IoT Security for Smart Home Devices
VerifiedAdded on 2022/10/01
|16
|3413
|166
AI Summary
This report focuses on the IoT security issues in the smart home and relevant strategies to mitigate these issues. It discusses various cyber threats and preventive measures to secure the smart home system. The report also highlights the involvement of government, stakeholders, and vendors in the smart home technology. It concludes with some basic precautions that users can take to secure their smart home devices.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: IOT SECURITY FOR SMART HOME DEVICES
IOT SECURITY FOR SMART HOME DEVICES
Name of the Student
Name of the University
Author Note
IOT SECURITY FOR SMART HOME DEVICES
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1IOT SECURITY FOR SMART HOME DEVICES
Executive Summary:
This report focuses on the IoT security issues in the smart home and relevant strategies to
mitigate these issues. There have been several IoT issues discussed in the report which has
affecting sustainable development in the smart home devices. Various appliances, electronic
devices, and the lightings can be controlled through this type of system. It can be said that
smart devices are the future of innovation. Now smart devices enabled resident places are
named as the smart home. It can be said various precaution, knowledge will help the user to
make the system better. There are several steps that have been discussed to prevent the
system outcomes more powerful. No doubt the system needs security; then it will work
properly. If a user should maintain the private network, set the password long enough and
make the system up to date; then it is also very difficult for a hacker to hack the system.
Executive Summary:
This report focuses on the IoT security issues in the smart home and relevant strategies to
mitigate these issues. There have been several IoT issues discussed in the report which has
affecting sustainable development in the smart home devices. Various appliances, electronic
devices, and the lightings can be controlled through this type of system. It can be said that
smart devices are the future of innovation. Now smart devices enabled resident places are
named as the smart home. It can be said various precaution, knowledge will help the user to
make the system better. There are several steps that have been discussed to prevent the
system outcomes more powerful. No doubt the system needs security; then it will work
properly. If a user should maintain the private network, set the password long enough and
make the system up to date; then it is also very difficult for a hacker to hack the system.
2IOT SECURITY FOR SMART HOME DEVICES
Table of Contents
Executive Summary:..................................................................................................................1
Introduction................................................................................................................................3
Discussion..................................................................................................................................3
Conclusion..................................................................................................................................9
Referencing..............................................................................................................................10
Table of Contents
Executive Summary:..................................................................................................................1
Introduction................................................................................................................................3
Discussion..................................................................................................................................3
Conclusion..................................................................................................................................9
Referencing..............................................................................................................................10
3IOT SECURITY FOR SMART HOME DEVICES
Introduction
Inter of things are applied in today’s life in the general-purpose usage to complete an
environment that is enabled with various smart technology. These smart technologies will
make human residence more efficient as well as the conservative. As per the requirement,
smart homes are made with various sensor-enabled gadgets; which will help to provide the
automation properly. This smart device will help to operate with the conjunction in the house
and communicate with the other smart devices for the response. There are several devices
like air conditioner, refrigerator, washing machines, dryer, security systems, camera, sensor-
enabled tap, computer, laptops denoted as smart devices (Sorebo and Echols., 2016). Now,
these smart devices are implemented by several stakeholders, also they are economically
attached to this device usage. It can be stated that several cybersecurity issues may happen in
these devices. Though these devices are very much useful for everyone; but still there is risk
when anyone uses it. So all of the users have to take several steps to make this system safe.
The following report will consist the several issues that have been faced through smart
devices and solutions which will help to make the system secure and usable. The privacy
concern is also discussed (Wilkowska, Ziefle and Himmel., 2015).
Discussion
To analyze the situation, smart home threats and countermeasures are needed to be
discussed properly. It can be stated that near about 80% Inter of things devices can be
attacked by the vulnerable attacks. The locking system and several smart devices are easily
attachable for the devices. In fact, baby monitors are vulnerable sometimes; hackers will hack
the system and talk with the babies which may mentally affect the child. There are several
cyber threats taking steps alongside smart devices (Gupta and Chhabra., 2016).
