IoT Device Security in Smart Homes
VerifiedAdded on 2023/01/06
|15
|4739
|84
AI Summary
This research report examines the security risks and challenges associated with IoT devices in smart homes. It discusses the need for adequate security measures to protect against potential attacks and provides recommendations for improving security. The report also highlights the importance of customer trust and the role of security in the widespread adoption of IoT technology in homes.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
RESEARCH REPORT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Table of Contents
ABSTRACT....................................................................................................................................3
1. Introduction..................................................................................................................................4
1.1 Background............................................................................................................................4
1.2 Problem statement.................................................................................................................5
1.3 Research questions.................................................................................................................6
2. Literature Review........................................................................................................................6
2.1 Introduction............................................................................................................................6
2.2 Security Issues.......................................................................................................................7
2.3 Research Gap.........................................................................................................................8
3. Results and discussion.................................................................................................................9
4. Recommendations......................................................................................................................10
5. Conclusion.................................................................................................................................11
Reference.......................................................................................................................................14
ABSTRACT....................................................................................................................................3
1. Introduction..................................................................................................................................4
1.1 Background............................................................................................................................4
1.2 Problem statement.................................................................................................................5
1.3 Research questions.................................................................................................................6
2. Literature Review........................................................................................................................6
2.1 Introduction............................................................................................................................6
2.2 Security Issues.......................................................................................................................7
2.3 Research Gap.........................................................................................................................8
3. Results and discussion.................................................................................................................9
4. Recommendations......................................................................................................................10
5. Conclusion.................................................................................................................................11
Reference.......................................................................................................................................14
ABSTRACT
The chosen topic for this research project is IoT device security (Home Appliances). The Internet
of Things (IoT) is an ever-expanding world view of the connection between objects or devices
with each other and with our customers. Over time, most IoT associations go from "Human to
Thing" to "Thing to Thing". This innovation is expected to turn into a key achievement in the
development of robust homes to bring housing and efficiency into our lives and homes.
However, introducing this IoT technology into our homes will bring significant security changes
in these developments. Linking all internal articles dedicated to the web and between them
results in new security and protection issues, such as privacy, confidentiality and honesty of
information found and exchanged via objects. These advances are largely useless against various
security attacks that make an IoT-based safe home unstable and therefore it is important to assess
the security risks in order to make a judgment the situation of committed families. For any
innovation to be effective and achieve inevitable application, it must build customer trust by
providing adequate security and security assurance. As in all departments, maintaining safety
will be a fundamental test of survival. As homes are increasingly electronic and fully equipped,
there is a need to investigate potential attacks on PC security and their impact on occupants. This
report uses the OCTAVE Allegro approach which is primarily focused on data assets and
rational thinking (specialist, physical and individual) and conducts a security risk assessment
with the aim of display various security inequalities in the familiar home based IoT, influencing
and suggesting counter-reactions to the important issues that satisfy most of the security needs.
Finally, think of some suggestions for customers. The test results documented in a theory paper
for IoT-based clear home officers and the project summary and recommendations represent a
useful commitment that can be used as a basis for determining security needs. For future work,
the assessment will be expanded to include more types of interesting home applications instead
of just ordinary ones.
The chosen topic for this research project is IoT device security (Home Appliances). The Internet
of Things (IoT) is an ever-expanding world view of the connection between objects or devices
with each other and with our customers. Over time, most IoT associations go from "Human to
Thing" to "Thing to Thing". This innovation is expected to turn into a key achievement in the
development of robust homes to bring housing and efficiency into our lives and homes.
However, introducing this IoT technology into our homes will bring significant security changes
in these developments. Linking all internal articles dedicated to the web and between them
results in new security and protection issues, such as privacy, confidentiality and honesty of
information found and exchanged via objects. These advances are largely useless against various
security attacks that make an IoT-based safe home unstable and therefore it is important to assess
the security risks in order to make a judgment the situation of committed families. For any
innovation to be effective and achieve inevitable application, it must build customer trust by
providing adequate security and security assurance. As in all departments, maintaining safety
will be a fundamental test of survival. As homes are increasingly electronic and fully equipped,
there is a need to investigate potential attacks on PC security and their impact on occupants. This
report uses the OCTAVE Allegro approach which is primarily focused on data assets and
rational thinking (specialist, physical and individual) and conducts a security risk assessment
with the aim of display various security inequalities in the familiar home based IoT, influencing
and suggesting counter-reactions to the important issues that satisfy most of the security needs.
Finally, think of some suggestions for customers. The test results documented in a theory paper
for IoT-based clear home officers and the project summary and recommendations represent a
useful commitment that can be used as a basis for determining security needs. For future work,
the assessment will be expanded to include more types of interesting home applications instead
of just ordinary ones.
1. Introduction
As a rule, there is no known definition of the Internet of Things. All in all, there are several
collections of individuals who have identified the term, despite it being used as a basis by a
computer development expert named Kevin Ashton [1]. We find a common thought in all
explanations that the main change in the Internet was about information provided by people,
while the following variation is about information provided by things, which is the reason it is
called the Internet of Things. There are several definitions for the internet of things. Here are
some of the definitions:
The IoT has been commonly identified as “a dynamic worldwide organizational structure with
self-design capabilities dependent on principles and norms of interactive communication; The
physical and virtual "objects" in the IoT have personalities and characteristics and are equipped
to use a smart interface and be integrated as a group of data "[2].
