Skip to main content

Security and Threats in the Internet of Things Based Smart Home

  • Conference paper
  • First Online:
Innovative Systems for Intelligent Health Informatics (IRICT 2020)

Abstract

The Internet of Things (IoT) carries the meaning of a developing prototype that focuses on the connection between devices, objects, sensors and users. Using IoT, the method of communications and interactions changes in form of ‘Human to Thing’ to ‘Thing to Thing’. IoT technology is rapidly evolving and spreading its technology influence across various domains including healthcare (personal and enterprise), smart campuses, smart homes, smart mobility, and Industry 4.0. As a result, a lot of IoT devices are being used as a crucial component as one of human made high-tech butlers of everyday lifestyle. This paper focuses on the IoT security threats and vulnerabilities that shall be considered in the implementation of IoT ecosystem by conducting a research in the area of smart home environment. The current security threats and vulnerabilities are being discussed in the contexts of the IoT architecture layers, which is the application layer, network layer and physical layer are also presented. This paper also provides an analysis of the possible threats and proposes possible solutions for improving the security of the IoT smart home, that may influence as beneficial factors that are able to promote a secured eco-system of IoT devices in smart home operational environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Benjamin, K.: RFID as an enabler of the Internet of Things: issues of security and privacy. In: IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing (2011)

    Google Scholar 

  2. Hartog, F.D., Balm, M., Jong, C.D., Kwaaitaal, J.J.: Convergence of residential gateway technology. IEEE Commun. Mag. 42, 138–143 (2004)

    Article  Google Scholar 

  3. Mantas, G., Lymberopoulos, D., Komninos, N.: Security in smart home environment, wireless technologies for ambient assisted living and healthcare: systems and applications. In: Medical Information Science, Hershey, PA, pp. 170–191 (2010)

    Google Scholar 

  4. Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. 4(1) (2009)

    Google Scholar 

  5. Kim, G.W., Lee, D.G., Han, J.W., Kim, S.W.: Security technologies based on home gateway for making Smart Home secure. In: Emerging Directions in Embedded and Ubiquitous Computing, pp. 124–135. Springer, Heidelberg (2007)

    Google Scholar 

  6. Ioannis, A., Chrysostomos, C., George, H.: Internet of Things: security vulnerabilities and challenges . In: Conference Paper (2015). https://doi.org/10.1109/ISCC.2015.7405513

  7. Gubbi, J., Buyya, R., Marusic, M., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Fut. Gener. Comput. Syst. 29(7), 1645–1660 (2013)

    Article  Google Scholar 

  8. Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52(12), 2292–2330 (2008)

    Article  Google Scholar 

  9. Li, L.: Study on security architecture in the Internet of Things. In: International Conference on Measurement, Information and Control (MIC) (2012)

    Google Scholar 

  10. Hager, M., Schellenberg, S., Seitz, J., Mann, S., Schorcht, G.: Secure and QoS-aware communications for smart home services. In: 2012 35th International Conference Telecommunications and Signal Processing (TSP), pp. 11–17 (2012)

    Google Scholar 

  11. Kangas, M.: Authentication and authorization in universal plug and play home networks. In: Ad Hoc Mobile Wireless Networks — Research Seminar on Telecommunications Software, p. 12 (2002)

    Google Scholar 

  12. Haque, M.M., Ahamed, S.I.: Security in pervasive computing: current status and open issues. IJ Netw. Secur. 3, 203–214 (2006)

    Google Scholar 

  13. Komninos, N., Douligeris, C.: LIDF: layered intrusion detection framework for ad-hoc networks. Ad Hoc Netw. 7, 171–182 (2009)

    Article  Google Scholar 

  14. Ahmed, N., Kanhere, S.S., Jha, S.: The holes problem in wireless sensor network: a survey. In: Mobile Computing and Communications Review, vol. 1, no. 2 (2005)

    Google Scholar 

  15. Chen, K., Zhang, S., Li, Z., et al.: Internet-of-Things security and vulnerabilities: taxonomy, challenges, and practice. J. Hardw. Syst. Secur. 2, 97–110 (2018)

    Article  Google Scholar 

  16. Fulare, P.S., Nikita, C.: false data detection in wireless sensor network with secure communication. Int. J. Smart Sensors AdHoc Netw. (IJSSAN) 1(1), 66–71 (2011)

    Article  Google Scholar 

  17. Robles, R.J., Kim, T.H.: A review on security in smart home development. Int. J. Adv. Sci. Technol. 15, 13–22 (2010)

    Google Scholar 

  18. Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future internet: the Internet of Things architecture, possible applications and key challenges. In: FIT, pp. 257–260 (2012)

    Google Scholar 

  19. Uttarkar, R., Kulkarni, R.: Internet of Things: architecture and security. Int. J. Comput. Appl. 3(4), 12–19 (2014)

    Google Scholar 

  20. Xu, L., Chen, J., Liu, M., Wang, X.: Active eavesdropping detection based on large-dimensional random matrix theory for massive MIMO-enabled IoT. Electronics 8, 146 (2019)

    Article  Google Scholar 

  21. Xie, T., Tu, G., Li, C., Peng, C.: How can IoT services pose new security threats in operational cellular networks? IEEE Trans. Mobile Comput. (2020). https://doi.org/10.1109/TMC.2020.2984192

  22. Nawir, M., Amir, A., Yaakob, N., Lynn, O.B.: Internet of Things (IoT): taxonomy of security attacks. In: 2016 3rd International Conference on Electronic Design (ICED), Phuket, pp. 321–326 (2016). https://doi.org/10.1109/ICED.2016.7804660

  23. Ricquebourg, V., Menga, D., Durand, D., Marhic, B., Delahoche, L., Loge, C.: The smart home concept: our immediate future. In: 2006 1ST IEEE International Conference E-Learning in Industrial Electronics, pp. 23–28 (2006)

    Google Scholar 

  24. Yang, X., Li, Z., Geng, Z., Zhang, H.: A multi-layer security model for Internet of Things. In: Internet of Things, pp. 388–393. Springer, Heidelberg (2012)

    Google Scholar 

  25. Kang, Y.M., Han, M.R., Han, K.S., Kim, J.B.: A study on the Internet of Things (IoT) applications. Int. J. Softw. Eng. Appl. 9(9), 117–126 (2015). https://doi.org/10.14257/ijseia.2015.9.9.10,ISSN: 1738 9984

  26. Song, Y.: Security in Internet of Things, KTH Information and Communication Technology, Stockholm: Master of Science Thesis (2013)

    Google Scholar 

Download references

Acknowledgement

The authors would like to thank the Ministry of Higher Education, Malaysia for supporting this research under the Fundamental Research Grant Scheme (FRGS) RACER with code number RACER/1/2019/ICT04/UPNM/2. This project is also supported by National Defense University Malaysia (NDUM).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nor Fatimah Awang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Awang, N.F., Zainudin, A.F.I.M., Marzuki, S., Alsagoff, S.N., Tajuddin, T., Jarno, A.D. (2021). Security and Threats in the Internet of Things Based Smart Home. In: Saeed, F., Mohammed, F., Al-Nahari, A. (eds) Innovative Systems for Intelligent Health Informatics. IRICT 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 72. Springer, Cham. https://doi.org/10.1007/978-3-030-70713-2_61

Download citation

Publish with us

Policies and ethics