Professional Documents
Culture Documents
Aisha Rehman
dd
Quick Submit
Quick Submit
Document Details
Submission ID
trn:oid:::1:2777834343 34 Pages
Download Date
File Name
RISK_MANAGEMENT_IN_SMART_HOMES_-_Copy.docx
File Size
2.1 MB
34%
Caution: Percentage may not indicate academic misconduct. Review required.
Our testing has found that there is a higher incidence of false positives when the percentage is less than 20. In order to reduce the
likelihood of misinterpretation, the AI indicator will display an asterisk for percentages less than 20 to call attention to the fact that
the score is less reliable.
However, the final decision on whether any misconduct has occurred rests with the reviewer/instructor. They should use the
percentage as a means to start a formative conversation with their student and/or use it to examine the submitted assignment in
greater detail according to their school's policies.
Non-qualifying text, such as bullet points, annotated bibliographies, etc., will not be processed and can create disparity between the submission highlights and the
percentage shown.
In a longer document with a mix of authentic writing and AI generated text, it can be difficult to exactly determine where the AI writing begins and original writing
ends, but our model should give you a reliable guide to start conversations with the submitting student.
Disclaimer
Our AI writing assessment is designed to help educators identify text that might be prepared by a generative AI tool. Our AI writing assessment may not always be accurate (it may misidentify
both human and AI-generated text) so it should not be used as the sole basis for adverse actions against a student. It takes further scrutiny and human judgment in conjunction with an
organization's application of its specific academic policies to determine whether any academic misconduct has occurred.
Abstract
[1]
Page 4 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 5 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
TABLE OF CONTENTS
Abstract __________________________________________________________ 1
1. Introduction ____________________________________________________ 6
[2]
Page 5 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 6 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
[3]
Page 6 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 7 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
9. Conclusion ___________________________________________________ 28
[4]
Page 7 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 8 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
List of Figures
Figure 1 Projected global smart home market growth from 2017 to 2027. ________ 6
Figure 4 Methodology for Identifying and Classifying Smart Home Assets _______ 14
Figure 5 Smart Home Components. Source: (Wu and Fu, 2012) ______________ 17
List of Table
[5]
Page 8 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 9 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
1. Introduction
Recently, the term "smart" has grown to include cutting-edge technologies that display
a certain level of artificial intelligence. The fundamental characteristic of intelligent
technology is the capacity to gather data from its immediate environment and act
appropriately (Marikyan, Papagiannidis, and Alamanos, 2019). Intelligent technology
has emerged as a foundational element of the "smart home" concept because its
ultimate goal is to enhance the well-being of individuals (Arunvivek, Srinath, and
Balamurugan, 2015; Dawid et al., 2016).
Smart homes, which are components of intelligent technology, gain advantages from
the advancement of interconnected services and devices. Functioning on the
principles of artificial intelligence, this technology endeavours to optimise home
administration by employing automation, control, and efficiency (Chakraborty et al.,
2023). The smart home market is anticipated to reach 222.9 billion US dollars in value
by 2027 (Yahoo Finance, 2023), reflecting its accelerated expansion. At first, perceived
as a casual convenience, smart homes have since progressed into providing security,
preference, and efficiency. Therefore, it substantially influences home security
systems and energy consumption (Chakraborty et al., 2023).
Figure 1 Projected global smart home market growth from 2017 to 2027.
Source: Oberlo (2023)
[6]
Page 9 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 10 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Using IoT, Smart house Systems (SHSs) could remotely monitor and control house
features. The data collecting, processing, and service delivery stages use sensors,
cameras, and microphones. Security, appliance control, and older comfort and care
are handled using this data (Hammi et al., 2022). Various technologies are utilised in
SHS, such as Wireless Sensor Networks (WSN) for environmental monitoring, Internet
of Things (IoT) for device interconnectivity, Artificial Intelligence (AI) for tasks like
object detection and decision-making, Machine Learning for pattern recognition and
security monitoring (Guo et al., 2019), Deep Learning for automation and healthcare
applications (Dawid et al., 2016), Neural Networks for smart decision-making
(Marikyan, Papagiannidis and Alamanos, 2019), Fuzzy Logic for handling ambiguous
data, GSM for communication via SMS and Bluetooth for short-range data transfer
(Arunvivek, Srinath and Balamurugan, 2015).
