A review on Internet of Things Based Smart Home


Download 235.34 Kb.
Pdf ko'rish
bet6/6
Sana30.04.2023
Hajmi235.34 Kb.
#1406855
1   2   3   4   5   6
Bog'liq
A Review on Internet of Things Based Smart Home

B. Internet of Things Software and Firmware Updates 
The most common computers, smart phones and other smart 
devices in daily life will receive the prompt of software update 
regularly and automatically. This is because the number of 
system types used by this kind of smart devices is very small, 
but the range of use is extremely wide, so it is economically 
feasible. While there are hundreds and thousands types of IoT 
devices with different network standards, and few smart home 
devices provide any regular software update service to fix 
security vulnerabilities. 
Firmware is an important part of the Internet of Things 
system. It is a program that directly connected with the hardware 
to control the operation and function of the system. Therefore, 
smart device firmware must be kept up-to-date to resolve 
security vulnerabilities, improve features, add new features, and 
fix other errors. Smart home IoT devices should automatically 
implement safe and reliable firmware updates. Once a problem 
is found, the vendor can issue a fix in time. However, the life 
cycle of smart devices is long, and the number of smart devices 
is increasing, which makes firmware update very challenging. 
Without appropriate protection measures, firmware update will 
become a security vulnerability. So before the update, each 
update must be verified according to its digital signature and the 
digital certificate should be checked; in the process of update, in 
order to prevent the firmware from being tampered, we need to 
encrypt and digitally sign the updated release information, so as 
to ensure the integrity and authenticity of the update, prevent 
hackers from destroying the update checking mechanism, and 
attack the unrepaired firmware. Delta updates are adopted as it 
only contains the data that have changed, which greatly 
improves efficiency and shorten installation task time. 
C. Automatic Analysis and Detection of Threats 
Smart home should have the ability to automatically analyze 
and detect threats, and react immediately after discovering 
threats to prevent from. The realization of such functions 
requires the support of machine learning and user behavior 
analysis technology. Machine learning is used to read and 
analyze a large amount of data generated in smart home, and 
determine the behavior and usage of devices, so as to find and 
prevent abnormal activities and potential harmful behaviors. 
The realization of automatic detection of security threats will 
depend on the massive data of cloud server terminal devices. 
Therefore, the security of user data in cloud server has become 
an inevitable research work in the future. 
276
Authorized licensed use limited to: Tashkent University of Information Technologies. Downloaded on April 09,2023 at 09:43:10 UTC from IEEE Xplore. Restrictions apply. 