The motivation behind the IoT is to build and leverage the key elements of the Internet
transformation. With the IoT, customers can both share data provided by people who were in
data sets, and share data with objects in a physical world [3]. We can design the IoT as
connecting physical objects to the Internet and to each other for different purposes of value
through various dedicated devices, making a difficult recording environment inevitable. It can
also be described as the recall of information posted for individual articles showing changes in
their physical state.
1.1 Background
The consistent meaning of IoT is that PCs, sensors and objects interact with each other and cycle
information, as a result of which we can point out that IoT is another framework for innovation
along with various data enhancements. The Internet of Things is confirming a number of
developments into a semi-autonomous organization. A unique device interface for the
organization and for each other. Similarly there are control frameworks in the organization
(programming and administrations) that act as the brain of the framework to prepare information
by disseminating and using the information gathered from connected devices to make choices
and initiate tasks from similar or different devices [4].
As a rule, there is no known definition of the Internet of Things. All in all, there are several
collections of individuals who have identified the term, despite it being used as a basis by a
computer development expert named Kevin Ashton [1]. We find a common thought in all
explanations that the main change in the Internet was about information provided by people,
while the following variation is about information provided by things, which is the reason it is
called the Internet of Things. There are several definitions for the internet of things. Here are
some of the definitions:
The IoT has been commonly identified as “a dynamic worldwide organizational structure with
self-design capabilities dependent on principles and norms of interactive communication; The
physical and virtual "objects" in the IoT have personalities and characteristics and are equipped
to use a smart interface and be integrated as a group of data "[2].
The motivation behind the IoT is to build and leverage the key elements of the Internet
transformation. With the IoT, customers can both share data provided by people who were in
data sets, and share data with objects in a physical world [3]. We can design the IoT as
connecting physical objects to the Internet and to each other for different purposes of value
through various dedicated devices, making a difficult recording environment inevitable. It can
also be described as the recall of information posted for individual articles showing changes in
their physical state.
1.1 Background
The consistent meaning of IoT is that PCs, sensors and objects interact with each other and cycle
information, as a result of which we can point out that IoT is another framework for innovation
along with various data enhancements. The Internet of Things is confirming a number of
developments into a semi-autonomous organization. A unique device interface for the
organization and for each other. Similarly there are control frameworks in the organization
(programming and administrations) that act as the brain of the framework to prepare information
by disseminating and using the information gathered from connected devices to make choices
and initiate tasks from similar or different devices [4].
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
The main purpose of the IoT is to allow us to make a real difference, to understand, to access and
to control things anytime and anywhere using the web [5]. Interconnected device organizations
can lead to unconventional and automated smart applications and administrations, bringing
significant individual, potential and financial benefits [6].
Bringing IoT innovation to our home to new security challenges, so experienced IoT-based
homes need high-level security pre-requisites, as home settings contain meaningful and private
data. Advanced innovations offer both capability and risk, IoT-based Smart Home is virtually
powerless against attacks from the web, if a clear home or a dedicated device is blocked, the
attacker can attack the security of the individual -purchase, take individual data and control them
within the home [7] so appropriate action must be taken.
1.2 Problem statement
Ongoing reports on IoT and Smart Homes have revealed public concern and concern, and
significant security changes have been made in these developments. The requirement for security
in busy homes is identical and significantly more than the requirement for security in all other
computing frameworks to ensure that data is not captured, modified or leaked.
Excellent home frames allow the user to control the screen and control, for example, indoor
controllers, washing machines, cleaning robots, theater setting, security frames, smoke alarms,
entrance locks to provide examples. The introduction of this IoT technology into our homes
compromises accommodation, control, security and protection [8]. Attackers can attack the
client's defenses, take private data, and shield occupants inside the home in case they get the
upper hand with a great home safe or life-saving device [7]. It is worth noting that a spacious
home (SH) is an attractive target for an attacker despite being SH; individual data, connected to
the internet all day, every day, there is no dedicated frame chair, it consists of machines with
space with multiple repetitions with different weaknesses and an attacker to constantly decide to
filter the internet for a particular weakness of being replaced by a particular device from a
particular manufacturer for abuse.
The proposed study will be linked to opportunities for monitoring data security in dedicated IoT-
based homes. This research initiative examines the data security risks in mutual and Internet
to control things anytime and anywhere using the web [5]. Interconnected device organizations
can lead to unconventional and automated smart applications and administrations, bringing
significant individual, potential and financial benefits [6].
Bringing IoT innovation to our home to new security challenges, so experienced IoT-based
homes need high-level security pre-requisites, as home settings contain meaningful and private
data. Advanced innovations offer both capability and risk, IoT-based Smart Home is virtually
powerless against attacks from the web, if a clear home or a dedicated device is blocked, the
attacker can attack the security of the individual -purchase, take individual data and control them
within the home [7] so appropriate action must be taken.