Smart technology has changed how we use our houses, making smart homes more
popular. However, this innovation presents several cybersecurity risks. The present
research analyses these risks and proposes a thorough risk management method.
The objective is to offer insights into effectively monitoring, controlling, and mitigating
risks in smart home environments, leveraging the knowledge accumulated in the field
of cybersecurity.
This research paper is structured as follows: Following the Literature Review (II), it
explores the Smart Home Environment (III), then progresses through Asset
Identification and Classification (IV), Risk Assessment Process (V), and a Threat
Mitigation Plan (VI) ending with a complete Conclusion (VIII).
2. Problem Statement
Smart home technology has completely changed the way people live in their homes
by enhancing their comfort, safety, and resource efficiency. However, these
developments pose serious cybersecurity threats, which could compromise user
privacy, functionality, and safety. Cybercriminals threaten smart homes with stringent
security protocols. But the widespread use of new technologies has not bridged the
gap between the need to implement these protocols and the widespread adoption of
new technologies.
[7]
Page 10 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 11 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
3. Related Work
An analysis of recent academic articles that discuss smart homes and risk
management, is provided in this section.
Due to IoT's rapid development and adoption in SHSs, significant security concerns
have arisen, as these systems are extremely closely interconnected with people's daily
lives. In SHSs, security issues can pose serious threats to the health and safety of
individuals as well as damage to the information assets. The paper explores the
concept and architecture of SHSs, defining them as a hybrid of physical and cyber
platforms based on Information Technology (IT), IoT, and the Internet. SHSs integrate
technologies like AI, cloud computing, edge computing, multimedia processing,
automatic control, and more. This integrated nature demands a more complex
approach to security (Yang and Sun, 2022). Another study by Jacobsson, Boldt and
Carlsson (2016) recognises that smart home automation systems introduce significant
security and user privacy risks. A detailed risk analysis identified 32 risks, including
four severe and 19 moderate risks. The extreme risks are primarily associated with
software components and human behaviour, highlighting the critical nature of these
areas in smart home risk management.
Moreover, while rapidly growing, the smart home industry faces significant privacy
security risks. Traditional risk assessment methods struggle to meet these new
security requirements due to the complexity of systems involving multiple subjects like
user, environment, and smart home products. To address this, the study proposes a
privacy risk assessment method combining system theoretical process analysis
(STPA) with failure mode and effects analysis (FMEA), identifying 35 privacy risk
scenarios. Using this approach, the interaction and control among these subjects is
taken into account, resulting in a comprehensive assessment of privacy risks (Wang
et al., 2022).
Smart Home Systems have experienced extraordinary growth over the last decade.
This research has been a success, and researchers are constantly improving it.With
IoT, home appliances and users may now communicate more easily. IoT-based SHSs
[8]
Page 11 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 12 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
are now the most prevalent. Connecting all devices to the internet allows simultaneous
maintenance of all household equipment (Froiz-Míguez et al., 2018). With IoT-enabled
devices, homeowners can monitor and manage numerous home functions from
anywhere. Smart homes can recognise forms, sounds, and gestures through machine
learning and AI, improving the smart home experience. With powerful CPUs, complex
and processor-intensive smart home systems are possible (Hammi et al., 2022). To
deliver these services, every smart home system is constructed following the
fundamental framework illustrated in the Figure below (Chakraborty et al., 2023). The
procedure consists of the subsequent three phases:
[9]
Page 12 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 13 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
(iii) Producing outcomes and providing services following the processed data
One of the most significant aspects of home automation systems is how simple it is to
monitor and operate from various devices, such as a smartphone, computer, tablet,
smartwatch, or voice assistant. There is a long list of advantages to installing a home
automation system, including increased security with the help of automated door locks,
better situational awareness with the help of surveillance cameras, greater comfort
with the support of climate control, more efficient use of time, and lower utility costs
(Stolojescu-Crisan, Crisan and Butunoi, 2021).
In the past decade, several IoT-based home automation solutions have been
presented by academic researchers. There are a variety of technologies utilised in
wireless home automation systems, and they all have advantages and disadvantages.
[10]
Page 13 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 14 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Bluetooth-based automation (Puri and Nayyar, 2016; Asadullah and Ullah, 2017;
Shinde et al., 2017) is one example; it is cheap, quick, and simple to set up but only
works over short distances. GSM and ZigBee are frequently used wireless
technologies as well. With a mobile package from a local service provider, GSM allows
for long-distance communication. The Zigbee (Baraka et al., 2013; Izquierdo, Santa
and Gomez-Skarmeta, 2010; Froiz-Míguez et al., 2018; Han and Lim, 2010) standard
for wireless mesh networks is intended for use in wireless control and monitoring
applications using battery-operated devices because of its cheap cost and low power
consumption. However, it requires frequent repairs, has a slow data transfer rate, and
has unstable connections. For example, Wi-Fi technology is used in research (Vivek
and Sunil, 2015; Huang and Tseng, 2016; Ahsan, 2019; Singh and Ansari, 2019;
Davidovic and Labus, 2016).
[11]
Page 14 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 15 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
In the realm of smart homes, the assets and technologies involved can be categorised
into several distinct sectors, each playing a unique role in enhancing the functionality
and convenience of a home:
[12]
Page 15 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 16 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
5.1.6 Gateways: The smart home network passes information between these
devices, which are often the main control points (Yan et al., 2020).
5.1.7 Interfaces: Various user interfaces and platforms are used to interact with
smart home systems, such as mobile apps and voice-controlled assistants (Sharif and
Tenbergen, 2020).
5.1.8 Servers: In smart homes, servers are typically cloud-based platforms that
process and store data from various smart devices, enabling remote access and
control (Mocrii, Chen, and Musilek, 2018).
[13]
Page 16 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 17 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
5.2.1 Continuous monitoring: This category comprises all the data consistently
monitored while the appliances are operational. Certain data are transmitted routinely
to the utilities without being observable by the user. Conversely, user interfaces may
always display other data. They primarily comprise data on the consumption of
resources (e.g., water, energy, etc.) and are utilised for utility and customer-facing
services (Peter Michael Hart, 2011).
5.2.2 User interaction: It encompasses all content pertaining to the consumer and
product interaction. In general, statistical analysis is employed to aggregate data to
identify critical user profiles or recurring patterns of occurrence (e.g., incorrect actions,
selected options, and so forth). Manufacturers utilise them primarily for customer
service and marketing analysis investigations. Information is transmitted as needed
(Yu, Ouyang and Wang, 2022).
[14]
Page 17 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 18 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
hazardous conditions (Taiwo and Ezugwu, 2021). Typically, they are transferred to
service providers or organisations upon fulfilling a predetermined threshold.
5.2.4 State parameters: They pertain to data concerning the device's condition or a
specific pre-existing scenario that is retrieved before the execution of the remote
control. The system employs such information for remote control and device state
control (Altujjar and Mokhtar, 2018).
[15]
Page 18 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 19 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Smart Home Asset Continuous Monitoring User Interaction Control Parameters State Parameters
Security Systems (e.g., cameras, Yes (24/7 surveillance) Via app or voice Arm/disarm, sensitivity Operational status,
alarms) commands settings, alert recent activity
configurations
Smart Thermostats Yes (temperature, Via app, voice, or Temperature set points, Current temperature,
humidity) manual controls schedules, modes humidity levels,
(home/away) system status
Smart Lighting Optional (usage patterns) Via app, voice, Brightness, colour, Light status, energy
switches on/off, schedules consumption
Smart Locks Yes (access logs) Via app, keypad, voice Lock/unlock, access Lock status, battery
codes, guest access level, access history
Health Monitoring Devices (e.g., Yes (vital signs, activity) Through the device Alerts, thresholds for Heart rate, blood
wearables, medical monitors) interface or app vital signs pressure, activity
levels
Smart Appliances (e.g., Yes (operational status, Via app or physical Temperature settings, Current operation,
refrigerators, ovens) usage) controls timers, modes maintenance alerts
Energy Management Systems Yes (energy consumption) Via app or control Energy saving settings, Real-time energy
panel usage limits usage, historical data
Entertainment Systems (e.g., smart Optional (media Remote, app, voice Volume, channels, Current playback,
TVs, speakers) consumption) content selection volume level
Table 1 Overview of Smart Home Assets
The components of a smart home are both wired and wireless networks. A wide variety
of protocols and communication media are in use. In a smart home environment,
communication among smart home objects is possible through various transmission
media, including phone lines, radio communications, and wired connections. The
diagram illustrates a smart home network architecture, differentiating between outdoor
and indoor environments. The outdoor environment includes service and content
providers interfacing with core and access networks. The indoor environment
comprises a residential gateway connecting to various home devices like white
appliances, control devices, and user interfaces, all linked to an indoor control network.
This configuration supports multiple interaction methods, including voice, visual,
graphical inputs and physical actuators for device operation.
Smart home privacy threats come from people, goods, and the environment, according
to Miandashti et al. (2020). Product components represent secondary concerns. User
and environmental elements must be addressed when defining risk scenarios. The
hierarchical control framework of the 'user-environment-smart home' evaluates
privacy and security risk features from the user, product, and environment
perspectives to inform risk analysis.
Smart home systems are most susceptible to negative effects due to human conduct,
according to Jacobsson, Boldt and Carlsson (2016). User risk includes three factors:
(1) Due to personal preferences or bad recall, some users pick continuous or reversed
numbers as passwords in basic password settings, making it easy to bypass the
identity verification process and giving hackers direct entry into the system. (2)
Because unaware individuals accept online content easily, hackers may steal their
information and property. (3) Private security is poor; these users fail to protect their
private information while using the smart home app service platform, and social
engineering exploits the hints to leak information.
According to Kulik et al. (2022), Smart home systems are at risk from component
failures and poor security control limitations at each level. Theft, damage, and
manipulation of system hardware are somewhat likely yet significant and
straightforward to manage. Unauthorised function changes and data leakage might
result from improper system server setup. Insufficient access control and
accountability procedures may lead to hacking and severe data and property loss.
One part of the environment's risk characteristics comes from the physical world, while
the other part comes from the virtual world of networks. There are regular incidents of
hostile workers, third-party suppliers, and others breaking authorisation and unlawfully
managing customers' personal information in the actual world. Denial of service,
[18]
Page 21 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 22 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
phishing, and other forms of network-based assaults are all too common. Users are
the first target of certain assaults, while devices and networks are the initial target of
others (Wang et al., 2023).
[19]
Page 22 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 23 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
7. Risk Evaluation
7.1.2 Integration with ISO 31000: Recent work by James (2019) integrates
traditional information security risk analysis with risk management principles from ISO
31000. This hybrid approach not only considers the likelihood and impact of risks but
also introduces the concept of system attractiveness, assessing how appealing a
compromised system might be to potential attackers.
7.2.2 ISO 27000 Series: The ISO 27000 series compresses a collection of best
practices for information security management, offering guidance on establishing and
maintaining information security protocols.
7.2.3 ISA/IEC 62443 Standards: The ISA/IEC 62443 standards are designed to build
cyber-security robustness within industrial control systems, including those used in
SHs.
[20]
Page 23 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 24 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
NIST SP800-183: Offers insights into the security considerations for networks
of interconnected devices.
[21]
Page 24 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 25 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
7.3.5 Information Security Risk Analysis (ISRA): This method was applied to a
smart home automation system (SHAS), resulting in a comprehensive risk profile. This
method calculated risk values based on the mean probability and consequence
values, categorising risks into low, medium, and high severity classes. The analysis
showed that the average consequences of risks were classified as more severe than
the probability of occurrence, indicating a general agreement among experts about the
potential severity of these risks. Most risks were found in the software-related category
(13), followed by risks in the information, communication, and human categories (5
risks each). The hardware-related threats contained four risks. Notably, the most
severe risks were found in the human category, underscoring the importance of
addressing human factors in smart home security. The study critically analyses the
methodologies employed in SHS security, acknowledging the unique challenges
posed by integrating various technologies. It underlines the importance of contextual
understanding in deploying security measures, as traditional PC solutions may not
directly apply to IoT devices in SHSs.
