基于安全和隐私的物联网智能家居门禁设备评述

IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Wireless Personal Communications Pub Date : 2024-07-18 DOI:10.1007/s11277-024-11405-8
Sirisha Uppuluri, G. Lakshmeeswari
{"title":"基于安全和隐私的物联网智能家居门禁设备评述","authors":"Sirisha Uppuluri, G. Lakshmeeswari","doi":"10.1007/s11277-024-11405-8","DOIUrl":null,"url":null,"abstract":"<p>The Internet of Things (IoT) represents a network framework comprising identifiable entities that interact through the Internet. One of its applications is the smart home, where household devices can be remotely monitored and controlled. This has led to an increased demand for reliable security solutions in IoT systems. Security presents a significant challenge in IoT smart home devices and must be carefully considered. Unauthorized access to a smart home system, facilitated by means such as jamming or replay attacks, could pose risks by manipulating sensors and controls, potentially allowing unauthorized entry. This review paper concentrates specifically on the security and privacy aspects of IoT smart home access control devices. It begins with a concise overview of smart home security and privacy, then delves into various techniques within the smart home system taxonomy, such as authentication, access control, blockchain, and cryptography-based methods. Furthermore, the paper compares the advantages and disadvantages of these techniques. It also examines various types of attacks on smart home IoT access control systems and evaluates risk factors such as methodologies, attack frequency, severity, probability, and ranking. Finally, the paper discusses challenges, applications, conclusions, and future directions.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"24 1","pages":""},"PeriodicalIF":1.9000,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Review of Security and Privacy-Based IoT Smart Home Access Control Devices\",\"authors\":\"Sirisha Uppuluri, G. Lakshmeeswari\",\"doi\":\"10.1007/s11277-024-11405-8\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The Internet of Things (IoT) represents a network framework comprising identifiable entities that interact through the Internet. One of its applications is the smart home, where household devices can be remotely monitored and controlled. This has led to an increased demand for reliable security solutions in IoT systems. Security presents a significant challenge in IoT smart home devices and must be carefully considered. Unauthorized access to a smart home system, facilitated by means such as jamming or replay attacks, could pose risks by manipulating sensors and controls, potentially allowing unauthorized entry. This review paper concentrates specifically on the security and privacy aspects of IoT smart home access control devices. It begins with a concise overview of smart home security and privacy, then delves into various techniques within the smart home system taxonomy, such as authentication, access control, blockchain, and cryptography-based methods. Furthermore, the paper compares the advantages and disadvantages of these techniques. It also examines various types of attacks on smart home IoT access control systems and evaluates risk factors such as methodologies, attack frequency, severity, probability, and ranking. Finally, the paper discusses challenges, applications, conclusions, and future directions.</p>\",\"PeriodicalId\":23827,\"journal\":{\"name\":\"Wireless Personal Communications\",\"volume\":\"24 1\",\"pages\":\"\"},\"PeriodicalIF\":1.9000,\"publicationDate\":\"2024-07-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Wireless Personal Communications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s11277-024-11405-8\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"TELECOMMUNICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Personal Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11277-024-11405-8","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0

摘要

物联网(IoT)是一个网络框架,由通过互联网进行互动的可识别实体组成。其应用之一是智能家居,可以远程监控家用设备。因此,物联网系统对可靠安全解决方案的需求日益增长。安全问题是物联网智能家居设备面临的一项重大挑战,必须认真加以考虑。通过干扰或重放攻击等手段对智能家居系统进行未经授权的访问,可能会通过操纵传感器和控制装置造成风险,从而可能导致未经授权的进入。本综述论文特别关注物联网智能家居门禁控制设备的安全和隐私方面。文章首先简要概述了智能家居的安全性和隐私性,然后深入探讨了智能家居系统分类中的各种技术,如身份验证、访问控制、区块链和基于密码学的方法。此外,本文还比较了这些技术的优缺点。论文还研究了针对智能家居物联网访问控制系统的各类攻击,并对方法、攻击频率、严重程度、概率和等级等风险因素进行了评估。最后,本文讨论了挑战、应用、结论和未来方向。
本文章由计算机程序翻译,如有差异,请以英文原文为准。

摘要图片

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Review of Security and Privacy-Based IoT Smart Home Access Control Devices

The Internet of Things (IoT) represents a network framework comprising identifiable entities that interact through the Internet. One of its applications is the smart home, where household devices can be remotely monitored and controlled. This has led to an increased demand for reliable security solutions in IoT systems. Security presents a significant challenge in IoT smart home devices and must be carefully considered. Unauthorized access to a smart home system, facilitated by means such as jamming or replay attacks, could pose risks by manipulating sensors and controls, potentially allowing unauthorized entry. This review paper concentrates specifically on the security and privacy aspects of IoT smart home access control devices. It begins with a concise overview of smart home security and privacy, then delves into various techniques within the smart home system taxonomy, such as authentication, access control, blockchain, and cryptography-based methods. Furthermore, the paper compares the advantages and disadvantages of these techniques. It also examines various types of attacks on smart home IoT access control systems and evaluates risk factors such as methodologies, attack frequency, severity, probability, and ranking. Finally, the paper discusses challenges, applications, conclusions, and future directions.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Wireless Personal Communications
Wireless Personal Communications 工程技术-电信学
CiteScore
5.80
自引率
9.10%
发文量
663
审稿时长
6.8 months
期刊介绍: The Journal on Mobile Communication and Computing ... Publishes tutorial, survey, and original research papers addressing mobile communications and computing; Investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia; Explores propagation, system models, speech and image coding, multiple access techniques, protocols, performance evaluation, radio local area networks, and networking and architectures, etc.; 98% of authors who answered a survey reported that they would definitely publish or probably publish in the journal again. Wireless Personal Communications is an archival, peer reviewed, scientific and technical journal addressing mobile communications and computing. It investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia. A partial list of topics included in the journal is: propagation, system models, speech and image coding, multiple access techniques, protocols performance evaluation, radio local area networks, and networking and architectures. In addition to the above mentioned areas, the journal also accepts papers that deal with interdisciplinary aspects of wireless communications along with: big data and analytics, business and economy, society, and the environment. The journal features five principal types of papers: full technical papers, short papers, technical aspects of policy and standardization, letters offering new research thoughts and experimental ideas, and invited papers on important and emerging topics authored by renowned experts.
期刊最新文献
Capacity Analysis of a WLAN Cell Using VoWiFi Service for CBR Traffic Telecardiology in “New Normal” COVID-19: Efficacy of Neuro-Metaheuristic Session Key (NMSK) and Encryption Through Bipartite New State-of-Art Sharing A Robust Bias Reduction Method with Geometric Constraint for TDOA-Based Localization Variable Speed Drive Applications Performing Effectively with ANN Technique HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1