Skip to main content

Security over Smart Home Automation Systems: A Survey

  • Conference paper
  • First Online:
Developments and Advances in Defense and Security (MICRADS 2018)

Abstract

Internet of Things (IoT) is growing every day since it has allowed the interconnection of different devices existent in smart environments e.g. home environment, and because it has allowed improving or supporting different services such as physical security, energy consumption management, entertainment among others. The smart home environment, also known as Smart Home Automation Systems (SHAS), has properly attacked and solved the domestic needs of families around the world. However, in spite of having a protocol stack architecture to govern the rules of communication and exchange of information, the security and privacy requirements have been displaced to a second place. For this reason, this paper surveys several previous works from the security perspective with the purpose of providing the most important approaches in this field. Additionally, this work provides recommendations and best practices from different security perspectives.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gartner Says 4.9 Billion Connected Things Will Be in Use in 2015. https://www.gartner.com/newsroom/id/2905717. Accessed 27 Nov 2017

  2. Ul Rehman, S., Manickam, S.: A study of smart home environment and its security threats. Int. J. Reliab. Qual. Saf. Eng. 23(3), 1–9 (2016)

    Article  Google Scholar 

  3. Tank, B., Upadhyay, H., Patel, H.: A survey on IoT privacy issues and mitigation techniques. In: Proceedings of Second International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016, pp. 1–4 (2016)

    Google Scholar 

  4. Pirbhulal, S., et al.: A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors 17(1), 69 (2016)

    Article  Google Scholar 

  5. Barcena, M.B., Wueest, C.: Insecurity in the Internet of Things (2015)

    Google Scholar 

  6. Gheorghe, A.: The Internet of Things: Risk in the Connected Home (2016)

    Google Scholar 

  7. Salman, T., Jain, R.: Networking protocols and standards for internet of things. In: Geng, H. (ed.) Internet of Things and Data Analytics Handbook, pp. 215–238. Wiley, Hoboken (2017)

    Google Scholar 

  8. Rayes, A., Salam, S.: IoT protocol stack: a layered view. In: Rayes, A., Salam, S. (eds.) Internet of Things from Hype to Reality, pp. 93–138. Springer, Cham (2017)

    Chapter  Google Scholar 

  9. Lin, H., Bergmann, N.: IoT privacy and security challenges for smart home environments. Information 7(3), 44 (2016)

    Article  Google Scholar 

  10. Reuter, T.: Security analysis of wireless communication standards for home automation, p. 92 (2013)

    Google Scholar 

  11. Mendes, T., Godina, R., Rodrigues, E., Matias, J., Catalão, J.: Smart home communication technologies and applications: wireless protocol assessment for home area network resources. MDPI 8(7), 1–33 (2015)

    Google Scholar 

  12. Schwarz, D.: The Current State of Security in Smart Home Systems (0-14) (2016)

    Google Scholar 

  13. Wurm, J., Hoang, K., Arias, O., Sadeghi, A.R., Jin, Y.: Security analysis on consumer and industrial IoT devices. In: 2016 21st Asia and South Pacific Design Automation Conference, pp. 519–524 (2016)

    Google Scholar 

  14. S. Avizheh, T. T. Doan, X. Liu, nd R. Safavi-Naini: A secure event logging system for smart homes. In: Proceedings of 2017 Workshop on Internet Things Security and Privacy - IoTS&P 2017, pp. 37–42 (2017)

    Google Scholar 

  15. Iuchi, K., Matsunaga, T., Toyoda, K., Sasase, I.: Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. In: 2015 21st Asia-Pacific Conference on Communications, APCC 2015, vol. 4, no. 11, pp. 299–303(2016)

    Google Scholar 

  16. Hafeez, I., Ding, A.Y.: IOTURVA: Securing Device-to-Device (D2D) Communication in IoT Networks, pp. 1–6 (2017)

    Google Scholar 

  17. DeMarinis, N., Fonseca, R.: Toward usable network traffic policies for IoT devices in consumer networks. In: Proceedings of 2017 Workshop on Internet Things Security and Privacy - IoTS&P 2017, pp. 43–48(2017)

    Google Scholar 

  18. W. Jang, A. Chhabra, A. Prasad: Enabling multi-user controls in smart home devices, In: Proceedings of 2017 Workshop on Internet Things Security and Privacy - IoTS&P 2017, pp. 49–54 (2017)

    Google Scholar 

  19. Ishengoma, F.: Authentication system for smart homes based on ARM7TDMI-S and IRIS-fingerprint recognition technologies. CiiT Int. J. Program. Device Circ. Syst. 6(6), 64–69 (2014)

    Google Scholar 

  20. Qiu, Y., Ma, M.: An authentication and key establishment scheme to enhance security for M2 M in 6LoWPANs. In: 2015 IEEE International Conference on Communication Workshop (ICCW), pp. 2671–2676(2015)

    Google Scholar 

  21. Hsueh, S.-C., Li, J.-T.: Secure transmission protocol for the IoT. In: Proceedings of the 3rd International Conference on Industrial and Business Engineering - ICIBE 2017, pp. 73–76 (2017)

    Google Scholar 

  22. Chatterjee, U., Chakraborty, R.S., Mukhopadhyay, D.: A PUF-based Secure Communication Protocol for IoT, V(212), (2015)

    Google Scholar 

  23. Jacobsson, A., Boldt, M., Carlsson, B.: A risk analysis of a smart home automation system. Futur. Gener. Comput. Syst. 56, 719–733 (2016)

    Article  Google Scholar 

  24. Jacobsson, A., Davidsson, P.: Towards a model of privacy and security for smart homes. In: 2015 IEEE 2nd World Forum Internet Things, pp. 727–732 (2015)

    Google Scholar 

  25. Chandramohan, J., Nagarajan, R., Satheeshkumar, K., Ajithkumar, N., Gopinath, P.A., Ranjithkumar, S.: Intelligent smart home automation and security system using Arduino and Wi-Fi. Int. J. Eng. Comput. Sci. 6(3), 20694–20698 (2017)

    Google Scholar 

  26. Yoo, S.G., Barriga, J.J.: Privacy-aware authentication for Wi-Fi based indoor positioning systems, vol. 719 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jhonattan J. Barriga A .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Barriga A, J.J., Yoo, S.G. (2018). Security over Smart Home Automation Systems: A Survey. In: Rocha, Á., Guarda, T. (eds) Developments and Advances in Defense and Security. MICRADS 2018. Smart Innovation, Systems and Technologies, vol 94. Springer, Cham. https://doi.org/10.1007/978-3-319-78605-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78605-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78604-9

  • Online ISBN: 978-3-319-78605-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics