A review on Internet of Things Based Smart Home
Download 235.34 Kb. Pdf ko'rish
|
A Review on Internet of Things Based Smart Home
B. Internet of Things Software and Firmware Updates
The most common computers, smart phones and other smart devices in daily life will receive the prompt of software update regularly and automatically. This is because the number of system types used by this kind of smart devices is very small, but the range of use is extremely wide, so it is economically feasible. While there are hundreds and thousands types of IoT devices with different network standards, and few smart home devices provide any regular software update service to fix security vulnerabilities. Firmware is an important part of the Internet of Things system. It is a program that directly connected with the hardware to control the operation and function of the system. Therefore, smart device firmware must be kept up-to-date to resolve security vulnerabilities, improve features, add new features, and fix other errors. Smart home IoT devices should automatically implement safe and reliable firmware updates. Once a problem is found, the vendor can issue a fix in time. However, the life cycle of smart devices is long, and the number of smart devices is increasing, which makes firmware update very challenging. Without appropriate protection measures, firmware update will become a security vulnerability. So before the update, each update must be verified according to its digital signature and the digital certificate should be checked; in the process of update, in order to prevent the firmware from being tampered, we need to encrypt and digitally sign the updated release information, so as to ensure the integrity and authenticity of the update, prevent hackers from destroying the update checking mechanism, and attack the unrepaired firmware. Delta updates are adopted as it only contains the data that have changed, which greatly improves efficiency and shorten installation task time. C. Automatic Analysis and Detection of Threats Smart home should have the ability to automatically analyze and detect threats, and react immediately after discovering threats to prevent from. The realization of such functions requires the support of machine learning and user behavior analysis technology. Machine learning is used to read and analyze a large amount of data generated in smart home, and determine the behavior and usage of devices, so as to find and prevent abnormal activities and potential harmful behaviors. The realization of automatic detection of security threats will depend on the massive data of cloud server terminal devices. Therefore, the security of user data in cloud server has become an inevitable research work in the future. 276 Authorized licensed use limited to: Tashkent University of Information Technologies. Downloaded on April 09,2023 at 09:43:10 UTC from IEEE Xplore. Restrictions apply. VI. T HE FUTURE OF I NTERNET OF THINGS AND SMART HOME In the future, smart home will become an important part of people's life, there will be more home devices connected to Internet of Things, that will become a simple and unimaginable complex system, and the possibility of those home devices integrated with IoT will be unlimited. Smart home becomes more and more popular and makes our life more comfortable and convenient than ever before. But the deployment of smart home may bring potential security threats to personal information and family privacy, and its security is the first important problem to be solved. Although some security solutions have been proposed, there are still some areas that need further research. A CKNOWLEDGMENT This work is partially supported by grant YKJ201990 of Talent Introduction Scientific Research Start-up Fund of Nanjing Institute of Technology, China. And it is also partially supported by 2020SJA0450 of Philosophy and Social Science Research in Colleges and Universities of Jiangsu Province, China. R EFERENCES [1] A. Bhattacharjya, X. Zhong, J. Wang, and X. Li, “Secure IoT structural design for smart homes,” Smart Cities Cybersecurity and Privacy, 1st ed., Bei Jing: Tsinghua University, 2019, pp.187-201. [2] J. Manyika, M. Chui, P. Bisson, J. Woetzel, R. Dobbs, J. Bughin, et al. , “The Internet of Things: Mapping the Value beyond the Hype,” McKinsey Global Institute, June 2015. [3] Strategy Analitics, Report