Research Paper: Cyber Issues in Smart Home Appliances of IoT

Verified

Added on  2022/08/22

|26
|7130
|13
Report
AI Summary
This research paper investigates the cybersecurity challenges associated with smart home appliances within the Internet of Things (IoT) ecosystem. The study begins by introducing the increasing prevalence of smart home devices and the vulnerabilities they introduce, including data breaches and cyber-attacks. It highlights the core problem of securing these devices, which often handle sensitive user information. The research aims to analyze the privacy and security issues in IoT-driven smart home appliances, identifying key elements of smart home automation systems (SHAS) and the interactions between these elements. The objectives include determining the major security concerns, identifying threats related to each element, and evaluating their impact on users. The literature review explores security goals like confidentiality, integrity, and availability, along with potential attacks and security standards. The study also examines the significance of securing IoT devices, emphasizing the need for robust security solutions to protect user data. The report concludes with recommendations for enhancing smart home appliance security and mitigating identified threats.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Cyber issues in smart home appliances of IoT
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1Research Paper
Abstract
Smart home devices have gather huge attention of people in few last decades because using these
devices people increased their quality of life as well as expanded their comfort zone. Most of
these devices are handled using micro controllers and smart phones. Smart phone is used for
controlling and monitoring the home operations by utilizing the wireless communication method.
In this research study, the research explored the idea of smart home appliances with the IoT
technology and the vulnerable threats related to these devices are also discussed in this study.
The researchers embedded intelligence in actuators and sensors. The cloud technology is also
considered in the study. The main theme of this research study is to identify the vulnerable
threats in using the smart home appliances. The study comprises of three parts where the first
part is used to introduce the research subject, second part is used to analyze the research subject
and the last section of the study is used to conclude the research study.
Document Page
2Research Paper
Table of Contents
Chapter 1: Introduction........................................................................................................4
1.1 Introduction................................................................................................................4
1.2 Background of the Study...........................................................................................4
1.3 Problem Statement.....................................................................................................6
1.4 Research Aim.............................................................................................................6
1.5 Research Objectives...................................................................................................7
1.6 Research Questions....................................................................................................7
1.7 Significance of the Study...........................................................................................7
1.8 Conclusion.................................................................................................................8
Chapter 2: Literature Review...............................................................................................9
Security goals.................................................................................................................10
Possible attacks..............................................................................................................11
Security standards that are to be followed.....................................................................15
Chapter 3: Conclusion.......................................................................................................16
3.1 Conclusion...............................................................................................................16
3.2 Linking with Objectives..........................................................................................17
3.3 Recommendations....................................................................................................19
References..........................................................................................................................22
Document Page
3Research Paper
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4Research Paper
Chapter 1: Introduction
1.1 Introduction
As people are getting interconnected with each other by using various technologies, their
sensitive information are getting more vulnerable to multiple cyber security threats. The huge
prevalence of the internet connected appliances forced people to become vulnerable to data
breaches as because of multiple cyber-attacks. The modern smart technology allows people to
control devices from any location. Smart appliances are mainly concerned with the internet of
things (IoT). The latest modern technology increased the risk level for the people. This disallow
the individuals to trust on the appliances due the threat of few cyber-attacks (Weber and Studer
2016). People are always fear of the data breach while using the smart appliances in their home.
The security lag in IoT generates a misbalance among the security and the technology. The
demands of the current technology has increased in quantity which disallow numerous IoT
researchers to consider development in the usage of the technology. Thus, the complete security
layout failed to meet the meet the demands of million peoples (Diro and Chilamkurti 2018).
These system deal with huge data which comprises of numerous sensitive information of people.
These attacks can led to numerous consequences in the physical, economic and financial areas of
an individual. The security framework mainly aims in determining the future security ideas for
ensuring that that the devices are appropriately used as well as the motive of using such devices
is fulfilled (Rabai et al. 2013). With the increasing security threats the IoT security solutions
required to be developed for responding threats actively and fight against such vulnerable data
breaches.
Document Page
5Research Paper
1.2 Background of the Study
Cyberspace globally has become a threatened platform for multiple users. It is due to the
rapid technological development. This also allow cyberspace to catch the attention of individuals
globally. The technological advancement in the IoT domain also allowed the cybercriminals to
easily phish the data of the users. The weaker technologies used in smart home appliances can
easily be hacked and the information can easily be misused by outsiders. The cyberspace experts
developed various defensive strategies for mitigating the risks involved in the smart home
appliances. These strategies are developed for helping people to easily and freely handle their
smart home appliances (Komninos, Philippou and Pitsillides 2014). Their strategies disallow the
attackers to trigger their attack on the home appliances. The technological experts yet faced
difficulties to develop and implemented their strategies in the market due to the rapid technical
advancements.
IoT was started with M2M version where M2M was described as the communication
between appliances by the use a communication channel. The channels were either wired or
wireless. Then, the wireless communication practice evolved in a gigantic manner which helped
numerous users to communicate easily and effectively. In the telephony system, the data were
exchanged with the help of various end points. In recent days, M2M practice is carried out in
multiple areas like alarm panels addn industrial sector (Bangali and Shaligram 2013). Then,
M2M practice was developed as IoT. IoT is covering multiple areas of the environment which
allow the experts to expand the usages of IoT for their sole purpose as well to serve the society.
The IoT technology is transforming the whole world in its smart phase where in future people
can easily handle and manage their operations from any location.
Document Page
6Research Paper
With the emerging technologies, IoT experts are facing difficulties in decreasing the risk
of data breaches and other attacks. The attackers are using the IoT devices to phish sensitive
information of an individual. IoT implementation involves cyber security issues (Bertino and
Ferrari 2018). Attackers are already able to trigger their attack. Therefore, they are capable to
penetrate a particular system and copy the sensitive information from the system. In this modern
world, securing the IoT devices from cyber security challenges become the major priority for
multiple IoT users. Each and every devices that are connected produces huge information which
measures in zeta bytes (Kitchin 2016). The IoT experts always try to secure the data from the
source end. According to them, data should always be kept secured before transmitting it to other
ends. Therefore, strengthening their strategies is highly important in this modern and threatened
days.
1.3 Problem Statement
As mentioned earlier, the users of IoT are facing huge threats while using the smart home
appliances in their houses. The vulnerable environment of these devices are disallowing multiple
users to use the appliances in a secure way. The main motive of this research study is to
determine the vulnerabilities in using the smart home automated systems in their houses. As the
devices produces and store huge information, thus the appliances are required to be kept secured
such that the attackers cannot access those information. The advanced smart appliances
comprises of numerous components like gateways, firmware, databases, cloud computing,
middle ware and protocols (Cunha et al. 2016). The data behaviour was utilized for showing the
anomalous data link traffic and their payloads. Therefore, this research study will be based on the
vulnerabilities of the smart home appliances and their countermeasures to resist the attacks and
their effects on the individual.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7Research Paper
1.4 Research Aim
This study aims in in analyzing the privacy and security issues in handling and using the
IoT driven smart home appliances. The study focused on various vulnerable threats in using
smart home appliances also the study provides countermeasures to fight against the identified
threats to disallow the attackers from triggering their attacks and stealing the sensitive
information of the users.
1.5 Research Objectives
The objectives of conducting this research are mentioned below:
ï‚· To analyze the key elements of SHAS (Smart Home Automation Systems) and also to
know the method of interaction among those elements.
ï‚· To determine the major factors involving the privacy and security concerns of SHAS.
ï‚· To determine the vulnerable threats related to each of the key element of SHAS.
ï‚· To produce a fault tree diagram to analyze the effectiveness of the identified threats on
multiple SHAS users.
1.6 Research Questions
The investigators produced research questions for achieving the aim of the research.
Therefore, the research questions for this research study are declared below:
ï‚· What are the key elements of SHAS and how they interact with each other?
ï‚· What are the major factors affecting the privacy and security of SHAS?
ï‚· What are the threats involving in each of the key element of SHAS?
ï‚· How the identified threats effect the users of SHAS?
Document Page
8Research Paper
1.7 Significance of the Study
This research study plays an important role in this modern world. The research will help
multiple users to secure and handle their smart home devices in an appropriate manner. Smart
home and IoT can provide multiple benefits from the wide range of functionalities and resources
of cloud computing for compensating the limitations in communication, storage, processing and
recovery. The IoT technology and smart home mainly aims at data collection, processing and
transmission from and to the cloud. Cloud can be made private to secure the data and to cope up
the security challenges in using the smart home devices. A computing operation can be executed
either on the smart devices or can be outsourced to cloud (Khalil, Khreishah and Azeem 2014).
The compensations can be carried out in various areas like data availability, overhead tradeoffs,
data transportation, data dependency and other security considerations. The triple computing
model allow the experts to reduce the cost for the users by mixing all three technologies.
Therefore, this research study will help the readers in determining the vulnerable threats involved
with their devices and will allow the users to secure their data from external environment.
1.8 Conclusion
Therefore, from this particular chapter the readers are came to know the purpose of this
research study. This chapter declared the key aims and objectives of the research study. This
chapter portrays the layout of the research study and the purpose to be served by each layout.
The next chapter of this study is literature review section where various literatures will be
reviewed to analyze the research subject in logical and detail way.
Document Page
9Research Paper
Chapter 2: Literature Review
According to Lin and Bergmann (2016), the major technology that are to be considered in
the building process of the smart house is Internet of Things. The components of IOT have been
acting as the building blocks of smart home. However, it have been seen that with increase in the
usage of IOT, the complexity of the architecture have been increasing and hence there have been
a rise in the security issues. It can be stated that the security threats that are imposed in the
operational process in smart home is a result of the compromises that are made in security goals.
The security objectives that are to be considered includes the likes of maintaining confidentiality.
In this process, the main aspect that is to be considered is that data that will be generated in
performing the regular activities need not be disclosed without proper authorization and
authentication. Maintaining integrity have been another aspect that is to be considered in the
operational process. It is stated that a smart system is accessed over wireless networks. Inserting
of malignant software have been one of the major security issue that is to be considered. In case
integrity is absent in the process, the entire smart home might be getting affected. Due to the
absence of integrity, the entire functional process might fail (Lin and Bergmann 2016).
Availability of data in a secured manner is another aspect that is to be considered. It can be stated
that the receiving and sending of data have been acting important in the processing of smart
homes. Another security objective that is to be considered in the process is the authority of the
source that have been trying to gain access to the data sets that are generated. It have been
observed that in case authenticity of source is not maintained, attackers can insert derived
module or can insert a malignant code in the network. This aspect might be affecting the smart
home service and the environment (Mendel 2017). Authorization have been also one of the
major aspect that is to be considered. Maintaining access rights have been another important
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10Research Paper
factor that is considered under the security objectives. Maintaining non repudiation have been
another aspect that can be considered.
2.1 Security goals
Again according to Ali, Dustgeer, Awais and Shah (2017), these are the security
goals that are to be maintained in order to prevent any kind of cyber security issues. The threats
that are present in the process can be diverged in 2 sections. The sections are namely passive
attack and active attack. This proposing of passive attack deals about fetching of data that are
present in the system and not directly affecting the system itself. The main aspect that is
considered in the process is that in this case data is collected in order to analyze the same and not
to modulate. Eavesdropping and traffic analysis are the major techniques that are performed in
the process. Unauthorized data interception have been another aspect that is to be considered
(Pandey et al 2019). This process is used in order to get into the communication process in order
to propose consent in the data transaction. Traffic analysis is focused on subtler. It is considered
as one of the major aspect that includes better analysis of the traffic pattern is considered. This
patter analysis helps in gathering information. These attacks are not performed as they do not
have the potential to alter data that are being transacted. However, detecting these attacks are
difficult and hence taking proper steps for preventing these attacks are considered to be
important. The second category of attack is active attack.
In this process, altering the system information have been the main focus. Altering
system resources have been another aspect that is considered. The attacks that fall under the
heading of active attacks are namely masquerading, message modification, replay, malicious
software introduction and denial of service have been the major attacks that are imposed
(Sivanathan et al 2017). Masquerading attack is completely based on proposing of intruders
Document Page
11Research Paper
trying to become the legitimate entity and hence this will be resulting in false gaining of
privilege for gaining access to the data sets. Replay is another attack that gains access to the data
in a passive manner and retransmit the same and provide an unauthorized effect. Message
modification deals with alteration of the message that is being transacted. Delaying of the
message that is being sent or reordering of the system have been another issue that is to be
considered. Denial of Service attack have been another issue that is to be considered in the
process (Menon et al 2019). Suspending availability of the communication resources have been
the main focus of Denial of Service attack. The malicious attacks are mainly focused on
exploiting of the vulnerabilities for stealing information.
2.2 Possible attacks
Again according to Zhou, Liu and Hu (2017), other major attacks that are to be conspired
in the process are namely the attacks that are imposed on wireless sensor network that includes
Sybil attack, sinkhole attack, ID Cloning attack and Selective forwarding attack. Wormhole
attack is also considered in the process. This is one of the major threat that is present operational
process of smart homes.
As per Do, Martini and Choo (2018), in smart homes there are presence of sensors in
order to gather information from the environment. Presence of sensors in wearable devices have
been the major reason of proper functionality in smart homes are maintained. However, it have
been identified that IOT is highly prone to Sybil attack.
Saxena, Sodhi and Singh, (2017), stated that in case of Sybil attack, the reports that are
generated during the operational process are wrong and hence the IOT based functioning’s will
be inaccurate. The Sybil attack not only lead to spreading of spam but also instigates introduction
of malware in the operating process. Thus it may lead to stealing of information and hence this
Document Page
12Research Paper
will be affecting the functional ethics. There are 3 major types of Sybil attacks. The attacks are
namely SA-1 Sybil Attack, SA-2 Sybil Attack and SA-3 Sybil Attack. In case of SA-1 Sybil
Attack, the main aspect that is considered is that SA-1 attackers build a connection in between
them. Sybil nodes are properly connected with themselves. It can be started that the connection
in between the Sybil nodes and the honest nodes are limited in nature. Proper sensing of the
domain and the social domain have been considered as one of the main factor that have been
enhancing the connection of the domain along with the special domains (Do, Martini and Choo
2018). The SA-1 attackers have been creating entities and hence wise this ensures creation of
normal users can be created. In case of SA-2 Sybil Attack, the attackers are found to be present
in social connection. Mimicking of the normal users have been one of the main target for the SA-
2 Sybil attack. This section ensures that the number of attack edges that are present are huge.
This have been leading to violation of the user’s privacy. Purposefully spreading of spams have
been another issue that have been faced in the process. Again in case of the SA-3 Sybil attack,
the attack is imposed in the local area and the goal of this Sybil attack is similar to that of the
SA-2 Sybil attack (Karimi and Krit 2019). These are the type of Sybil attacks that will be
harming the entire process. This is one of the major reason that functional process of Smart
homes that uses the platform of IOT. However proper detection of the Sybil Attacks are
important in the process. In this process, analyzing of the number of edges that are visible are
also considered in this section. Pre computed random permutation is also performed in this
section for predicting the attacking point. The algorithms that are considered in the process are
namely random walk that is performed by each and every node. Usage of multiple random walk
algorithm can also be used, Bayesian interference on the result on the result of random walk
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
13Research Paper
algorithm is also used for prevention of this issue. Mimicking process have been affecting the
identity of the people residing the smart homes.
Again according to Sisodia, Mergendahl, Li and Cam (2018), Sinkhole attack have been
getting implemented in the network layers. This section ensures the fact that the adversary tries
to attract several traffics that have been preventing base stations from receiving proper sensing of
the data from respective nodes. In this attacking process the nodes are considered as the attacking
points. This point will ensure that there will be processing of the entry of attacking points.
Sinkhole attacks have been leading to the prevention of the proper data collection by the system
and hence improper actions are taken. In this attack the packets of information have been leading
to wrong address and hence this affects the data transaction process (Stojkoska and Trivodaliev
2017). There are certain techniques that are used for detection of the sinkhole attack. They are
namely extending of the IDS as it is capable of detecting the Sinkhole attack. Usage of Received
Signal Strength Indicator have been another aspect that will be providing proper assessment of
the incoming traffic and this will be beneficial in detecting the sinkhole attack. However, there
are certain issues that are present in the operational process. Proposing communication pattern in
WSN have been another issue that is detected. The sinkhole attacks normally occurs when there
is a compromised node sending fake routing information. This sending of fake routing
information will be leading to higher challenges in the communication process. Another issue
that can be considered in the process is that the entire attack is unpredictable in nature. Hence
prediction process gets difficult and preventing this attack also fails. Another issue present is that
there are 2 kind of attacks. The attacks are namely insider attack and the outsider attack. The
outside attack is based on the fact that the intruder is not based on the network. Again in case of
inside attack one of the main aspect that is considered in the process is that the intruder is present
Document Page
14Research Paper
in the system itself. This have been affecting the operational process. Hence in case of smart
home the data that are collected and analyzed for performing automation have been providing
improper understanding of the operational process. Data breach will be affecting the privacy of
the people residing in the smart home.
Xu, Sgandurra, Mayes, Li and Wang (2017), stated that ID Cloning have been affecting
the security system of the people residing in smart home. It have been seen that there have been
seen that the banking details. In this process of ID cloning, the main aspect that is present is that
the data breaching might take place. Due to ID cloning, card information might be stolen.
Software and electronic devices that are present in the operational process can be stolen and
hence wise this will be proposing identity theft issues. Due to ID cloning, the physical devices
are not required, data can be collected either wise (Pacheco and Hariri 2016). This have been
affecting the entire process. The information that are present in the magnetic strips that are
present in the encrypted process will ensure that gathering data will be getting easier. Once the
encrypted data is gathered, the entire data can be transferred on the magnetic strips of another
card and this will be affecting the security process.
Again according to Hariri, Giannelos and Arief (2019), In case of the selective
forwarding attack, the main aspect that is considered in the process is that attacker participates in
the routing process and performs the same in a normal node. This process ensures selective
discarding of the packets that are present in the neighboring node. Forwarding of the non critical
data in a normal manner. This will be damaging WSN security process. There are several
schemes that are to be considered in a manner without detection of SFA (Ali et al 2017). The
detector node is incapable of capturing the forward data. Hence this is the scene when the node is
considered to be malicious in nature. With the help of extensive simulation, the main aspect that
Document Page
15Research Paper
is considered is that there have been an increase in the misbehaving nodes. The average
throughput of the network have been reducing. This is one of the major aspect that is to be
considered. This section ensures that the data that are generated in the functional process of the
smart homes have been affecting the security system. This section ensures the fact that the smart
home residents will be getting affected.
Benzarti, Triki and Korbaa (2017), stated that Wormhole attack have been a major issue
that is considered in the operational process. It can be stated that 2 attackers keep a look on the
network. This ensures that proper understanding of the wireless information can be received.
This is one of the major aspect that can be considered. Strategic positioning of the network is
considered in this process as well. The main aspect that can be considered in the process is that
location of the residents of the people can be understood and this understanding have been acting
as a data breach process. This will be affecting the entire cyber security process.
Again as per Shouran, Ashari and Priyambodo (2019), Mirai is a malware that is being
used in the operating process. This is one of the major aspect that can be considered. This section
ensures that networked devices that have been using the platform of bots, can be used for botnet
attacks. The home routers have been the major target of the Mirai botnet. The devices that are
affected in the process are namely the IOT based products. This is one of the major reason that
proper assessment of the bandwidth can be made. In case of the introduction of the Mirai botnet,
the main aspect that is to be considered is that the device stays infected until rebooting of the
devices are done. This includes the fact that once a CCTV camera is infected with the Mirai
botnet, the entire data that will be collected via the CCTV will be accessed by the attacker and
this will be leading to security breach of the persons living in the smart home.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
16Research Paper
2.3 Security standards that are to be followed
According to Chifor, Arseni, Matei and Bica (2019), Security standards that are to be
implemented in the operational process of IOT devices that are present in smart home includes
proper naming of the router. It have been observed that with the help of the name that is provided
by the manufacturer, it gets easier for the attacker to understand the model of the router and
hence wise it gets easier for the attacker to understand the architecture of the router that is being
used in the process. Personal identifiers might also be retrieved with the help of name of the
default router name. Another aspect that is considered in the process is that strong encryption
method is to be implemented. In this case a proper and strong encryption method like WPA 2
might be used. This will be helping in reducing the chances of reducing the decryption chances.
Another technique that can be used in the process is that a guest network is needed to be set up
(Ghirardello et al 2018). This setting up of the guest network will ensure that third parties can
log in other accounts and will not be clashing with the network that have been operating in the
IOT based devices. Updating of software also plays a vital role in the process. With updated
cyber security the main aspect that is considered is that the data that are present in the
operational process will be enhancing the security process.
Chapter 3: Conclusion
3.1 Conclusion
Therefore, smart home devices are observed as next stage of evolution in computing
domain. Beside owing the reliance on the platforms and integrating the devices with effective
communication protocols the smart home ecosystem are developed by the cloud to make them
reliable for using on the daily basis. In SHAS, resident is safer because of the on demand
communication for local emergency responders. This study offered a qualitative exploratory
Document Page
17Research Paper
research for analyzing the vulnerabilities associated with the smart home appliances within the
typical uses of the IoT devices. The literature review section covered all possible areas of the
research topic. Through those literatures, it can be said that the IoT technology face deficiency in
covering and fighting against multiple vulnerable threats. These threats are required to be
handled as soon as possible because the IoT devices are developing day by day which increases
its popularity globally. The attackers or the hackers are using the IoT devices to steal the
sensitive information of the users. This is increasing the risk for the users to use the devices
safely. On the basis of the literatures, IoT driven home appliances can be observed as a single
computer system with respect its architecture. Moreover, the IoT environment is more
comparable as compared to ICT environment which is positive impact for the device power. IoT
environment require a life – cycle management approach starting from development to the
production phase. Another important factor of SHMS is the use and application of the user
management where the authorized users will be allowed to access the device else the
unauthorized user will not be permitted to use the device as well as to use the data of the device.
An overview of the security problems is discussed in the paper to aware the users regarding the
malicious act of the attackers. IoT faces multiple threats which can be recognized and mitigated
by implementing the discussed countermeasures.
3.2 Linking with Objectives
Objective 1: To analyze the key elements of SHAS (Smart Home Automation Systems) and
also to know the method of interaction among those elements.
The key elements of SHAS was determined by reviewing the literatures which helped the
investigators to determine all the key areas and the key element of the Smart Home Automation
Document Page
18Research Paper
Systems. The literatures also helped the investigators to know the interaction method of these
elements. Each and every element of SHAS was analyzed in detail.
Objective 2: To determine the major factors involving the privacy and security concerns of
SHAS.
The vulnerable threats are identified from the fault tree analysis. The fault tree diagram helped
the investigators to analyze the security and privacy factors of SHAS. These factors were
displayed in the fault tree diagram. Through the literatures, the privacy and security factors are
identified and countermeasures are also drawn to mitigate the attacks and their effects. These
factors were shown such that the users of the smart home appliances can strengthen the security
of their devices. The sensitive information that are vulnerable for the users are also identified
such that the users can secure those data from the outside environment.
Objective 3: To determine the vulnerable threats related to each of the key element of SHAS.
Initially all the key elements of SHAS is identified and then they are analyzed with high detail.
This allow the investigators to determine the effective threats relative for every element of
SHAS. The investigators are able to recognize the privacy and security threats related to each
key element of SHAS. The fault tree diagram covered all the key areas of the SHAS which
showed the privacy and security. The fault tree diagram and the relevant literature allowed the
investigators to determine threats related to every component of the SHAS.
Objective 4: To produce a fault tree diagram to analyze the effectiveness of the identified
threats on multiple SHAS users.
The effectiveness of the threats and the attacks is measured using the fault tree diagram. Few
literatures also helped the investigators to know the effect of these attacks. The effect is
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
19Research Paper
measured by the continuous analysis of the literatures and the fault tree diagram. The effect of
the attacks on the users of the smart home devices are also portrayed in various literatures. The
literatures also commented on the effectiveness of the attacks on them.
3.3 Recommendations
Recommendation 1: To strengthen the cyber security measures of smart home appliances.
SMART JUSTIFICATION
S-Specific The IoT researchers require to develop few security measures to
strengthen the cyber security measures to handle and use the IoT
driven smart home appliances.
M-Measurable If the security are develop then the users can disallow the attackers
from triggering their attacks on their smart devices. This can be
measured when by decreasing the rate of data breach uniformly.
A-Achievable If the cyber security measures are developed then the user can
achieve the key aim and objective of using the device.
R-Relative This is a relevant recommendation for the users as this can allow
them to use their system securely.
T-Timely According to the researchers, it can consume high time for the IoT
experts to strengthen and develop the security measures of the smart
home devices.
Recommendation 2: To aware people regarding the cyber security threats related with the IoT
driven smart home appliances.
SMART JUSTIFICATION
S-Specific Informing people regarding various attacks and threats related to their
system is specific. This will allow the users to know the importance
of their devices and will also help them to implement security
measures to secure their devices.
M-Measurable If the security are develop then the users can disallow the attackers
from triggering their attacks on their smart devices. This can be
measured when by decreasing the rate of data breach uniformly.
Document Page
20Research Paper
A-Achievable If people are aware of the threats and attack they can secure their
sensitive information from the external environment.
R-Relative This is a relevant recommendation for the users as this can allow
them to use their system securely.
T-Timely People can easily be informed regarding the potential risk of their
devices.
Document Page
21Research Paper
Recommendation 3: To develop the appliances with respect to the architecture and the security
concerns.
SMART JUSTIFICATION
S-Specific The IoT developers are recommended to develop their architecture
such that it become user friendly to use and implement the system
effectively.
M-Measurable Development in the IoT architecture will majorly disallow numerous
attackers to trigger the attack.
A-Achievable Developing the technology can allow the users to achieve all their
project aims and objectives.
R-Relative This is a relevant recommendation for the researchers as this can
allow them to develop the system in a secure manner.
T-Timely This can also consume high time for the experts to develop the whole
architecture of IoT driven smart home appliances.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
22Research Paper
References
Ali, W., Dustgeer, G., Awais, M. and Shah, M.A., 2017, September. IoT based smart home:
Security challenges, security requirements and solutions. In 2017 23rd International Conference
on Automation and Computing (ICAC) (pp. 1-6). IEEE.
Ali, W., Dustgeer, G., Awais, M. and Shah, M.A., 2017, September. IoT based smart home:
Security challenges, security requirements and solutions. In 2017 23rd International Conference
on Automation and Computing (ICAC) (pp. 1-6). IEEE.
Bangali, J. and Shaligram, A., 2013. Design and Implementation of Security Systems for Smart
Home based on GSM technology. International Journal of Smart Home, 7(6), pp.201-208.
Benzarti, S., Triki, B. and Korbaa, O., 2017, May. A survey on attacks in Internet of Things
based networks. In 2017 International Conference on Engineering & MIS (ICEMIS) (pp. 1-7).
IEEE.
Bertino, E. and Ferrari, E., 2018. Big data security and privacy. In A Comprehensive Guide
Through the Italian Database Research Over the Last 25 Years (pp. 425-439). Springer, Cham.
Chifor, B.C., Arseni, S.C., Matei, I. and Bica, I., 2019, May. Security-Oriented Framework for
Internet of Things Smart-Home Applications. In 2019 22nd International Conference on Control
Systems and Computer Science (CSCS) (pp. 146-153). IEEE.
Cunha, F., Villas, L., Boukerche, A., Maia, G., Viana, A., Mini, R.A. and Loureiro, A.A., 2016.
Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Networks, 44,
pp.90-103.
Document Page
23Research Paper
Diro, A.A. and Chilamkurti, N., 2018. Distributed attack detection scheme using deep learning
approach for Internet of Things. Future Generation Computer Systems, 82, pp.761-768.
Do, Q., Martini, B. and Choo, K.K.R., 2018. Cyber-physical systems information gathering: A
smart home case study. Computer Networks, 138, pp.1-12.
Do, Q., Martini, B. and Choo, K.K.R., 2018. Cyber-physical systems information gathering: A
smart home case study. Computer Networks, 138, pp.1-12.
Ghirardello, K., Maple, C., Ng, D. and Kearney, P., 2018. Cyber security of smart homes:
Development of a reference architecture for attack surface analysis.
Hariri, A., Giannelos, N. and Arief, B., 2019. Selective Forwarding Attack on IoT Home
Security Kits.
