Skip to main content

Enhancing Security in Smart Homes-A Review

  • Conference paper
  • First Online:
Intelligent Computing in Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1125))

Abstract

Internet of Things (IoT) is growing rapidly as the number of users using smart “things” for communication has increased. The Internet of Things is the interconnection of individually recognizable smart embedded computing gadgets inside the previous web or Internet foundation. Applications find their way in Health Care, Building Smart cities, Smart Vehicles, Agriculture, and Smart Home. There are huge profits of smart home system like being able to lock/unlock homes from a long distance, get notified in case of smoke/fire in the house and automating gadget maintenance. It is especially beneficial to assist elderly people who are sick and prefer to stay home rather than being in a Hospital. Despite the benefits, these devices bring in lot of security and privacy issues. IoT devices have firmware with less computing power and battery. They mostly do not have antivirus software installed. These devices communicate seemingly large amount of data and they are most vulnerable for security attacks like Denial of Service (DOS), Malware attacks and Ransomware attacks. A lot of research work is taking place to address the security issues in IoT Platform. This paper aims to provide a detailed review of the Methods or Techniques that are proposed to secure smart home systems by providing better design, access control techniques, encryption algorithms, and secure software applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Han JH, Jeon Y, Kim J (2015) Security considerations for secure and trustworthy smart home system in the IoT environment. In: 2015 international conference on information and communication technology convergence (ICTC). IEEE, pp 1116–1118

    Google Scholar 

  2. Liu H, Li C, Jin X, Li J, Zhang Y, Gu D (2017) Smart solution, poor protection: an empirical study of security and privacy issues in developing and deploying smart home devices. In: Proceedings of the 2017 workshop on internet of things security and privacy. ACM, pp 13–18

    Google Scholar 

  3. Erfani S, Ahmadi M, Chen L (2017) The Internet of Things for smart homes: an example. In: 2017 8th annual industrial automation and electromechanical engineering conference (IEMECON). IEEE, pp 153–157

    Google Scholar 

  4. Schiefer M (2015) Smart home definition and security threats. In: 2015 ninth international conference on IT security incident management & IT forensics, pp 114–118

    Google Scholar 

  5. abcNEWS (2013) Baby monitor hacking alarms houston parents. http://goo.gl/LpuJzg

  6. Finamore A, Saha S, Modelo-Howard G, Lee SJ, Bocchi E, Grimaudo L, Mellia M, Baralis E (2015) Macroscopic view of malware in home networks. In: 2015 12th annual IEEE consumer communications and networking conference (CCNC), pp 262–266

    Google Scholar 

  7. Ye M, Jiang N, Yang H, Yan Q (2017) Security analysis of internet-of-things: a case study of August smart lock. In: 2017 IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 499–504

    Google Scholar 

  8. Ramesh GP, Kumar NM (2019) Design of RZF antenna for ECG monitoring using IoT. Multimed Tools Appl 1–6

    Google Scholar 

  9. Adiono T, Marthensa R, Muttaqin R, Fuada S, Harimurti S, Adijarto W (2017) Design of database and secure communication protocols for Internet-of-things-based smart home system’. In: TENCON 2017—2017 IEEE region 10 conference, pp 1273–1278

    Google Scholar 

  10. Hoque ME, Rahman F, Ahamed SI, Liu L (2009) Trust based security auto-configuration for smart assisted living environments. In: Proceedings of the 2nd ACM workshop on assurable and usable security configuration. ACM, pp 7–12

    Google Scholar 

  11. Salman T (2015) Internet of Things protocols and standards

    Google Scholar 

  12. Chia MH, Keoh SL, Tang Z (2017) Secure data provenance in home energy monitoring networks. In: Proceedings of the 3rd annual industrial control system security workshop, pp 7–14

    Google Scholar 

  13. Chothia T, de Ruiter J (2016) Learning from others’ mistakes: penetration testing iot devices in the classroom. In: 2016 {USENIX} workshop on advances in security education ({ASE} 16)

    Google Scholar 

  14. https://www.schneier.com/academic/archives/1999/12/attack_trees.html

  15. Meyer D, Haase J, Eckert M, Klauer B (2016) A threat-model for building and home automation. In: 2016 IEEE 14th international conference on industrial informatics (INDIN), pp 860–866

    Google Scholar 

  16. Ge M, Hong JB, Guttmann W, Kim DS (2017) A framework for automating security analysis of the internet of things. J Netw Comput Appl 83:12–27

    Article  Google Scholar 

  17. Chung H, Iorga M, Voas J, Lee S (2017) Alexa, can I trust you? Computer 50(9):100–104

    Article  Google Scholar 

  18. Notra S, Siddiqi M, Gharakheili HH, Sivaraman V, Boreli R (2014) An experimental study of security and privacy risks with emerging household appliances. In: 2014 IEEE conference on communications and network security. IEEE, pp 79–84

    Google Scholar 

  19. Jia YJ, Chen QA, Wang S, Rahmati A, Fernandes E, Mao ZM, Prakash A, Unviersity SJ (2017) ContexloT: Towards providing contextual integrity to appified IoT platforms. In: NDSS

    Google Scholar 

  20. Liu J, Xiao Y, Chen CP (2012) Authentication and access control in the internet of things. In: 2012 32nd international conference on distributed computing systems workshops, pp 588–592

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhuvana Janita .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Janita, B., Kannan, R.J., Kumaratharan, N. (2020). Enhancing Security in Smart Homes-A Review. In: Solanki, V., Hoang, M., Lu, Z., Pattnaik, P. (eds) Intelligent Computing in Engineering. Advances in Intelligent Systems and Computing, vol 1125. Springer, Singapore. https://doi.org/10.1007/978-981-15-2780-7_40

Download citation

Publish with us

Policies and ethics