Introduction
Inter of things are applied in today’s life in the general-purpose usage to complete an
environment that is enabled with various smart technology. These smart technologies will
make human residence more efficient as well as the conservative. As per the requirement,
smart homes are made with various sensor-enabled gadgets; which will help to provide the
automation properly. This smart device will help to operate with the conjunction in the house
and communicate with the other smart devices for the response. There are several devices
like air conditioner, refrigerator, washing machines, dryer, security systems, camera, sensor-
enabled tap, computer, laptops denoted as smart devices (Sorebo and Echols., 2016). Now,
these smart devices are implemented by several stakeholders, also they are economically
attached to this device usage. It can be stated that several cybersecurity issues may happen in
these devices. Though these devices are very much useful for everyone; but still there is risk
when anyone uses it. So all of the users have to take several steps to make this system safe.
The following report will consist the several issues that have been faced through smart
devices and solutions which will help to make the system secure and usable. The privacy
concern is also discussed (Wilkowska, Ziefle and Himmel., 2015).
Discussion
To analyze the situation, smart home threats and countermeasures are needed to be
discussed properly. It can be stated that near about 80% Inter of things devices can be
attacked by the vulnerable attacks. The locking system and several smart devices are easily
attachable for the devices. In fact, baby monitors are vulnerable sometimes; hackers will hack
the system and talk with the babies which may mentally affect the child. There are several
cyber threats taking steps alongside smart devices (Gupta and Chhabra., 2016).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4IOT SECURITY FOR SMART HOME DEVICES
Data and identity theft: sometimes the user using various types of smart appliances of
devices that are actually unprotected. So it can be said that there is a chance to break the user
system through the network and hack the sensitive data from the user. It can be said that they
can break the system very easily and various malicious problems may occur by them.
Sometimes users applied the smart system in their house to keep safe their babies properly.
But if a hacker will hack the system; then there is a chance to get close to their babies, and it
will be a huge problem. As an example, very a few years ago children and teenagers are very
much affected by the “Blue Whale game” which has been speeded by smartphones. Though
the new smart devices are the future and possibly to use in the home also; but there is a risk in
each and every case (El-Basioni et al.,2013).
Man-in-the-middle: This case can be acknowledged by a simple example. Any problem
between the two communicative systems can be called the Man in the middle problem.
Sometimes the attacker will attack in the HVAC system and can create a disastrous scenario
against the service provider. Fake weather changing problems also created by this method.
Device high jacking: One of the famous and dangerous attack is the device hijacking. The
main target of the hacker is to take control of the smart home system in their control. The
primary function will be changed by the +-hackers. Thus it is very difficult to detect the
system. After getting control the attacker will open the door or can disarm the all type of
alarm with it. After that, they can do whatever they want. The entire network system can be
controlled through this attacking method (Komninos, Philippou and Pitsillides., 2014).
DDoS or the Distributed Denial of Service: The denial of service attacks are this kind of
attack which will temporally disrupt the system. The host connection can be disrupted
through this procedure. Incoming traffic problem will because of the service attack in the
home security system. The traffic flooding will target multiple sources to make the system
Data and identity theft: sometimes the user using various types of smart appliances of
devices that are actually unprotected. So it can be said that there is a chance to break the user
system through the network and hack the sensitive data from the user. It can be said that they
can break the system very easily and various malicious problems may occur by them.
Sometimes users applied the smart system in their house to keep safe their babies properly.
But if a hacker will hack the system; then there is a chance to get close to their babies, and it
will be a huge problem. As an example, very a few years ago children and teenagers are very
much affected by the “Blue Whale game” which has been speeded by smartphones. Though
the new smart devices are the future and possibly to use in the home also; but there is a risk in
each and every case (El-Basioni et al.,2013).
Man-in-the-middle: This case can be acknowledged by a simple example. Any problem
between the two communicative systems can be called the Man in the middle problem.
Sometimes the attacker will attack in the HVAC system and can create a disastrous scenario
against the service provider. Fake weather changing problems also created by this method.
Device high jacking: One of the famous and dangerous attack is the device hijacking. The
main target of the hacker is to take control of the smart home system in their control. The
primary function will be changed by the +-hackers. Thus it is very difficult to detect the
system. After getting control the attacker will open the door or can disarm the all type of
alarm with it. After that, they can do whatever they want. The entire network system can be
controlled through this attacking method (Komninos, Philippou and Pitsillides., 2014).
DDoS or the Distributed Denial of Service: The denial of service attacks are this kind of
attack which will temporally disrupt the system. The host connection can be disrupted
through this procedure. Incoming traffic problem will because of the service attack in the
home security system. The traffic flooding will target multiple sources to make the system
5IOT SECURITY FOR SMART HOME DEVICES
better. In the DDos attack has been raised 3% to 6% in the year 2016. The single
compromised smart sensor network can infect the smart system software which may e the
cause of malicious attacks. All of these infected devices are controlled and joined into the
botnet armies. So it can be stated that the network used in smart home appliance is not
secured for the active security. It may hamper the system hugely (Bangali and Shaligram.,
2013).
Permanent Denial of Service or PDoS: It is one of the most dangerous attacks that have been
seen against the smart home security. This kind of plashing attack is so much powerful; that it
will corrupt the system permanently. Again the system soft should have to install to start the
system again. Fake data can be stored through this type of attack. That is why this kind of
attack should be avoided properly.
Now there are several processes that can be used to save the smart home system; those are:
Secure the booting: The secure booting process is used the code signing procedure; which
will help to execute the system only OEM/ trusted source executable file. It can be said that
the boot technology will prevent hackers with the help of firmware to secure the system. The
cryptography is used for this process. The secure boot technology is needed because it will
protect the system from the core, or starting which will help to provide a better home security
system for helping it (Kodali et al.,2016).
Mutual Authentication: Each time authentication is needed when the device has been
connected with the prior network. The receiving and transmitting data are the sensitive
portion of the networking. The cryptographical data involvement is very much needed to
specify the protection properly. The symmetric and asymmetric key usage are the main
advantages in this scenario. The two-way authentication is generally done through this
better. In the DDos attack has been raised 3% to 6% in the year 2016. The single
compromised smart sensor network can infect the smart system software which may e the
cause of malicious attacks. All of these infected devices are controlled and joined into the
botnet armies. So it can be stated that the network used in smart home appliance is not
secured for the active security. It may hamper the system hugely (Bangali and Shaligram.,
2013).
Permanent Denial of Service or PDoS: It is one of the most dangerous attacks that have been
seen against the smart home security. This kind of plashing attack is so much powerful; that it
will corrupt the system permanently. Again the system soft should have to install to start the
system again. Fake data can be stored through this type of attack. That is why this kind of
attack should be avoided properly.
Now there are several processes that can be used to save the smart home system; those are:
Secure the booting: The secure booting process is used the code signing procedure; which
will help to execute the system only OEM/ trusted source executable file. It can be said that
the boot technology will prevent hackers with the help of firmware to secure the system. The
cryptography is used for this process. The secure boot technology is needed because it will
protect the system from the core, or starting which will help to provide a better home security
system for helping it (Kodali et al.,2016).
Mutual Authentication: Each time authentication is needed when the device has been
connected with the prior network. The receiving and transmitting data are the sensitive
portion of the networking. The cryptographical data involvement is very much needed to
specify the protection properly. The symmetric and asymmetric key usage are the main
advantages in this scenario. The two-way authentication is generally done through this
6IOT SECURITY FOR SMART HOME DEVICES
procedure. The popular secure hash algorithm is generally used for the symmetric key. On the
other hand, the Digital signature algorithm, I used for the asymmetric keys.
Secure Communication: It is one of the essential methods of protecting the data within the
transmission process. If any data has been transferring into the other destination; then the data
will be encrypted by the proper secret encryption key. After the packet has been transferred to
the other side of the target, then the data will be decrypted with the proper key. That is how if
the data loss is happening in between the path, it will be reduced with this process. This type
of data transfer is named as the digital eavesdropping (Sivaraman et al.,2015).
Secure monitoring and the analysis: this procedure will capture all of the data which is
essential for everyone. The connectivity record and endpoint devices are are also recorded. If
the data will face any type of problem; then a huge action has been formulated against the
system. The violation and the potential threat problem can be solved through his procedure.
Any anomalous behaviour can be solved through these cases. Another point that can be saved
properly for solving this system is to monitor analyze act cycle. It will help in real-life
situations and identifying the usage patterns. The critical ensuring process at the endpoint will
secure the data manipulation which is denoted as the incorrect data representation of each
event .
Security life cycle management: the lifecycle management will allow to the OEMs for
controlling the security aspect in the IoT devices. It can be said that if the OTA device key
will be replaced for the cyber disaster recovery then it will ensure minimal service disruption.
