Professional Documents
Culture Documents
Article QR
Affiliation: Govt. Graduate College for Women, Islampura, Lahore, Pakistan
Copyright
Information: This article is open access and is distributed under the terms of
Creative Commons Attribution 4.0 International License
A publication of the
1
Farzana Kausar Gondal is with Govt. Graduate College for Women, Islampura, Lahore,
Pakistan.
Farzana Kausar Gondal the corresponding author available at the given Email
ID:farzana.gondal@gmail.com
internal home setting and the smart home appliances are wireless
information of air conditioning system networked and battery operated with
might be analyzed to determine if the little operative duty sequence, thus the
house is currently occupied or not [15]. flooding of the network with many
This acts as a basis for break-ins. requirements can result in an energy
Moreover, the loss of privacy regarding exhaustion outbreak leading to a denial
passwords and pin codes results in of services (DOS).
unauthorized access to the system.
C. Privacy in Smart Homes
2) Authentication Threats. Verification Privacy refers to a state of not being
threats can result in the identification observed and disturbed by others.
and monitoring of data by unauthorized Privacy emphasizes protecting people’s
personnel, causing interference [1]. For identity, location, information, and
instance, unauthenticated environment movement. [18]. Smart homes’
or user’s status signals may confuse the sensitive information includes aspects
supervisor of the house into assuming such as digital information, photos, and
that there is an emergency condition. videos. Smart devices with dynamic IP
They then rush to open doors and cameras can capture pictures and videos
windows for the exit but, in the real wherever. Feature microphones have
sense, allow unauthorized entry into the the ability to snoop on personal
house. Also, if software updates are not discussions. There are mainly two
properly authenticated, then systems privacy threats facing smart homes.
might as well be altered [1].
Data Privacy Threats: Information
3) Access Threats. Access threats are confidentiality is a significant concern
the primary threats facing the IoT-based when it comes to the exchange of
smart homes. Unauthorized access to confidential data [19]. This is because
system controls, specifically everything is or will be connected to the
administrative positions, makes the existing internet, thus penetrating into
overall structure insecure [16]. This can the network and access to network tariff
be attained over unauthorized access via remains less challenging for cyber
PIN key codes or through the use of terrorists. By merely getting access to a
illegitimate devices linked to the part of the system, a hacker may obtain
system. Even though maximum the general information about the
regulation of the system can be attained, homeowner [3].
still having an unofficial link to the
system may lead to the stealing of Context-aware Privacy: Context
network bandwidth and the denial of cognizance entails noticing, sensing,
service (DOS) to genuine network and tracing operators’ movements and
operators [17]. Subsequently, most actions, as well as actions by the means
They face the following security and and care of smart home appliances
privacy challenges. easier and to enhance security.
A. Lack of Technical Support B. Openness of the Networked Systems
The absence of technical support is The openness of the networked
the main problem with the housed system is among the major weaknesses
environment of smart homes. Households of the IoT-based smart households [3].
are loaded with monotonous, tedious, Smart home strategies are linked to
and fault-related physical equipment cyberspace. Figure 4 highlights the
required to manage smart devices in the points of weakness of systems
home network, mainly due to little corresponding to the layers of IoT. This
power and little computationally provides a greater chance for attackers
controlled structure strategies. This can to remotely access the networks and
pose a major security issue [20]. Thus, control their interface, either directly or
for the fruitful execution of smart indirectly. They can also upload malware
homes, the protected auto-configuration to the devices, thus interrupting the entire
method is used to make the connection system.
Fig. 4. An IoT scheme from the provider, system, and operator viewpoints. The
image pinpoints the weaknesses in the IoT layers [3]
Fig. 7. Current security standards for the existing IoT security protocols [1]
conditioners. These aspects have made VI. COUNTERMEASURES FOR THE
it more challenging to integrate changes SECURITY AND PRIVACY CHALLENGES
as a result of already designed IPs. FACING THE IOT-BASED SMART
Several internet services task force have HOMES
been formulated to counter these issues. Smart homes can be made safer and
Their efforts regarding IoT standards more private in many ways. In Figure 8,
have played a significant part in the some security vulnerabilities and
formulation of the required lightweight prevention methods of an actual smart
communication protocols for the home setting are highlighted.
controlled environment via the existing
IP network [28]-[30]. Even with these Security awareness and training,
specifications put in place, there still that is, providing awareness and
exist the above discussed security and training programs about possible
privacy challenges in smart homes. security vulnerabilities and
Numerous Internet Engineering Task challenges will ensure system
Forces (IETFs) and working assemblies configuration and appropriate
have been formulated to solve these performance by authentic
issues as depicted in Figure 7 [1]. IETF personnel.
adjustment work regarding IoT has Data encryption and
played a dynamic role in the formation authentication
of the much needed lightweight Encryption and monitoring of
communication protocols for controlled network traffic
surroundings over the existing IP Monitoring systems’ performance
network [1]. Figure 7 shows the current Replacement of default
security standards for the existing IoT configuration
security procedures. Secure physical locations