1.2 Problem statement
Ongoing reports on IoT and Smart Homes have revealed public concern and concern, and
significant security changes have been made in these developments. The requirement for security
in busy homes is identical and significantly more than the requirement for security in all other
computing frameworks to ensure that data is not captured, modified or leaked.
Excellent home frames allow the user to control the screen and control, for example, indoor
controllers, washing machines, cleaning robots, theater setting, security frames, smoke alarms,
entrance locks to provide examples. The introduction of this IoT technology into our homes
compromises accommodation, control, security and protection [8]. Attackers can attack the
client's defenses, take private data, and shield occupants inside the home in case they get the
upper hand with a great home safe or life-saving device [7]. It is worth noting that a spacious
home (SH) is an attractive target for an attacker despite being SH; individual data, connected to
the internet all day, every day, there is no dedicated frame chair, it consists of machines with
space with multiple repetitions with different weaknesses and an attacker to constantly decide to
filter the internet for a particular weakness of being replaced by a particular device from a
particular manufacturer for abuse.
The proposed study will be linked to opportunities for monitoring data security in dedicated IoT-
based homes. This research initiative examines the data security risks in mutual and Internet
interference when designing a smart home, so that customers are aware of the security risks who
can abuse, improve security, and provide recommendations.
1.3 Research questions
As a result of the written review I conducted in Section 3 on the point, Security Issues in IoT-
based Smart Homes, the need for further investigation into potentially harmful security risks on
people living in luxury homes and then suggests possible answers for them. I have not been able
to identify any school study that will provide a complete security risk assessment to the homes of
IoT-based experts that highlights security risks, countermeasures, and side effects. To explore
this hole, the accompanying test questions are highlighted:
1. What are the emerging security threats from IoT-based Smart Homes?
2. What are the consequences of these threats (Impacts)?
3. Are there suitable countermeasures to propose?
4. What to recommend the users?
By recognizing the risks and the consequences we can reduce the risks since the risk includes
both the risks and the consequences. Investigating security issues in IoT-based smart homes is
crucial for a better understanding and to avoid real results. Without a security risk assessment or
with risks, it is difficult to determine the framework and legitimize the efforts made to make
security. Moreover, this new innovation, the IoT, in order to gain widespread recognition among
customers, security needs to be better and trust is crucial in implementing this innovation in their
homes because, if yes, buyers need to trust their homes. innovation they will not use it. Next,
security is one of the areas that needs to be included in the top applications as it includes smart
home upgrade.
can abuse, improve security, and provide recommendations.
1.3 Research questions
As a result of the written review I conducted in Section 3 on the point, Security Issues in IoT-
based Smart Homes, the need for further investigation into potentially harmful security risks on
people living in luxury homes and then suggests possible answers for them. I have not been able
to identify any school study that will provide a complete security risk assessment to the homes of
IoT-based experts that highlights security risks, countermeasures, and side effects. To explore
this hole, the accompanying test questions are highlighted:
1. What are the emerging security threats from IoT-based Smart Homes?
2. What are the consequences of these threats (Impacts)?
3. Are there suitable countermeasures to propose?
4. What to recommend the users?
By recognizing the risks and the consequences we can reduce the risks since the risk includes
both the risks and the consequences. Investigating security issues in IoT-based smart homes is
crucial for a better understanding and to avoid real results. Without a security risk assessment or
with risks, it is difficult to determine the framework and legitimize the efforts made to make
security. Moreover, this new innovation, the IoT, in order to gain widespread recognition among
customers, security needs to be better and trust is crucial in implementing this innovation in their
homes because, if yes, buyers need to trust their homes. innovation they will not use it. Next,
security is one of the areas that needs to be included in the top applications as it includes smart
home upgrade.
2. Literature Review
2.1 Introduction
The rationale behind this section is to build an academic judgment on the test case by revealing a
past study of the earth, to develop my understanding of the area, to update my walkers, to find a
hole in the writing and requirements for this test. .
Releases in the last decade, from 2005 to 2016, were marked by the activities of three web
crawlers, such as Google Scholar, Scopus and IEEE Xplore Digital Library. The sources were
separated and the most important sources were selected. At that stage, they were sorted and
placed in different envelopes in order from 2005 to 2016.
This section first shows the work done on security in IoT-based dedicated homes. At that point, it
is fundamentally based on the security problems identified by this innovation. Also, try to find a
study hole with the utmost satisfaction that accompanies a writing study summary.
2.2 Security Issues
This section highlights the specific safety issues identified by hungry family photo safety and the
key ideas seen in the previous section; Devices, sensors and actors, control group, remote control
controllers and devices, as well as the devices used and designed.