7.3.6 Spear vs. Shield Concept: The study by Yang and Sun (2022) explores the
balance between offensive tools ("Spear") used by attackers and defensive security
measures ("Shield") in smart home systems (SHSs). The research indicates a need
for enhancement of Intrusion Detection Systems (IDS) to accommodate the unique
context of SHSs better, pointing out the inadequacy of current encryption techniques
for ensuring data privacy within these systems.
7.4.1 STPA for Risk Control: Wang et al. (2023) critique Failure Modes and Effects
Analysis (FMEA) for overlooking user and environmental risks in SHSs. They advocate
for using Systems-Theoretic Process Analysis (STPA) to proactively identify hazards,
component flaws, and risky interactions, thereby enhancing privacy and reducing
risks.
[22]
Page 25 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 26 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
7.4.3 CISA Cybersecurity Best Practices: In collaboration with global and national
agencies, the Cybersecurity and Infrastructure Security Agency (CISA) has produced
a cybersecurity best practices handbook. It highlights proactive measures such as
supply chain risk management, secure system design, and operational resilience,
advocating for strategies like zero trust architecture and regular patching of systems
and applications (Security Magazine, 2023).
The study by Prakash, Xie and Huang (2023) highlighted that using the most recent
software version is hugely advantageous from a security and cost standpoint. As a
result, the largest software companies have increased the frequency of their update
releases and taken steps to improve their update distribution procedures. However,
end users are urged to follow "Best Practices," which include applying software
updates as soon as they become available. The study discussed that geometric or
exponential distributions characterise the pattern of user update installs for crucial
software like operating systems (OS) and related applications. This implies that
although most users swiftly upgrade their software upon a new release, a portion
prefers to postpone the update installation.
Another study by Faishal (2020) discussed that in the IoT and Cloud Environment,
encryption techniques for data are implemented in response to Smart Home security
concerns to safeguard the privacy and data of home users. The data encryption
methods utilised on Internet of Things (IoT) components for smart homes adhere to
the OSI model for every IoT layer. The study stated that encryption significantly
[23]
Page 26 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 27 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
reduces privacy risks and prevents unauthorised access, protecting data from
malicious attacks.
In the paper by Baek, Kanampiu, and Kim (2021), a secure network design for the
Internet of Things (IoT) smart home networks is proposed. An IoT server is essential
for managing the network, ensuring it is effectively designed and configured. A protocol
is needed to exchange information between the IoT server and devices and provide
secure communication. The home gateway should monitor all safety aspects of both
inbound and outbound traffic, protecting the network from unauthorised access.
As stated in the study by Wang et al. (2023), to ascertain the security of the smart
home system, it is imperative to examine the control and feedback Loop of the 'user-
environment-smart home' control structure as a whole to identify potentially hazardous
control behaviours.
Wang et al. (2023) highlighted that it is essential to encourage users to change default
credentials to strong, unique ones upon first use of IoT devices. Additionally, regularly
change passwords and avoid using the same password across different devices.
Email addresses should not be used as usernames to prevent phishing.
[24]
Page 27 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 28 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Risteska Stojkoska and Trivodaliev (2017) highlighted the need for careful supervision
of device connections and message transfers in IoT device networks while examining
the need for ongoing monitoring. To find security flaws in IoT devices, they stressed
the necessity of using network monitoring tools like Microsoft Message Analyzer.
[25]
Page 28 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 29 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Risk Risk
ID Category Smart Home Asset Identified Risk Impact Mitigation Technique Responsible Party Likelihood Impact Priority
1 User Risk Smart Locks Weak Passwords High policies IT Security Team High High High
Awareness programs on
2 User Risk Smart Home Platform Content Trust Issues Medium phishing scams User Training Coordinator Medium Medium Medium
Privacy-enhancing
3 User Risk Smart Home Apps Poor Privacy Practices High technologies Data Privacy Officer High High High
4 Product Risk Smart Thermostats Component Failures High quality checks Product Management Team Medium High High
5 Product Risk Security Systems Weaknesses High updates IT Security Team High High High
6 Product Risk Infrastructure Inadequate Server Setup High server setup IT Infrastructure Team Medium High High
7 Risk Home Network Physical Security Breaches High measures Facility Security Manager Medium High High
8 Risk Home Network Network Attacks High security solutions Network Security Team High High High
[27]
Page 30 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 31 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
9. Conclusion
In conclusion, the outcomes of this study provide light on the complicated landscape
of risk management in smart homes, highlighting the challenges posed by IoT
integration. It provides an excellent task of comparing the ease of today's high-tech
solutions with the dangerous circumstances of cyberspace. Reviewing recent
publications assists in identifying existing vulnerabilities and highlights new cyber risks
reinforcing the need for reactive and adaptable defense. The findings are combined
into a series of compact recommendations that promote a holistic approach to security
that includes encryption, regular upgrades, and strict network monitoring.
Reference list
Asadullah, M. and Ullah, K. (2017) Smart home automation system using Bluetooth
technology. 2017 International Conference on Innovations in Electrical Engineering
and Computational Technologies (ICIEECT).
Baek, J., Kanampiu, M.W. and Kim, C. (2021) A Secure Internet of Things Smart Home
Network: Design and Configuration. Applied Sciences, 11(14), 6280.
Baraka, K., Ghobril, M., Malek, S., Kanj, R. and Kayssi, A. (2013) Low Cost
Arduino/Android-Based Energy-Efficient Home Automation System with Smart Task
Scheduling. 2013 Fifth International Conference on Computational Intelligence,
Communication Systems and Networks.
Chakraborty, A., Islam, M., Shahriyar, F., Islam, S., Zaman, H.U. and Hasan, M. (2023)
Smart Home System: a Comprehensive Review. Journal of Electrical and Computer
Engineering, 2023, e7616683.
Dawid, H., Decker, R., Hermann, T., Jahnke, H., Klat, W., König, R. and Stummer, C.
(2016) Management Science in the Era of Smart Consumer products: Challenges and
[29]
Page 32 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 33 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Ford , R. (2017) Categories and Functionality of Smart Home Technology for Energy
Management. Building and Environment, 123, 543–554.
Ghayvat, H., Awais, M., Pandya, S., Ren, H., Akbarzadeh, S., Chandra
Mukhopadhyay, S., Chen, C., Gope, P., Chouhan, A. and Chen, W. (2019) Smart Aging
System: Uncovering the Hidden Wellness Parameter for Well-Being Monitoring and
Anomaly Detection. Sensors, 19(4), 766.
Guo, X., Shen, Z., Zhang, Y. and Wu, T. (2019) Review on the Application of Artificial
Intelligence in Smart Homes. Smart Cities, 2(3), 402–420.
Hammi, B., Zeadally, S., Khatoun, R. and Nebhen, J. (2022) Survey on Smart Homes:
Vulnerabilities, Risks, and Countermeasures. Computers & Security, 117, 102677.
Han, D.-M. and Lim, J.-H. (2010) Design and implementation of smart home energy
management systems based on zigbee. IEEE Transactions on Consumer Electronics,
56(3), 1417–1425.
Huang, F.-L. and Tseng, S.-Y. (2016) Predictable smart home system integrated with
heterogeneous network and cloud computing. IEEE Xplore, 2, 649–653.
[30]
Page 33 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 34 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Jacobsson, A., Boldt, M. and Carlsson, B. (2016) A Risk Analysis of a Smart Home
Automation System. Future Generation Computer Systems, 56, 719–733.
Kulik, T., Dongol, B., Larsen, P.G., Macedo, H.D., Schneider, S., Tran-Jørgensen,
P.W.V. and Woodcock, J. (2022) A Survey of Practical Formal Methods for
Security. Formal Aspects of Computing, 34(1), 1–39.
Md. Rakib Ahsan (2019) Implementation of IOT based Smart Security and Home
Automation System. International Journal of Engineering Research and, V8(06).
Mocrii, D., Chen, Y. and Musilek, P. (2018) IoT-based Smart homes: a Review of
System architecture, software, communications, Privacy and Security. Internet of
Things, 1-2, 81–98.
Peter Michael Hart (2011) Continuous asset monitoring on the smart grid. IEEE
Innovative Smart Grid Technologies.
