Smart Home Network Security: Vulnerabilities and Protection Strategies
VerifiedAdded on 2023/01/04
|7
|1886
|82
Report
AI Summary
This report provides an in-depth analysis of security issues within smart home networks, focusing on the vulnerabilities associated with the Internet of Things (IoT) technology. It identifies two primary security threats: targeted attacks, where hackers exploit stored personal and financial data, and password exploitation, where weak passwords allow unauthorized access to devices and sensitive information. The report emphasizes the importance of understanding these vulnerabilities to protect user data and financial details. It recommends several security measures, including strong Wi-Fi encryption, the creation of separate guest networks, and careful review of default privacy settings on all connected devices. The report concludes that awareness and proactive security practices are essential for safeguarding smart home networks and protecting user privacy.

NETWORK
MANAGEMENT IN
ORGANISATIONS
MANAGEMENT IN
ORGANISATIONS
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

TABLE OF CONTENTS
TOPIC..............................................................................................................................................1
Introduction of topi..........................................................................................................................1
Feedback of Part 1A........................................................................................................................1
Analysis of the issues.......................................................................................................................1
Key arguments and recommendations.............................................................................................2
Conclusion.......................................................................................................................................4
REFERENCES................................................................................................................................5
TOPIC..............................................................................................................................................1
Introduction of topi..........................................................................................................................1
Feedback of Part 1A........................................................................................................................1
Analysis of the issues.......................................................................................................................1
Key arguments and recommendations.............................................................................................2
Conclusion.......................................................................................................................................4
REFERENCES................................................................................................................................5

TOPIC
Key security issues in relation to Smart Home Network
Introduction of topi
Internet of things is a kind of network of physical objects that uses different kinds of
technologies in order to remain connected to each other and exchange data with other devices
and other systems present over internet. In past few years usage of IoT enabled devices in
Australia has increased drastically. Smart homes in one of the examples of IoT technology. But
increasing usage of IoT technologies have increase risk related to hacking of personal
information or controlling those devices due to their easy availability risk and vulnerabilities
have been increased [1]. Due to this advancement in technology and easy accessibility of Smart
home network security risk associated with this IoT technology has increased. This assessment
will focus upon analysis of security issues in relation to Smart Home network that can put its
users and their information at risk. This assessment will further focus upon ways in which Smart
home technology users can safeguard themselves from such vulnerabilities.
Feedback of Part 1 A
Feedback received from part 1 A helped in understanding that there is a need to identify
appropriate and most important and common security issues that are likely to occur and smart
home network are vulnerable for the same. Feedback received also helped in identifying that in
part 1 A ways in which identified issues can be resolved were not explained in a proper and
appropriate manner [4]. This feedback will be addressed in this part as in these two most
important security issues to which smart home networks are vulnerable to will be identified and
ways in which its users can safeguard themselves from the same.
Analysis of the issues
There are various kinds of security issues that are associated with smart home networks
that can put its users at risk. It is important for smart home users to be aware about these issues
so that they can understand ways in which they can focus upon safeguarding themselves from
such issues. It is important to focus upon enhancing security of smart home network as it can be
considered as a tressure in which personal details of its users, credit card details and many more
are stored. Two most common type of security issues to which smart home networks are
vulnerable to are:
1
Key security issues in relation to Smart Home Network
Introduction of topi
Internet of things is a kind of network of physical objects that uses different kinds of
technologies in order to remain connected to each other and exchange data with other devices
and other systems present over internet. In past few years usage of IoT enabled devices in
Australia has increased drastically. Smart homes in one of the examples of IoT technology. But
increasing usage of IoT technologies have increase risk related to hacking of personal
information or controlling those devices due to their easy availability risk and vulnerabilities
have been increased [1]. Due to this advancement in technology and easy accessibility of Smart
home network security risk associated with this IoT technology has increased. This assessment
will focus upon analysis of security issues in relation to Smart Home network that can put its
users and their information at risk. This assessment will further focus upon ways in which Smart
home technology users can safeguard themselves from such vulnerabilities.
