CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Internet of Things (IoT) of Smart Home: Privacy and Security

by Zaied Shouran, Ahmad Ashari, Tri Kuntoro Priyambodo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 39
Year of Publication: 2019
Authors: Zaied Shouran, Ahmad Ashari, Tri Kuntoro Priyambodo
10.5120/ijca2019918450

Zaied Shouran, Ahmad Ashari, Tri Kuntoro Priyambodo . Internet of Things (IoT) of Smart Home: Privacy and Security. International Journal of Computer Applications. 182, 39 ( Feb 2019), 3-8. DOI=10.5120/ijca2019918450

@article{ 10.5120/ijca2019918450,
author = { Zaied Shouran, Ahmad Ashari, Tri Kuntoro Priyambodo },
title = { Internet of Things (IoT) of Smart Home: Privacy and Security },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2019 },
volume = { 182 },
number = { 39 },
month = { Feb },
year = { 2019 },
issn = { 0975-8887 },
pages = { 3-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number39/30347-2019918450/ },
doi = { 10.5120/ijca2019918450 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:13:44.467339+05:30
%A Zaied Shouran
%A Ahmad Ashari
%A Tri Kuntoro Priyambodo
%T Internet of Things (IoT) of Smart Home: Privacy and Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 39
%P 3-8
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide smart services in a ubiquitous manner to the individuals. organization and people are wide accepting and adopting the functionalities offered by the smart home applications. this can be because of the various advantages, in easing users’ everyday life and work, provided by the rising internet of Things (IoT) technologies and devices, equipped with sensors, cameras, or actuators, and able either to accumulate information from the environment or to perform proper tasks. the main features of smart homes embrace real-time monitoring, remote control, safety from intruders, gas/fire alarm, and so on. Since among smart homes, sensitive and personal data are managed, security and privacy solutions should be put in place, to protect users/businesses’ data against violation try still on guarantee the supply of reliable services. As IoT home devices become increasingly ubiquitous, study’s findings and recommendations contribute to the broader understanding of users’ evolving attitudes towards privacy in smart homes.

