2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference On 2018
DOI: 10.1109/hpcc/smartcity/dss.2018.00235
|View full text |Cite
|
Sign up to set email alerts
|

Smart Home Systems Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…For example, ChienYuan proposed an automation system to realize the expected requirements of power outlet control and environmental weather detection [21], Adrian designed a pneumatic door automation system for accessing control of all smart products [22], and Yu Hsiu proposed an automated energy management system [23]. Thirdly, in research on smart home security, scholars addressed security challenges through a variety of security technologies and approaches [24][25][26][27][28]. It is worth noting that most of these studies have been conducted from the perspective of technological innovation while few studies have focused on positive user experience.…”
Section: Related Work 21 Iot In Smart Homementioning
confidence: 99%
“…For example, ChienYuan proposed an automation system to realize the expected requirements of power outlet control and environmental weather detection [21], Adrian designed a pneumatic door automation system for accessing control of all smart products [22], and Yu Hsiu proposed an automated energy management system [23]. Thirdly, in research on smart home security, scholars addressed security challenges through a variety of security technologies and approaches [24][25][26][27][28]. It is worth noting that most of these studies have been conducted from the perspective of technological innovation while few studies have focused on positive user experience.…”
Section: Related Work 21 Iot In Smart Homementioning
confidence: 99%
“…2) RQ2: SMART HOME NETWORK SECURITY Home routers have poor protection against internet-based attacks [87]. Hussain et al [88] showed that various vulnerabilities like default passwords, infrequent password changes, and the absence of system updates could be reduced by accessing the home automation system using a single network. Lounis and Zulkernine [89] provided a taxonomy of attacks in Wi-Fi, Bluetooth, ZigBee, and Radio Frequency Identification (RFID) infrastructures, as well as a survey of assaults on each network technology.…”
Section: ) Rq1: Smart Home Device Securitymentioning
confidence: 99%
“…Eavesdropping [64][65] Node capture and replay attacks [66] Sleep deprivation attack [67] DDoS attack [68] Internet pairing default password [70] Configuration and device authentication [71], [85] Legacy authentication mechanism [72] Exposed services [75] Overprivileged configuration Apps [76], [84] Insecure hardware interfaces [73] OTA Updates and upgradeability weakness [75][76] Critical vulnerabilities: side channel, spyware, and backdoor pin code injection [83] Voice spoofing [79] Communal acts like renting, lending, etc. [80] Hardware-level attacks [82] COTS obsolescence risk [81] RQ2: Network Authentication and communication [87], [89] Default password [85][86] Insecure protocols [24], [91] Susceptibility to MITM attack [88][89], [95] Inappropriate use of encryption [94] Protocol attacks [96], [106] Relay attack [97] Sensitive data [100] Prospective attacks [98][99] Social engineering [99] RQ3: Cloud Information disclosure and access control [116][117] Authentication and verification [119], [94] Exploitable services [112]…”
Section: Rq1: Devicementioning
confidence: 99%
“…In this paper, we do not deal with security and mobility problems. For this, it is suggested to refer to existing methods 9–13 …”
Section: Related Workmentioning
confidence: 99%