Emerging Trends in Smart Home Security, Privacy, and Digital Forensics

Technology integration is becoming an impetus to everyday lives. This new interconnected world can be found from our most private spaces to the public ones. Smart homes, which is the use of Internet of Things (IoT) within a home, has become the utmost concern in the security and privacy domain. In this paper, we review the current literature from both research and practice and offer five research trends for security and privacy in smart homes: potential for remote security breaches, risks for smart home devices, privacy violations, infrastructure vulnerabilities, and digital forensics challenges. We integrated these five trends in a conceptual model showcasing their roles in the rapidly changing IoT landscape. Combining the trends and smart forensics, we elucidate the bimodal lenses in security and privacy: preventive and investigative. These discussions offer research directions and practitioners’ implications for further development of a safe and secured smart home.

[1]  Jill Slay,et al.  Digital Forensics Infovis: An Implementation of a Process for Visualisation of Digital Evidence , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.

[2]  Robert Hegarty,et al.  Digital Evidence Challenges in the Internet of Things , 2014, INC.

[3]  Iain Sutherland,et al.  Forensic analysis of smart TV: A current issue and call to arms , 2014, Digit. Investig..

[4]  Steffen Wendzel,et al.  Envisioning Smart Building Botnets , 2014, Sicherheit.

[5]  Carlo Maria Medaglia,et al.  An Overview of Privacy and Security Issues in the Internet of Things , 2010 .

[6]  Tobias Zillner,et al.  ZigBee Exploited The good , the bad and the ugly , 2015 .

[7]  Srinivas Bangalore,et al.  Personalized speech recognition for Internet of Things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).

[8]  Ramjee Prasad,et al.  Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) , 2010, CNSA.

[9]  Adam Wynne,et al.  Enforcing fine-grained security and privacy policies in an ecosystem within an ecosystem , 2015, MobileDeLi.

[10]  Alan T. Sherman,et al.  UNDERSTANDING ISSUES IN CLOUD FORENSICS: TWO HYPOTHETICAL CASE STUDIES , 2011 .

[11]  Tim Storer,et al.  Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics , 2014, Int. J. Digit. Crime Forensics.

[12]  Steven I. Friedland,et al.  I Spy: The New Self-Cybersurveillance , 2015 .

[13]  Marie-Helen Maras,et al.  Internet of Things: security and privacy implications , 2015 .

[14]  Domenico Rotondi,et al.  A capability-based security approach to manage access control in the Internet of Things , 2013, Math. Comput. Model..

[15]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[16]  Charlie Wilson,et al.  Smart homes and their users: a systematic analysis and key challenges , 2014, Personal and Ubiquitous Computing.

[17]  Paul Sant,et al.  The Forensics Edge Management System: A Concept and Design , 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing.

[18]  James Newsome,et al.  Challenges in Access Right Assignment for Secure Home Networks , 2010, HotSec.

[19]  Scott R. Peppet Regulating the Internet of Things: First Steps Toward Managing Discrimination, Privacy, Security & Consent , 2014 .

[20]  Bin Ma,et al.  Joint Application of Speech and Speaker Recognition for Automation and Security in Smart Home , 2011, INTERSPEECH.