Karimi, K. and Krit, S., 2019, July. Smart home-Smartphone Systems: Threats, Security
Requirements and Open research Challenges. In 2019 International Conference of Computer
Science and Renewable Energies (ICCSRE) (pp. 1-5). IEEE.
Khalil, I.M., Khreishah, A. and Azeem, M., 2014. Cloud computing security: A
survey. Computers, 3(1), pp.1-35.
Kitchin, R., 2016. Getting smarter about smart cities: Improving data privacy and data security.
Komninos, N., Philippou, E. and Pitsillides, A., 2014. Survey in smart grid and smart home
security: Issues, challenges and countermeasures. IEEE Communications Surveys &
Tutorials, 16(4), pp.1933-1954.
Lin, H. and Bergmann, N.W., 2016. IoT privacy and security challenges for smart home
environments. Information, 7(3), p.44.
Document Page
24Research Paper
Mendel, J., 2017. Smart grid cyber security challenges: Overview and classification. e-
mentor, 68(1), pp.55-66.
Menon, V.D., Kumar, J.T., Sabhanayagan, M., Ramkumar, A. and Rajesh, K., 2019, April.
Cyber Security for Smart Meters. In 2019 IEEE International Conference on Intelligent
Techniques in Control, Optimization and Signal Processing (INCOS) (pp. 1-5). IEEE.
Pacheco, J. and Hariri, S., 2016, September. IoT security framework for smart cyber
infrastructures. In 2016 IEEE 1st International Workshops on Foundations and Applications of
Self* Systems (FAS* W) (pp. 242-247). IEEE.
Pandey, P., Collen, A., Nijdam, N., Anagnostopoulos, M., Katsikas, S. and Konstantas, D., 2019,
July. Towards automated threat based risk assessment for cyber security in smart homes.
In Proceedings of the 18th European Conference on Cyber Warfare and Security (ECCWS
2019), Coimbra, Portugal (pp. 4-5).
Piasecki, S., Urquhart, L. and McAuley, D., 2019. Defence Against Dark Artefacts: An Analysis
of the Assumptions Underpinning Smart Home Cybersecurity Standards. Available at SSRN
3463799.
Rabai, L.B.A., Jouini, M., Aissa, A.B. and Mili, A., 2013. A cybersecurity model in cloud
computing environments. Journal of King Saud University-Computer and Information
Sciences, 25(1), pp.63-75.
Saxena, U., Sodhi, J.S. and Singh, Y., 2017, January. Analysis of security attacks in a smart
home networks. In 2017 7th International Conference on Cloud Computing, Data Science &
Engineering-Confluence (pp. 431-436). IEEE.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
25Research Paper
Shouran, Z., Ashari, A. and Priyambodo, T.K., 2019. Internet of things (IoT) of smart home:
privacy and security. International Journal of Computer Applications, 182(39), pp.3-8.
Sisodia, D., Mergendahl, S., Li, J. and Cam, H., 2018, August. Securing the smart home via a
two-mode security framework. In International Conference on Security and Privacy in
Communication Systems (pp. 22-42). Springer, Cham.
Sivanathan, A., Loi, F., Gharakheili, H.H. and Sivaraman, V., 2017, December. Experimental
evaluation of cybersecurity threats to the smart-home. In 2017 IEEE International Conference
on Advanced Networks and Telecommunications Systems (ANTS) (pp. 1-6). IEEE.
Stojkoska, B.L.R. and Trivodaliev, K.V., 2017. A review of Internet of Things for smart home:
Challenges and solutions. Journal of Cleaner Production, 140, pp.1454-1464.
Weber, R.H. and Studer, E., 2016. Cybersecurity in the Internet of Things: Legal
aspects. Computer Law & Security Review, 32(5), pp.715-728.
Xu, H., Sgandurra, D., Mayes, K., Li, P. and Wang, R., 2017, December. Analysing the
resilience of the internet of things against physical and proximity attacks. In International
Conference on Security, Privacy and Anonymity in Computation, Communication and
Storage (pp. 291-301). Springer, Cham.
Zhou, Y., Liu, Y. and Hu, S., 2017. Smart home cyberattack detection framework for sponsor
incentive attacks. IEEE Transactions on Smart Grid, 10(2), pp.1916-1927.
chevron_up_icon
1 out of 26
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]