A person can legitimately attack an interconnecting device (eg, a pass) or a field machine using
their neighborhood or neighborhood matching interface (attack on the device) [9]. Pantomime
machine using its broken statement [11]. Household appliances can be connected to a wireless or
remote arrangement through the front door. There may be a weakness in the corridor of the
house itself. Regularly, the e-administration program is introduced at the front door. His concern
is that the attacker could gain an active advantage by exploiting the vulnerability of a web
worker or CGI. The attack on the corridor of the house can push the attack directly against the
entire family network as the point is the interface of the family with the outside [10]. Other
safety concerns are related to the straightness of the tools themselves, the tools are flexible and
can appear in a bright position from a dark place. The problem is that even a manufactured
device could have changed when it was not [12]. Types of security vulnerabilities can include
2.1 Introduction
The rationale behind this section is to build an academic judgment on the test case by revealing a
past study of the earth, to develop my understanding of the area, to update my walkers, to find a
hole in the writing and requirements for this test. .
Releases in the last decade, from 2005 to 2016, were marked by the activities of three web
crawlers, such as Google Scholar, Scopus and IEEE Xplore Digital Library. The sources were
separated and the most important sources were selected. At that stage, they were sorted and
placed in different envelopes in order from 2005 to 2016.
This section first shows the work done on security in IoT-based dedicated homes. At that point, it
is fundamentally based on the security problems identified by this innovation. Also, try to find a
study hole with the utmost satisfaction that accompanies a writing study summary.
2.2 Security Issues
This section highlights the specific safety issues identified by hungry family photo safety and the
key ideas seen in the previous section; Devices, sensors and actors, control group, remote control
controllers and devices, as well as the devices used and designed.
A person can legitimately attack an interconnecting device (eg, a pass) or a field machine using
their neighborhood or neighborhood matching interface (attack on the device) [9]. Pantomime
machine using its broken statement [11]. Household appliances can be connected to a wireless or
remote arrangement through the front door. There may be a weakness in the corridor of the
house itself. Regularly, the e-administration program is introduced at the front door. His concern
is that the attacker could gain an active advantage by exploiting the vulnerability of a web
worker or CGI. The attack on the corridor of the house can push the attack directly against the
entire family network as the point is the interface of the family with the outside [10]. Other
safety concerns are related to the straightness of the tools themselves, the tools are flexible and
can appear in a bright position from a dark place. The problem is that even a manufactured
device could have changed when it was not [12]. Types of security vulnerabilities can include
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
home appliances, invasion of infections, data transmission, content creation, and security
breaches [10].
There are various approaches to entering a smart home. With more or more devices connected to
the web, an offender could attack the most vulnerable of them and use this tool to access the
entire frame. Another possibility is that the infection is now attacked by PCs or mobile phones
with malware and consequently used as a bulletin board for further investigation and entry into
the organization. The gadget presents a different level of risk for being the target of an attack.
Some devices, especially raw sensors, high memory level and handling power, make them ugly.
The attacker points to a number of interesting collections of smart home devices. There is no
doubt that the main widespread distributed attacks will focus on the results of the Control
Systems collection, as they are generally similar to existing targets and are also almost
exclusively tied to their all other smart appliances [13].
The creators in writing [11] cause an enemy to have two unique open doors for access to control
capabilities, particularly organizational attacks and machine attacks. In network attacks, an
enemy may attempt to capture, control, execute or block the information communicated. Gadget
attacks can be combined into software attacks, physical attacks or harassment and side channel
attacks. Furthermore, it is just as likely that the attacker could hack himself as the incoming
client via intuitive digital TV, IP set top box or home pillows or illegal access via various
intentions of controlling household appliances [10].
The script [14] includes a security model to ensure that data flows in a high matrix source land
organization. The proposed model can adequately manage the data flow in the Home Area
Network using the private and non-confidential data streaming approach without compromising
the standard resource of the HAN.
The creators of Writing [15] propose a frame (Seeing-Is-Believing) that uses standard tags and
camera phones as a visual station for visible authentication. These instructions went out of one-
to-one attacks against basic conventions based on the public key. The visual channel has a
seductive property from providing accurate ID of the parts they provide, assuring the customer
that their device is talking to that other device.
breaches [10].
There are various approaches to entering a smart home. With more or more devices connected to
the web, an offender could attack the most vulnerable of them and use this tool to access the
entire frame. Another possibility is that the infection is now attacked by PCs or mobile phones
with malware and consequently used as a bulletin board for further investigation and entry into
the organization. The gadget presents a different level of risk for being the target of an attack.
Some devices, especially raw sensors, high memory level and handling power, make them ugly.
The attacker points to a number of interesting collections of smart home devices. There is no
doubt that the main widespread distributed attacks will focus on the results of the Control
Systems collection, as they are generally similar to existing targets and are also almost
exclusively tied to their all other smart appliances [13].
The creators in writing [11] cause an enemy to have two unique open doors for access to control
capabilities, particularly organizational attacks and machine attacks. In network attacks, an
enemy may attempt to capture, control, execute or block the information communicated. Gadget
attacks can be combined into software attacks, physical attacks or harassment and side channel
attacks. Furthermore, it is just as likely that the attacker could hack himself as the incoming
client via intuitive digital TV, IP set top box or home pillows or illegal access via various
intentions of controlling household appliances [10].