Feedback of Part 1 A
Feedback received from part 1 A helped in understanding that there is a need to identify
appropriate and most important and common security issues that are likely to occur and smart
home network are vulnerable for the same. Feedback received also helped in identifying that in
part 1 A ways in which identified issues can be resolved were not explained in a proper and
appropriate manner [4]. This feedback will be addressed in this part as in these two most
important security issues to which smart home networks are vulnerable to will be identified and
ways in which its users can safeguard themselves from the same.
Analysis of the issues
There are various kinds of security issues that are associated with smart home networks
that can put its users at risk. It is important for smart home users to be aware about these issues
so that they can understand ways in which they can focus upon safeguarding themselves from
such issues. It is important to focus upon enhancing security of smart home network as it can be
considered as a tressure in which personal details of its users, credit card details and many more
are stored. Two most common type of security issues to which smart home networks are
vulnerable to are:
1
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Targeted Attacks: As it has already been identified that Smart home networks are tressure of
personal information. It stores personal details of its users; payment details their appliances uses
and many more [5]. Hackers can hack the network and use this information for their personal use
or can use that information against the users of smart home network only. For example, credit
card details stored can be used to purchase things, or if a family member has debt or taken loan
and this information is saved within the network then this information can be used by hackers
this information and give a fake call to that particular user for debt which is due to be paid. If any
family members phone number is saved then that number can be used to give call abut asking for
money on the name of another family member. Due to this many times smart home technology
users become victim of frauds mostly financial frauds because many of them save their emailed,
important dates, connect other application to smart home network and as a result they become
prone to this security issue of target attack.
Exploitation to password: it is another kind of security issue which is associated with Smart
home network. In order to remain connected to all the devices of home and manage everything
from one place most of the times smart home users save their important password to some
documents or application on this network. It is a fact that users of smart home connect all the
smart devices to this smart home network that are secured with weak password [6]. Expert
hackers can easily penetrate and gain access to the network and can either gain access to
important password or can use that password in order to temper with devices connect to smart
homes like turn on lights, turn off lights, change channels on television and many more. They
can also gain access to internet of Wi-Fi connection and use it till it exhaust its limit and many
more. Many times, users store username and password of their bank details in order to do faster
payments. But these passwords can be used by hackers to make payment for their own use. Due
to these issues users of smart home technology devices can become victim of these password
thefts or password exploitation issue and as a result they can suffer financial theft problem.
Key arguments and recommendations
From the above analysis it has been identified that there are various kinds of security
issues that are being faced by users of smart home technology. It is important for its users to
identify ways in which these security issues make their system vulnerable. If users of this
technology do not focus upon these vulnerabilities then it can increase risk associated with their
financial information, personal information etc. and can put them at risk [2]. From the above
2
personal information. It stores personal details of its users; payment details their appliances uses
and many more [5]. Hackers can hack the network and use this information for their personal use
or can use that information against the users of smart home network only. For example, credit
card details stored can be used to purchase things, or if a family member has debt or taken loan
and this information is saved within the network then this information can be used by hackers
this information and give a fake call to that particular user for debt which is due to be paid. If any
family members phone number is saved then that number can be used to give call abut asking for
money on the name of another family member. Due to this many times smart home technology
users become victim of frauds mostly financial frauds because many of them save their emailed,
important dates, connect other application to smart home network and as a result they become
prone to this security issue of target attack.
Exploitation to password: it is another kind of security issue which is associated with Smart
home network. In order to remain connected to all the devices of home and manage everything
from one place most of the times smart home users save their important password to some
documents or application on this network. It is a fact that users of smart home connect all the
smart devices to this smart home network that are secured with weak password [6]. Expert
hackers can easily penetrate and gain access to the network and can either gain access to
important password or can use that password in order to temper with devices connect to smart
homes like turn on lights, turn off lights, change channels on television and many more. They
can also gain access to internet of Wi-Fi connection and use it till it exhaust its limit and many
more. Many times, users store username and password of their bank details in order to do faster
payments. But these passwords can be used by hackers to make payment for their own use. Due
to these issues users of smart home technology devices can become victim of these password
thefts or password exploitation issue and as a result they can suffer financial theft problem.