Summary, https://www.strategyanalytics.com/access-services/devices/connected- home/smart-home/market-data/report-detail/2018-global-smart-home- forecast, December 2019. [4] PricewaterhouseCoopers (PwC), Information Security Breaches Survey 2015, HM Government: London, UK, 2015. [5] W. Zegers, S. Y. Chang, Y. Park, and J. Gao, “A lightweight encryption and secure protocol for smartphone cloud,” Symposium on Service- Oriented System Engineering, IEEE, 2015, pp.259-266. [6] H. Park, C. Basaran, T. Park, and S.Son, “Energy-efficient privacy protection for smart home environments using behavioral semantics,” Sensors, 2014, 14(9), pp.16235-16257. [7] L. Zhou, C.H.Su, and K. H.Yeh, “A lightweight cryptographic protocol with certificateless signature for the Internet of Things,” ACM transactions on embedded computing system, 2019, 18(3), pp.1-10. [8] P. Kumar, A. Braeken, A. Gurtov, J. Iinatti, and P. Ha, “Anonymous secure framework in connected smart home environments,” IEEE transactions on information forensics and security, 2017, 12(4), pp.968- 979. [9] S. Meng, N. Yu, H. Wang, and X.C.Ling, “Anonymous authentication scheme for smart home environment with provable security,” Computers & Security, 2019, 86, pp.132-146. [10] M. Alshahrani, I. Traore, and I. W. Gang, “Design and implementation of a lightweight authentication framework for the Internet of Things,” Sixth International Conference on Internet of Things: Systems, Management and Security, IEEE, 2019, pp.185-194. [11] Y. J. Jia, Q. A. Chen, S.Q. Wang, A. Rahmati, E. Fernandes, Z. M. Mao, et al. , “ContexloT:Towards Providing Contextual Integrity to Appified IoT Platforms,” Network and Distributed System Security Symposium. 2017. [12] Y. Tian, N. Zhang, Y. H. Lin, X.F.Wang, B.Ur, X.Z.Guo, et al, “Smartauth: User-centered authorization for the Internet of Things,” 26th Security Symposium(Security 17), 2017, pp.361-378. [13] M. Narendra, “Research reveals the most vulnerable IoT devices,” Priv Sec Report, https://gdpr.report/news/2019/06/12/research-reveals-the- most-vulnerable-iot-devices/, May 2020. [14] T. Denning, T. Kohno, and H. M. Levy, “Computer security and the modern home,” Communications of the ACM, Vol. 56, No. 1, 2013, pp.94-103. [15] B.Wallace, “A Look at the Security Risks of IoT Devices,” https://hackernoon.com/a-look-at-the-security-risks-of-iot-devices- f0d6ffe1441d, May 2020. [16] H. Lin, and N. Bergmann, “IoT privacy and security challenges for smart home environments,” Information, 7(3):44, 2016. [17] W. A. Jabbar, M. H. Alsibai, N. S. S. Amran, and S. K. Mahayadin, “Design and implementation of IoT-based automation system for smart home,” International Symposium on Networks, Computers and Communications (ISNCC), 2018, pp.1–6. [18] A. A. Zandamela, “An Approach to Smart Home Security System using Arduino,” Electr. Eng. Int. J. EEIJ, vol. 4, no. 2/3, 2017, pp.1–18. [19] T. Adiono, B. A. Manangkalangi, R. Muttaqin, S. Harimurti, and W. Adijarto, “Intelligent and secured software application for IoT based smart home,” IEEE 6th Global Conference on Consumer Electronics (GCCE), 2017, pp.1–2. [20] J. Joshi, V.Rajapriya, S.R. Rahul, P.Kumar, and D.G.K. Tej, “Performance enhancement and IoT based monitoring for smart home,” International Conference on Information Networking (ICOIN), 2017, pp. 468–473. [21] P. K. Madupu and B. Karthikeyan, “Automatic service request system for security in smart home using IoT,” Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), 2018, pp.1413–1418. [22] W. Rahman, H. A. Rashid, R. Islam, and M. M. Rahman, “Embodiment of IoT based Smart Home Security System,” ijraset, 2018. [23] S. Tanwar, P. Patel, K. Patel, S. Tyagi, N. Kumar, and M. S. Obaidat, “An advanced internet of thing based security alert system for smart home,” International Conference on Computer, Information and Telecommunication Systems (CITS), 2017, pp.25–29. [24] H. Singh, V. Pallagani, V. Khandelwal, and U. Venkanna, “IoT based smart home automation system using sensor node,” 4th International Conference on Recent Advances in Information Technology (RAIT), 2018, pp.1–5. 277 Authorized licensed use limited to: Tashkent University of Information Technologies. Downloaded on April 09,2023 at 09:43:10 UTC from IEEE Xplore. Restrictions apply. Download 235.34 Kb. Do'stlaringiz bilan baham: |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling