A Report on Security Mechanisms for Internet of Things in Smart Homes
VerifiedAdded on  2020/10/05
|8
|1847
|445
Report
AI Summary
This report delves into the critical domain of IoT security within smart home environments. It begins by establishing the rationale for addressing vulnerabilities in these interconnected systems, highlighting the increasing risks posed by cyber threats and the need for robust security measures. The report reviews existing literature on smart home security, focusing on the challenges related to data privacy, unauthorized access, and the potential for attackers to exploit connected devices. The methodology section proposes a threat-based approach, including the use of Microsoft's security development lifecycle and smart grid methodologies, to analyze and mitigate risks. The report discusses various security mechanisms, such as encryption and authentication, and their role in safeguarding data and devices. The conclusion emphasizes the importance of continuous security improvements and the adoption of effective strategies to protect smart homes from evolving cyber threats.

Security Mechanism for Internet of
Things Vulnerabilities focus on Smart
Home
Things Vulnerabilities focus on Smart
Home
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Table of Contents
RATIONALE...................................................................................................................................3
OBJECTIVES..................................................................................................................................3
LITERATURE REVIEW................................................................................................................4
METHODOLOGY..........................................................................................................................6
CONCLUSION................................................................................................................................7
REFERENCE ..................................................................................................................................8
RATIONALE...................................................................................................................................3
OBJECTIVES..................................................................................................................................3
LITERATURE REVIEW................................................................................................................4
METHODOLOGY..........................................................................................................................6
CONCLUSION................................................................................................................................7
REFERENCE ..................................................................................................................................8

RATIONALE
Internet of things is to be consider as the main problem in the homes which required to domain
applications with proposed the specific solution related for the development. It is required for
manage the infrastructure and IoT devices to provide the security and safety related the attackers.
According to cyber based, it is quite challenges for secure or manage the overall performance of
homes. Internet of things is considered as single problem in the domain that applied the different
types of applications. It is important of internet of things which mainly focus on the smart home
because cybercriminal accesses the data on network through the IoT devices. It is the interesting
topic that concern about to protect their data and information through the attacker because
attackers damage the personal details of users in the smart homes. All the smart devices are
connected to the network that's why, it is easy for attacker to access the information in effective
manner (Alaa and et.al. 2017). Furthermore, Security and privacy needed for the critical analysis
engineering infrastructure and other sensitive commercial operations or function various need for
the smart home environment. It also includes resources that implements as security and privacy.
In domestic place or home. There are human issues occur related the technical problems after
analysing, it also identified that internet of things is main existing solution to understand the need
and requirement of smart home.
OBJECTIVES
Internet of things is gained popularity in the last few years and it also connects with the non-
traditional devices such as medical equipment, factory machinery and other domestic appliances
etc. The main objective to increase the efficiency and speed of appliances that provide the best
services. Smart home environment used the microprocessor based controller in the different
applications like toasters in the airliners and it is becoming ubiquitous. Security challenges are
major issues so that proposed the specific problem such as hacking. There many ways to keep
secure their data and information in proper manner. User can protect against the security issue by
using the authentication factor such as security key or one time password received in the phone
call and messages ( Razzaq and et.al., 2017). There are various areas to need for further work.
This proposal can summarized into the existing technique that used for secure the smart homes
and presented the areas where further work needed for providing the safety, security and privacy.
Internet of things is to be consider as the main problem in the homes which required to domain
applications with proposed the specific solution related for the development. It is required for
manage the infrastructure and IoT devices to provide the security and safety related the attackers.
According to cyber based, it is quite challenges for secure or manage the overall performance of
homes. Internet of things is considered as single problem in the domain that applied the different
types of applications. It is important of internet of things which mainly focus on the smart home
because cybercriminal accesses the data on network through the IoT devices. It is the interesting
topic that concern about to protect their data and information through the attacker because
attackers damage the personal details of users in the smart homes. All the smart devices are
connected to the network that's why, it is easy for attacker to access the information in effective
manner (Alaa and et.al. 2017). Furthermore, Security and privacy needed for the critical analysis
engineering infrastructure and other sensitive commercial operations or function various need for
the smart home environment. It also includes resources that implements as security and privacy.
In domestic place or home. There are human issues occur related the technical problems after
analysing, it also identified that internet of things is main existing solution to understand the need
and requirement of smart home.