Key arguments and recommendations
From the above analysis it has been identified that there are various kinds of security
issues that are being faced by users of smart home technology. It is important for its users to
identify ways in which these security issues make their system vulnerable. If users of this
technology do not focus upon these vulnerabilities then it can increase risk associated with their
financial information, personal information etc. and can put them at risk [2]. From the above
2
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

analysis it has been identified that two most important type of security issues to which these
devices are vulnerable to are: targeted attack and password exploitation. In order to remain
connected to each and every smart device in a proper manner, users connect all of their devices
to smart home network. Not only this many times they also save their important password to this
network and if any device has weak password then connect to smart home network can make that
password vulnerable. It is important for smart home technology users to remain aware about
these security issues. There are various recommended ways though which security from this
vulnerable security issues can be provided to users of smart home technology. Some of the main
recommended ways for safeguarding themselves from these vulnerabilities are as follows:
First method is used a strong encryption method for Wi-Fi because gaining access to WIFI is
one of the most common routes though which attackers or hackers can gain access to smart
home network [3]. By using a strong encryption method for Wi-Fi password, it will become
difficult for hackers to can access to the network or enter into smart home network because
encryption method helps in keeping network and connection both safe. Not only these users
can create a separate guest network which is not connected to smart home network or to any
other devices. This will protect any direct access to this network or to devices connected to it.
In fact, owners of smart home devices can keep a separate password for guest Wi-Fi. This
will not only protect Wi-Fi password from being exploited but it will reduce risk of hackers
entering to smart home network.
Before connecting any kind of smart device to Smart home network it is important for its
users to check their default privacy settings because many times most of the privacy settings
are useless for the owners but are useful for manufacturer and might be users by hackers or
attackers for hacking the devices or exploiting passwords. Checking privacy settings of all
the devices connected to smart home will directly help in enhancing overall security of
devices and will reduce risk of getting hacked or chances of exploring password of smart
devices or important application can be reduced. In order to make sure that all the smart
devices connected to this network are safe and secure primary settings of all the technology
or objects should be reviewed and all the unnecessary settings that are of no use should be
disabled [4]. There are variety of settings such as remote access, auto download settings auto
debit settings and many more can be changed or disabled so that overall security of the
devices or objectives can be enhanced. Not only this in this auto software update settings is
3
devices are vulnerable to are: targeted attack and password exploitation. In order to remain
connected to each and every smart device in a proper manner, users connect all of their devices
to smart home network. Not only this many times they also save their important password to this
network and if any device has weak password then connect to smart home network can make that
password vulnerable. It is important for smart home technology users to remain aware about
these security issues. There are various recommended ways though which security from this
vulnerable security issues can be provided to users of smart home technology. Some of the main
recommended ways for safeguarding themselves from these vulnerabilities are as follows:
First method is used a strong encryption method for Wi-Fi because gaining access to WIFI is
one of the most common routes though which attackers or hackers can gain access to smart
home network [3]. By using a strong encryption method for Wi-Fi password, it will become
difficult for hackers to can access to the network or enter into smart home network because
encryption method helps in keeping network and connection both safe. Not only these users
can create a separate guest network which is not connected to smart home network or to any
other devices. This will protect any direct access to this network or to devices connected to it.
In fact, owners of smart home devices can keep a separate password for guest Wi-Fi. This
will not only protect Wi-Fi password from being exploited but it will reduce risk of hackers
entering to smart home network.
Before connecting any kind of smart device to Smart home network it is important for its
users to check their default privacy settings because many times most of the privacy settings
are useless for the owners but are useful for manufacturer and might be users by hackers or
attackers for hacking the devices or exploiting passwords. Checking privacy settings of all
the devices connected to smart home will directly help in enhancing overall security of
devices and will reduce risk of getting hacked or chances of exploring password of smart
devices or important application can be reduced. In order to make sure that all the smart
devices connected to this network are safe and secure primary settings of all the technology
or objects should be reviewed and all the unnecessary settings that are of no use should be
disabled [4]. There are variety of settings such as remote access, auto download settings auto
debit settings and many more can be changed or disabled so that overall security of the
devices or objectives can be enhanced. Not only this in this auto software update settings is
3

also present that can be changed. So that users can update software from time to rime as per
their convenience.
