Smart City Gnosys

Smart city article details

Title Fortifying Home Iot Security: A Framework For Comprehensive Examination Of Vulnerabilities And Intrusion Detection Strategies For Smart Cities
ID_Doc 26946
Authors Bhardwaj A.; Bharany S.; Abulfaraj A.W.; Osman Ibrahim A.; Nagmeldin W.
Year 2024
Published Egyptian Informatics Journal, 25
DOI http://dx.doi.org/10.1016/j.eij.2024.100443
Abstract Smart home devices have brought in a disruptive, revolutionary Internet-based ecosystem that enhanced our daily lives but has pushed private data from inside our homes to external public sources. Threats and attacks mounted against IoT deployments have only increased in recent times. There have been several proposals to secure home automation environments, but there is no full protection against Cybersecurity threats for our home IoT platforms. This research investigates attack attempts on smart home environments, focusing on firmware, brute force, and DoS attacks on the Internet of Things (IoT) network which were successful in bringing down the device in less than a minute. Weak passwords were cracked using Brute Force techniques related to HTTP, SSH, Telnet, and FTP protocols, and an unknown service port to reveal backdoor access. Cross-site scripting vulnerability was detected on IoT devices that could allow running malicious scripts on the devices. The authors also exploited the unknown services to reveal backdoors and access sensitive device details and potentially exploited them to add new ports or rules to turn the IoT devices into a router to attack other devices. To detect and mitigate such attacks, the authors present an IoT-based intrusion detection and prevention system to secure smart home network devices. The authors compared the proposed framework with other similar research based on Precision, Accuracy, F-measure, and Recall. The proposed model outperforms all the other known models reporting a high of 95% for identifying malicious attack packets, while others reported 58% and 71% detection percentage. © 2024
Author Keywords Brute Force; Cross-site scripting; Firmware attack; IDS; IoT; UPnP; XSS


Similar Articles


Id Similarity Authors Title Published
46467 View0.906Chiba Z.; Abghour N.; Moussaid K.; Lifandali O.; Kinta R.Review Of Recent Intrusion Detection Systems And Intrusion Prevention Systems In Iot Networks2022 30th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2022 (2022)
47934 View0.889Padmavathi V.; Saminathan R.Security For The Internet Of ThingsComputer and Information Security Handbook, Fourth Edition: Volumes 1-2, 1 (2024)
47716 View0.889Wang M.; Yang N.; Weng N.Securing A Smart Home With A Transformer-Based Iot Intrusion Detection SystemElectronics (Switzerland), 12, 9 (2023)
47990 View0.885Sharma R.; Arya R.Security Threats And Measures In The Internet Of Things For Smart City Infrastructure: A State Of ArtTransactions on Emerging Telecommunications Technologies, 34, 11 (2023)
8502 View0.882Noor Z.; Hina S.; Hayat F.; Shah G.A.An Intelligent Context-Aware Threat Detection And Response Model For Smart Cyber-Physical SystemsInternet of Things (Netherlands), 23 (2023)
5249 View0.879Chowdhury R.R.; Abas P.E.A Survey On Device Fingerprinting Approach For Resource-Constraint Iot Devices: Comparative Study And Research ChallengesInternet of Things (Netherlands), 20 (2022)
47710 View0.878Secureguard: An Iot-Based Home Security Solution For High-Burglary AreasDigest of Technical Papers - IEEE International Conference on Consumer Electronics (2024)
5283 View0.876Wei Z.; Wei Q.; Geng Y.; Yang Y.A Survey On Iot Security: Vulnerability Detection And ProtectionProceedings of 2024 International Conference on Artificial Intelligence of Things and Computing, AITC 2024 (2025)
4267 View0.876Durga Bhavani A.; Mangla N.A Review On Intrusion Detection Approaches In Resource-Constrained Iot EnvironmentLecture Notes on Data Engineering and Communications Technologies, 68 (2022)
47830 View0.875Mao Y.; Li X.; Jia Y.; Zhao S.; Zhang Y.Security Analysis Of Smart Home Based On Life CycleProceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019 (2019)