Advertisement

Security over Smart Home Automation Systems: A Survey

  • Jhonattan J. Barriga A
  • Sang Guun Yoo
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 94)

Abstract

Internet of Things (IoT) is growing every day since it has allowed the interconnection of different devices existent in smart environments e.g. home environment, and because it has allowed improving or supporting different services such as physical security, energy consumption management, entertainment among others. The smart home environment, also known as Smart Home Automation Systems (SHAS), has properly attacked and solved the domestic needs of families around the world. However, in spite of having a protocol stack architecture to govern the rules of communication and exchange of information, the security and privacy requirements have been displaced to a second place. For this reason, this paper surveys several previous works from the security perspective with the purpose of providing the most important approaches in this field. Additionally, this work provides recommendations and best practices from different security perspectives.

Keywords

IoT Security SHAS Smart home Mechanisms 

References

  1. 1.
    Gartner Says 4.9 Billion Connected Things Will Be in Use in 2015. https://www.gartner.com/newsroom/id/2905717. Accessed 27 Nov 2017
  2. 2.
    Ul Rehman, S., Manickam, S.: A study of smart home environment and its security threats. Int. J. Reliab. Qual. Saf. Eng. 23(3), 1–9 (2016) CrossRefGoogle Scholar
  3. 3.
    Tank, B., Upadhyay, H., Patel, H.: A survey on IoT privacy issues and mitigation techniques. In: Proceedings of Second International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016, pp. 1–4 (2016)Google Scholar
  4. 4.
    Pirbhulal, S., et al.: A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors 17(1), 69 (2016)CrossRefGoogle Scholar
  5. 5.
    Barcena, M.B., Wueest, C.: Insecurity in the Internet of Things (2015)Google Scholar
  6. 6.
    Gheorghe, A.: The Internet of Things: Risk in the Connected Home (2016)Google Scholar
  7. 7.
    Salman, T., Jain, R.: Networking protocols and standards for internet of things. In: Geng, H. (ed.) Internet of Things and Data Analytics Handbook, pp. 215–238. Wiley, Hoboken (2017)Google Scholar
  8. 8.
    Rayes, A., Salam, S.: IoT protocol stack: a layered view. In: Rayes, A., Salam, S. (eds.) Internet of Things from Hype to Reality, pp. 93–138. Springer, Cham (2017)CrossRefGoogle Scholar
  9. 9.
    Lin, H., Bergmann, N.: IoT privacy and security challenges for smart home environments. Information 7(3), 44 (2016)CrossRefGoogle Scholar
  10. 10.
    Reuter, T.: Security analysis of wireless communication standards for home automation, p. 92 (2013)Google Scholar
  11. 11.
    Mendes, T., Godina, R., Rodrigues, E., Matias, J., Catalão, J.: Smart home communication technologies and applications: wireless protocol assessment for home area network resources. MDPI 8(7), 1–33 (2015)Google Scholar
  12. 12.
    Schwarz, D.: The Current State of Security in Smart Home Systems (0-14) (2016)Google Scholar
  13. 13.
    Wurm, J., Hoang, K., Arias, O., Sadeghi, A.R., Jin, Y.: Security analysis on consumer and industrial IoT devices. In: 2016 21st Asia and South Pacific Design Automation Conference, pp. 519–524 (2016)Google Scholar
  14. 14.
    S. Avizheh, T. T. Doan, X. Liu, nd R. Safavi-Naini: A secure event logging system for smart homes. In: Proceedings of 2017 Workshop on Internet Things Security and Privacy - IoTS&P 2017, pp. 37–42 (2017)Google Scholar
  15. 15.
    Iuchi, K., Matsunaga, T., Toyoda, K., Sasase, I.: Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. In: 2015 21st Asia-Pacific Conference on Communications, APCC 2015, vol. 4, no. 11, pp. 299–303(2016)Google Scholar
  16. 16.
    Hafeez, I., Ding, A.Y.: IOTURVA: Securing Device-to-Device (D2D) Communication in IoT Networks, pp. 1–6 (2017)Google Scholar
  17. 17.
    DeMarinis, N., Fonseca, R.: Toward usable network traffic policies for IoT devices in consumer networks. In: Proceedings of 2017 Workshop on Internet Things Security and Privacy - IoTS&P 2017, pp. 43–48(2017)Google Scholar
  18. 18.
    W. Jang, A. Chhabra, A. Prasad: Enabling multi-user controls in smart home devices, In: Proceedings of 2017 Workshop on Internet Things Security and Privacy - IoTS&P 2017, pp. 49–54 (2017)Google Scholar
  19. 19.
    Ishengoma, F.: Authentication system for smart homes based on ARM7TDMI-S and IRIS-fingerprint recognition technologies. CiiT Int. J. Program. Device Circ. Syst. 6(6), 64–69 (2014)Google Scholar
  20. 20.
    Qiu, Y., Ma, M.: An authentication and key establishment scheme to enhance security for M2 M in 6LoWPANs. In: 2015 IEEE International Conference on Communication Workshop (ICCW), pp. 2671–2676(2015)Google Scholar
  21. 21.
    Hsueh, S.-C., Li, J.-T.: Secure transmission protocol for the IoT. In: Proceedings of the 3rd International Conference on Industrial and Business Engineering - ICIBE 2017, pp. 73–76 (2017)Google Scholar
  22. 22.
    Chatterjee, U., Chakraborty, R.S., Mukhopadhyay, D.: A PUF-based Secure Communication Protocol for IoT, V(212), (2015)Google Scholar
  23. 23.
    Jacobsson, A., Boldt, M., Carlsson, B.: A risk analysis of a smart home automation system. Futur. Gener. Comput. Syst. 56, 719–733 (2016)CrossRefGoogle Scholar
  24. 24.
    Jacobsson, A., Davidsson, P.: Towards a model of privacy and security for smart homes. In: 2015 IEEE 2nd World Forum Internet Things, pp. 727–732 (2015)Google Scholar
  25. 25.
    Chandramohan, J., Nagarajan, R., Satheeshkumar, K., Ajithkumar, N., Gopinath, P.A., Ranjithkumar, S.: Intelligent smart home automation and security system using Arduino and Wi-Fi. Int. J. Eng. Comput. Sci. 6(3), 20694–20698 (2017)Google Scholar
  26. 26.
    Yoo, S.G., Barriga, J.J.: Privacy-aware authentication for Wi-Fi based indoor positioning systems, vol. 719 (2017)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Facultad de Ingeniería de SistemasEscuela Politécnica NacionalQuitoEcuador

Personalised recommendations