OBJECTIVES
Internet of things is gained popularity in the last few years and it also connects with the non-
traditional devices such as medical equipment, factory machinery and other domestic appliances
etc. The main objective to increase the efficiency and speed of appliances that provide the best
services. Smart home environment used the microprocessor based controller in the different
applications like toasters in the airliners and it is becoming ubiquitous. Security challenges are
major issues so that proposed the specific problem such as hacking. There many ways to keep
secure their data and information in proper manner. User can protect against the security issue by
using the authentication factor such as security key or one time password received in the phone
call and messages ( Razzaq and et.al., 2017). There are various areas to need for further work.
This proposal can summarized into the existing technique that used for secure the smart homes
and presented the areas where further work needed for providing the safety, security and privacy.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

All the necessary things can be maintain by the appliance in the Smart Homes. It is beneficial for
home environment to use the better resources to reduce the lack of facilities that's why, internet
of things provided the facility related the security and privacy. Many applications and software
useful for identifying the threats in the system and automatic update system software applicable
which is required for maintain the secure operations and functions of appliances that used in the
homes. Smart home environment is one of the common exciting factors that comes with the help
for internet of thing. It can provide for developer to implement the high security in entire
devices. In this way, it easily massive benefits of user through technologies without exploiting
from hackers and unauthorized access.
LITERATURE REVIEW
According to Geneiatakis and et.al., 2017. Smart devices are generally connected with the
other electronic device through the high speed for transmitting signals. Internet of things is
basically used for the purpose of communication and easily access the website in proper manner.
Security is the main concept which help for protecting the data in effective manner. Robust
security mechanism is the important in the home to provide the better quality security in their
appliance. Many electric devices are used for managing the entire task in effective manner. Users
need to protect their own information from the other attackers and competitors. Security is the
main aspects for protecting towards the unauthorized access and excessive amount of used.
Many hackers monitor to the people activities by using webcams and it is necessary to secure or
protect the smart home device in proper manner. Sometimes, cyber criminals access the data on
the smart devices and figure out. Hacker gets the network with the help of internet of things
device. As per Mosenia and Jha, 2017. Smart home environment is implements different
integrated multiple internet of thing devices that collecting all process and exchange the data
from one node to another. In home devices, there are various number of security threats
generated either from attackers inside the home network. This type of threats impact on the
personal data which required for used the security aspects related to the technologies. It is based
on the emerging domain whereas all the liabilities cannot define in proper manner that's why, it
becomes more important to develop or adopted security measurement for preventing to cyber
threats.
home environment to use the better resources to reduce the lack of facilities that's why, internet
of things provided the facility related the security and privacy. Many applications and software
useful for identifying the threats in the system and automatic update system software applicable
which is required for maintain the secure operations and functions of appliances that used in the
homes. Smart home environment is one of the common exciting factors that comes with the help
for internet of thing. It can provide for developer to implement the high security in entire
devices. In this way, it easily massive benefits of user through technologies without exploiting
from hackers and unauthorized access.
LITERATURE REVIEW
According to Geneiatakis and et.al., 2017. Smart devices are generally connected with the
other electronic device through the high speed for transmitting signals. Internet of things is
basically used for the purpose of communication and easily access the website in proper manner.
Security is the main concept which help for protecting the data in effective manner. Robust
security mechanism is the important in the home to provide the better quality security in their
appliance. Many electric devices are used for managing the entire task in effective manner. Users
need to protect their own information from the other attackers and competitors. Security is the
main aspects for protecting towards the unauthorized access and excessive amount of used.
Many hackers monitor to the people activities by using webcams and it is necessary to secure or
protect the smart home device in proper manner. Sometimes, cyber criminals access the data on
the smart devices and figure out. Hacker gets the network with the help of internet of things
device. As per Mosenia and Jha, 2017. Smart home environment is implements different
integrated multiple internet of thing devices that collecting all process and exchange the data
from one node to another. In home devices, there are various number of security threats
generated either from attackers inside the home network. This type of threats impact on the
personal data which required for used the security aspects related to the technologies. It is based
on the emerging domain whereas all the liabilities cannot define in proper manner that's why, it
becomes more important to develop or adopted security measurement for preventing to cyber
threats.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

According to Alharbi and Aspinall, 2018. Security issue is basically of communicating
the objects in the smart homes. It is automatic process to research on the cryptography services
in low cost. The domain of smart home used by the cryptography techniques whereas all the new
protocols are proposed in the small devices. As per author views, The security and privacy issue
in the internet of things is based on the technical component such as ID management, encryption,
decryption and authentication etc. It concluded that mechanism has been developed that remove
all the problems and issues that arise in the internet of things.
