2021
DOI: 10.1007/978-3-030-70713-2_61
|View full text |Cite
|
Sign up to set email alerts
|

Security and Threats in the Internet of Things Based Smart Home

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…They showed that the connection of IoT devices to smart home networks caused potential man-in-the-browser attacks to target the remote control systems. Awang et al [ 81 ] proposed solutions to enhance the IoT ecosystems in smart homes and analysed the possible threats to smart home operational environments. Turner et al [ 82 ] discussed how the Internet connection between devices introduces security risks to smart homes as it allows access to private user information.…”
Section: Cybersecurity In Smart Citiesmentioning
confidence: 99%
See 1 more Smart Citation
“…They showed that the connection of IoT devices to smart home networks caused potential man-in-the-browser attacks to target the remote control systems. Awang et al [ 81 ] proposed solutions to enhance the IoT ecosystems in smart homes and analysed the possible threats to smart home operational environments. Turner et al [ 82 ] discussed how the Internet connection between devices introduces security risks to smart homes as it allows access to private user information.…”
Section: Cybersecurity In Smart Citiesmentioning
confidence: 99%
“…The preservation of event log privacy for smart homeowners Rossi et al [78] 2020 Monitoring and defence against exploiting devices using Shodan APIs Giannoutakis et al [79] 2020 Blocking malicious IPs using dynamic and immutable management Rauti et al [80] 2021 A demonstration of a man-in-the-browser attack on a smart home system Awang et al [81] 2021 Solutions for threats to smart home operational environments Turner et al [82] 2021 Best practice and recommendations for smart homeowners Alshboul et al [83] 2021 Protecting sensor identities from being recognized Mahor et al [84] 2022 A multivariate correlation analysis and correlation detection Bringhenti et al [85] 2022 Cybersecurity personalization based on policy-based management Allifah and Zualkernan [86] 2022 A ranking of the critical vulnerabilities of smart home devices Thammarat and Techapanupreeda [87] 2022…”
Section: Smart Transportation/mobilitymentioning
confidence: 99%
“…IoT refer to the system composed of interconnected and interrelated devices, objects and sensors. 21 IoT targets have also been threatened by APTs with the widespread application of IoT because the IoT device such as the sensors is weaker than host in security. How to detect and respond to APT attacks has become increasingly important for the IoT security since IoT devices are inherently risky and easy to exploit while being heavily exposed to the Internet.…”
Section: Related Workmentioning
confidence: 99%