A Redundancy-based Security Model for Smart Home

Recent developments in smart devices, Cloud Computing and Internet of Things (IoT) are introducing network of intelligent devices. These intelligent devices can be used to develop smart home network. The home appliance in a smart home forms an ad-hoc network. A smart home network architecture can be exploited by compromising the devices it is made up of. Various malicious activities can be performed through such exploitation. This paper presents a security approach to combat this. By using a collaborative and redundant security approach, the ad-hoc network of a smart home would be able to prevent malicious exploitation. The security approach discussed in this paper is a conceptual representation on the proposed security model for smart home networks.

[1]  Sudhir T. Bagade,et al.  Internet of Things: Architecture, Security Issues and Countermeasures , 2015 .

[2]  Li-Chen Fu,et al.  Service-Oriented Smart-Home Architecture Based on OSGi and Mobile-Agent Technology , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[3]  Roy H. Campbell,et al.  Cerberus: a context-aware security scheme for smart spaces , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[4]  Tarek F. Abdelzaher,et al.  SATIRE: a software architecture for smart AtTIRE , 2006, MobiSys '06.

[5]  Athanasios V. Vasilakos,et al.  Secure Smart Homes , 2017, ACM Comput. Surv..

[6]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[7]  Ozgur Koray Sahingoz,et al.  A survey of intrusion detection systems in wireless sensor networks , 2015, 2015 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO).

[8]  Javier Rubio-Loyola,et al.  Maximizing packet loss monitoring accuracy for reliable trace collections , 2008, 2008 16th IEEE Workshop on Local and Metropolitan Area Networks.

[9]  Carsten Maple,et al.  Security and privacy in the internet of things , 2017 .

[10]  Dariusz Król,et al.  Updatable Multi-agent OSGi Architecture for Smart Home System , 2010, KES-AMSTA.

[11]  Jong Hyuk Park,et al.  SH-SecNet: An enhanced secure network architecture for the diagnosis of security threats in a smart home , 2017 .

[12]  Ivan Marsá-Maestre,et al.  A Hierarchical, Agent-based Approach to Security in Smart Offices , 2006, ICUC.

[13]  Jin-Young Choi,et al.  Home-Network Security Model in Ubiquitous Environment , 2007 .

[14]  Jingsha He,et al.  An Adaptive Privacy Protection Method for Smart Home Environments Using Supervised Learning , 2017, Future Internet.

[15]  Gregory D. Abowd,et al.  The Aware Home: A Living Laboratory for Ubiquitous Computing Research , 1999, CoBuild.

[16]  Ali Ismail Awad,et al.  Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes , 2018, Sensors.

[17]  Sylvain Giroux,et al.  Enforcing Security in Smart Homes using Security Patterns , 2009 .

[18]  Byoungcheon Lee,et al.  Security Framework for RFID-based Applications in Smart Home Environment , 2011, J. Inf. Process. Syst..

[19]  Olawumi Olayemi,et al.  Security issues in smart homes and mobile health system: threat analysis, possible countermeasures and lessons learned , 2017 .

[20]  Juan Carlos Augusto,et al.  The Use of Temporal Reasoning and Management of Complex Events in Smart Homes , 2004, ECAI.

[21]  W. Granzer,et al.  Security in networked building automation systems , 2006, 2006 IEEE International Workshop on Factory Communication Systems.

[22]  Donal O'Mahony,et al.  Securing Communications in the Smart Home , 2004, EUC.

[23]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[24]  Robbie Schaefer,et al.  Securing Personal Data in Smart Home Environments , 2006 .

[25]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[26]  Jong Wook Han,et al.  Security Technologies Based on Home Gateway for Making Smart Home Secure , 2007, EUC Workshops.