The script [14] includes a security model to ensure that data flows in a high matrix source land
organization. The proposed model can adequately manage the data flow in the Home Area
Network using the private and non-confidential data streaming approach without compromising
the standard resource of the HAN.
The creators of Writing [15] propose a frame (Seeing-Is-Believing) that uses standard tags and
camera phones as a visual station for visible authentication. These instructions went out of one-
to-one attacks against basic conventions based on the public key. The visual channel has a
seductive property from providing accurate ID of the parts they provide, assuring the customer
that their device is talking to that other device.
2.3 Research Gap
By conducting this literature review, we can see that most of the smart home literatures presented
above focus specifically on the security issues that customers can experience smart
environments. Many of the security problems are repeated by different authors in different years
and some are different. No document covering the entire architecture of luxury homes is viewed
from home or to the remote server and only focuses on certain parts of the system and in this
dissertation the coverage gap by carrying out a comprehensive security risk assessment to the
whole system.
3. Results and discussion
As we have already said, Internet of Things (IoT) innovation has been the development of smart
homes to bring housing and productivity into our lives and homes. Security however is one of
the goals of the shrewd house based on IoT, according to the above (security risks) as a result of
the study, we can see that these devices are quite without power against various security attacks
that make IoT-based home safe and unstable to live in if security is neglected. As a result, it is
important to assess the safety risks in order to judge the situation of experienced families. Given
the possibility that security in a hard-core home will not be compromised or where safety and
comfort were in the interest of security, there will be significant changes to security in these
developments. A strong home is a condition of human life and requires refuge and security. It
must provide adequate security and protection. Connecting all intrusions within the home to the
web and together will produce new security and defense issues, such as the privacy, legitimacy
and integrity of information found and exchanged by devices. Security risks and vulnerabilities
need to be investigated as we did in this review. We can assume that safety is a key feature and
should be considered and in depth (a top down promise) in a crisp family picture at least the
interesting results may not be exactly as the risks identified in the proposal this is substantial.
For this reason and to answer the test questions, a comprehensive security risk assessment was
conducted using the OCTAVE Allegro mechanism to study and evaluate security opportunities
in a brilliant common home with the aim of uncovering various risks to the IoT-based secure
home security impacts and suggests side effects on known issues that meet a large percentage of
security needs.
By conducting this literature review, we can see that most of the smart home literatures presented
above focus specifically on the security issues that customers can experience smart
environments. Many of the security problems are repeated by different authors in different years
and some are different. No document covering the entire architecture of luxury homes is viewed
from home or to the remote server and only focuses on certain parts of the system and in this
dissertation the coverage gap by carrying out a comprehensive security risk assessment to the
whole system.
3. Results and discussion
As we have already said, Internet of Things (IoT) innovation has been the development of smart
homes to bring housing and productivity into our lives and homes. Security however is one of
the goals of the shrewd house based on IoT, according to the above (security risks) as a result of
the study, we can see that these devices are quite without power against various security attacks
that make IoT-based home safe and unstable to live in if security is neglected. As a result, it is
important to assess the safety risks in order to judge the situation of experienced families. Given
the possibility that security in a hard-core home will not be compromised or where safety and
comfort were in the interest of security, there will be significant changes to security in these
developments. A strong home is a condition of human life and requires refuge and security. It
must provide adequate security and protection. Connecting all intrusions within the home to the
web and together will produce new security and defense issues, such as the privacy, legitimacy
and integrity of information found and exchanged by devices. Security risks and vulnerabilities
need to be investigated as we did in this review. We can assume that safety is a key feature and
should be considered and in depth (a top down promise) in a crisp family picture at least the
interesting results may not be exactly as the risks identified in the proposal this is substantial.
For this reason and to answer the test questions, a comprehensive security risk assessment was
conducted using the OCTAVE Allegro mechanism to study and evaluate security opportunities
in a brilliant common home with the aim of uncovering various risks to the IoT-based secure
home security impacts and suggests side effects on known issues that meet a large percentage of
security needs.
In this work, 10 core data assets were identified on which the security risk assessment was
carried out with the aim of protecting them. About 15 associated hazards have been established
in different components or subsystems in the safe house with different risk scores. Several
assessment plans are proposed to address these risks or to reduce them to an appropriate level.
The human trait is important and must be considered realistically. The orientation of the
messenger is crucial to make the participants especially the residents aware of the different
security that social planning in particular provides.
4. Recommendations
The aim of this chapter is to provide some recommendations to the stakeholders, both the
commercial stakeholders (suppliers, infrastructure providers, third party software and hardware
vendors etc.) and Non-commercial stakeholders (governmental institutions and municipalities
and end-users (inhabitants)), with the goal of making improvements in this technology (IoT-
based smart home), with respect to the security.
Recommendations to the Commercial Stakeholders
1) There is a great need to co-ordinate safety at the design and development stage.
2) All matters and administrations that affect the lives and well-being of residents should have
high level safety precautions.
3) Security has been improved in frameworks by blocking access to a login page for a long time
after subsequent login attempts. This protects the structure from brute force and reference-based
attacks.
4) Ask buyers to change the default passwords during the configuration phase.
5) Legitimate assistance is required in implementing security in IoT settings, and security should
be considered as of now while IoT frameworks are being designed.
6) There is a requirement for safety standards (measurement required for manufacturers).
7) It is softer to test your safety efforts before forwarding your items and remember to close all
sub-steps in items. Terrible for your infamy.
8) Businesses should continue to rectify known weaknesses throughout the life cycle of the item.
carried out with the aim of protecting them. About 15 associated hazards have been established
in different components or subsystems in the safe house with different risk scores. Several
assessment plans are proposed to address these risks or to reduce them to an appropriate level.
The human trait is important and must be considered realistically. The orientation of the
messenger is crucial to make the participants especially the residents aware of the different
security that social planning in particular provides.
4. Recommendations
The aim of this chapter is to provide some recommendations to the stakeholders, both the
commercial stakeholders (suppliers, infrastructure providers, third party software and hardware
vendors etc.) and Non-commercial stakeholders (governmental institutions and municipalities
and end-users (inhabitants)), with the goal of making improvements in this technology (IoT-
based smart home), with respect to the security.
Recommendations to the Commercial Stakeholders
1) There is a great need to co-ordinate safety at the design and development stage.
2) All matters and administrations that affect the lives and well-being of residents should have
high level safety precautions.
3) Security has been improved in frameworks by blocking access to a login page for a long time
after subsequent login attempts. This protects the structure from brute force and reference-based
attacks.
4) Ask buyers to change the default passwords during the configuration phase.
5) Legitimate assistance is required in implementing security in IoT settings, and security should
be considered as of now while IoT frameworks are being designed.
6) There is a requirement for safety standards (measurement required for manufacturers).
7) It is softer to test your safety efforts before forwarding your items and remember to close all
sub-steps in items. Terrible for your infamy.
8) Businesses should continue to rectify known weaknesses throughout the life cycle of the item.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
9) Security risk assessment systems should be developed, which may cover device limitations.
10) Be direct and explain to your customers how to use their classified data.
Recommendations to the Non Commercial Stakeholders
1) It is essential to set up secure usernames and passwords for all appliance frameworks instead
of leaving them at their default settings.
2) Keep your passwords strict and irregular Use a long secret word with upper and lower case
letters, numbers and unique characters. Change them frequently on all your frames and devices.
3) Avoid using figure-by-figure configurations such as "123456".
4) Do not use preset passwords for various purposes.
5) Stay up to date and install any firmware updates or programming available for the devices you
have installed.
6) Buyers should choose their frames and tools from reputable and trustworthy merchants and
not from security-restricted sellers.
7) Avoid reallocating your frame to the specialized external cooperative, they are unsure of all
security risks or prerequisites.
8) Don't choose comfort and safety on the off chance that you don't make the decision.
9) Adjust your version and frames appropriately. For this you should be a security talent,
otherwise it will find its own solution to vulnerabilities. Choose your switch with Wi-Fi
Protected Access (WPA2) to ensure maximum security from programmers.
10) Equipment upgrades and replacements. Try not to brush up on the old ones.
11) Run access tests from time to time to make sure frames are secure.
12) Risks and risks change after some time, which is why it is important that the customer re-
evaluate the risks from time to time and reconsider the feasibility of the selected drugs.
13) A safety preparation program is absolutely essential for home occupants to be aware of key
safety forecasts.
10) Be direct and explain to your customers how to use their classified data.
Recommendations to the Non Commercial Stakeholders
1) It is essential to set up secure usernames and passwords for all appliance frameworks instead
of leaving them at their default settings.
2) Keep your passwords strict and irregular Use a long secret word with upper and lower case
letters, numbers and unique characters. Change them frequently on all your frames and devices.
3) Avoid using figure-by-figure configurations such as "123456".
4) Do not use preset passwords for various purposes.
5) Stay up to date and install any firmware updates or programming available for the devices you
have installed.
6) Buyers should choose their frames and tools from reputable and trustworthy merchants and
not from security-restricted sellers.
7) Avoid reallocating your frame to the specialized external cooperative, they are unsure of all
security risks or prerequisites.
8) Don't choose comfort and safety on the off chance that you don't make the decision.
9) Adjust your version and frames appropriately. For this you should be a security talent,
otherwise it will find its own solution to vulnerabilities. Choose your switch with Wi-Fi
Protected Access (WPA2) to ensure maximum security from programmers.
10) Equipment upgrades and replacements. Try not to brush up on the old ones.
11) Run access tests from time to time to make sure frames are secure.
12) Risks and risks change after some time, which is why it is important that the customer re-
evaluate the risks from time to time and reconsider the feasibility of the selected drugs.
13) A safety preparation program is absolutely essential for home occupants to be aware of key
safety forecasts.
