
Lack of encryption: it is a type of challenging issue or problem when occurred lack of
encryption within network. It became easier for hackers to access data or information. It is one of
learning IoT security challenges. Thus, each and every device have a lack of storage and
processing capabilities that would be identified on the traditional devices. As a result, it can
easily increase chances of attacks where hacker can manipulate the specific algorithms that were
designed for purpose of protection.
Outdated legacy security: The vulnerabilities among different IoT devices and another concern
about the interconnection between legacy systems (Jeong and Park, 2019). It has rapidly growing
the use of IoT in smart homes. It might have seen out of places. A breach of IoT device can be
identified, which directly affecting the security standards.
Phishing attacks: it is concerned about the security across IoT device for smart homes, which is
mainly representing latest attack vendor. Hackers could perform the operation and send a signal
to IoT devices. Afterwards, it triggered the various complication. Although, it is the most
common approach in term of security attacks. Usually, it can be controlled or managed through
effective strategies.
Infrequent update: it is important way to ensure that all devices are secured but Some IoT
device may have a lack of large amount of software update. In this way, it struggles to provide
the better critical security update to IoT devices.
Weak Default passwords: many other IoT devices come from with original password that are
consider as weak. Sometimes, it has been developed as failure which take important step to
improve the weakness. Easy way to guess the password by hackers, IoT devices vulnerable to
brute force attacks.
Solutions
There is no specific plug that can turn on and IoT devices get secured in proper manner.
There are different available solutions which is mainly adopted by individuals. In order to
increase the security aspects. Other hand, it is important for identifying the technical community
12
knowledge of this thing. Sometimes, it has increased the problem but can be managed through
real time security solution.
Lack of encryption: it is a type of challenging issue or problem when occurred lack of
encryption within network. It became easier for hackers to access data or information. It is one of
learning IoT security challenges. Thus, each and every device have a lack of storage and
processing capabilities that would be identified on the traditional devices. As a result, it can
easily increase chances of attacks where hacker can manipulate the specific algorithms that were
designed for purpose of protection.
Outdated legacy security: The vulnerabilities among different IoT devices and another concern
about the interconnection between legacy systems (Jeong and Park, 2019). It has rapidly growing
the use of IoT in smart homes. It might have seen out of places. A breach of IoT device can be
identified, which directly affecting the security standards.
Phishing attacks: it is concerned about the security across IoT device for smart homes, which is
mainly representing latest attack vendor. Hackers could perform the operation and send a signal
to IoT devices. Afterwards, it triggered the various complication. Although, it is the most
common approach in term of security attacks. Usually, it can be controlled or managed through
effective strategies.
Infrequent update: it is important way to ensure that all devices are secured but Some IoT
device may have a lack of large amount of software update. In this way, it struggles to provide
the better critical security update to IoT devices.
Weak Default passwords: many other IoT devices come from with original password that are
consider as weak. Sometimes, it has been developed as failure which take important step to
improve the weakness. Easy way to guess the password by hackers, IoT devices vulnerable to
brute force attacks.
Solutions
There is no specific plug that can turn on and IoT devices get secured in proper manner.
There are different available solutions which is mainly adopted by individuals. In order to
increase the security aspects. Other hand, it is important for identifying the technical community
12
and other enterprise need to work together and enhance the device security. Generally, it can be
used the important steps to improve security and privacy of IoT devices (Jeong and Park, 2019).
It makes sure that all devices protected with strong password and also learned about the suitable
features which mainly provide by device. In this way, it is required to turn “On”, detecting the
unauthorized access.
The Home router is based on the main gateway to outside which are completely insecure
internet. It makes sure that maintain proper Wi-Fi setting, other encryption. On regular basis, it
would check the non-default password.
Long term solutions
It is an essential part for enabling the privacy as well as security option within IoT
devices. Generally, it may use SDN to provide the better security as service for smart home IoT
devices. Another approach is to consider block chain architecture to enhance security and
privacy among different IoT devices. This will help for reducing threats, risks within entire
system.
IoT has several applications in term of next generation and their evolution. Success can be
achieved when protect or secure IoT devices. Otherwise, it is becoming as challenges in term of
privacy and security.
In additional, malware bytes offers various cyber security solution for both business and
home. It is helping to protect against the ransomware, malware and other malicious website.
However, it should be including the different important solution for providing better security
within system.
Wireshark tool: it is one of important protocol analyzer support windows, Solaris, Linux.
It help for easily capture the live performance. in order to provide as powerful display
filters to maintain security.
Webroot: It is one of most common antivirus which help for providing the better internet
security in which different devices protect sensitive information or data. It will storage 25
GB memory. It is the best solution for offices, business and other partners.
Cloud Computing
13
used the important steps to improve security and privacy of IoT devices (Jeong and Park, 2019).
It makes sure that all devices protected with strong password and also learned about the suitable
features which mainly provide by device. In this way, it is required to turn “On”, detecting the
unauthorized access.
The Home router is based on the main gateway to outside which are completely insecure
internet. It makes sure that maintain proper Wi-Fi setting, other encryption. On regular basis, it
would check the non-default password.
Long term solutions
It is an essential part for enabling the privacy as well as security option within IoT
devices. Generally, it may use SDN to provide the better security as service for smart home IoT
devices. Another approach is to consider block chain architecture to enhance security and
privacy among different IoT devices. This will help for reducing threats, risks within entire
system.
IoT has several applications in term of next generation and their evolution. Success can be
achieved when protect or secure IoT devices. Otherwise, it is becoming as challenges in term of
privacy and security.
In additional, malware bytes offers various cyber security solution for both business and
home. It is helping to protect against the ransomware, malware and other malicious website.
However, it should be including the different important solution for providing better security
within system.
Wireshark tool: it is one of important protocol analyzer support windows, Solaris, Linux.
It help for easily capture the live performance. in order to provide as powerful display
filters to maintain security.
Webroot: It is one of most common antivirus which help for providing the better internet
security in which different devices protect sensitive information or data. It will storage 25
GB memory. It is the best solution for offices, business and other partners.
Cloud Computing
13
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Cloud Centric as a solution, which is mainly applied in every part of system such as
production, transmission and distribution. Smart home has become as major application interest
on term of smart grid. Generally, smart grid can be used the ICT in home control, ranging from
managing and controlling appliances in term of automation feature. It is based on the element of
smart home that can use as intelligence power to maintain the security aspects.
Cloud server can use to store or collect large amount of sensitive information or data. In
this way, it always supports for reducing authorised access of third parties. Afterwards, it is
useful to eliminate threats, risks within IoT devices (Jeong and Park, 2019). Thus, users can
access the data with full of protection. All devices are secured or protected through different
malicious actions, hackers because cloud server may use encryption technique for protecting
signals during transmission from different IoT devices.
CONCLUSION
From above discussion, it has been identified the IoT for smart home, which is mainly
consider as electronic appliances to be connected with computer control system. In this report, it
has summarised concept of smart phone with integration of IoT services. It can be identified the
recent innovation developments with respect to use of Internet of things in Smart Home. it
involves automation refrigerator, washer and amazon echo. These are considered as smart home
devices for established the connection through internet. Moreover, the documentation has been
described about the certain in term of cyber security, which directly affecting on the overall
performance and efficiency. However, it has concluded that challenges and its solution.
14
production, transmission and distribution. Smart home has become as major application interest
on term of smart grid. Generally, smart grid can be used the ICT in home control, ranging from
managing and controlling appliances in term of automation feature. It is based on the element of
smart home that can use as intelligence power to maintain the security aspects.
Cloud server can use to store or collect large amount of sensitive information or data. In
this way, it always supports for reducing authorised access of third parties. Afterwards, it is
useful to eliminate threats, risks within IoT devices (Jeong and Park, 2019). Thus, users can
access the data with full of protection. All devices are secured or protected through different
malicious actions, hackers because cloud server may use encryption technique for protecting
signals during transmission from different IoT devices.
CONCLUSION
From above discussion, it has been identified the IoT for smart home, which is mainly
consider as electronic appliances to be connected with computer control system. In this report, it
has summarised concept of smart phone with integration of IoT services. It can be identified the
recent innovation developments with respect to use of Internet of things in Smart Home. it
involves automation refrigerator, washer and amazon echo. These are considered as smart home
devices for established the connection through internet. Moreover, the documentation has been
described about the certain in term of cyber security, which directly affecting on the overall
performance and efficiency. However, it has concluded that challenges and its solution.
14
REFERENCES
Book and Journals
Almusaylim, Z.A. and Zaman, N., 2019. A review on smart home present state and challenges:
linked to context-awareness internet of things (IoT). Wireless networks. 25(6). pp.3193-
3204.
