2017 23rd International Conference on Automation and Computing (ICAC) 2017
DOI: 10.23919/iconac.2017.8082057
|View full text |Cite
|
Sign up to set email alerts
|

IoT based smart home: Security challenges, security requirements and solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 79 publications
(31 citation statements)
references
References 31 publications
0
30
0
Order By: Relevance
“…Active attacks include, e.g., modification of information or attempting to gain unauthorized access to system resources. Common examples of active attacks are worms, malware, ramsomware, password cracking, or denial of service [ 23 ].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Active attacks include, e.g., modification of information or attempting to gain unauthorized access to system resources. Common examples of active attacks are worms, malware, ramsomware, password cracking, or denial of service [ 23 ].…”
Section: Methodsmentioning
confidence: 99%
“…Ali et al in [ 23 ] list the basic security requirements in the smart home environment: User and Device Authentication, Monitor the Network, Integrity, Availability, and Confidentiality. Of these requirements, Availability is most at risk in a smart home due to a DDoS attack, as the Availability requirement ensures that all network services and resources are available in a protected form at all times.…”
Section: Methodsmentioning
confidence: 99%
“…Results indicate that many participants were reluctant to introduce sensing technologies and recording devices into their home. They felt wary of leaving digital trails others can monitor and use to their advantage, such as to break in when the house is empty (Ali et al, 2017;Portet et al, 2013;Wilson et al, 2015;Derniris et al, 2013)…”
Section: Security and Privacymentioning
confidence: 99%
“…A smart home system is a typical ubiquitous computing environment, but there are a lot of problems that need to be solved. Ali [ 21 ], detected the security threats by posing several scenarios and evaluating the impact of these threats on a smart home environment. Chifor et al [ 22 ] proposed a lightweight authorization stack for smart home IoT applications and the architecture is user-device centric.…”
Section: Related Workmentioning
confidence: 99%