VI. T
HE FUTURE OF 
I
NTERNET OF THINGS AND SMART HOME
In the future, smart home will become an important part of 
people's life, there will be more home devices connected to 
Internet of Things, that will become a simple and unimaginable 
complex system, and the possibility of those home devices 
integrated with IoT will be unlimited. Smart home becomes 
more and more popular and makes our life more comfortable 
and convenient than ever before. But the deployment of smart 
home may bring potential security threats to personal 
information and family privacy, and its security is the first 
important problem to be solved. Although some security 
solutions have been proposed, there are still some areas that need 
further research. 
A
CKNOWLEDGMENT
This work is partially supported by grant YKJ201990 of 
Talent Introduction Scientific Research Start-up Fund of 
Nanjing Institute of Technology, China. And it is also partially 
supported by 2020SJA0450 of Philosophy and Social Science 
Research in Colleges and Universities of Jiangsu Province, 
China.
R
EFERENCES
[1] A. Bhattacharjya, X. Zhong, J. Wang, and X. Li, “Secure IoT structural 
design for smart homes,” Smart Cities Cybersecurity and Privacy, 1st ed., 
Bei Jing: Tsinghua University, 2019, pp.187-201. 
[2] J. Manyika, M. Chui, P. Bisson, J. Woetzel, R. Dobbs, J. Bughin, et al. , 
“The Internet of Things: Mapping the Value beyond the Hype,” 
McKinsey Global Institute, June 2015. 
[3] Strategy 
Analitics, 
Report 
Summary, 
https://www.strategyanalytics.com/access-services/devices/connected-
home/smart-home/market-data/report-detail/2018-global-smart-home-
forecast, December 2019. 
[4] PricewaterhouseCoopers (PwC), Information Security Breaches Survey 
2015, HM Government: London, UK, 2015. 
[5] W. Zegers, S. Y. Chang, Y. Park, and J. Gao, “A lightweight encryption 
and secure protocol for smartphone cloud,” Symposium on Service-
Oriented System Engineering, IEEE, 2015, pp.259-266. 
[6] H. Park, C. Basaran, T. Park, and S.Son, “Energy-efficient privacy 
protection for smart home environments using behavioral semantics,” 
Sensors, 2014, 14(9), pp.16235-16257. 
[7] L. Zhou, C.H.Su, and K. H.Yeh, “A lightweight cryptographic protocol 
with certificateless signature for the Internet of Things,” ACM 
transactions on embedded computing system, 2019, 18(3), pp.1-10. 
[8] P. Kumar, A. Braeken, A. Gurtov, J. Iinatti, and P. Ha, “Anonymous 
secure framework in connected smart home environments,” IEEE 
transactions on information forensics and security, 2017, 12(4), pp.968-
979. 
[9] S. Meng, N. Yu, H. Wang, and X.C.Ling, “Anonymous authentication 
scheme for smart home environment with provable security,” Computers 
& Security, 2019, 86, pp.132-146. 
[10] M. Alshahrani, I. Traore, and I. W. Gang, “Design and implementation of 
a lightweight authentication framework for the Internet of Things,” Sixth 
International Conference on Internet of Things: Systems, Management 
and Security, IEEE, 2019, pp.185-194. 
[11] Y. J. Jia, Q. A. Chen, S.Q. Wang, A. Rahmati, E. Fernandes, Z. M. Mao, 
et al. , “ContexloT:Towards Providing Contextual Integrity to Appified 
IoT Platforms,” Network and Distributed System Security Symposium. 
2017. 
[12] Y. Tian, N. Zhang, Y. H. Lin, X.F.Wang, B.Ur, X.Z.Guo, et al, 
“Smartauth: User-centered authorization for the Internet of Things,” 26th 
Security Symposium(Security 17), 2017, pp.361-378. 
[13] M. Narendra, “Research reveals the most vulnerable IoT devices,” Priv 
Sec Report, https://gdpr.report/news/2019/06/12/research-reveals-the- 
most-vulnerable-iot-devices/, May 2020. 
[14] T. Denning, T. Kohno, and H. M. Levy, “Computer security and the 
modern home,” Communications of the ACM, Vol. 56, No. 1, 2013, 
pp.94-103. 
[15] B.Wallace, “A Look at the Security Risks of IoT Devices,” 
https://hackernoon.com/a-look-at-the-security-risks-of-iot-devices-
f0d6ffe1441d, May 2020. 
[16] H. Lin, and N. Bergmann, “IoT privacy and security challenges for smart 
home environments,” Information, 7(3):44, 2016. 
[17] W. A. Jabbar, M. H. Alsibai, N. S. S. Amran, and S. K. Mahayadin, 
“Design and implementation of IoT-based automation system for smart 
home,” International Symposium on Networks, Computers and 
Communications (ISNCC), 2018, pp.1–6. 
[18] A. A. Zandamela, “An Approach to Smart Home Security System using 
Arduino,” Electr. Eng. Int. J. EEIJ, vol. 4, no. 2/3, 2017, pp.1–18. 
[19] T. Adiono, B. A. Manangkalangi, R. Muttaqin, S. Harimurti, and W. 
Adijarto, “Intelligent and secured software application for IoT based 
smart home,” IEEE 6th Global Conference on Consumer Electronics 
(GCCE), 2017, pp.1–2. 
[20] J. Joshi, V.Rajapriya, S.R. Rahul, P.Kumar, and D.G.K. Tej, 
“Performance enhancement and IoT based monitoring for smart home,” 
International Conference on Information Networking (ICOIN), 2017, pp. 
468–473. 
[21] P. K. Madupu and B. Karthikeyan, “Automatic service request system for 
security in smart home using IoT,” Second International Conference on 
Electronics, Communication and Aerospace Technology (ICECA), 2018, 
pp.1413–1418. 
[22] W. Rahman, H. A. Rashid, R. Islam, and M. M. Rahman, “Embodiment 
of IoT based Smart Home Security System,” ijraset, 2018. 
[23] S. Tanwar, P. Patel, K. Patel, S. Tyagi, N. Kumar, and M. S. Obaidat, “An 
advanced internet of thing based security alert system for smart home,” 
International 
Conference 
on 
Computer, 
Information 
and 
Telecommunication Systems (CITS), 2017, pp.25–29. 
[24] H. Singh, V. Pallagani, V. Khandelwal, and U. Venkanna, “IoT based 
smart home automation system using sensor node,” 4th International 
Conference on Recent Advances in Information Technology (RAIT), 
2018, pp.1–5. 
277
Authorized licensed use limited to: Tashkent University of Information Technologies. Downloaded on April 09,2023 at 09:43:10 UTC from IEEE Xplore. Restrictions apply. 

Download 235.34 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling