You are on page 1of 17

Innovative Computing Review (ICR)

Volume 1 Issue 1, Summer 2021


ISSN(P): 2791-0024 ISSN(E): 2791-0032
Journal DOI: https://doi.org/10.32350/icr
Issue DOI: https://doi.org/10.32350/icr.0101
Homepage: https://journals.umt.edu.pk/index.php/icr

Security and Privacy Challenges for the IOT-based Smart Journal QR


Article:
Homes with Limited Resources and Adoption Immaturity

Author(s): Farzana Kausar Gondal

Article QR
Affiliation: Govt. Graduate College for Women, Islampura, Lahore, Pakistan

Received: March 31, 2021


Article History: Revised: June 23, 2021
Accepted: June 30, 2021
Available Online: June 30, 2021

M. R. Gondal, “Security and privacy challenges for the IOT-based


Citation: smart homes with limited resources and adoption immaturity”,
Innov Comput Rev, vol. 1, no. 1, pp. 43–59, 2021.
https://doi.org/10.32350/icr.0101.04

Copyright
Information: This article is open access and is distributed under the terms of
Creative Commons Attribution 4.0 International License

A publication of the

School of Systems and Technology

University of Management and Technology, Lahore, Pakistan


Security and Privacy Challenges for the IOT-based Smart Homes
with Limited Resources and Adoption Immaturity
Farzana Kausar Gondal1

ABSTRACT: The Internet of Things incorporates the security risk


(IoT) is technically a developing model assessment approach in order to
looking at the connectivity of different evaluate the potential security and
devices or “things” to each other, as privacy risks and challenges faced by
well as with the users and also with the smart homes. The basic goal of this
Internet. IoT is projected to be an study is to identify and point up diverse
important necessity for the security and privacy threats to smart
advancement of intelligent smart homes homes and to unveil the risks for their
to facilitate homeowners because it residents. The paper also presents
provides opportuneness and methods to mitigate the recognized
effectiveness in order to help them dangers. This study provides a
attain an improved quality of life. The foundation to future applications aimed
incorporation of IoT into smart homes at refining the security necessities of the
entails integrating devices with the IoT-based smart homes.
Internet. Even though it offers many INDEXED TERMS: Internet of Things
advantages to the users, it also poses (IoT), smart homes, risk assessments,
new security and privacy challenges security
based on connectivity, confidentiality,
integrity, authenticity, resource I. INTRODUCTION
limitation, and adoption immaturity. In most cases, the Internet of Things
These challenges make the IoT-based (IoT) is regarded as a problematic field
smart homes with limited resources with planned resolutions envisioned to
enormously susceptible to diverse be incorporated in diverse application
forms of security vulnerabilities. Thus, choices [1]. Nevertheless, the
it is pivotal to detect the probable confidentiality and safety requirements
security threats to establish a of critical engineering substructures and
comprehensive and secure status of subtle viable processes are far different
smart IOT-based homes. This paper from the necessities of a preliminary

1
Farzana Kausar Gondal is with Govt. Graduate College for Women, Islampura, Lahore,
Pakistan.
Farzana Kausar Gondal the corresponding author available at the given Email
ID:farzana.gondal@gmail.com

Innovative Computing Review


44
Volume 1 Issue 1, Summer 2021
Gondal

smart home setting. Moreover, the components of computing, security and


security implementation processes and privacy are the main challenges for the
infrastructure differ significantly among designing of smart homes. Contrary to
various domains of smart application the enterprises which dedicate specific
like smart healthcare, smart home smart professional resources to systems
governance [2]. In the home-related security, IoT with limited resources
settings, human problems are gives smart homes a relatively ad hoc
considered more critical than technical system with no dedicated system
issues. Subsequent research on many management resources, making it more
prevailing resolutions for improving vulnerable to privacy and security
IoT safety is presented in this paper. It threats [6]. This also contributes to the
determines the extensive security and challenge of the immature adoption of
privacy challenges for the IoT-based smart systems [7]. There is no
smart homes with limited resources [3]. awareness and adoption of these
The primary purpose of the IoT is to systems due to the lack of knowledge
increase the potential of the Internet by and training to use them, hence the
increasing the capability to connect with security and privacy of the systems are
many devices simultaneously [4]. By compromised and not fully
incorporating the IoT model, the users implemented.
obtain a platform to share equally the
II. IoT AND SMART HOMES
data provided by user behaviors and the
data gathered by the linked devices in A smart home-based setting can be
the physical space. regarded as a limited physical space
with various sensors, computational
There are diverse definitions of a software, electronic appliances, and a
smart home from a technical display screen that aids the exchange of
perspective but the primary idea is to information and interaction between the
link sensors, home applications and residents [8]. An overview is presented
smart devices through the Internet to in Figure 1.
attain the remote monitoring, access,
and control of a residential setting [5]. In many instances, IoT technology
Therefore, the smart home setting is expected to be implemented to the
targets the rich integration of minor already existing homes, portion by
computational schemes to find and portion, depending on the emergent
distribute personalized amenities to the security needs. Mostly, there is a lack of
operators. It emphasizes the progressively specialized sustenance in
computerization and regulation of the the project or process stages of IoT
environment to attain a secure and placement in a smart home [9].
private setting [3]. Thus, all the other

School of Systems and Technology


45
Volume 1 Issue 1, Summer 2021
Security and Privacy Challenges for the IOT-based…

Fig. 1. IoT- based smart home [14]


Although there are diverse smart comfort and setting. Still, neither of the
home designs, the lack of particular advantages is probable to be booked up
security approaches before home if these home systems are not safe and
control networks are interconnected trusted. In order to identify the privacy
poses great privacy and security issues and security challenges, this study
to smart homes. Currently, there are conducts the security evaluation
many networking standards that can be approach of the IoT-based smart homes
incorporated into smart homes such as taking into consideration limited
Bluetooth, Wi-Fi, and Z-Wave [1]. resources and immature adoption by the
Each one of these has its advantages and users.
disadvantages. Moreover, imagining
III. SECURITY AND PRIVACY THREATS
such an assorted network environment
IN THE IOT-BASED SMART HOME
with diverse procedures to be
competently secured and manageable A. IoT Architecture for Smart Homes
presents many detrimental challenges IoT deployment in smart homes
[10]. The smart home offers additional entails the incorporation of different

Innovative Computing Review


46
Volume 1 Issue 1, Summer 2021
Gondal

Fig. 2. Smart home based IoT architecture [3]


technologies such as Wireless Sensor Even though IoT-based smart
Networks (WSNs), Internet Protocol homes are completely different in their
(IP), Wireless Fidelity (Wi-Fi), RFID, configurations, the entire outlook of
Bluetooth, and different sensors [11]. security issues is similarly relatable to
The main goal of the IoT protocol is to the existing network connections.
help the users to distinctively identify,
B. Threats to Smart Homes
control and access other things at their
convenience through the Internet [12]. Although there are many threats to
The interrelated device network can smart systems but the more critical and
yield diverse intelligence and vulnerable ones encountered by smart
independent applications that offer homes are confidentiality, authentication,
many advantages. Technically, a home and unauthorized access.
authentication system is made up of five 1) Confidentiality Threats. These are
components or units. These include the threats that arise due to the
appliances under regulation, sensing breaching of the confidentiality of data
devices and actuators, the regulator, the or unauthorized access of data. For
control network, and the remote-control instance, privacy breaches in home-
devices [13]. A comprehensive image based monitoring structures can result
of the IoT devices, service providers, in the unintentional issue of the leakage
diverse layers of IoT and their probable of subtle banking information [14].
safety matters are illustrated in Figure 2. Even information that is seemingly
harmless such as the temperature of

School of Systems and Technology


47
Volume 1 Issue 1, Summer 2021
Security and Privacy Challenges for the IOT-based…

internal home setting and the smart home appliances are wireless
information of air conditioning system networked and battery operated with
might be analyzed to determine if the little operative duty sequence, thus the
house is currently occupied or not [15]. flooding of the network with many
This acts as a basis for break-ins. requirements can result in an energy
Moreover, the loss of privacy regarding exhaustion outbreak leading to a denial
passwords and pin codes results in of services (DOS).
unauthorized access to the system.
C. Privacy in Smart Homes
2) Authentication Threats. Verification Privacy refers to a state of not being
threats can result in the identification observed and disturbed by others.
and monitoring of data by unauthorized Privacy emphasizes protecting people’s
personnel, causing interference [1]. For identity, location, information, and
instance, unauthenticated environment movement. [18]. Smart homes’
or user’s status signals may confuse the sensitive information includes aspects
supervisor of the house into assuming such as digital information, photos, and
that there is an emergency condition. videos. Smart devices with dynamic IP
They then rush to open doors and cameras can capture pictures and videos
windows for the exit but, in the real wherever. Feature microphones have
sense, allow unauthorized entry into the the ability to snoop on personal
house. Also, if software updates are not discussions. There are mainly two
properly authenticated, then systems privacy threats facing smart homes.
might as well be altered [1].
Data Privacy Threats: Information
3) Access Threats. Access threats are confidentiality is a significant concern
the primary threats facing the IoT-based when it comes to the exchange of
smart homes. Unauthorized access to confidential data [19]. This is because
system controls, specifically everything is or will be connected to the
administrative positions, makes the existing internet, thus penetrating into
overall structure insecure [16]. This can the network and access to network tariff
be attained over unauthorized access via remains less challenging for cyber
PIN key codes or through the use of terrorists. By merely getting access to a
illegitimate devices linked to the part of the system, a hacker may obtain
system. Even though maximum the general information about the
regulation of the system can be attained, homeowner [3].
still having an unofficial link to the
system may lead to the stealing of Context-aware Privacy: Context
network bandwidth and the denial of cognizance entails noticing, sensing,
service (DOS) to genuine network and tracing operators’ movements and
operators [17]. Subsequently, most actions, as well as actions by the means

Innovative Computing Review


48
Volume 1 Issue 1, Summer 2021
Gondal

of data to offer amenities that might be These include aspects such as


of importance to them [17]. Context fingerprinting, face recognition, voice
cognizance has the capability of sensing recognition, smart cards, and RFIDs
and responding when things change, for that allow access and control [3]. IoT
example, if devices are moved to a new devices connected in smart households
location. with limited resources do not have the
required computational control and also
IV. SECURITY CHALLENGES IN THE
have an inadequate storage capacity.
IOT-BASED SMART HOMES
Figure 3 shows household devices that
Security refers to a state of being require computational control. Thus,
which is free from distress [15]. implementing intensive security
Security deals with aspects of solutions is a challenging approach.
messaging, confidentiality, integrity,
and authenticity. IoT strategies are used In order to provide a protected
to gather and process an enormous connection among IoT devices and the
quantity of individual information that gateway to the smart home-based
is very delicate. Having IoT devices setting a dispersed encryption approach
with limited resources poses greater is used, for instance, triangle-based
risks to smart homes. Home security in security algorithms. IoT-based smart
smart homes relies on biometric households are extremely vulnerable to
identification recognition systems. intrusions [3].

Fig. 3. Smart Home Devices [13]

School of Systems and Technology


49
Volume 1 Issue 1, Summer 2021
Security and Privacy Challenges for the IOT-based…

They face the following security and and care of smart home appliances
privacy challenges. easier and to enhance security.
A. Lack of Technical Support B. Openness of the Networked Systems
The absence of technical support is The openness of the networked
the main problem with the housed system is among the major weaknesses
environment of smart homes. Households of the IoT-based smart households [3].
are loaded with monotonous, tedious, Smart home strategies are linked to
and fault-related physical equipment cyberspace. Figure 4 highlights the
required to manage smart devices in the points of weakness of systems
home network, mainly due to little corresponding to the layers of IoT. This
power and little computationally provides a greater chance for attackers
controlled structure strategies. This can to remotely access the networks and
pose a major security issue [20]. Thus, control their interface, either directly or
for the fruitful execution of smart indirectly. They can also upload malware
homes, the protected auto-configuration to the devices, thus interrupting the entire
method is used to make the connection system.

Fig. 4. An IoT scheme from the provider, system, and operator viewpoints. The
image pinpoints the weaknesses in the IoT layers [3]

Innovative Computing Review


50
Volume 1 Issue 1, Summer 2021
Gondal

C. Physical Accessibility to the System malevolent attacks. Figure 6 shows the


cloud-based architecture of a smart
Physical accessibility to the system
home. For instance, the unintentional
is another paramount safety and
removal of information by cloud service
confidentiality issue of the IoT-based
providers and unprecedented events
smart households [21]. The
such as fire outbreaks can result in the
diversification of IoT devices is also a
permanent loss of data [5].
most significant and serious challenge
that needs to be fixed on an urgent basis. E. Weak Passwords
Figure 5 illustrates the diversification of The use of weak passwords is
IoT devices in the IoT-based smart among the biggest issues with the IoT-
homes. A device comes with based smart homes. The users of the
heterogeneous networking protocols network systems need to take care of
and various supporting software as well their passwords and should use
as different features due to diverse authenticated passwords that they can
manufacturers [3]. easily remember [14]. Weak password
D. Data at Risk in the Cloud selection also shows immaturity
towards system use.
Information kept in the cloud can be
lost for many causes apart from

Fig. 5. Diversification of the IoT Devices [9]

School of Systems and Technology


51
Volume 1 Issue 1, Summer 2021
Security and Privacy Challenges for the IOT-based…

Fig. 6. Cloud-based Architecture of a Smart Home [29]


F. Fixed Firmware the device interface [23]. It implies that
a smart device’s firmware should be
In most instances, to mitigate
kept updated to help solve security
security vulnerabilities, reprogramming
susceptibilities and to advance its
and software updates are needed.
operationality. The smart home setting
Computerized functioning systems are
typically lacks technical assistance
habitually automatically updated when
making this process challenging. There
safety susceptibilities are recognized
are limited smart home devices that
[1]. Likewise, there are regular software
offer steady software update services to
updates sent to mobile devices such as
resolve the existing security issues.
smartphones, which lower security
Currently, there is little motivation to
vulnerabilities as much as possible.
patch the software frequently and to stay
However, smart homes have a fixed
ahead of security breaches in smart
firmware that mostly does not support
home appliances with low cost.
these dynamic patches. Firmware is a
Attackers can easily block new software
kind of software that is automated into
and disguise the legitimate old firmware
the non-volatile memory of a smart
with security vulnerabilities [1].
device and remains an indispensable
part of the IoT systems [22]. It G. Unsecured Network Connectivity
unswervingly connects with the Although some branded schemes
hardware and thus operates the system’s such as smart health where 24-hour care
processes and functions by initializing

Innovative Computing Review


52
Volume 1 Issue 1, Summer 2021
Gondal

systems have well-formulated standards and immature, it is challenging to create


of compliant securities, most of the indistinct workflows [23]. Most smart
current smart homes do not have system users do not have an adequate
devices with well-implemented security experience of executing IoT
systems [24]. As stipulated earlier, most technologies, which can be difficult
smart homes rely on the Internet. given the inconsistency of information
However, many times their networks that is mostly extricated from sources in
are not secure. This is because of the smart homes ranging from an array of
smart home devices. Smart homes are sensors. There is no appropriate
not built from scratch but they are based awareness and adoption of the smart
on the existing homes [4]. Thus, an systems [7]. This is the result of the lack
individual cannot take steps to of knowledge and adequate training
configure their wireless networks with about the use of these systems. There is
the specifications of their security in a deficiency of dependable means to
place. Security steps are largely ignored create the emerging smart technology
during the installation of wireless readiness, capabilities and to avail their
networks which leaves the networks benefits. There is also an increased lack
more open to anyone within the network of systematic knowledge transfer from
connectivity range [25]. This makes it different frameworks towards the
easy for cyber terrorists to access the industry. In most cases, progressively
network and spy on the information technologies from their earliest stages
traffic. The leading cause of this type of are always difficult to adopt.
security vulnerability is the lack of Respondents lack adequate funding
dedicated security personnel. Such instruments required for early
personnel are expected to manage technological development. The
network complexities in smart homes challenge of quantifying the benefits
and make them less vulnerable. Few and costs of these technologies makes it
households can afford these harder to make supportive decisions for
professionals to foster the existing need their implementation [26].
of network administration aid. As an
V. EXISTING SECURITY SUPPORT
alternative, unprofessional
FOR IOT
householders are assumed to have the
abilities to manage their systems As a result of their low cost, IoT
simply, securely, and strongly [15]. devices are usually not very powerful.
Most of these devices use less energy,
H. Immature Adoption of Smart have limited memories, and use a low-
Systems end microcontroller [27]. Such
Given the idea that the IoT market controllers have the specifications of
and smart homes are relatively young standalone controllers like those in air

School of Systems and Technology


53
Volume 1 Issue 1, Summer 2021
Security and Privacy Challenges for the IOT-based…

Fig. 7. Current security standards for the existing IoT security protocols [1]
conditioners. These aspects have made VI. COUNTERMEASURES FOR THE
it more challenging to integrate changes SECURITY AND PRIVACY CHALLENGES
as a result of already designed IPs. FACING THE IOT-BASED SMART
Several internet services task force have HOMES
been formulated to counter these issues. Smart homes can be made safer and
Their efforts regarding IoT standards more private in many ways. In Figure 8,
have played a significant part in the some security vulnerabilities and
formulation of the required lightweight prevention methods of an actual smart
communication protocols for the home setting are highlighted.
controlled environment via the existing
IP network [28]-[30]. Even with these  Security awareness and training,
specifications put in place, there still that is, providing awareness and
exist the above discussed security and training programs about possible
privacy challenges in smart homes. security vulnerabilities and
Numerous Internet Engineering Task challenges will ensure system
Forces (IETFs) and working assemblies configuration and appropriate
have been formulated to solve these performance by authentic
issues as depicted in Figure 7 [1]. IETF personnel.
adjustment work regarding IoT has  Data encryption and
played a dynamic role in the formation authentication
of the much needed lightweight  Encryption and monitoring of
communication protocols for controlled network traffic
surroundings over the existing IP  Monitoring systems’ performance
network [1]. Figure 7 shows the current  Replacement of default
security standards for the existing IoT configuration
security procedures.  Secure physical locations

Innovative Computing Review


54
Volume 1 Issue 1, Summer 2021
Gondal

 Set-up to secure Wi-Fi networks:  The use of intrusion detection


Homeowners should avoid using systems can be helpful in
insecure network connectivity monitoring and reporting possible
such as Wi-Fi that could give attacks.
hackers access to private  Also, the use of strong encryption
information in a smart home mechanisms should be
environment. encouraged to aid in securing
 Homeowners should restrict traffic transmissions.
physical access of the devices to These are just a few measures
unauthorized individuals.

Fig. 8. Security vulnerabilities and prevention methods of an actual smart home


environment are highlighted [3]
VII. CONCLUSION extremely susceptible to diverse safety
pressures emanating from both external
Incorporating the IoT technology in
and internal home environment. This is
smart homes yields multifaceted
due to limited resourced devices and
outcomes. These include both
adoption immaturity linked with the
opportunities and security threats. From
lack of knowledge about the
the discussion above, it is evident that
technicality of the system. If a device is
the IoT-based smart households are

School of Systems and Technology


55
Volume 1 Issue 1, Summer 2021
Security and Privacy Challenges for the IOT-based…

compromised, then its user’s privacy, 2016.