According to Mouratidis and Diamantopoulou, 2018. Mobile devices are connected with
the network and perform different task in the smart home. It is needed for home security to
increase the privacy. These devices applicable to provide security and also associated with the
overall functionality of system in effective manner. For analysing the risk in the system which
essential for proper planning an effective strategy for securing the internal mechanism of
network system. In the smart home, there are different types of applications, devices or people
collaborate with each other. They also planning to remove all the threats and provide security
and privacy.
METHODOLOGY
As per research, it can propose to analyse the threats based approach and strategies for
providing the security and privacy in the smart home environment. Microsoft security
development life cycle is the better application that applicable in the smart home to analyse the
risk at every stage of security development life cycle. This application is mainly focused on
towards the system analysis. Smart grid is new concept that can design for implementing the
technique in the network system and also provide the information regarding the threat's analysis
in the system. This methodology is applicable to provide the description of threats which is main
issue in the smart homes. In this way, it can be listed the various security issues at every level of
network.
A structure methodology of smart grid to analyse the threats and unwanted software,
messages or link etc. there are followings steps for smart grid structured based methodology in
effective manner. Firstly, it can describe the smart home pattern where all the elements are
labelled according to the categorise. Another ways, it easily identifies the different threats that
manage the personal information of users (Mouratidis and Diamantopoulou, 2018). Life cycle
the objects in the smart homes. It is automatic process to research on the cryptography services
in low cost. The domain of smart home used by the cryptography techniques whereas all the new
protocols are proposed in the small devices. As per author views, The security and privacy issue
in the internet of things is based on the technical component such as ID management, encryption,
decryption and authentication etc. It concluded that mechanism has been developed that remove
all the problems and issues that arise in the internet of things.
According to Mouratidis and Diamantopoulou, 2018. Mobile devices are connected with
the network and perform different task in the smart home. It is needed for home security to
increase the privacy. These devices applicable to provide security and also associated with the
overall functionality of system in effective manner. For analysing the risk in the system which
essential for proper planning an effective strategy for securing the internal mechanism of
network system. In the smart home, there are different types of applications, devices or people
collaborate with each other. They also planning to remove all the threats and provide security
and privacy.
METHODOLOGY
As per research, it can propose to analyse the threats based approach and strategies for
providing the security and privacy in the smart home environment. Microsoft security
development life cycle is the better application that applicable in the smart home to analyse the
risk at every stage of security development life cycle. This application is mainly focused on
towards the system analysis. Smart grid is new concept that can design for implementing the
technique in the network system and also provide the information regarding the threat's analysis
in the system. This methodology is applicable to provide the description of threats which is main
issue in the smart homes. In this way, it can be listed the various security issues at every level of
network.
A structure methodology of smart grid to analyse the threats and unwanted software,
messages or link etc. there are followings steps for smart grid structured based methodology in
effective manner. Firstly, it can describe the smart home pattern where all the elements are
labelled according to the categorise. Another ways, it easily identifies the different threats that
manage the personal information of users (Mouratidis and Diamantopoulou, 2018). Life cycle

follows some specific criteria that implement the different action therefore, all unwanted threats
and viruses remove them. Afterwards, it proposed the data flow diagram that help for refine all
the technical details in smart home. This is the best concept that arrange all the detail's step by
step process. It is targeting the network system which is important to use the specified domain by
using Internet protocol. It will fix some code of address and cannot broke the security terms.
Many users can use the encryption and decryption algorithm that provide the highly security
because this technique is used the encrypted code for security. It is difficult for attackers to broke
the passwords and codes. These are effective technique which useful for managing the security
operations and their functions in effective ways.
CONCLUSION
As per discuss, it concluded that security and privacy is important factor in the internet of things
for smart homes. It also used the different methodology such as encryption, cryptography and
structure smart grid provide the facilities to manage their data or entire functionality of system n
effective ways.
and viruses remove them. Afterwards, it proposed the data flow diagram that help for refine all
the technical details in smart home. This is the best concept that arrange all the detail's step by
step process. It is targeting the network system which is important to use the specified domain by
using Internet protocol. It will fix some code of address and cannot broke the security terms.