These are some ways though which users of smart homes can enhance their network
security and safeguard themselves from such issues.
Conclusion
From the above assessment it has been concluded that there are various kinds of risk and
vulnerabilities that are associated with Smart home network. It is important for owners of these
technologies to focus upon different kinds of security issues that can directly put owners, their
personal information and financial detail at risk. There are various kinds of security ways though
which overall security of these devices and smart home network can be enhanced. It has also
been analysed that simple steps and awareness about the system or type of issues associated with
it can directly help users to increases overall security of their network and safeguard their
personal information in an appropriate manner
4
their convenience.
These are some ways though which users of smart homes can enhance their network
security and safeguard themselves from such issues.
Conclusion
From the above assessment it has been concluded that there are various kinds of risk and
vulnerabilities that are associated with Smart home network. It is important for owners of these
technologies to focus upon different kinds of security issues that can directly put owners, their
personal information and financial detail at risk. There are various kinds of security ways though
which overall security of these devices and smart home network can be enhanced. It has also
been analysed that simple steps and awareness about the system or type of issues associated with
it can directly help users to increases overall security of their network and safeguard their
personal information in an appropriate manner
4
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

REFERENCES
Books and Journals
[1] Sharma, P.K., and et. al., 2019. Shsec: sdn based secure smart home network architecture for
internet of things. Mobile Networks and Applications. 24(3). pp.913-924.
[2] Bastos, D., Shackleton, M. and El-Moussa, F., 2018. Internet of Things: A survey of
technologies and security risks in smart home and city environments.
[3] Chifor, B.C., and et. al., 2018. A security authorization scheme for smart home Internet of
Things devices. Future Generation Computer Systems. 86. pp.740-749.
[4] Rafferty, L., Iqbal, F. and Hung, P.C., 2017. A security threat analysis of smart home
network with vulnerable dynamic agents. In Computing in smart toys (pp. 127-147).
Springer, Cham.
[5] Geneiatakis, D., and et. al., 2017, May. Security and privacy issues for an IoT based smart
home. In 2017 40th International Convention on Information and Communication
Technology, Electronics and Microelectronics (MIPRO) (pp. 1292-1297). IEEE.
[6] Ali, W., and et. al., 2017, September. IoT based smart home: Security challenges, security
requirements and solutions. In 2017 23rd International Conference on Automation and
Computing (ICAC) (pp. 1-6). IEEE.
5
Books and Journals
[1] Sharma, P.K., and et. al., 2019. Shsec: sdn based secure smart home network architecture for
internet of things. Mobile Networks and Applications. 24(3). pp.913-924.
[2] Bastos, D., Shackleton, M. and El-Moussa, F., 2018. Internet of Things: A survey of
technologies and security risks in smart home and city environments.
[3] Chifor, B.C., and et. al., 2018. A security authorization scheme for smart home Internet of
Things devices. Future Generation Computer Systems. 86. pp.740-749.
[4] Rafferty, L., Iqbal, F. and Hung, P.C., 2017. A security threat analysis of smart home
network with vulnerable dynamic agents. In Computing in smart toys (pp. 127-147).
Springer, Cham.
[5] Geneiatakis, D., and et. al., 2017, May. Security and privacy issues for an IoT based smart
home. In 2017 40th International Convention on Information and Communication
Technology, Electronics and Microelectronics (MIPRO) (pp. 1292-1297). IEEE.
[6] Ali, W., and et. al., 2017, September. IoT based smart home: Security challenges, security
requirements and solutions. In 2017 23rd International Conference on Automation and
Computing (ICAC) (pp. 1-6). IEEE.
5
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.