{"title":"Review of Security and Privacy-Based IoT Smart Home Access Control Devices","authors":"Sirisha Uppuluri, G. Lakshmeeswari","doi":"10.1007/s11277-024-11405-8","DOIUrl":null,"url":null,"abstract":"<p>The Internet of Things (IoT) represents a network framework comprising identifiable entities that interact through the Internet. One of its applications is the smart home, where household devices can be remotely monitored and controlled. This has led to an increased demand for reliable security solutions in IoT systems. Security presents a significant challenge in IoT smart home devices and must be carefully considered. Unauthorized access to a smart home system, facilitated by means such as jamming or replay attacks, could pose risks by manipulating sensors and controls, potentially allowing unauthorized entry. This review paper concentrates specifically on the security and privacy aspects of IoT smart home access control devices. It begins with a concise overview of smart home security and privacy, then delves into various techniques within the smart home system taxonomy, such as authentication, access control, blockchain, and cryptography-based methods. Furthermore, the paper compares the advantages and disadvantages of these techniques. It also examines various types of attacks on smart home IoT access control systems and evaluates risk factors such as methodologies, attack frequency, severity, probability, and ranking. Finally, the paper discusses challenges, applications, conclusions, and future directions.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"24 1","pages":""},"PeriodicalIF":1.9000,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Personal Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11277-024-11405-8","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of Things (IoT) represents a network framework comprising identifiable entities that interact through the Internet. One of its applications is the smart home, where household devices can be remotely monitored and controlled. This has led to an increased demand for reliable security solutions in IoT systems. Security presents a significant challenge in IoT smart home devices and must be carefully considered. Unauthorized access to a smart home system, facilitated by means such as jamming or replay attacks, could pose risks by manipulating sensors and controls, potentially allowing unauthorized entry. This review paper concentrates specifically on the security and privacy aspects of IoT smart home access control devices. It begins with a concise overview of smart home security and privacy, then delves into various techniques within the smart home system taxonomy, such as authentication, access control, blockchain, and cryptography-based methods. Furthermore, the paper compares the advantages and disadvantages of these techniques. It also examines various types of attacks on smart home IoT access control systems and evaluates risk factors such as methodologies, attack frequency, severity, probability, and ranking. Finally, the paper discusses challenges, applications, conclusions, and future directions.
期刊介绍:
The Journal on Mobile Communication and Computing ...
Publishes tutorial, survey, and original research papers addressing mobile communications and computing;
Investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia;
Explores propagation, system models, speech and image coding, multiple access techniques, protocols, performance evaluation, radio local area networks, and networking and architectures, etc.;
98% of authors who answered a survey reported that they would definitely publish or probably publish in the journal again.
Wireless Personal Communications is an archival, peer reviewed, scientific and technical journal addressing mobile communications and computing. It investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia. A partial list of topics included in the journal is: propagation, system models, speech and image coding, multiple access techniques, protocols performance evaluation, radio local area networks, and networking and architectures.
In addition to the above mentioned areas, the journal also accepts papers that deal with interdisciplinary aspects of wireless communications along with: big data and analytics, business and economy, society, and the environment.
The journal features five principal types of papers: full technical papers, short papers, technical aspects of policy and standardization, letters offering new research thoughts and experimental ideas, and invited papers on important and emerging topics authored by renowned experts.