The secure device decommission will ensure the minimum, service disruption.in addition, it
is stated the scrapped device will not be repurposed to connect the unauthorized one (Chitnis,
Deshpande and Shaligram., 2016).
procedure. The popular secure hash algorithm is generally used for the symmetric key. On the
other hand, the Digital signature algorithm, I used for the asymmetric keys.
Secure Communication: It is one of the essential methods of protecting the data within the
transmission process. If any data has been transferring into the other destination; then the data
will be encrypted by the proper secret encryption key. After the packet has been transferred to
the other side of the target, then the data will be decrypted with the proper key. That is how if
the data loss is happening in between the path, it will be reduced with this process. This type
of data transfer is named as the digital eavesdropping (Sivaraman et al.,2015).
Secure monitoring and the analysis: this procedure will capture all of the data which is
essential for everyone. The connectivity record and endpoint devices are are also recorded. If
the data will face any type of problem; then a huge action has been formulated against the
system. The violation and the potential threat problem can be solved through his procedure.
Any anomalous behaviour can be solved through these cases. Another point that can be saved
properly for solving this system is to monitor analyze act cycle. It will help in real-life
situations and identifying the usage patterns. The critical ensuring process at the endpoint will
secure the data manipulation which is denoted as the incorrect data representation of each
event .
Security life cycle management: the lifecycle management will allow to the OEMs for
controlling the security aspect in the IoT devices. It can be said that if the OTA device key
will be replaced for the cyber disaster recovery then it will ensure minimal service disruption.
The secure device decommission will ensure the minimum, service disruption.in addition, it
is stated the scrapped device will not be repurposed to connect the unauthorized one (Chitnis,
Deshpande and Shaligram., 2016).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7IOT SECURITY FOR SMART HOME DEVICES
Advance Crypto Manager: The Rambus crypto manager, which is one of the best advance
crypto manager for the IoT security service used in the smart city for OEMs. The one-stop
solution will provide seamless connectivity. It has the feature of device to cloud secure
connectivity. This advanced technology will help to stop the various actors in the smart home
technology appropriately (Teymourzadeh et al.,2013).
Government, Stakeholder, vendor’s involvement: To explain these three categories'
involvement in deep research is needed. The fact is the government is earning money through
this company; because a shareholder of the companies (smart device manufacture companies)
is government itself. After installing it the normal crime happening is little bite difficult, so
the crime rate will be low in this case (Hao et al.,2013). If the smart home is enabled with a
camera and alarm, then the house security will be very strong. To broke this smart houses,
they hacker have to specialize in programming which is very much difficult. So the
government will also encourage the people to make the system stronger with the smart
devices. The stakeholders are investing a bulk of money for this investment; because they
thought that this smart home concept ios new for everyone. So there is a chance of huge
money invest and futuristic business. The vendors are supplying the smart devices and some
of them are interested in the service the devices; as in future serving will be a must. So they
are all interested in the new technology launching (Piyare., 2013).
After all the discussion some basic precaution is needed to apply for the various
circumstance. Cybercriminals will always try to break the network of the victim’s device. In
the year 2018; VPN malware-infected huge amount of routers all over the 50 countries. It will
affect so much power that the system will become incapable. After that, it will block the
victim's network and may seal the exact password (Lin and Bergmann., 2016). So the basic
problem is to handle this kind of situation, Symantec online check tool which will help to
remove this kind o problem from the router.
Advance Crypto Manager: The Rambus crypto manager, which is one of the best advance
crypto manager for the IoT security service used in the smart city for OEMs. The one-stop
solution will provide seamless connectivity. It has the feature of device to cloud secure
connectivity. This advanced technology will help to stop the various actors in the smart home
technology appropriately (Teymourzadeh et al.,2013).
Government, Stakeholder, vendor’s involvement: To explain these three categories'
involvement in deep research is needed. The fact is the government is earning money through
this company; because a shareholder of the companies (smart device manufacture companies)
is government itself. After installing it the normal crime happening is little bite difficult, so
the crime rate will be low in this case (Hao et al.,2013). If the smart home is enabled with a
camera and alarm, then the house security will be very strong. To broke this smart houses,
they hacker have to specialize in programming which is very much difficult. So the
government will also encourage the people to make the system stronger with the smart
devices. The stakeholders are investing a bulk of money for this investment; because they
thought that this smart home concept ios new for everyone. So there is a chance of huge
money invest and futuristic business. The vendors are supplying the smart devices and some
of them are interested in the service the devices; as in future serving will be a must. So they
are all interested in the new technology launching (Piyare., 2013).
After all the discussion some basic precaution is needed to apply for the various
circumstance. Cybercriminals will always try to break the network of the victim’s device. In
the year 2018; VPN malware-infected huge amount of routers all over the 50 countries. It will
affect so much power that the system will become incapable. After that, it will block the
victim's network and may seal the exact password (Lin and Bergmann., 2016). So the basic
problem is to handle this kind of situation, Symantec online check tool which will help to
remove this kind o problem from the router.
8IOT SECURITY FOR SMART HOME DEVICES
Another one type of attack has happened in 2016; all chained applications like Paypal,
Spotify, Netflix are corrupted through this attack. All of them are controlled by them, and the
system remains in a shutdown situation. There is some reason for the system is actually
vulnerable. The security camera and home used network are the main target of hackers;
because both of them have low built in security (Fadell et al.,2015). That is why the hacker is
interested in their system. The main strong technical door of the network is the Wi-Fi router.
Generally, the user uses a very low ending password to secure it. It is the main item which is
needed to be protected properly. There are some tips to secure the router along with the smart
devices:
Rename the router with a proper routing name that it will difficult to identify the model
which is using (Matsuoka et al.,2015).
Use a strong cartographical letter, which is very much difficult to hack. The hackers generally
use an automatic possible password generating an app that will generate passcode one by one
using permutation and combination. If the passcode is a long-range array with ten to fifteen
words, combined with numeric and special character. Then it is very much difficult to track
the password, in fact with the application also (Santoso and Vun., 2015). Keep the network
private, that will help to process the network good positioning situation. The user has
changed the default name and passcode. Unnecessary features should be deactivated. Various
features are using through the system, maybe some of them are in beta condition. It will be
easy for any hacker, to break the system with those less updated features and hack the system.
Not only the antivirus, all the software should be updated. Each update came with various
features and new protection; which will help to bridge the system properly. Two-factor
authentication should be activated. It will help to continue the process of working properly.
Another point is to avoid the public wifi networks because there is a chance to hack your
system through the public network by the system (Mowad, Fathy and Hafez., 2014).
Another one type of attack has happened in 2016; all chained applications like Paypal,
Spotify, Netflix are corrupted through this attack. All of them are controlled by them, and the
system remains in a shutdown situation. There is some reason for the system is actually
vulnerable. The security camera and home used network are the main target of hackers;
because both of them have low built in security (Fadell et al.,2015). That is why the hacker is
interested in their system. The main strong technical door of the network is the Wi-Fi router.
Generally, the user uses a very low ending password to secure it. It is the main item which is
needed to be protected properly. There are some tips to secure the router along with the smart
devices:
Rename the router with a proper routing name that it will difficult to identify the model
which is using (Matsuoka et al.,2015).
Use a strong cartographical letter, which is very much difficult to hack. The hackers generally
use an automatic possible password generating an app that will generate passcode one by one
using permutation and combination. If the passcode is a long-range array with ten to fifteen
words, combined with numeric and special character. Then it is very much difficult to track
the password, in fact with the application also (Santoso and Vun., 2015). Keep the network
private, that will help to process the network good positioning situation. The user has
changed the default name and passcode. Unnecessary features should be deactivated. Various
features are using through the system, maybe some of them are in beta condition. It will be
easy for any hacker, to break the system with those less updated features and hack the system.
Not only the antivirus, all the software should be updated. Each update came with various
features and new protection; which will help to bridge the system properly. Two-factor
authentication should be activated. It will help to continue the process of working properly.
Another point is to avoid the public wifi networks because there is a chance to hack your
system through the public network by the system (Mowad, Fathy and Hafez., 2014).
9IOT SECURITY FOR SMART HOME DEVICES
Conclusion
After the whole, through research, it can be stated that various issues are negative in
smart home enabled technologies. So if the smart home technology is used by any user, then
there are several points needed to be maintained properly, as discussed. Otherwise, a huge
problem may occur in the system. Except that it can be said the user should have some basic
idea about network, that he/she might set passwords properly; maintain the system properly.
Now after an attack, there are several rules can be followed if the system gets corrupted. That
is why knowledge is needed. On the other hand, the smart home is very much useful for
safety and resource savings. In the future, every resident should be enabled with the smart
approach for completing the method properly. Thus a system can be properly protected and
the malicious attacks can be stopped. Technology has an advantage and also disadvantage,
users have to face both of them, but with sincerity.
Conclusion
After the whole, through research, it can be stated that various issues are negative in
smart home enabled technologies. So if the smart home technology is used by any user, then
there are several points needed to be maintained properly, as discussed. Otherwise, a huge
problem may occur in the system. Except that it can be said the user should have some basic
idea about network, that he/she might set passwords properly; maintain the system properly.
Now after an attack, there are several rules can be followed if the system gets corrupted. That
is why knowledge is needed. On the other hand, the smart home is very much useful for
safety and resource savings. In the future, every resident should be enabled with the smart
approach for completing the method properly. Thus a system can be properly protected and
the malicious attacks can be stopped. Technology has an advantage and also disadvantage,
users have to face both of them, but with sincerity.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10IOT SECURITY FOR SMART HOME DEVICES
Referencing
Sorebo, G.N. and Echols, M.C., 2016. Smart grid security: an end-to-end view of security in
the new electrical grid. CRC Press.
El-Basioni, B.M.M., El-Kader, S.M.A. and Abdelmonim, M., 2013. Smart home design using
wireless sensor network and biometric technologies. information technology, 1, p.2.
Komninos, N., Philippou, E. and Pitsillides, A., 2014. Survey in smart grid and smart home
security: Issues, challenges and countermeasures. IEEE Communications Surveys &
Tutorials, 16(4), pp.1933-1954.
Bangali, J. and Shaligram, A., 2013. Design and Implementation of Security Systems for
Smart Home based on GSM technology. International Journal of Smart Home, 7(6), pp.201-
208.
Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R. and Mehani, O., 2015, October.
Network-level security and privacy control for smart-home IoT devices. In 2015 IEEE 11th
International conference on wireless and mobile computing, networking and communications
(WiMob) (pp. 163-167). IEEE.
Chitnis, S., Deshpande, N. and Shaligram, A., 2016. An investigative study for smart home
security: Issues, challenges and countermeasures. Wireless Sensor Network, 8(4), pp.61-68.
Kumar, S., 2014. Ubiquitous smart home system using android application. arXiv preprint
arXiv:1402.2114.
Teymourzadeh, R., Ahmed, S.A., Chan, K.W. and Hoong, M.V., 2013, December. Smart gsm
based home automation system. In 2013 IEEE Conference on Systems, Process & Control
(ICSPC) (pp. 306-309). IEEE.
Referencing
Sorebo, G.N. and Echols, M.C., 2016. Smart grid security: an end-to-end view of security in
the new electrical grid. CRC Press.
El-Basioni, B.M.M., El-Kader, S.M.A. and Abdelmonim, M., 2013. Smart home design using
wireless sensor network and biometric technologies. information technology, 1, p.2.
Komninos, N., Philippou, E. and Pitsillides, A., 2014. Survey in smart grid and smart home
security: Issues, challenges and countermeasures. IEEE Communications Surveys &
Tutorials, 16(4), pp.1933-1954.
Bangali, J. and Shaligram, A., 2013. Design and Implementation of Security Systems for
Smart Home based on GSM technology. International Journal of Smart Home, 7(6), pp.201-
208.
Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R. and Mehani, O., 2015, October.
Network-level security and privacy control for smart-home IoT devices. In 2015 IEEE 11th
International conference on wireless and mobile computing, networking and communications
(WiMob) (pp. 163-167). IEEE.
Chitnis, S., Deshpande, N. and Shaligram, A., 2016. An investigative study for smart home
security: Issues, challenges and countermeasures. Wireless Sensor Network, 8(4), pp.61-68.
Kumar, S., 2014. Ubiquitous smart home system using android application. arXiv preprint
arXiv:1402.2114.
Teymourzadeh, R., Ahmed, S.A., Chan, K.W. and Hoong, M.V., 2013, December. Smart gsm
based home automation system. In 2013 IEEE Conference on Systems, Process & Control
(ICSPC) (pp. 306-309). IEEE.
11IOT SECURITY FOR SMART HOME DEVICES
Piyare, R., 2013. Internet of things: ubiquitous home control and monitoring system using
android based smart phone. International journal of Internet of Things, 2(1), pp.5-11.
Lin, H. and Bergmann, N., 2016. IoT privacy and security challenges for smart home
environments. Information, 7(3), p.44.
