Abstract
The Internet of Things (IoT) carries the meaning of a developing prototype that focuses on the connection between devices, objects, sensors and users. Using IoT, the method of communications and interactions changes in form of ‘Human to Thing’ to ‘Thing to Thing’. IoT technology is rapidly evolving and spreading its technology influence across various domains including healthcare (personal and enterprise), smart campuses, smart homes, smart mobility, and Industry 4.0. As a result, a lot of IoT devices are being used as a crucial component as one of human made high-tech butlers of everyday lifestyle. This paper focuses on the IoT security threats and vulnerabilities that shall be considered in the implementation of IoT ecosystem by conducting a research in the area of smart home environment. The current security threats and vulnerabilities are being discussed in the contexts of the IoT architecture layers, which is the application layer, network layer and physical layer are also presented. This paper also provides an analysis of the possible threats and proposes possible solutions for improving the security of the IoT smart home, that may influence as beneficial factors that are able to promote a secured eco-system of IoT devices in smart home operational environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Benjamin, K.: RFID as an enabler of the Internet of Things: issues of security and privacy. In: IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing (2011)
Hartog, F.D., Balm, M., Jong, C.D., Kwaaitaal, J.J.: Convergence of residential gateway technology. IEEE Commun. Mag. 42, 138–143 (2004)
Mantas, G., Lymberopoulos, D., Komninos, N.: Security in smart home environment, wireless technologies for ambient assisted living and healthcare: systems and applications. In: Medical Information Science, Hershey, PA, pp. 170–191 (2010)
Padmavathi, G., Shanmugapriya, D.: A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. 4(1) (2009)
Kim, G.W., Lee, D.G., Han, J.W., Kim, S.W.: Security technologies based on home gateway for making Smart Home secure. In: Emerging Directions in Embedded and Ubiquitous Computing, pp. 124–135. Springer, Heidelberg (2007)
Ioannis, A., Chrysostomos, C., George, H.: Internet of Things: security vulnerabilities and challenges . In: Conference Paper (2015). https://doi.org/10.1109/ISCC.2015.7405513
Gubbi, J., Buyya, R., Marusic, M., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Fut. Gener. Comput. Syst. 29(7), 1645–1660 (2013)
Yick, J., Mukherjee, B., Ghosal, D.: Wireless sensor network survey. Comput. Netw. 52(12), 2292–2330 (2008)
Li, L.: Study on security architecture in the Internet of Things. In: International Conference on Measurement, Information and Control (MIC) (2012)
Hager, M., Schellenberg, S., Seitz, J., Mann, S., Schorcht, G.: Secure and QoS-aware communications for smart home services. In: 2012 35th International Conference Telecommunications and Signal Processing (TSP), pp. 11–17 (2012)
Kangas, M.: Authentication and authorization in universal plug and play home networks. In: Ad Hoc Mobile Wireless Networks — Research Seminar on Telecommunications Software, p. 12 (2002)
Haque, M.M., Ahamed, S.I.: Security in pervasive computing: current status and open issues. IJ Netw. Secur. 3, 203–214 (2006)
Komninos, N., Douligeris, C.: LIDF: layered intrusion detection framework for ad-hoc networks. Ad Hoc Netw. 7, 171–182 (2009)
Ahmed, N., Kanhere, S.S., Jha, S.: The holes problem in wireless sensor network: a survey. In: Mobile Computing and Communications Review, vol. 1, no. 2 (2005)
Chen, K., Zhang, S., Li, Z., et al.: Internet-of-Things security and vulnerabilities: taxonomy, challenges, and practice. J. Hardw. Syst. Secur. 2, 97–110 (2018)
Fulare, P.S., Nikita, C.: false data detection in wireless sensor network with secure communication. Int. J. Smart Sensors AdHoc Netw. (IJSSAN) 1(1), 66–71 (2011)
Robles, R.J., Kim, T.H.: A review on security in smart home development. Int. J. Adv. Sci. Technol. 15, 13–22 (2010)
Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future internet: the Internet of Things architecture, possible applications and key challenges. In: FIT, pp. 257–260 (2012)
Uttarkar, R., Kulkarni, R.: Internet of Things: architecture and security. Int. J. Comput. Appl. 3(4), 12–19 (2014)
Xu, L., Chen, J., Liu, M., Wang, X.: Active eavesdropping detection based on large-dimensional random matrix theory for massive MIMO-enabled IoT. Electronics 8, 146 (2019)
Xie, T., Tu, G., Li, C., Peng, C.: How can IoT services pose new security threats in operational cellular networks? IEEE Trans. Mobile Comput. (2020). https://doi.org/10.1109/TMC.2020.2984192
Nawir, M., Amir, A., Yaakob, N., Lynn, O.B.: Internet of Things (IoT): taxonomy of security attacks. In: 2016 3rd International Conference on Electronic Design (ICED), Phuket, pp. 321–326 (2016). https://doi.org/10.1109/ICED.2016.7804660
Ricquebourg, V., Menga, D., Durand, D., Marhic, B., Delahoche, L., Loge, C.: The smart home concept: our immediate future. In: 2006 1ST IEEE International Conference E-Learning in Industrial Electronics, pp. 23–28 (2006)
Yang, X., Li, Z., Geng, Z., Zhang, H.: A multi-layer security model for Internet of Things. In: Internet of Things, pp. 388–393. Springer, Heidelberg (2012)
Kang, Y.M., Han, M.R., Han, K.S., Kim, J.B.: A study on the Internet of Things (IoT) applications. Int. J. Softw. Eng. Appl. 9(9), 117–126 (2015). https://doi.org/10.14257/ijseia.2015.9.9.10,ISSN: 1738 9984
Song, Y.: Security in Internet of Things, KTH Information and Communication Technology, Stockholm: Master of Science Thesis (2013)
Acknowledgement
The authors would like to thank the Ministry of Higher Education, Malaysia for supporting this research under the Fundamental Research Grant Scheme (FRGS) RACER with code number RACER/1/2019/ICT04/UPNM/2. This project is also supported by National Defense University Malaysia (NDUM).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Awang, N.F., Zainudin, A.F.I.M., Marzuki, S., Alsagoff, S.N., Tajuddin, T., Jarno, A.D. (2021). Security and Threats in the Internet of Things Based Smart Home. In: Saeed, F., Mohammed, F., Al-Nahari, A. (eds) Innovative Systems for Intelligent Health Informatics. IRICT 2020. Lecture Notes on Data Engineering and Communications Technologies, vol 72. Springer, Cham. https://doi.org/10.1007/978-3-030-70713-2_61
Download citation
DOI: https://doi.org/10.1007/978-3-030-70713-2_61
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-70712-5
Online ISBN: 978-3-030-70713-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)