Smart City Gnosys

Smart city article details

Title Security Analysis Of Smart Home Based On Life Cycle
ID_Doc 47830
Authors Mao Y.; Li X.; Jia Y.; Zhao S.; Zhang Y.
Year 2019
Published Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019
DOI http://dx.doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00261
Abstract With the rapid development of the Internet of Things (IoT) technology, security and privacy issues in the smart home have become the focus of extensive research. However, due to the differences in smart home solutions, especially the complex communication protocols and the wide variety of IoT devices, it is difficult for security researchers to systematically and comprehensively study the security of smart home. In this paper, we propose a novel security analysis method based on the life cycle of smart home, including the complete process of the user using IoT devices in smart home scenario, and take user, samrt device and IoT cloud as the research object. Moreover, in order to figure out the life cycle of smart home from different manufacturers, we propose a tool, called IoTCap (IoT Capture), to study the security and privacy issues of the smart home. The fundamental approach used in this tool is to capture IP-layer data packets sent and received by smart appliance on the user's mobile phone, and to analyze the contents of the data packets. Using this tool to recover the workflow and interaction process of the smart home, we further analyze security risks at all stages of the life cycle, including identity authentication, access control, protocol security, and privacy protection. The experimental results have shown that the method is feasible. We believe that this tool will be the basis of a general automation framework for analyzing the security and privacy of smart home. © 2019 IEEE.
Author Keywords IoT; Life Cycle; Security and Privacy Introduction; Smart Home; Traffic Analysis


Similar Articles


Id Similarity Authors Title Published
26946 View0.875Bhardwaj A.; Bharany S.; Abulfaraj A.W.; Osman Ibrahim A.; Nagmeldin W.Fortifying Home Iot Security: A Framework For Comprehensive Examination Of Vulnerabilities And Intrusion Detection Strategies For Smart CitiesEgyptian Informatics Journal, 25 (2024)
57619 View0.868Wu T.-Y.; Meng Q.; Chen Y.-C.; Kumari S.; Chen C.-M.Toward A Secure Smart-Home Iot Access Control Scheme Based On Home Registration ApproachMathematics, 11, 9 (2023)
51047 View0.867Al Farsi G.; AlSinani M.Smart Home Using Internet Of ThingsLecture Notes in Networks and Systems, 671 LNNS (2023)
57292 View0.858Kavallieratos G.; Gkioulos V.; Katsikas S.K.Threat Analysis In Dynamic Environments: The Case Of The Smart HomeProceedings - 15th Annual International Conference on Distributed Computing in Sensor Systems, DCOSS 2019 (2019)
47826 View0.855Liao B.; Ali Y.; Nazir S.; He L.; Khan H.U.Security Analysis Of Iot Devices By Using Mobile Computing: A Systematic Literature ReviewIEEE Access, 8 (2020)
47678 View0.853Ouni R.; Saleem K.Secure Smart Home Architecture For Ambient-Assisted Living Using A Multimedia Internet Of Things Based System In Smart CitiesMathematical Biosciences and Engineering, 21, 3 (2024)