Phyxter Home Services (2020) Stay Healthy at Home: 11 Essential Pieces of Home
Wellness Technology | Phyxter Home Services. Phyxter Home Services. Available
online: https://phyxter.ai/blog/11-best-smart-home-devices-for-a-healthy-home
[Accessed 25 Nov. 2023].
[31]
Page 34 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 35 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Prakash, V., Xie, S. and Huang, D. (2023) Software Update Practices on Smart Home
IoT Devices. Available online: https://arxiv.org/pdf/2208.14367.pdf [Accessed 27 Nov.
2023].
Puri, V. and Nayyar, A. (2016) Real Time Smart Home Automation Based on PIC
microcontroller, Bluetooth and Android Technology. 1478–1484.
Risteska Stojkoska, B.L. and Trivodaliev, K.V. (2017) A review of Internet of Things for
smart home: Challenges and solutions. Journal of Cleaner Production, 140(3), 1454–
1464.
Security Magazine (2023) Cybersecurity best practices guide for smart cities released
| Security Magazine. www.securitymagazine.com. Available online:
https://www.securitymagazine.com/articles/99245-cybersecurity-best-practices-
guide-for-smart-cities-released [Accessed 25 Nov. 2023].
Sharif, K. and Tenbergen, B. (2020) Smart Home Voice Assistants: A Literature Survey
of User Privacy and Security Vulnerabilities. Complex Systems Informatics and
Modeling Quarterly, (24), 15–30.
Shinde, A., Kanade, S., Jugale, N., Gurav, A., Vatti, R.A. and Patwardhan, MM (2017)
Smart Home Automation System Using IR, bluetooth, GSM and Android. 2017 Fourth
International Conference on Image Information Processing (ICIIP).
Singh, U. and Ansari, M.A. (2019) Smart Home Automation System Using Internet of
Things. 2019 2nd International Conference on Power Energy, Environment and
Intelligent Control (PEEIC).
Sovacool, B.K. and Furszyfer Del Rio, DD (2020) Smart Home Technologies in
Europe: a Critical Review of concepts, benefits, Risks and Policies. Renewable and
Sustainable Energy Reviews, 120, 109663.
Stolojescu-Crisan, C., Crisan, C. and Butunoi, B.-P. (2021) An IoT-Based Smart Home
Automation System. Sensors, 21(11), 3784.
[32]
Page 35 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Page 36 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343
Taiwo, O. and Ezugwu, A.E. (2021) Internet of Things-Based Intelligent Smart Home
Control System. Security and Communication Networks, 2021, 1–17.
Vivek, G.V. and Sunil, M.P. (2015) Enabling IOT Services Using WIFI - ZigBee
Gateway for a Home Automation System. IEEE Xplore, 77–80.
Wang, Y., Zhang, R., Zhang, X. and Zhang, Y. (2023) Privacy Risk Assessment of
Smart Home System Based on a STPA–FMEA Method. Sensors, 23(10), 4664.
Wu, C.-L. and Fu, L.-C. (2012) Design and Realisation of a Framework for Human–
System Interaction in Smart Homes. IEEE transactions on systems, man, and
cybernetics, 42(1), 15–31.
Yahoo Finance (2023) United States Smart Homes Market Set to Reach $69.97 Billion
by 2030, Driven by Growing Adoption of Smart Domestic Devices. Yahoo Finance.
Available online: https://finance.yahoo.com/news/united-states-smart-homes-market-
094800318.html [Accessed 24 Nov. 2023].
Yan, W., Wang, Z., Wang, H., Wang, W., Li, J. and Gui, X. (2020) Survey on Recent
Smart Gateways for Smart home: Systems, technologies, and
Challenges. Transactions on Emerging Telecommunications Technologies.
Yu, N., Ouyang, Z. and Wang, H. (2022) Study on Smart Home Interface Design
Characteristics considering the Influence of Age Difference: Focusing on
Sliders. Frontiers in Psychology, 13.
Yuan, Z., Bi, T., Muntean, G.-M. and Ghinea, G. (2015) Perceived Synchronisation of
Mulsemedia Services. IEEE Transactions on Multimedia, 17(7), 957–966.
[33]
Page 36 of 36 - AI Writing Submission Submission ID trn:oid:::1:2777834343