confidentiality, and security is in great https://doi.org/10.1016/j.future.20
danger. Thus, suitable measures are 15.09.003
needed to be put in place to make the
[5] S. J. Darby, "Smart technology in
smart home security implementation the home: time for more clarity,"
process a security bounded process. It Building Research & Information,
will guarantee that all the pertinent vol. 46, no. 1, pp. 140-147, 2018.
fundamental security risks are https://doi.org/10.1080/09613218.
discovered beforehand. 2017.1301707
References [6] Y. Liu, S. Hu, and T.-Y. Ho,
[1] H. Lin and N. W. J. I. Bergmann, "Vulnerability assessment and
"IoT privacy and security defense technology for smart home
challenges for smart home cybersecurity considering pricing
environments," vol. 7, no. 3, p. 44, cyberattacks," in 2014 IEEE/ACM
2016. International Conference on
https://doi.org/10.3390/info70300 Computer-Aided Design (ICCAD),
44 2014, pp. 183-190: IEEE.
[2] M. Park, H. Oh, and K. J. S. Lee, [7] J. M. D. Delgado et al., "Robotics
"Security risk measurement for and automated systems in
information leakage in IoT-based construction: Understanding
smart homes from a situational
industry-specific challenges for
awareness perspective," adoption," Journal of Building
Sensors, vol. 19, no. 9, p. 2148, Engineering, vol. 26, pp. 100868,
2019. 2019.
https://doi.org/10.3390/s19092148 https://doi.org/10.1016/j.jobe.2019
[3] B. Ali and A. I. J. s. Awad, "Cyber .100868
and physical security vulnerability [8] L. Satpathy, L, Smart housing:
assessment for IoT-based smart
technology to aid aging in place-
homes," Sensors, vol. 18, no. 3, p.
new opportunities and challenges
817, 2018. [Doctoral dissertation]. Department
https://doi.org/10.3390/s18030817 of Architecture, 2006.
[4] A. Jacobsson, M. Boldt, and B. J. [9] H. Yang, W. Lee, and H. J. J. o. S.
F. G. C. S. Carlsson, "A risk Lee, "IoT smart home adoption: the
analysis of a smart home importance of proper level
automation system," Future automation," Journal of Sensors,
Generation Computer vol. 2018, pp. 1-10, 2018.
Systems, vol. 56, pp. 719-733,

Innovative Computing Review


56
Volume 1 Issue 1, Summer 2021
Gondal

https://doi.org/10.1155/2018/6464 Convention on Information and


036 Communication Technology,
[10] S. Wadhwani, U. Singh, P. Singh, Electronics and Microelectronics
(MIPRO), 2017, pp. 1292-1297:
S. J. I. R. J. o. E. Dwivedi, and
IEEE.
Technology, "Smart home
automation and security system [15] W. Ali, G. Dustgeer, M. Awais,
using Arduino and IOT," and M. A. Shah, "IoT based smart
International Research Journal of home: Security challenges, security
Engineering and Technology requirements and solutions," in
(IRJET), vol. 5, no. 2, pp. 1357- 2017 23rd International
1359, 2018. Conference on Automation and
Computing (ICAC), 2017, pp. 1-6:
[11] L. Chhaya, P. Sharma, G.
IEEE.
Bhagwatikar, and A. J. E. Kumar,
https://doi.org/10.10.23919/IConA
"Wireless sensor network based
C.2017.8082057
smart grid communications:
Cyber-attacks, intrusion detection [16] R. Heartfield et al., "A taxonomy
system and topology control," of cyber-physical threats and
Electronics, vol. 6, no. 1, pp. 1-5, impact in the smart home," vol. 78,
2017. pp. 398-428, 2018.
https://doi.org/10.1016/j.cose.2018
[12] W. H. Hassan, "Current research on
.07.011
Internet of Things (IoT) security: A
survey," Computer Networks, vol. [17] P. Anand, Y. Singh, A. Selwal, P.
148, pp. 283-294, 2019. K. Singh, R. A. Felseghi, and M. S.
https://doi.org/10.1016/j.comnet.2 J. E. Raboaca, "IoVT: internet of
018.11.025 vulnerable things? Threat
architecture, attack surfaces, and
[13] B. Mahajan, (2021, March 15),
vulnerabilities in internet of things
Civiconcepts, Home automation
and its applications towards smart
system and technologies.
Grids," vol. 13, no. 18, p. 4813,
https://civiconcepts.com/blog/hom
2020.
e-automation-system-and-
https://doi.org/10.3390/en1318481
technologies
3
[14] D. Geneiatakis, I. Kounelis, R.
[18] H. Zadran, Amazing Architecture,
Neisse, I. Nai-Fovino, G. Steri, and
2017.
G. Baldini, "Security and privacy
http://amazingarchitecture.net/2017/
issues for an IoT based smart
05/19/elegant-home-plan-design-
home," in 2017 40th International
ideas/(accessed on 6 March 2018)

School of Systems and Technology


57
Volume 1 Issue 1, Summer 2021
Security and Privacy Challenges for the IOT-based…

[19] D. Mocrii, Y. Chen, and P. J. I. o. End-to-End Framework for Secure


T. Musilek, "IoT-based smart Firmware Updates on Embedded
homes: A review of system Systems," arXiv preprint arXiv:
architecture, software, communications, 2007.09071, 2020.
privacy and security," Internet of [24] S. Chege, G. Wanyembi, and C.
Things, vol. 1, pp. 81-98, 2018. Nyamboga, "IT and Business
https://doi.org/10.1016/j.iot.2018.0 Strategies in the Kenyan Leading
8.009 Organizations," International
[20] Y. Yang, L. Wu, G. Yin, L. Li, and Journal of Scientific and Technical
H. J. I. I. o. T. J. Zhao, "A survey Research in Engineering, vol. 41,
on security and privacy issues in no. 1, 2019.
Internet-of-Things," IEEE Internet [25] R. Budhrani, R. J. I. J. O. A. N.
of Things Journal, vol. 4, no. 5, pp. Sridaran, and Applications,
1250-1258, 2017. "Wireless Local Area Networks:
https://doi.org/1010.1109/JIOT.20 Threats and Their Discovery Using
17.2694844 WLANs Scanning Tools,"
[21] M. Tao, J. Zuo, Z. Liu, A. International Journal Of Advanced
Castiglione, and F. J. F. G. C. S. Networking & Applications, pp.
Palmieri, "Multi-layer cloud 137-150, 2015.
architectural model and ontology- [26] S. Manandhar, K. Moran, K. Kafle,
based security service framework
R. Tang, D. Poshyvanyk, and A.
for IoT-based smart homes," Nadkarni, "Towards a natural
Future Generation Computer perspective of smart homes for
Systems, vol. 78, pp. 1040-1051, practical security and safety
2018. analyses," in 2020 IEEE
https://doi.org/10.1016/j.future.20
Symposium on Security and
16.11.011 Privacy (SP), 2020, pp. 482-499:
[22] J. M. Castelo Gómez, J. Roldán IEEE.
Gómez, J. Carrillo Mondéjar, and [27] S. A. Al-Qaseemi, H. A.
J. L. J. E. Martínez Martínez, Almulhim, M. F. Almulhim, and S.
"Non-Volatile Memory Forensic R. Chaudhry, "IoT architecture
Analysis in Windows 10 IoT challenges and issues: Lack of
Core," vol. 21, no. 12, pp. 1141, standardization," in 2016 Future
2019. technologies conference (FTC),
https://doi.org/10.3390/e21121141 2016, pp. 731-738: IEEE.
[23] S. Falas, C. Konstantinou, and M.
K. J. a. p. a. Michael, "A Modular

Innovative Computing Review


58
Volume 1 Issue 1, Summer 2021
Gondal

[28] N. Komninos, E. Philippou, A. J. I. and cloud interworking," in


C. S. Pitsillides, and Tutorials, International Conference on
"Survey in smart grid and smart Convergence Technology, 2013,
home security: Issues, challenges vol. 2, no. 1, pp. 1572-1573:
and countermeasures," EEE 한국융합학회.
Communications Surveys &
Tutorials, vol. 16, no. 4, pp. 1933- [30] C. Paul, A. Ganesh, and C. Sunitha,
1954, 2014. "An overview of IoT based smart
https://doi.org/1010.1109/COMST homes," in 2018 2nd International
.2014.2320093 Conference on Inventive Systems
and Control (ICISC), 2018, pp. 43-
[29] G.-W. Lee, S.-H. Na, K.-H. Kim,
46: IEEE.
and E.-N. Huh, "Cloud-based smart
https://doi.org/1010.1109/ICISC.2
home system (CbSH) architecture
018.8398858
design for virtual home gateway

School of Systems and Technology


59
Volume 1 Issue 1, Summer 2021

You might also like