Smart home security: challenges, issues and solutions at different IoT layers

The Internet of Things is a rapidly evolving technology in which interconnected computing devices and sensors share data over the network to decipher different problems and deliver new services. For example, IoT is the key enabling technology for smart homes. Smart home technology provides many facilities to users like temperature monitoring, smoke detection, automatic light control, smart locks, etc. However, it also opens the door to new set of security and privacy issues, for example, the private data of users can be accessed by taking control over surveillance devices or activating false fire alarms, etc. These challenges make smart homes feeble to various types of security attacks and people are reluctant to adopt this technology due to the security issues. In this survey paper, we throw light on IoT, how IoT is growing, objects and their specifications, the layered structure of the IoT environment, and various security challenges for each layer that occur in the smart home. This paper not only presents the challenges and issues that emerge in IoT-based smart homes but also presents some solutions that would help to overcome these security challenges.

[1]  George C. Hadjichristofi,et al.  Internet of Things: Security vulnerabilities and challenges , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).

[2]  Muhammad Awais,et al.  IoT based smart home: Security challenges, security requirements and solutions , 2017, 2017 23rd International Conference on Automation and Computing (ICAC).

[3]  Carolyn Penstein Rosé,et al.  CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites , 2011, TSEC.

[4]  Yan Zhang,et al.  Wireless Big Data: Technologies and Applications , 2018, IEEE Wirel. Commun..

[5]  Andreas Pitsillides,et al.  Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.

[6]  Seokung Yoon,et al.  Security Issues on Smarthome in IoT Environment , 2015 .

[7]  Seong-Il Jin,et al.  Security Threats in Connected Car Environment and Proposal of In-Vehicle Infotainment-Based Access Control Mechanism , 2018, MUE/FutureTech.

[8]  Jorge Portilla,et al.  Distributed Reprogramming on the Edge: A New Collaborative Code Dissemination Strategy for IoT , 2019 .

[9]  Xianbin Wang,et al.  Security and privacy considerations for Wireless Sensor Networks in smart home environments , 2012, Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD).

[10]  Pál Varga,et al.  Security threats and issues in automation IoT , 2017, 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS).

[11]  Bernardi Pranggono,et al.  Mobile Malware and Smart Device Security: Trends, Challenges and Solutions , 2013, 2013 19th International Conference on Control Systems and Computer Science.

[12]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[13]  Aman Arora,et al.  Security Concerns and Future Trends of Internet of Things , 2019, 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT).

[14]  Shadab Alam,et al.  Security Threats, Attacks, and Possible Countermeasures in Internet of Things , 2020 .

[15]  Biplab Sikdar,et al.  A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.

[16]  Qusay H. Mahmoud,et al.  A Behavior Profiling Model for User Authentication in IoT Networks based on App Usage Patterns , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.

[17]  E. Ezhilarasan,et al.  A Review on Mobile Technologies: 3G, 4G and 5G , 2017, 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM).

[18]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[19]  Jens Grossklags,et al.  Method Confusion Attack on Bluetooth Pairing , 2021, 2021 IEEE Symposium on Security and Privacy (SP).

[20]  Erik M. Fredericks,et al.  Uncertainty in big data analytics: survey, opportunities, and challenges , 2019, Journal of Big Data.

[21]  Abderrazak Jemai,et al.  A survey on security of IoT in the context of eHealth and clouds , 2016, 2016 11th International Design & Test Symposium (IDT).

[22]  Jing Liu,et al.  Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[23]  Zhu Han,et al.  Jamming Mitigation via Hierarchical Security Game for IoT Communications , 2018, IEEE Access.

[24]  Maurizio A. Spirito,et al.  DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.

[25]  Hesham F. A. Hamed,et al.  Intrusion detection systems for IoT-based smart environments: a survey , 2018, Journal of Cloud Computing.

[26]  Guowang Miao,et al.  Latency-Energy Tradeoff Based on Channel Scheduling and Repetitions in NB-IoT Systems , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[27]  Anita Gehlot,et al.  Design and Development of IoT-Based Transmission Line Monitoring System , 2018 .

[28]  Carsten Maple,et al.  Proactive Forensics in IoT: Privacy-Aware Log-Preservation Architecture in Fog-Enabled-Cloud Using Holochain and Containerization Technologies , 2020, Electronics.

[29]  Biplab Sikdar,et al.  Detecting Forwarding Misbehavior In Clustered IoT Networks , 2018, Q2SWinet'18.

[30]  Gautam Srivastava,et al.  A Decentralized Privacy-Preserving Healthcare Blockchain for IoT , 2019, Sensors.

[31]  Chuck Yoo,et al.  DAoT: Dynamic and energy-aware authentication for smart home appliances in Internet of Things , 2015, 2015 IEEE International Conference on Consumer Electronics (ICCE).

[32]  Pavan Pongle,et al.  A survey: Attacks on RPL and 6LoWPAN in IoT , 2015, 2015 International Conference on Pervasive Computing (ICPC).

[33]  Mostafa Nofal,et al.  IoT-RTP and IoT-RTCP: Adaptive Protocols for Multimedia Transmission over Internet of Things Environments , 2017, IEEE Access.

[34]  Monika Sachdeva,et al.  Detection of Hello Flood Attack on LEACH in Wireless Sensor Networks , 2018 .

[35]  Aalok Mehta,et al.  The Spectrum Opportunity , 2013 .

[36]  Maria Fazio,et al.  A Watchdog Service Making Container-Based Micro-services Reliable in IoT Clouds , 2017, 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud).

[37]  Alie El-Din Mady,et al.  Moving Target Defense Mechanism for Side-Channel Attacks , 2020, IEEE Systems Journal.

[38]  Andrew Kurtz,et al.  Securing the Internet of Things (IoT): A Security Taxonomy for IoT , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[39]  Syed Ali Hassan,et al.  Machine Learning in IoT Security: Current Solutions and Future Challenges , 2019, IEEE Communications Surveys & Tutorials.

[40]  Anton O. Prokofiev,et al.  A method to detect Internet of Things botnets , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).

[41]  Zheng Dou,et al.  An Adaptive Resource Allocation Model With Anti-Jamming in IoT Network , 2019, IEEE Access.

[42]  Mita Nasipuri,et al.  A Novel Approach for Detecting and Mitigating the Energy Theft Issues in the Smart Metering Infrastructure , 2018 .

[43]  Dimitri Konstantas,et al.  A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model , 2018 .

[44]  Young-Bae Ko,et al.  Mitigation of black hole attacks in Routing Protocol for Low Power and Lossy Networks , 2016, Secur. Commun. Networks.

[45]  Philip Levis,et al.  RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.

[46]  John Ross Wallrabenstein Practical and Secure IoT Device Authentication Using Physical Unclonable Functions , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[47]  B. Janet,et al.  Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection , 2020, Peer-to-Peer Netw. Appl..

[48]  Ayman I. Kayssi,et al.  IoT survey: An SDN and fog computing perspective , 2018, Comput. Networks.

[49]  Bamidele Adebisi,et al.  Internet of Things: Evolution and technologies from a security perspective , 2020, Sustainable Cities and Society.

[50]  Habtamu Abie,et al.  Towards metrics-driven adaptive security management in e-health IoT applications , 2012, BODYNETS.

[51]  V. Bhuvaneswari,et al.  The Internet of Things (IoT) Applications and Communication Enabling Technology Standards: An Overview , 2014, 2014 International Conference on Intelligent Computing Applications.

[52]  Kyung Sup Kwak,et al.  An Internet of Things-based health prescription assistant and its security system design , 2017, Future Gener. Comput. Syst..

[53]  Muhammad Imran,et al.  Perception layer security in Internet of Things , 2019, Future Gener. Comput. Syst..

[54]  Tony R. Martinez,et al.  A noise filtering method using neural networks , 2003, IEEE International Workshop on Soft Computing Techniques in Instrumentation, Measurement and Related Applications, 2003. SCIMA 2003..

[55]  Ragib Hasan,et al.  Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things , 2015, 2015 IEEE World Congress on Services.

[56]  Chalee Thammarat,et al.  Review of Internet of Things (IoT): Security Issue and Solution , 2020, 2020 17th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON).

[57]  Xiaojiang Du,et al.  Security and Privacy in Wireless IoT , 2018, IEEE Wirel. Commun..

[58]  Ueli Maurer,et al.  Constructive Cryptography - A New Paradigm for Security Definitions and Proofs , 2011, TOSCA.

