Survey on smart homes: Vulnerabilities, risks, and countermeasures

被引:31
|
作者
Hammi, Badis [1 ]
Zeadally, Sherali [2 ]
Khatoun, Rida [3 ]
Nebhen, Jamel [4 ]
机构
[1] EPITA Engn Sch, Le Kremlin Bicetre, France
[2] Univ Kentucky, Lexington, KY USA
[3] Inst Mines Telecom Paris, Paris, France
[4] Prince Sattam Bin Abdulaziz Univ, Al Kharj, Saudi Arabia
关键词
Home; IoT; Security; Vulnerability; Attack; Threat; Solution; IOT SECURITY; AUTHENTICATION SCHEME; INTERNET; THINGS; BLOCKCHAIN; SYSTEM; FRAMEWORK; NETWORK; PRIVACY; ATTACKS;
D O I
10.1016/j.cose.2022.102677
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last few years, the explosive growth of Internet of Things (IoT) has revolutionized the way we live and interact with each other as well as with various types of systems and devices which form part of the Information Communication Technology (ICT) infrastructure. IoT is having a significant impact on various application domains including healthcare, smart home, transportation, energy, agriculture, manufacturing, and many others. We focus on the smart home environment which has attracted a lot of attention from both academia and industry recently. The smart home provides a lot of convenience to home users but it also opens up various risks that threaten both the security and privacy of the users. In contrast to previous works on smart home security and privacy, we present an overview of smart homes from both academic and industry perspectives. Next we discuss the security requirements, challenges and threats associated with smart homes. Finally, we discuss countermeasures that can be deployed to mitigate the identified threats. (C) 2022 Elsevier Ltd. All rights reserved.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] Security Vulnerabilities and Countermeasures of Smart Contracts: A Survey
    Sifra, Epherem Merete
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 512 - 515
  • [2] A Survey on Vulnerabilities and Countermeasures in the Communications of the Smart Grid
    Lazaro, Jesus
    Astarloa, Armando
    Rodriguez, Mikel
    Bidarte, Unai
    Jimenez, Jaime
    [J]. ELECTRONICS, 2021, 10 (16)
  • [3] A Survey on Web Application Vulnerabilities and Countermeasures
    Atashzar, Hasty
    Torkaman, Atefeh
    Bahrololum, Marjan
    Tadayon, Mohammad H.
    [J]. 2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 647 - 652
  • [4] Security Vulnerabilities of SGX and Countermeasures: A Survey
    Fei, Shufan
    Yan, Zheng
    Ding, Wenxiu
    Xie, Haomeng
    [J]. ACM COMPUTING SURVEYS, 2021, 54 (06)
  • [5] A survey on blockchain cybersecurity vulnerabilities and possible countermeasures
    Hasanova, Huru
    Baek, Ui-jun
    Shin, Mu-gon
    Cho, Kyunghee
    Kim, Myung-Sup
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2019, 29 (02)
  • [6] Smart Meter Security: Vulnerabilities, Threat Impacts, and Countermeasures
    Khattak, Asad Masood
    Khanji, Salam Ismail
    Khan, Wajahat Ali
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM) 2019, 2019, 935 : 554 - 562
  • [7] Security Concerns in Smart Grids: Threats, Vulnerabilities and Countermeasures
    Khelifa, Benahmed
    Abla, Smahi
    [J]. PROCEEDINGS OF 2015 3RD IEEE INTERNATIONAL RENEWABLE AND SUSTAINABLE ENERGY CONFERENCE (IRSEC'15), 2015, : 772 - 777
  • [8] Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures
    Barrowclough, John Patrick
    Asif, Rameez
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [9] A survey of common security vulnerabilities and corresponding countermeasures for SaaS
    Kim, Donghoon
    Vouk, Mladen A.
    [J]. 2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 59 - 63
  • [10] On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
    Kumar, Rakesh
    Goyal, Rinkaj
    [J]. COMPUTER SCIENCE REVIEW, 2019, 33 : 1 - 48