Fadell, A.M., Rogers, M.L., Matsuoka, Y., Sloo, D., Honjo, S., McGaraghan, S.A., Plitkins,
M., Veron, M. and Guenette, I., Google LLC, 2015. Handling security services visitor at a
smart-home. U.S. Patent Application 14/587,835.
Matsuoka, Y., Sloo, D., Veron, M., Honjo, S., Guenette, I. and Malhotra, M.R., Google Inc,
2015. Security scoring in a smart-sensored home. U.S. Patent Application 14/489,162.
Mowad, M.A.E.L., Fathy, A. and Hafez, A., 2014. Smart home automated control system
using android application and microcontroller. International Journal of Scientific &
Engineering Research, 5(5), pp.935-939.
Hao, J.J., Ortiz, G., Stallings, H., Valdez, J.P., Xia, W. and Geiger, J.M., Verizon Patent and
Licensing Inc, 2013. Smart home device management. U.S. Patent 8,375,118.
Santoso, F.K. and Vun, N.C., 2015, June. Securing IoT for smart home system. In 2015
International Symposium on Consumer Electronics (ISCE) (pp. 1-2). IEEE.
Wilkowska, W., Ziefle, M. and Himmel, S., 2015, August. Perceptions of personal privacy in
smart home technologies: Do user assessments vary depending on the research method?.
In International Conference on Human Aspects of Information Security, Privacy, and
Trust (pp. 592-603). Springer, Cham.
Piyare, R., 2013. Internet of things: ubiquitous home control and monitoring system using
android based smart phone. International journal of Internet of Things, 2(1), pp.5-11.
Lin, H. and Bergmann, N., 2016. IoT privacy and security challenges for smart home
environments. Information, 7(3), p.44.
Fadell, A.M., Rogers, M.L., Matsuoka, Y., Sloo, D., Honjo, S., McGaraghan, S.A., Plitkins,
M., Veron, M. and Guenette, I., Google LLC, 2015. Handling security services visitor at a
smart-home. U.S. Patent Application 14/587,835.
Matsuoka, Y., Sloo, D., Veron, M., Honjo, S., Guenette, I. and Malhotra, M.R., Google Inc,
2015. Security scoring in a smart-sensored home. U.S. Patent Application 14/489,162.
Mowad, M.A.E.L., Fathy, A. and Hafez, A., 2014. Smart home automated control system
using android application and microcontroller. International Journal of Scientific &
Engineering Research, 5(5), pp.935-939.
Hao, J.J., Ortiz, G., Stallings, H., Valdez, J.P., Xia, W. and Geiger, J.M., Verizon Patent and
Licensing Inc, 2013. Smart home device management. U.S. Patent 8,375,118.
Santoso, F.K. and Vun, N.C., 2015, June. Securing IoT for smart home system. In 2015
International Symposium on Consumer Electronics (ISCE) (pp. 1-2). IEEE.
Wilkowska, W., Ziefle, M. and Himmel, S., 2015, August. Perceptions of personal privacy in
smart home technologies: Do user assessments vary depending on the research method?.
In International Conference on Human Aspects of Information Security, Privacy, and
Trust (pp. 592-603). Springer, Cham.
12IOT SECURITY FOR SMART HOME DEVICES
Gupta, P. and Chhabra, J., 2016, February. IoT based Smart Home design using power and
security management. In 2016 International Conference on Innovation and Challenges in
Cyber Security (ICICCS-INBUSH) (pp. 6-10). IEEE.
Kodali, R.K., Jain, V., Bose, S. and Boppana, L., 2016, April. IoT based smart security and
home automation system. In 2016 international conference on computing, communication
and automation (ICCCA) (pp. 1286-1289). IEEE.
Gupta, P. and Chhabra, J., 2016, February. IoT based Smart Home design using power and
security management. In 2016 International Conference on Innovation and Challenges in
Cyber Security (ICICCS-INBUSH) (pp. 6-10). IEEE.
Kodali, R.K., Jain, V., Bose, S. and Boppana, L., 2016, April. IoT based smart security and
home automation system. In 2016 international conference on computing, communication
and automation (ICCCA) (pp. 1286-1289). IEEE.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
13IOT SECURITY FOR SMART HOME DEVICES
14IOT SECURITY FOR SMART HOME DEVICES
15IOT SECURITY FOR SMART HOME DEVICES
1 out of 16
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.