A review on Internet of Things Based Smart Home


Author  Security Framework


Download 235.34 Kb.
Pdf ko'rish
bet4/6
Sana30.04.2023
Hajmi235.34 Kb.
#1406855
1   2   3   4   5   6
Bog'liq
A Review on Internet of Things Based Smart Home

Author 
Security Framework 
Security 
Goals
Kumar
et al. [8] 
Anonymous 
security 
framework (ASF) 
Using hash and symmetric 
cryptosystem 
to 
provide 
effective 
authentication 
between devices. 
Meng
et al. [9] 
Efficient anonymous 
authentication scheme 
based on Elliptic Curve 
Cryptography (ECC) 
It 
can 
effectively 
resist 
eavesdropping, replay, and 
man-in-the-middle attacks. 
Alshahrani 
et al. [10] 
Lightweight 
authentication 
framework and key 
exchange protocol 
Using dynamic identity and 
temporary key to support IoT 
nodes in smart home. 
C. Access
Access refers that only properly authorized users are allowed
to access data or given only limited access, while strengthening 
protection against potential attackers. 
TABLE III. 
R
ESEARCH ON SMART HOME 
A
CCESS
Author 
Security 
Framework 
Security 
Goals 
Jia
et al. 
[11] 
Context 
based 
permission 
system 
The system provides running prompt with 
context information to help users 
implement effective access control. The 
tips are too professional to be understood 
and used by users. 
Tian
et al. 
[12] 
User centered 
and semantic 
based 
authorization 
system 
It can automatically extract security related 
information from smart home APP, and 
generate an authorized user interface, 
which makes the device access meet the 
user's expectations. Prevent malicious 
applications from accessing sensitive data 
after obtaining user authorization. 
Generally speaking, we should control access to sensitive 
data and avoid illegal access by third parties. Authorization 
mechanism is used to control the access rights of authenticated 
entities to network services and sensitive resources in smart 
home environment. Unauthorized access to the system 
controller caused by improper password and key management 
or other reasons, especially at the administrator level, will make 
the whole system insecure. This may be caused by improper 
password and key management, or unauthorized device 
connected to the network (Table. III). For virtualized web 
services and devices, access control can be achieved through 
data isolation. However, there are two obvious security defects 
in the design of the access of smart home platform: excessive 
authorization caused by too coarse granularity; lack of isolation 
of sensitive resources. How to achieve fine-grained access 
control of sensitive resources has become the first problem to be 
solved in smart home. 
IV.
F
EATURES OF 
I
NTERNET OF THINGS AND PART OF 
EXISTING SECURITY SUPPORT FOR SMART HOME
A. Features of Internet of Things
a) Interconnectivity: Through the network platform,
anything can be interconnected with the IoT. 
b) Heterogeneity: Devices in the Internet of Things are
heterogeneous because they come from different manufacturers 
and networks.
c) Dynamic changes: The status and quantity of devices
can be changed dynamically. 
B. Example Cases of Internet of Things Security Breaches in
Smart Home
Due to the interconnection, heterogeneity and dynamics of
smart home system, it brings new security and privacy 
challenges to smart home. Smart devices and household 
appliances deployed in the home collect a large number of 
sensitive data about the home environment and user status. 
Researchers found that many devices have potential security 
vulnerabilities, making them as an intrusion points. Now, smart 
home system based on Internet of Things is receiving intense 
attention from hackers and cyber criminals, for example, 
attackers can intrude into the smart home system and control the 
switches of some household appliances, which may cause 
danger in the victim's home [13]. Home cameras can be hacked 
to observe and collect relevant information of residents, so as to 
plan illegal criminal activities [14]. The garage door system 
collects the daily entry and exit schedule data, according to 
which the burglar analyzes the time when there is no one at home 
and plans to break in illegally[15]. There are many similar 
examples, information security incidents and potential personal 
data leakage incidents are more and more closely linked, which 
have a significant impact on personal information security all 
over the world [16]. 
C. Existing Security Support for Smart Home
With the rapid growth of IoT applications, there are many
key challenges in smart home system, such as effective and 
convenient management and control of these increasing 
applications, ensuring the safety and privacy of users. In the past 
few years, in order to improve the overall security of the smart 
home IoT system, many experts have carried out a variety of 
research. In this part of the paper, I will introduce some latest 
research (Table. IV). 
TABLE IV. 
R
ESEARCH ON SMART HOME SYSTEM BASED ON 
IOT

Download 235.34 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling