2016
DOI: 10.1142/s0218539316400052
|View full text |Cite
|
Sign up to set email alerts
|

A Study of Smart Home Environment and its Security Threats

Abstract: As the world is moving towards Internet of Things, smart home is now rapidly becoming a reality. Home appliances and devices are interconnected, i.e., home area network, via proprietary or standard TCP/IP protocols allowing for better management and monitoring. Nevertheless, as with any form of network, smart home is also prone to security threats and vulnerabilities. This paper aims at presenting the importance of security in smart home environment. Herein, we will discuss (a) the concepts of smart home envir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…Nevertheless, security [91][92][93] and privacy [103,106,107] are major concerns for many applications such as smart home and grid. Cyber-Physical Systems is an application that, when powered by the IoT, enables the targets fixed by Industry 4.0 [111].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Nevertheless, security [91][92][93] and privacy [103,106,107] are major concerns for many applications such as smart home and grid. Cyber-Physical Systems is an application that, when powered by the IoT, enables the targets fixed by Industry 4.0 [111].…”
Section: Discussionmentioning
confidence: 99%
“…Similarly, Smart home has a linear growth, with 230 documents, and 111 in the last year, with China as the leading country. The most important related topics for Smart home are security [91][92][93], ZigBee [94][95][96], and activity recognition [97][98][99].…”
Section: Applicationsmentioning
confidence: 99%
“…The smart campus is based on a wide range of technologies and equipment including several unsecured devices, systems and applications that transmit information via unsafe media and use weak protocols such as HTTP, FTP, telnet, etc. The attackers can make use of these flaws to gain access to the systems, to retrieve sensitive data and to obtain confidential information for later manipulation (Rehman and Manickam, 2016). He can also damage the life of the devices and stop the functionality of the services.…”
Section: Smart Campus Susceptible Attacksmentioning
confidence: 99%
“…The intruder can capture and store a copy of a legitimate request for service from a device on the smart campus network. Then, replay it to get services that are only authorized by the smart campus users (Rehman, Manickam, 2016).…”
Section: 52mentioning
confidence: 99%
See 1 more Smart Citation