Augmenting Security of Smart Homes

Main Article Content

Narsaiah Putta
Raman Dugyala
Pallati Narsimhulu

Abstract

The development of new technology and people's propensity to rely on it more and more each year have led to enormous advancements in human technology. The idea of the Internet of Things (IOT) and later "Smart Homes" was one such enormous step. The surge in the smart home sector is due to the introduction of extremely practical and affordable technologies. However, the expanded use has also created a new set of security and privacy risks for those who rely on smart home technology. This article covers the basic idea of smart homes and IOT devices, as well as any current risks and any previous countermeasures that have been suggested.

Downloads

Download data is not yet available.

Article Details

How to Cite
[1]
Narsaiah Putta, Raman Dugyala, and Pallati Narsimhulu , Trans., “Augmenting Security of Smart Homes”, IJIES, vol. 11, no. 12, pp. 21–24, Dec. 2024, doi: 10.35940/ijies.I1065.11121224.
Section
Articles

How to Cite

[1]
Narsaiah Putta, Raman Dugyala, and Pallati Narsimhulu , Trans., “Augmenting Security of Smart Homes”, IJIES, vol. 11, no. 12, pp. 21–24, Dec. 2024, doi: 10.35940/ijies.I1065.11121224.
Share |

References

Alam, M.R.; Reaz, M.B.I.; Ali, M.A.M. A Review of Smart Homes—Past, present, and future. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 2012, 42, 1190–1203. DOI: https://doi.org/10.1109/TSMCC.2012.2189204

Lin, H., & Bergmann, N. (2016). IoT privacy and security challenges for smart home environments. Information, 7(3), 44. DOI: https://doi.org/10.3390/info7030044

Price Waterhouse Coopers (PwC). Information Security Breaches Survey 2015; HM Government: London, UK, 2015. https://www.pwc.co.uk/assets/pdf/2015-isbs-technical-report-blue-03.pdf

Patton, M.; Gross, E.; Chinn, R.; Forbis, S.; Walker, L.; Hsinchun, C. Uninvited connections: A study of vulnerable devices on the Internet of Things (IoT). In Proceedings of the 2014 IEEE Joint Intelligence and Security Informatics Conference (JISIC), The Hague, The Netherlands, 24–26 September 2014; pp. 232–235. DOI: https://doi.org/10.1109/JISIC.2014.43

Pecorella, T., Pierucci, L., & Nizzi, F. (2018). “Network Sentiment” Framework to Improve Security and Privacy for Smart Home. Future Internet, 10(12), 125. https://doi.org/10.3390/fi10120125

Park, Y.; Park, T.; Park, M.; Han, J. How to Secure Push Button Configuration for Remote Control of Devices. In Proceedings of the 10th International Conference on Remote Engineering and Virtual Instrumentation (REV), Sydney, Australia, 6– 8 February 2013. DOI: https://doi.org/10.1109/REV.2013.6502906

Han, J., & Park, T. (2017). Security-Enhanced Push Button Configuration for Home Smart Control. Sensors, 17(6), 1334. DOI: https://doi.org/10.3390/s17061334

Shelby, Z.; Bormann, C. 6lowpan: The Wireless Embedded Internet; John Wiley & Sons: New York, NY, USA, 2011; Volume 43. https://www.wiley.com/en-us/6LoWPAN%3A+The+Wireless+Embedded+Internet-p-9781119965343

Yue, Q.; Maode, M. An authentication and key establishment scheme to enhance security for m2m in 6lowpans. In Proceedings of the 2015 IEEE International Conference on Communication Workshop (ICCW), London, UK, 8–12 June 2015; pp. 2671–2676. DOI: https://doi.org/10.1109/ICCW.2015.7247582

V. Karri and J. S. Daniel Lim, “Method and Device to Communicate via SMS After a Security Intrusion”, 1st International Confe-rence on Sensing Technology, Palmerston North, New Zealand, (2005) November 21- 23. https://www.academia.edu/20866609/Method_and_Device_to_Communicate_via_SMS_After_a_Security_Intrusion

Bangali, J., & Shaligram, A. (2013). Design and Implementation of Security Systems for Smart Home based on GSM technology. International Journal of Smart Home, 7(6), 201-208. https://gvpress.com/journals/IJSH/vol7_no6/19.pdf

Robles, R. J., Kim, T. H., Cook, D., & Das, S. (2010). A review on security in smart home development. International Journal of Advanced Science and Technology, 15. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=f07fd4d666c9fe05e49501884054f6041d554ad5

Fernandes, E., Jung, J., & Prakash, A. (2016, May). Security analysis of emerging smart home applications. In 2016 IEEE symposium on security and privacy (SP) (pp. 636-654). IEEE. DOI: https://doi.org/10.1109/SP.2016.44

Jiang, L., Liu, D. Y., & Yang, B. (2004, August). Smart home research. In Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No. 04EX826)(Vol. 2, pp. 659-663). IEEE. DOI: https://doi.org/10.1109/ICMLC.2004.1382266

Davidoff, S., Lee, M. K., Yiu, C., Zimmerman, J., & Dey, A. K. (2006, September). Principles of smart home control. In International conference on ubiquitous computing (pp. 19-34). Springer, Berlin, Heidelberg. DOI: https://doi.org/10.1007/11853565_2

Aloul, F., Al-Ali, A. R., Al-Dalky, R., Al- Mardini, M., & El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy, 1(1), 1-6. https://www.ijsgce.com/uploadfile/2012/1011/20121011121836539.pdf

Lee, C., Zappaterra, L., Choi, K., & Choi, H. A. (2014, October). Securing smart home: Technologies, security challenges, and security requirements. In 2014 IEEE Conference on Communications and Network Security (pp. 67-72). IEEE. DOI: https://doi.org/10.1109/CNS.2014.6997467

Yoon, S., Park, H., & Yoo, H. S. (2015). Security issues on smarthome in IoT environment. In Computer science and its applications (pp. 691- 696). Springer, Berlin, Heidelberg. DOI: https://doi.org/10.1007/978-3-662-45402-2_97

Raza, S., Trabalza, D., & Voigt, T. (2012, May). 6LoWPAN compressed DTLS for CoAP. In 2012 IEEE 8th International Conference on Distributed Computing in

Sensor Systems (pp. 287- 289). IEEE.

DOI: https://doi.org/10.1109/DCOSS.2012.55

Theoharidou, M., Tsalis, N., Gritzalis, D. (2017). Smart Home Solutions: Privacy Issues. In: van Hoof, J., Demiris, G., Wouters, E. (eds) Handbook of Smart Homes, Health Care and Well-Being. Springer, Cham. https://doi.org/10.1007/978-3-319-01583-5_5

Parvin, N., Jain, P. K., & Ajnar, D. S. (2019). Automated and Secured Smart Home through FPGA Controller. In International Journal of Innovative Technology and Exploring Engineering (Vol. 8, Issue 11, pp. 1341–1345). DOI: https://doi.org/10.35940/ijitee.j9662.0981119

Sei-Youen Oh, Aeri Lee, Authentication and Access Control Methods for Secured Smart Home IoT Service Environmen. (2019). In International Journal of Recent Technology and Engineering (Vol. 8, Issue 2S6, pp. 330–335). DOI: https://doi.org/10.35940/ijrte.b1063.0782s619

Sharma, R. (2019). Security & Privacy Challenges in Smart Home. In International Journal of Engineering and Advanced Technology (Vol. 8, Issue 6, pp. 3169–3171). DOI: https://doi.org/10.35940/ijeat.f9268.088619

Kumar, M., & Pandey, K. M. (2023). The Impact of IoT on Smart Home Energy Management. In International Journal of Soft Computing and Engineering (Vol. 13, Issue 5, pp. 7–12). DOI: https://doi.org/10.35940/ijsce.d3647.13051123

Gupta, S. K. (2022). Smart Grid System in India. In Indian Journal of Energy and Energy Resources (Vol. 1, Issue 4, pp. 5–6). DOI: https://doi.org/10.54105/ijeer.c1018.081422

Most read articles by the same author(s)

1 2 3 > >>