References
  1. T. K. Priyambodo and Y. Prayudi, “Information security strategy on mobile device based egovernment,” ARPN J. Eng. Appl. Sci., vol. 10, no. 2, pp. 652–660, 2015.
  2. J. King, A. A.- Informatica, and undefined 2016, “A distributed security mechanism for resource-constrained IoT devices,” Informatica.si.
  3. O. Vermesan and P. Friess, Internet of things: converging technologies for smart environments and integrated ecosystems. 2013.
  4. S. Yoon, H. Park, and H. S. Yoo, “Security Issues on Smarthome in IoT Environment,” Springer, Berlin, Heidelberg, 2015, pp. 691–696.
  5. A. M.-2014 I. I. C. on Distributed and undefined 2014, “Cybersecurity for personal medical devices internet of things,” computer.org.
  6. G. Mantas, D. Lymberopoulos, and N. Komninos, “Security in Smart Home Environment,” 2011.
  7. C. Lee, L. Zappaterra, Kwanghee Choi, and Hyeong-Ah Choi, “Securing smart home: Technologies, security challenges, and security requirements,” in 2014 IEEE Conference on Communications and Network Security, 2014, pp. 67–72.
  8. S. Lee, J. Kim, and T. Shon, “User privacy-enhanced security architecture for home area network of Smartgrid,” Multimed. Tools Appl.
  9. A. Jose, R. M.- SmartCR, and undefined 2015, “Smart home automation security,” researchgate.net.
  10. G. Agosta, A. Antonini, … A. B.-S. T., and undefined 2015, “Cyber-security analysis and evaluation for smart home management solutions,” ieeexplore.ieee.org.
  11. S. Chitnis, N. Deshpande, and A. Shaligram, “An Investigative Study for Smart Home Security: Issues, Challenges, and Countermeasures,” Wirel. Sens. Netw., vol. 08, no. 04, pp. 61–68, Apr. 2016.
  12. Y. Prayudi and A. Ashari, “A Study on Secure Communication for Digital Forensics Environment,” Artic. Int. J. Sci. Eng. Res., 2015.
  13. N. Komninos, E. Philippou, and A. Pitsillides, “Survey in Smart Grid and Smart Home Security: Issues, Challenges, and Countermeasures,” IEEE Commun. Surv. Tutorials, vol. 16, no. 4, pp. 1933–1954, 2014.
  14. C. Huth, J. Zibuschka, P. Duplys, and T. Guneysu, “Securing systems on the Internet of Things via physical properties of devices and communications,” in 2015 Annual IEEE Systems Conference (SysCon) Proceedings, 2015, pp. 8–13.
  15. J. Greensmith and Julie, “Securing the Internet of Things with Responsive Artificial Immune Systems,” in Proceedings of 2015 on Genetic and Evolutionary Computation Conference - GECCO ’15, 2015, pp. 113–120.
  16. R. A. Rahman and B. Shah, “Security analysis of IoT protocols: A focus in CoAP,” in 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), 2016, pp. 1–7.
  17. V. Sivaraman, H. H. Gharakheili, A. Vishwanath, R. Boreli, and O. Mehani, “Network-level security and privacy control for smart-home IoT devices,” in 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking, and Communications (WiMob), 2015, pp. 163–167.
  18. I. Sanchez et al., “Privacy leakages in Smart Home wireless technologies,” in 2014 International Carnahan Conference on Security Technology (ICCST), 2014, pp. 1–6.
  19. O. Bergmann, S. Gerdes, … S. S.-W., and undefined 2012, “Secure bootstrapping of nodes in a CoAP network,” ieeexplore.ieee.org.
  20. V. L. Shivraj, M. A. Rajan, M. Singh, and P. Balamuralidhar, “One time password authentication scheme based on elliptic curves for Internet of Things (IoT),” in 2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW), 2015, pp. 1–6.
  21. A. O. Santin, J. E. Marynowski, A. Witkovski, A. Santin, V. Abreu, and J. Marynowski, “An IdM and Key-based Authentication Method for providing Single Sign-On in IoT Secure E-Voting System View project Testing the Fault Tolerance and Security of MapReduce Systems View project An IdM and Key-based Authentication Method for providing Single Sign-On in IoT.”
  22. P. Rajiv, R. Raj, and M. Chandra, “Email based remote access and surveillance system for smart home infrastructure,” Perspect. Sci., vol. 8, pp. 459–461, Sep. 2016.
  23. A. Ukil, S. Bandyopadhyay, and A. Pal, “Privacy for IoT: Involuntary privacy enablement for smart energy systems,” in 2015 IEEE International Conference on Communications (ICC), 2015, pp. 536–541.
  24. D. Konidala, D. Kim, … C. Y.-J. of I., and undefined 2011, “Security framework for RFID-based applications in smart home environment,” koreascience.or.kr.
  25. O. Tomanek and L. Kencl, “Security and privacy of using AllJoyn IoT framework at home and beyond,” in 2016 2nd International Conference on Intelligent Green Building and Smart Grid (IGBSG), 2016, pp. 1–6.
  26. T. Mantoro, M. A. Ayu, and S. M. binti Mahmod, “Securing the authentication and message integrity for Smart Home using smart phone,” in 2014 International Conference on Multimedia Computing and Systems (ICMCS), 2014, pp. 985–989.
  27. J. He, Q. Xiao, P. He, and M. S. Pathan, “An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning,” 2017.
  28. B. Ali, A. Awad, B. Ali, and A. I. Awad, “Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes,” Sensors, vol. 18, no. 3, p. 817, Mar. 2018.
  29. S. H. Khan, M. Ali Akbar, F. Shahzad, M. Farooq, and Z. Khan, “Secure biometric template generation for multi-factor authentication,” Pattern Recognit., vol. 48, pp. 458–472, 2014.
  30. H. Lin, N. Bergmann, H. Lin, and N. W. Bergmann, “IoT Privacy and Security Challenges for Smart Home Environments,” Information, vol. 7, no. 3, p. 44, Jul. 2016.
  31. N. Azman and B. Masalah, “Perancangan Software Aplikasi Pervasive Smart Home,” vol. 2009, no. Snati, pp. 1–5, 2009.
  32. R. H. Weber, “Internet of Things – New security and privacy challenges,” Comput. Law Secur. Rev., vol. 26, no. 1, pp. 23–30, Jan. 2010.
  33. N. Jyoti, “Internet of Things (IoT) : Security, Applications, Challenges and Future Directions,” 2017.
  34. M. Abdur Razzaq et al., “Security Issues in the Internet of Things (IoT): A Comprehensive Study,” 2017.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of Things (IoT) Smart home Privacy and Security