Many users can use the encryption and decryption algorithm that provide the highly security
because this technique is used the encrypted code for security. It is difficult for attackers to broke
the passwords and codes. These are effective technique which useful for managing the security
operations and their functions in effective ways.
CONCLUSION
As per discuss, it concluded that security and privacy is important factor in the internet of things
for smart homes. It also used the different methodology such as encryption, cryptography and
structure smart grid provide the facilities to manage their data or entire functionality of system n
effective ways.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

REFERENCE
Books and journals:
Alaa, M. and et.al. (2017). A review of smart home applications based on Internet of
Things. Journal of Network and Computer Applications, 97, pp.48-65. [online] available
at : https://www.sciencedirect.com/science/article/pii/S1084804517302801 [Accessed 5.
December 2018].
Razzaq, M.A. And et.al., (2017). Security Issues in the Internet of Things (IoT): A
Comprehensive Study. International Journal of Advanced Computer Science and
Applications (IJACSA), 8(6), pp.383-388. [online] available at :
https://pdfs.semanticscholar.org/c192/7578a61df3c5a33f6bca9f9bd5c181e1d5ac.pdf
[Accessed 5 december. 2018].
Geneiatakis, D. and et.al.,( 2017), May. Security and privacy issues for an IoT based smart
home. In Information and Communication Technology, Electronics and Microelectronics
(MIPRO), 2017 40th International Convention on (pp. 1292-1297). IEEE. [online]
available at: https://ieeexplore.ieee.org/abstract/document/7973622/ [Accessed 5
December 2018].
Mosenia, A. and Jha, N.K. (2017). A comprehensive study of security of internet-of-
things. IEEE Transactions on Emerging Topics in Computing, 5(4), pp.586-602. [online]
Available at : https://ieeexplore.ieee.org/abstract/document/7562568/ [Accessed 5
december 2018].
Alharbi, R. and Aspinall, D.(2018). An IoT analysis framework: An investigation of IoT smart
cameras' vulnerabilities. [online] Available at :
http://digital-library.theiet.org/content/conferences/10.1049/cp.2018.0047 [Accessed 5
December 2018].
Mouratidis, H. and Diamantopoulou, V.(2018). A Security Analysis Method for Industrial
Internet of Things. IEEE Transactions on Industrial Informatics. [online] Available at :
https://ieeexplore.ieee.org/abstract/document/8353731/ [Accessed 5 December 2018].
Books and journals:
Alaa, M. and et.al. (2017). A review of smart home applications based on Internet of
Things. Journal of Network and Computer Applications, 97, pp.48-65. [online] available
at : https://www.sciencedirect.com/science/article/pii/S1084804517302801 [Accessed 5.
December 2018].
Razzaq, M.A. And et.al., (2017). Security Issues in the Internet of Things (IoT): A
Comprehensive Study. International Journal of Advanced Computer Science and
Applications (IJACSA), 8(6), pp.383-388. [online] available at :
https://pdfs.semanticscholar.org/c192/7578a61df3c5a33f6bca9f9bd5c181e1d5ac.pdf
[Accessed 5 december. 2018].
Geneiatakis, D. and et.al.,( 2017), May. Security and privacy issues for an IoT based smart
home. In Information and Communication Technology, Electronics and Microelectronics
(MIPRO), 2017 40th International Convention on (pp. 1292-1297). IEEE. [online]
available at: https://ieeexplore.ieee.org/abstract/document/7973622/ [Accessed 5
December 2018].
Mosenia, A. and Jha, N.K. (2017). A comprehensive study of security of internet-of-
things. IEEE Transactions on Emerging Topics in Computing, 5(4), pp.586-602. [online]
Available at : https://ieeexplore.ieee.org/abstract/document/7562568/ [Accessed 5
december 2018].
Alharbi, R. and Aspinall, D.(2018). An IoT analysis framework: An investigation of IoT smart
cameras' vulnerabilities. [online] Available at :
http://digital-library.theiet.org/content/conferences/10.1049/cp.2018.0047 [Accessed 5
December 2018].
Mouratidis, H. and Diamantopoulou, V.(2018). A Security Analysis Method for Industrial
Internet of Things. IEEE Transactions on Industrial Informatics. [online] Available at :
https://ieeexplore.ieee.org/abstract/document/8353731/ [Accessed 5 December 2018].
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.