A review on Internet of Things Based Smart Home
Author Security Framework
Download 235.34 Kb. Pdf ko'rish
|
A Review on Internet of Things Based Smart Home
- Bu sahifa navigatsiya:
- Author Security Framework Security Goals
Author
Security Framework Security Goals Kumar et al. [8] Anonymous security framework (ASF) Using hash and symmetric cryptosystem to provide effective authentication between devices. Meng et al. [9] Efficient anonymous authentication scheme based on Elliptic Curve Cryptography (ECC) It can effectively resist eavesdropping, replay, and man-in-the-middle attacks. Alshahrani et al. [10] Lightweight authentication framework and key exchange protocol Using dynamic identity and temporary key to support IoT nodes in smart home. C. Access Access refers that only properly authorized users are allowed to access data or given only limited access, while strengthening protection against potential attackers. TABLE III. R ESEARCH ON SMART HOME A CCESS Author Security Framework Security Goals Jia et al. [11] Context based permission system The system provides running prompt with context information to help users implement effective access control. The tips are too professional to be understood and used by users. Tian et al. [12] User centered and semantic based authorization system It can automatically extract security related information from smart home APP, and generate an authorized user interface, which makes the device access meet the user's expectations. Prevent malicious applications from accessing sensitive data after obtaining user authorization. Generally speaking, we should control access to sensitive data and avoid illegal access by third parties. Authorization mechanism is used to control the access rights of authenticated entities to network services and sensitive resources in smart home environment. Unauthorized access to the system controller caused by improper password and key management or other reasons, especially at the administrator level, will make the whole system insecure. This may be caused by improper password and key management, or unauthorized device connected to the network (Table. III). For virtualized web services and devices, access control can be achieved through data isolation. However, there are two obvious security defects in the design of the access of smart home platform: excessive authorization caused by too coarse granularity; lack of isolation of sensitive resources. How to achieve fine-grained access control of sensitive resources has become the first problem to be solved in smart home. IV. F EATURES OF I NTERNET OF THINGS AND PART OF EXISTING SECURITY SUPPORT FOR SMART HOME A. Features of Internet of Things a) Interconnectivity: Through the network platform, anything can be interconnected with the IoT. b) Heterogeneity: Devices in the Internet of Things are heterogeneous because they come from different manufacturers and networks. c) Dynamic changes: The status and quantity of devices can be changed dynamically. B. Example Cases of Internet of Things Security Breaches in Smart Home Due to the interconnection, heterogeneity and dynamics of smart home system, it brings new security and privacy challenges to smart home. Smart devices and household appliances deployed in the home collect a large number of sensitive data about the home environment and user status. Researchers found that many devices have potential security vulnerabilities, making them as an intrusion points. Now, smart home system based on Internet of Things is receiving intense attention from hackers and cyber criminals, for example, attackers can intrude into the smart home system and control the switches of some household appliances, which may cause danger in the victim's home [13]. Home cameras can be hacked to observe and collect relevant information of residents, so as to plan illegal criminal activities [14]. The garage door system collects the daily entry and exit schedule data, according to which the burglar analyzes the time when there is no one at home and plans to break in illegally[15]. There are many similar examples, information security incidents and potential personal data leakage incidents are more and more closely linked, which have a significant impact on personal information security all over the world [16]. C. Existing Security Support for Smart Home With the rapid growth of IoT applications, there are many key challenges in smart home system, such as effective and convenient management and control of these increasing applications, ensuring the safety and privacy of users. In the past few years, in order to improve the overall security of the smart home IoT system, many experts have carried out a variety of research. In this part of the paper, I will introduce some latest research (Table. IV). TABLE IV. R ESEARCH ON SMART HOME SYSTEM BASED ON IOT Download 235.34 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling