2016
DOI: 10.3390/info7030044
|View full text |Cite
|
Sign up to set email alerts
|

IoT Privacy and Security Challenges for Smart Home Environments

Abstract: Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic environments, human issu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
155
0
2

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 325 publications
(157 citation statements)
references
References 29 publications
0
155
0
2
Order By: Relevance
“…The scenarios we are going to face are unimaginable; health, education, transport, every aspect of our lives will undergo radical changes, even our own homes will become smart [2]. The fridge could tell us that it is better to throw eggs away because they are no longer fresh, the washing machine could propose a more efficient way to wash clothes, entire buildings could work together to save energy or other resources.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The scenarios we are going to face are unimaginable; health, education, transport, every aspect of our lives will undergo radical changes, even our own homes will become smart [2]. The fridge could tell us that it is better to throw eggs away because they are no longer fresh, the washing machine could propose a more efficient way to wash clothes, entire buildings could work together to save energy or other resources.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, we suppose that there is influence between them, so that when a device selects a task belonging to level i and this is accepted, both the trust value on level i and on the next level "i + 1" will increase, according to the Formulas (1) and (2). Here the new trust value at level i, newAutonomyTrustL i , is computed as the sum of the old trust value plus the constant increment.…”
mentioning
confidence: 99%
“…The authors of [17] analyse existing architectures of smart homes from the security perspective, concluding that gateway architectures are the most suitable to provide key technologies for cyber protection: auto-configuration and automatic update installation. An overview of existing tooling for the implementation of cyber protection in smart homes is also included in their work, however, all these tools are applicable only for newly designed devices to be included in a future smart homes.…”
Section: Smart Home Cyber Security Frameworkmentioning
confidence: 99%
“…By investigating such related works as [12][13][14][15][16], these researchers drew the structure of smart devices which can be applied to smart home. The structure of smart devices consists of four layers: application layer, application framework, module core library, and Linux kernel layer.…”
Section: Architecture Of Smart Devicementioning
confidence: 99%