2020
DOI: 10.1007/978-3-030-58703-1_13
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Vulnerabilities in Security and Privacy of Smart Home Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 59 publications
0
4
0
Order By: Relevance
“…Nineteen papers covered by the meta-review focus on various common issues arising from security and privacy problems in a smart home. DeFranco and Kassab's 74,75,133,185] ✓ ✓ [51,55] ✓ ✓ [45,109,151,159,175] paper [52] covered the broad theme of general research avenues around smart home. While Kuyucu et al [99] reviewed papers relating to both privacy and security related issues and solutions, Liao et al [109] explored security problems, challenges, techniques used, and solutions available from a mobile computing point of view.…”
Section: Security and Privacy In Generalmentioning
confidence: 99%
See 1 more Smart Citation
“…Nineteen papers covered by the meta-review focus on various common issues arising from security and privacy problems in a smart home. DeFranco and Kassab's 74,75,133,185] ✓ ✓ [51,55] ✓ ✓ [45,109,151,159,175] paper [52] covered the broad theme of general research avenues around smart home. While Kuyucu et al [99] reviewed papers relating to both privacy and security related issues and solutions, Liao et al [109] explored security problems, challenges, techniques used, and solutions available from a mobile computing point of view.…”
Section: Security and Privacy In Generalmentioning
confidence: 99%
“…Papers were further sub-categorized into 'Attack vector', 'Mitigation', and 'Stakeholder' and evaluated with 45 IoT devices to identify the research gaps. Researchers also explored the security vulnerabilities by different IoT devices [51] and smart home devices [45]. Batalla et al [25] classified the security threats in home area network devices by referring to the 3-layered approach of ENISA (European Union agency for Cybersecurity), i.e., perceptual, network and the application layer attack and physical attacks.…”
Section: Threats and Attacksmentioning
confidence: 99%
“…Prior research shows that vulnerabilities of SHDs can be exploited, resulting in the violation of users’ privacy (Chhetri and Motti, 2020). Various incidents that have received media attention, such as baby monitor hacks and botnet attacks, have demonstrated such possibilities.…”
Section: Introductionmentioning
confidence: 99%
“…SHDs have been known to contain privacy vulnerabilities (Chhetri & Motti, 2020) and raise privacy concerns in users and non-users (Haney et al, 2020;Zeng et al, 2017). Researchers and SHD designers cannot develop effective privacy-enhanced solutions without enabling the users (Chong et al, 2019), which requires an understanding of users' privacy concerns.…”
Section: Introductionmentioning
confidence: 99%