5. Conclusion
The aims of this thesis were to present the theme of the Internet of Things (IoT) and its
application to create smart homes to provide vision, comfort and personal satisfaction. Bringing
IoT innovation to our home in new security challenges, so clear IoT-based homes need tight
security pre-requisites. These advanced features offer both capabilities and risk, IoT-based Smart
Home is uniquely powerless against various security threats from inside and outside the home, if
home security clear or compromised device compromised, consumer protection, individual data
and even the welfare of residents will be at risk. Clear home security and its data assets are
critical to the safety and well-being of residents. As a result, appropriate steps must be taken to
make the bright home safer and more reasonable to live in. Be that as it may, we should know
exactly what we are trying to secure and why before choosing specific agreements. Careful
security risk assessment should be carried out before use in security to ensure that the relevant
underlying issues are identified first.
For this purpose, these research question were stated from the beginning of this paper, namely:
1. What are the emerging security threats from IoT-based Smart Homes?
2. What are the consequences of these threats (Impacts)?
3. Are there suitable countermeasures to propose?
4. What to recommend the users?
This document provided detailed guidance on security risks using OCTAVE Allegro and
identified 10 basic data benefits to conduct its assessment. The risk assessment cycle was well
received and provided around 15 excellent indoor and outdoor security opportunities, as shown
in Table 61. Indeed, there are a number of different risks that are not expressed in terms of lack
of time and extension. number of worksheets limiting job measurement. Shows the results of the
risks that should be determined. Appropriate contraindications are recommended to minimize the
risk as 100% safety can rarely be achieved.
In a complex and closely related situation, for example, an IoT-based expert home, an attacker
who contracts a home automation framework can cause a wide range of damage. The risk
assessment aims to identify the greatest anticipated risks. One of the primary sources of risk is
The aims of this thesis were to present the theme of the Internet of Things (IoT) and its
application to create smart homes to provide vision, comfort and personal satisfaction. Bringing
IoT innovation to our home in new security challenges, so clear IoT-based homes need tight
security pre-requisites. These advanced features offer both capabilities and risk, IoT-based Smart
Home is uniquely powerless against various security threats from inside and outside the home, if
home security clear or compromised device compromised, consumer protection, individual data
and even the welfare of residents will be at risk. Clear home security and its data assets are
critical to the safety and well-being of residents. As a result, appropriate steps must be taken to
make the bright home safer and more reasonable to live in. Be that as it may, we should know
exactly what we are trying to secure and why before choosing specific agreements. Careful
security risk assessment should be carried out before use in security to ensure that the relevant
underlying issues are identified first.
For this purpose, these research question were stated from the beginning of this paper, namely:
1. What are the emerging security threats from IoT-based Smart Homes?
2. What are the consequences of these threats (Impacts)?
3. Are there suitable countermeasures to propose?
4. What to recommend the users?
This document provided detailed guidance on security risks using OCTAVE Allegro and
identified 10 basic data benefits to conduct its assessment. The risk assessment cycle was well
received and provided around 15 excellent indoor and outdoor security opportunities, as shown
in Table 61. Indeed, there are a number of different risks that are not expressed in terms of lack
of time and extension. number of worksheets limiting job measurement. Shows the results of the
risks that should be determined. Appropriate contraindications are recommended to minimize the
risk as 100% safety can rarely be achieved.
In a complex and closely related situation, for example, an IoT-based expert home, an attacker
who contracts a home automation framework can cause a wide range of damage. The risk
assessment aims to identify the greatest anticipated risks. One of the primary sources of risk is
associated with devices and sensors. The risks to the equipment relate to the burglary and
imperfection, control and damage of the various devices used within the SHAS, and must also be
considered carefully. The highest risk score identified by a data asset (user credentials and
mobile and app personal data) when mined. Within the organization's letters, the main threats
come from inadequate authentication and the lack of secure communication and an encrypted
channel. The human factor is the worst risk as people represent the highest risk in smart home
automation systems because homes are made up of people of all ages, some of them, especially
those with experience technically limited more vulnerable to social engineering attacks, misuse
and malfunction of systems. Thus, the test met its objectives and addressed the research
questions.
For future work, the security risk assessment will be extended to consider different types of
application areas of committed homes, for example, smart homes for the elderly, smart homes
for medical services, smart homes for childcare.
imperfection, control and damage of the various devices used within the SHAS, and must also be
considered carefully. The highest risk score identified by a data asset (user credentials and
mobile and app personal data) when mined. Within the organization's letters, the main threats
come from inadequate authentication and the lack of secure communication and an encrypted
channel. The human factor is the worst risk as people represent the highest risk in smart home
automation systems because homes are made up of people of all ages, some of them, especially
those with experience technically limited more vulnerable to social engineering attacks, misuse
and malfunction of systems. Thus, the test met its objectives and addressed the research
questions.
For future work, the security risk assessment will be extended to consider different types of
application areas of committed homes, for example, smart homes for the elderly, smart homes
for medical services, smart homes for childcare.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Reference
[1] Ashton, K. (2009). That ‘internet of things’ thing. RFiD Journal, 22(7), 97-114.
[2] Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: a survey. Information Systems Frontiers,
17(2), 243-259.
[3] Zhong, Y. (2015). I2oT: Advanced Direction of the Internet of Things. ZTECOMMUNICATIONS, 3.
[4] Miller, M. (2015). The internet of things: How smart TVs, smart cars, smart homes, and smart cities
are changing the world. Pearson Education.
