scholarly journals Assessment of Smart Home: Security and Privacy

2021 ◽  
Vol 11 (4) ◽  
pp. 4913-4930
Author(s):  
Akshat Goyal ◽  
Mugdha S Kulkarni

Home automation is now extremely common in Internet of things services and devices with a range of assurances to improve health, lifestyle, and customer wellbeing. In terms of its success and apparent utility for humans, intelligent homes possess various safety concerns resulting from the diversified, vast-range, and nuanced nature of IoT. Previous studies have talked about security and privacy issues. However, we observe that they have not addressed the risk assessment of each smart home component and corresponding security objective along with additional factors that affect a smart home security posture. In this study, we have proposed a framework defining a standard level of security and then analyzing each component concerning it. There are so many vulnerabilities, but all cannot be assessed due to the heterogeneity of devices and their connection in a small network. IoT can support a wide range of technologies and programs in various domains, including smart cities and smart houses. For monitoring, data exchange, and other operations in the given service, IoT smart objects communicate with other elements such as proxies, mobile devices, and data collectors. While such components help solve various social issues and provide consumers with modern advanced services, their restricted computing capacities render them vulnerable to well-known protection and privacy risks.

Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6131
Author(s):  
Mamun Abu-Tair ◽  
Soufiene Djahel ◽  
Philip Perry ◽  
Bryan Scotney ◽  
Unsub Zia ◽  
...  

Internet of Things (IoT) technology is increasingly pervasive in all aspects of our life and its usage is anticipated to significantly increase in future Smart Cities to support their myriad of revolutionary applications. This paper introduces a new architecture that can support several IoT-enabled smart home use cases, with a specified level of security and privacy preservation. The security threats that may target such an architecture are highlighted along with the cryptographic algorithms that can prevent them. An experimental study is performed to provide more insights about the suitability of several lightweight cryptographic algorithms for use in securing the constrained IoT devices used in the proposed architecture. The obtained results showed that many modern lightweight symmetric cryptography algorithms, as CLEFIA and TRIVIUM, are optimized for hardware implementations and can consume up to 10 times more energy than the legacy techniques when they are implemented in software. Moreover, the experiments results highlight that CLEFIA significantly outperforms TRIVIUM under all of the investigated test cases, and the latter performs 100 times worse than the legacy cryptographic algorithms tested.


2018 ◽  
Vol 7 (1.8) ◽  
pp. 249 ◽  
Author(s):  
Satvika Marrapu ◽  
Satyanarayana Sanakkayala ◽  
Arun kumar Vempalli ◽  
Sai Krishna Jayavarapu

The system is regarding the remotely overseen Door availability and voice alarming with the help of Smart Phone. It captures the guest picture at the Door as Email caution. Use of Smart home security control framework became essential in our day to day life. This paper describes the outline of an advanced home security framework. In this method the door availability has been controlled based on guest character by considering the human movement location and remotely checking innovation. This paper describes the remote control framework execution and organization and allows the validated individuals in to a home as it were. This Security Framework can be implemented by using switch/calling bell and a Camera module. The camera module captures the pictures of the guest separately and ideally to make the home security framework alive on demand. In this method we used an Electromagnetic entryway bolt module which created the entryway availability. This proposed framework deploys a controller interface framework and LPC 2148. If a guest press calling bell at the door then the web Camera module is interfaced with switch to capture pictures and send these pictures as Email caution with the help of TCP/IP protocol. Now, we can control this home security system by seeing camera module video stream with the help of Smart cell Phone. Like this, the proposed home security framework allows us for sending an order as a reply of voice ready whenever the gatecrasher recognized using smart phone. By using android stage and improved JavaScript, the Clients can see the guest on the screen and able to control the entryway by locking or unlocking the door. This software can be used in a wide range of application where the physical nearness can't be possible forever i. e in territories. The entire control framework is implemented with LPC 2148 now a days usage of smart lock system is increasing day by day in wide range of applications. This efficient effort less low power calling bell based home lock system is essential for security purpose in every home and offices. So many nations are worked on home based locking frame work to implement advanced technologies in it. Most of smart houses and business offices are associated with a chip for security purpose. Though numerous advancements take place, the clients face troubles i. e interface problems in utilizing this smart lock system. To avoid such type of issues i proposed microcontroller. This advanced home security system is useful for real time home environment.


2020 ◽  
Vol 62 (5-6) ◽  
pp. 215-226
Author(s):  
Ege Korkan ◽  
Sebastian Kaebisch ◽  
Sebastian Steinhorst

AbstractThe Internet of Things (IoT) is bringing Internet connectivity to a wide range of devices which results in an increasing number of products for smart home, industry 4.0 and/or smart cities. Even though IoT has the ambition to reach an increasing amount of devices and be scalable across different domains, lack of interoperability inhibits this scope to be attained. Recent standardization efforts by the World Wide Web Consortium (W3C) are addressing the interoperability problem by the means of Thing Description (TD) that allows humans and machines to understand the capabilities and communication interfaces of IoT devices. In this paper, we show a more systematic and streamlined development of IoT devices and systems that relies on the TD standard. We introduce three different complementary methods that can be applied independently in the different stages of the development, or as a framework to streamline the development of IoT devices and systems. As a result of using the TD standard, interoperability between IoT devices of various stakeholders is ensured from early stages and the time to market is reduced.


Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1777
Author(s):  
Atef Ibrahim ◽  
Fayez Gebali

Internet of things (IoT) technology provides practical solutions for a wide range of applications, including but not limited to, smart homes, smart cities, intelligent grid, intelligent transportation, and healthcare. Security and privacy issues in IoT are considered significant challenges that prohibit its utilization in most of these applications, especially relative to healthcare applications. Cryptographic protocols should be applied at the different layers of IoT framework, especially edge devices, to solve all security concerns. Finite-field arithmetic, particularly field multiplication and squaring, represents the core of most cryptographic protocols and their implementation primarily affects protocol performance. In this paper, we present a compact and combined two-dimensional word-based serial-in/serial-out systolic processor for field multiplication and squaring over GF(2m). The proposed structure features design flexibility to manage hardware utilization, execution time, and consumed energy. Application Specific Integrated Circuit (ASIC) Implementation results of the proposed word-serial design and the competitive ones at different embedded word-sizes show that the proposed structure realizes considerable saving in the area and consumed energy, up to 93.7% and 98.2%, respectively. The obtained results enable the implementation of restricted cryptographic primitives in resource-constrained IoT edge devices such as wearable and implantable medical devices, smart cards, and wireless sensor nodes.


Sensors ◽  
2019 ◽  
Vol 19 (2) ◽  
pp. 326 ◽  
Author(s):  
Ashutosh Dwivedi ◽  
Gautam Srivastava ◽  
Shalini Dhar ◽  
Rajani Singh

Medical care has become one of the most indispensable parts of human lives, leading to a dramatic increase in medical big data. To streamline the diagnosis and treatment process, healthcare professionals are now adopting Internet of Things (IoT)-based wearable technology. Recent years have witnessed billions of sensors, devices, and vehicles being connected through the Internet. One such technology—remote patient monitoring—is common nowadays for the treatment and care of patients. However, these technologies also pose grave privacy risks and security concerns about the data transfer and the logging of data transactions. These security and privacy problems of medical data could result from a delay in treatment progress, even endangering the patient’s life. We propose the use of a blockchain to provide secure management and analysis of healthcare big data. However, blockchains are computationally expensive, demand high bandwidth and extra computational power, and are therefore not completely suitable for most resource-constrained IoT devices meant for smart cities. In this work, we try to resolve the above-mentioned issues of using blockchain with IoT devices. We propose a novel framework of modified blockchain models suitable for IoT devices that rely on their distributed nature and other additional privacy and security properties of the network. These additional privacy and security properties in our model are based on advanced cryptographic primitives. The solutions given here make IoT application data and transactions more secure and anonymous over a blockchain-based network.


Sign in / Sign up

Export Citation Format

Share Document