Abstract
Internet of Things (IoT) is growing every day since it has allowed the interconnection of different devices existent in smart environments e.g. home environment, and because it has allowed improving or supporting different services such as physical security, energy consumption management, entertainment among others. The smart home environment, also known as Smart Home Automation Systems (SHAS), has properly attacked and solved the domestic needs of families around the world. However, in spite of having a protocol stack architecture to govern the rules of communication and exchange of information, the security and privacy requirements have been displaced to a second place. For this reason, this paper surveys several previous works from the security perspective with the purpose of providing the most important approaches in this field. Additionally, this work provides recommendations and best practices from different security perspectives.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Gartner Says 4.9 Billion Connected Things Will Be in Use in 2015. https://www.gartner.com/newsroom/id/2905717. Accessed 27 Nov 2017
Ul Rehman, S., Manickam, S.: A study of smart home environment and its security threats. Int. J. Reliab. Qual. Saf. Eng. 23(3), 1–9 (2016)
Tank, B., Upadhyay, H., Patel, H.: A survey on IoT privacy issues and mitigation techniques. In: Proceedings of Second International Conference on Information and Communication Technology for Competitive Strategies, ICTCS 2016, pp. 1–4 (2016)
Pirbhulal, S., et al.: A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors 17(1), 69 (2016)
Barcena, M.B., Wueest, C.: Insecurity in the Internet of Things (2015)
Gheorghe, A.: The Internet of Things: Risk in the Connected Home (2016)
Salman, T., Jain, R.: Networking protocols and standards for internet of things. In: Geng, H. (ed.) Internet of Things and Data Analytics Handbook, pp. 215–238. Wiley, Hoboken (2017)
Rayes, A., Salam, S.: IoT protocol stack: a layered view. In: Rayes, A., Salam, S. (eds.) Internet of Things from Hype to Reality, pp. 93–138. Springer, Cham (2017)
Lin, H., Bergmann, N.: IoT privacy and security challenges for smart home environments. Information 7(3), 44 (2016)
Reuter, T.: Security analysis of wireless communication standards for home automation, p. 92 (2013)
Mendes, T., Godina, R., Rodrigues, E., Matias, J., Catalão, J.: Smart home communication technologies and applications: wireless protocol assessment for home area network resources. MDPI 8(7), 1–33 (2015)
Schwarz, D.: The Current State of Security in Smart Home Systems (0-14) (2016)
Wurm, J., Hoang, K., Arias, O., Sadeghi, A.R., Jin, Y.: Security analysis on consumer and industrial IoT devices. In: 2016 21st Asia and South Pacific Design Automation Conference, pp. 519–524 (2016)
S. Avizheh, T. T. Doan, X. Liu, nd R. Safavi-Naini: A secure event logging system for smart homes. In: Proceedings of 2017 Workshop on Internet Things Security and Privacy - IoTS&P 2017, pp. 37–42 (2017)
Iuchi, K., Matsunaga, T., Toyoda, K., Sasase, I.: Secure parent node selection scheme in route construction to exclude attacking nodes from RPL network. In: 2015 21st Asia-Pacific Conference on Communications, APCC 2015, vol. 4, no. 11, pp. 299–303(2016)
Hafeez, I., Ding, A.Y.: IOTURVA: Securing Device-to-Device (D2D) Communication in IoT Networks, pp. 1–6 (2017)
DeMarinis, N., Fonseca, R.: Toward usable network traffic policies for IoT devices in consumer networks. In: Proceedings of 2017 Workshop on Internet Things Security and Privacy - IoTS&P 2017, pp. 43–48(2017)
W. Jang, A. Chhabra, A. Prasad: Enabling multi-user controls in smart home devices, In: Proceedings of 2017 Workshop on Internet Things Security and Privacy - IoTS&P 2017, pp. 49–54 (2017)
Ishengoma, F.: Authentication system for smart homes based on ARM7TDMI-S and IRIS-fingerprint recognition technologies. CiiT Int. J. Program. Device Circ. Syst. 6(6), 64–69 (2014)
Qiu, Y., Ma, M.: An authentication and key establishment scheme to enhance security for M2 M in 6LoWPANs. In: 2015 IEEE International Conference on Communication Workshop (ICCW), pp. 2671–2676(2015)
Hsueh, S.-C., Li, J.-T.: Secure transmission protocol for the IoT. In: Proceedings of the 3rd International Conference on Industrial and Business Engineering - ICIBE 2017, pp. 73–76 (2017)
Chatterjee, U., Chakraborty, R.S., Mukhopadhyay, D.: A PUF-based Secure Communication Protocol for IoT, V(212), (2015)
Jacobsson, A., Boldt, M., Carlsson, B.: A risk analysis of a smart home automation system. Futur. Gener. Comput. Syst. 56, 719–733 (2016)
Jacobsson, A., Davidsson, P.: Towards a model of privacy and security for smart homes. In: 2015 IEEE 2nd World Forum Internet Things, pp. 727–732 (2015)
Chandramohan, J., Nagarajan, R., Satheeshkumar, K., Ajithkumar, N., Gopinath, P.A., Ranjithkumar, S.: Intelligent smart home automation and security system using Arduino and Wi-Fi. Int. J. Eng. Comput. Sci. 6(3), 20694–20698 (2017)
Yoo, S.G., Barriga, J.J.: Privacy-aware authentication for Wi-Fi based indoor positioning systems, vol. 719 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Barriga A, J.J., Yoo, S.G. (2018). Security over Smart Home Automation Systems: A Survey. In: Rocha, Á., Guarda, T. (eds) Developments and Advances in Defense and Security. MICRADS 2018. Smart Innovation, Systems and Technologies, vol 94. Springer, Cham. https://doi.org/10.1007/978-3-319-78605-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-78605-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78604-9
Online ISBN: 978-3-319-78605-6
eBook Packages: EngineeringEngineering (R0)