[5] N. K. Suryadevara and S. C. Mukhopadhyay, Smart Homes: Design, Implementation and Issues, vol.
14. Springer, 2015
[6] Li, J., Huang, Z., & Wang, X. (2011, May). Notice of Retraction Countermeasure research about
developing Internet of Things economy: A case of Hangzhou city. 2011 International Conference on E-
Business and E-Government (ICEE).
[7] Steinberg, Joseph. (2014). “These Devices May Be Spying On You (Even In Your Own Home)”.
http://www.forbes.com/sites/josephsteinberg/2014/01/27/these-devices-may-bespying-on-you-even-in-
your-own-home/.
[8] Montano, C., Lundmark, M., & Mähr, W. (2006). Control vs convenience: critical factors of smart
homes. In 2nd Scandinavian Student Interaction Design Research Conference.
[9] Granzer, W., Kastner, W., Neugschwandtner, G., & Praus, F. (2006). Security in networked building
automation systems. Na
[10] Yoo, D. Y., Shin, J. W., & Choi, J. Y. (2007, December). Home-Network Security Model in
Ubiquitous Environment. In Proceedings of World Academy of Science, Engineering and Technology
(Vol. 26).
[11] Yoo, D. Y., Shin, J. W., & Choi, J. Y. (2007, December). Home-Network Security Model in
Ubiquitous Environment. In Proceedings of World Academy of Science, Engineering and Technology
(Vol. 26).
[12] Nixon, P. A., Wagealla, W., English, C., & Terzis, S. (2004). Security, privacy and trust issues in
smart environments. Smart Environments: Technologies, Protocols and Applications
[1] Ashton, K. (2009). That ‘internet of things’ thing. RFiD Journal, 22(7), 97-114.
[2] Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: a survey. Information Systems Frontiers,
17(2), 243-259.
[3] Zhong, Y. (2015). I2oT: Advanced Direction of the Internet of Things. ZTECOMMUNICATIONS, 3.
[4] Miller, M. (2015). The internet of things: How smart TVs, smart cars, smart homes, and smart cities
are changing the world. Pearson Education.
[5] N. K. Suryadevara and S. C. Mukhopadhyay, Smart Homes: Design, Implementation and Issues, vol.
14. Springer, 2015
[6] Li, J., Huang, Z., & Wang, X. (2011, May). Notice of Retraction Countermeasure research about
developing Internet of Things economy: A case of Hangzhou city. 2011 International Conference on E-
Business and E-Government (ICEE).
[7] Steinberg, Joseph. (2014). “These Devices May Be Spying On You (Even In Your Own Home)”.
http://www.forbes.com/sites/josephsteinberg/2014/01/27/these-devices-may-bespying-on-you-even-in-
your-own-home/.
[8] Montano, C., Lundmark, M., & Mähr, W. (2006). Control vs convenience: critical factors of smart
homes. In 2nd Scandinavian Student Interaction Design Research Conference.
[9] Granzer, W., Kastner, W., Neugschwandtner, G., & Praus, F. (2006). Security in networked building
automation systems. Na
[10] Yoo, D. Y., Shin, J. W., & Choi, J. Y. (2007, December). Home-Network Security Model in
Ubiquitous Environment. In Proceedings of World Academy of Science, Engineering and Technology
(Vol. 26).
[11] Yoo, D. Y., Shin, J. W., & Choi, J. Y. (2007, December). Home-Network Security Model in
Ubiquitous Environment. In Proceedings of World Academy of Science, Engineering and Technology
(Vol. 26).
[12] Nixon, P. A., Wagealla, W., English, C., & Terzis, S. (2004). Security, privacy and trust issues in
smart environments. Smart Environments: Technologies, Protocols and Applications
[13] Schiefer, M. (2015, May). Smart Home Definition and Security Threats. In IT Security Incident
Management & IT Forensics (IMF), 2015 Ninth International Conference on (pp. 114- 118). IEEE.
[14] Tong, J., Sun, W., & Wang, L. (2013, May). An information flow security model for home area
network of smart grid. In Cyber Technology in Automation, Control and Intelligent Systems (CYBER),
2013 IEEE 3rd Annual International Conference on (pp. 456-461). IEEE
[15] McCune, J. M., Perrig, A., & Reiter, M. K. (2005, May). Seeing-is-believing: Using camera phones
for human-verifiable authentication. In Security and privacy, 2005 IEEE symposium on (pp. 110-124).
IEEE.
Management & IT Forensics (IMF), 2015 Ninth International Conference on (pp. 114- 118). IEEE.
[14] Tong, J., Sun, W., & Wang, L. (2013, May). An information flow security model for home area
network of smart grid. In Cyber Technology in Automation, Control and Intelligent Systems (CYBER),
2013 IEEE 3rd Annual International Conference on (pp. 456-461). IEEE
[15] McCune, J. M., Perrig, A., & Reiter, M. K. (2005, May). Seeing-is-believing: Using camera phones
for human-verifiable authentication. In Security and privacy, 2005 IEEE symposium on (pp. 110-124).
IEEE.
1 out of 15
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.