[59]  Noor Zaman,et al.  A review on smart home present state and challenges: linked to context-awareness internet of things (IoT) , 2019, Wirel. Networks.

[60]  Zahoor Ahmed Alizai,et al.  Improved IoT Device Authentication Scheme Using Device Capability and Digital Signatures , 2018, 2018 International Conference on Applied and Engineering Mathematics (ICAEM).

[61]  Hao Wang,et al.  Security-Driven hybrid collaborative recommendation method for cloud-based iot services , 2020, Comput. Secur..

[62]  Byoungcheon Lee,et al.  Security Framework for RFID-based Applications in Smart Home Environment , 2011, J. Inf. Process. Syst..

[63]  Thomas Unterluggauer,et al.  Sponge-Based Control-Flow Protection for IoT Devices , 2018, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).

[64]  Shreyas Sen,et al.  High efficiency power side-channel attack immunity using noise injection in attenuated signature domain , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[65]  Kusprasapta Mutijarsa,et al.  Secure IoT Communication using Blockchain Technology , 2018, 2018 International Symposium on Electronics and Smart Devices (ISESD).

[66]  Hairulnizam Mahdin,et al.  Clone tag detection in distributed RFID systems , 2018, PloS one.

[67]  Muttukrishnan Rajarajan,et al.  An attack tree based risk evaluation approach for the internet of things , 2018, IOT.

[68]  Mohsen Guizani,et al.  Privacy in the Internet of Things for Smart Healthcare , 2018, IEEE Communications Magazine.

[69]  Hong Li,et al.  The Survey of RFID Attacks and Defenses , 2012, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing.

[70]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[71]  Zhiwei Wang,et al.  Identity-Based Verifiable Aggregator Oblivious Encryption and Its Applications in Smart Grids , 2021, IEEE Transactions on Sustainable Computing.

[72]  Munam Ali Shah,et al.  IoT security: A layered approach for attacks & defenses , 2017, 2017 International Conference on Communication Technologies (ComTech).

[73]  Sheetal Kalra,et al.  Security in IoT-Based Smart Grid Through Quantum Key Distribution , 2018 .

[74]  Tariq Aziz Rao,et al.  Security Challenges Facing IoT Layers and its Protective Measures , 2018 .

[75]  Ilango Krishnamurthi,et al.  An efficacious method for detecting phishing webpages through target domain identification , 2014, Decis. Support Syst..

[76]  Konstantinos E. Psannis,et al.  Defending against phishing attacks: taxonomy of methods, current issues and future directions , 2017, Telecommunication Systems.

[77]  Ramesh Karri,et al.  Hardware and embedded security in the context of internet of things , 2013, CyCAR '13.

[78]  D. Bastos,et al.  Internet of Things: A survey of technologies and security risks in smart home and city environments , 2018, IoT 2018.

[79]  Hao Wang,et al.  An Analytical Study on Eavesdropping Attacks in Wireless Nets of Things , 2016, Mob. Inf. Syst..

[80]  Andrea Zanella,et al.  IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices , 2019, IEEE Internet of Things Journal.

[81]  Xu Xiaohui,et al.  Study on Security Problems and Key Technologies of the Internet of Things , 2013, 2013 International Conference on Computational and Information Sciences.

[82]  Tao Zhang,et al.  Defending Connected Vehicles Against Malware: Challenges and a Solution Framework , 2014, IEEE Internet of Things Journal.

[83]  Hyunsoo Yoon,et al.  Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage , 2013, Comput. Electr. Eng..

[84]  Lin Li,et al.  Research on PKI-like Protocol for the Internet of Things , 2013, 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation.

[85]  K SudeendraKumar,et al.  Security Enhancements to System on Chip Devices for IoT Perception Layer , 2017, 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS).

[86]  Chandrakumar Thangavel,et al.  Security Challenges in the IoT Paradigm for Enterprise Information Systems , 2017 .

[87]  Andreas Jacobsson,et al.  On Privacy and Security Challenges in Smart Connected Homes , 2016, 2016 European Intelligence and Security Informatics Conference (EISIC).

[88]  Daniel M. Batista,et al.  A dependability evaluation tool for the Internet of Things , 2013, Comput. Electr. Eng..

[89]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[90]  Amarsinh Vidhate,et al.  Security attacks in IoT: A survey , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[91]  Dipti Jadhav,et al.  Security threats in the application layer in IOT applications , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[92]  Ricardo Neisse,et al.  Security and privacy issues for an IoT based smart home , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[93]  Smruti R. Sarangi,et al.  Internet of Things: Architectures, Protocols, and Applications , 2017, J. Electr. Comput. Eng..

[94]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[95]  Jari Veijalainen,et al.  Security and privacy threats in IoT architectures , 2012, BODYNETS.

[96]  J. Guerreiro,et al.  RELOAD/CoAP architecture for the federation of wireless sensor networks , 2020, Peer Peer Netw. Appl..

[97]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[98]  Edward W. Knightly,et al.  The Spy Next Door: Eavesdropping on High Throughput Visible Light Communications , 2015, VLCS@MobiCom.

[99]  Arnab Raha,et al.  Energy-efficient system design for IoT devices , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).

[100]  Audrey A. Gendreau,et al.  Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[101]  Xiaofeng Qiu,et al.  Status-based Detection of malicious code in Internet of Things (IoT) devices , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).

[102]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[103]  Sherali Zeadally,et al.  A Survey on Hardware-based Security Mechanisms for Internet of Things , 2019, ArXiv.

[104]  Mohammad Hammoudeh,et al.  Social Engineering Attack Strategies and Defence Approaches , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[105]  Hany F. Atlam,et al.  IoT Security, Privacy, Safety and Ethics , 2019, Internet of Things.

[106]  Do-Yeon Kim Cyber security issues imposed on nuclear power plants , 2014 .

[107]  Taeeun Kim,et al.  Management platform of threats information in IoT environment , 2018, J. Ambient Intell. Humaniz. Comput..

[108]  Neil W. Bergmann,et al.  IoT Privacy and Security Challenges for Smart Home Environments , 2016, Inf..

[109]  Chetana Prakash,et al.  Internet of Things (IoT): A vision, architectural elements, and security issues , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[110]  Yuan Liu,et al.  Study of secure boot with a FPGA-based IoT device , 2017, 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS).

[111]  Sathish Alampalayam Kumar,et al.  Security in Internet of Things: Challenges, Solutions and Future Directions , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[112]  Roksana Boreli,et al.  Network-level security and privacy control for smart-home IoT devices , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[113]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[114]  Aalok Mehta,et al.  The Spectrum Opportunity: Sharing as the Solution to the Wireless Crunch , 2014 .

[115]  Jose Romero-Mariona,et al.  IoDDoS - The Internet of Distributed Denial of Sevice Attacks - A Case Study of the Mirai Malware and IoT-Based Botnets , 2017, IoTBDS.

[116]  Xiong Luo,et al.  On Threat Analysis of IoT-Based Systems: A Survey , 2020, 2020 IEEE International Conference on Smart Internet of Things (SmartIoT).

[117]  Somajyoti Majumder,et al.  Application of wireless technology for a vision based rehabilitation system , 2016, 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).

[118]  Sema F. Oktug,et al.  Internet-of-Things security: Denial of service attacks , 2015, 2015 23nd Signal Processing and Communications Applications Conference (SIU).

[119]  Kumar Yelamarthi,et al.  Vulnerable C/C++ code usage in IoT software systems , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[120]  Miao Wu,et al.  Research on the architecture of Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[121]  Theodore Tryfonas,et al.  The Internet of Things: a security point of view , 2016, Internet Res..

[122]  C. M. Roberts,et al.  Radio frequency identification (RFID) , 2006, Comput. Secur..

[123]  S. Albert Rabara,et al.  Internet of Things (IoT) based Smart Environment integrating various Business Applications , 2015 .

[124]  Tarek R. Sheltami,et al.  A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing , 2018, EUSPN/ICTH.

[125]  Bhisham Sharma,et al.  A survey on IoT architectures, protocols, security and smart city based applications , 2017, 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT).

[126]  Dorothy E. Denning Stuxnet: What Has Changed? , 2012, Future Internet.

[127]  Mohsen Ghasemi,et al.  Threats of Social Engineering Attacks Against Security of Internet of Things (IoT) , 2018, Lecture Notes in Electrical Engineering.

[128]  Tai-hoon Kim,et al.  A Review on Security in Smart Home Development , 2010 .