Geneiatakis, D., and et. al., 2017, May. Security and privacy issues for an IoT based smart home.
In 2017 40th International Convention on Information and Communication Technology,
Electronics and Microelectronics (MIPRO) (pp. 1292-1297). IEEE.
HaddadPajouh, H., Dehghantanha, A. and Karimipour, H., 2019. A survey on internet of things
security: Requirements, challenges, and solutions. Internet of Things. p.100129.
Jain, A. and Singh, T., 2020. Security Challenges and Solutions of IoT Ecosystem.
In Information and Communication Technology for Sustainable Development (pp. 259-
270). Springer, Singapore.
Jeong, Y.S. and Park, J.H., 2019. IoT and Smart City Technology: Challenges, Opportunities,
and Solutions. JIPS. 15(2). pp.233-238.
Kazmi, S., and et. al., 2017. Towards optimization of metaheuristic algorithms for IoT enabled
smart homes targeting balanced demand and supply of energy. IEEE Access. 7.
pp.24267-24281.
Mocrii, D., Chen, Y. and Musilek, P., 2018. IoT-based smart homes: A review of system
architecture, software, communications, privacy and security. Internet of Things. 1.
pp.81-98.
Patrono, L. and et.al., 2019. Challenges to be addressed to realize Internet of Things solutions for
smart environments.
Pirbhulal, S., and et. al., 2017. A novel secure IoT-based smart home automation system using a
wireless sensor network. Sensors. 17(1). p.69.
Sharma, A. and Sharma, R., 2020. A Review of Applications, Approaches, and Challenges in
Internet of Things (IoT). In Proceedings of ICRIC 2019 (pp. 257-269). Springer, Cham.
Singh, H., and et. al., 2018, March. IoT based smart home automation system using sensor node.
In 2018 4th International Conference on Recent Advances in Information Technology
(RAIT) (pp. 1-5). IEEE.
Tawalbeh, L.A., Muheidat, F. and Quwaider, M., 2020. IoT Privacy and security: Challenges and
solutions. Applied Sciences. 10(12). p.4102.
15
Book and Journals
Almusaylim, Z.A. and Zaman, N., 2019. A review on smart home present state and challenges:
linked to context-awareness internet of things (IoT). Wireless networks. 25(6). pp.3193-
3204.
Geneiatakis, D., and et. al., 2017, May. Security and privacy issues for an IoT based smart home.
In 2017 40th International Convention on Information and Communication Technology,
Electronics and Microelectronics (MIPRO) (pp. 1292-1297). IEEE.
HaddadPajouh, H., Dehghantanha, A. and Karimipour, H., 2019. A survey on internet of things
security: Requirements, challenges, and solutions. Internet of Things. p.100129.
Jain, A. and Singh, T., 2020. Security Challenges and Solutions of IoT Ecosystem.
In Information and Communication Technology for Sustainable Development (pp. 259-
270). Springer, Singapore.
Jeong, Y.S. and Park, J.H., 2019. IoT and Smart City Technology: Challenges, Opportunities,
and Solutions. JIPS. 15(2). pp.233-238.
Kazmi, S., and et. al., 2017. Towards optimization of metaheuristic algorithms for IoT enabled
smart homes targeting balanced demand and supply of energy. IEEE Access. 7.
pp.24267-24281.
Mocrii, D., Chen, Y. and Musilek, P., 2018. IoT-based smart homes: A review of system
architecture, software, communications, privacy and security. Internet of Things. 1.
pp.81-98.
Patrono, L. and et.al., 2019. Challenges to be addressed to realize Internet of Things solutions for
smart environments.
Pirbhulal, S., and et. al., 2017. A novel secure IoT-based smart home automation system using a
wireless sensor network. Sensors. 17(1). p.69.
Sharma, A. and Sharma, R., 2020. A Review of Applications, Approaches, and Challenges in
Internet of Things (IoT). In Proceedings of ICRIC 2019 (pp. 257-269). Springer, Cham.
Singh, H., and et. al., 2018, March. IoT based smart home automation system using sensor node.
In 2018 4th International Conference on Recent Advances in Information Technology
(RAIT) (pp. 1-5). IEEE.
Tawalbeh, L.A., Muheidat, F. and Quwaider, M., 2020. IoT Privacy and security: Challenges and
solutions. Applied Sciences. 10(12). p.4102.
15
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.