232 117
Full Length Article
Volume 5 , Issue 1, PP: 5-16 , 2021

Title

HomeTec Software for Security Aspects of Smart Home Devices Based on IOT

Authors Names :   Parth Rustagi   1 *     Rohit Sroa   2     Priyanshu Sinha   3     Ashish Sharma4   4     Sandeep Tayal   5  

1  Affiliation :  Department of Information Technology, Maharaja Agrasen Institute of Technology, Delhi, India,

    Email :  parthrustagi1@gmail.com


2  Affiliation :  Department of Computer Science and Engineering, Maharaja Agrasen Institute of Technology, Delhi, India,

    Email :  


3  Affiliation :  Departmnet of Computer Science and Engineering, Maharaja Agrasen Institute of Technology, Delhi, India,

    Email :  


4  Affiliation :  Assistant Professor, Department of Computer Science and Engineering, Maharaja Agrasen Institute of Technology, Delhi, India,

    Email :  


5  Affiliation :  Assistant Professor, Department of Computer Science and Engineering, Maharaja Agrasen Institute of Technology, Delhi, India,

    Email :  



Doi   :  DOI: 10.5281/zenodo.4099720

Received: July 23, 2020, Revised: September 25, 2020 , Accepted: October 10, 2020

Abstract :

 

As useful as it gets to connect devices to the internet to make life easier and more comfortable, it also opens the gates to various cyber threats. The connection of Smart Home devices to the internet makes them vulnerable to malicious hackers that infiltrate the system. Hackers can penetrate these systems and have full control over devices. This can lead to denial of service, data leakage, invasion of privacy, etc. Thus security is a major aspect of Smart home devices. However, many companies manufacturing these Smart Home devices have little to no security protocols in their devices. In the process of making the IoT devices cheaper, various cost-cutting is done on the security protocols in IoT devices. In some way, many manufactures of the devices don’t even consider this as a factor to build upon. This leaves the devices vulnerable to attacks. Various authorities have worked upon to standardize the security aspects for the IoT and listed out guidelines for manufactures to follow, but many fail to abide by them. This paper introduces and talks about the various threats, various Security threats to Smart Home devices. It takes a deep dive into the solutions for the discussed threats. It also discusses their prevention. Lastly, it discusses various preventive measures and good practices to be incorporated to protect devices from any future attacks.

 

Keywords :

SQL Injection , Digital Certificate , Eavesdropping , Biometric Security , Botnets

References :

Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018, July). N-BaIoT—Network-Based Detection of IoT Botnet Deep Autoencoders. IEEE, 11. Shah, T., & Venkatesan, S. (2018, August). Authentication of IoT Device and IoT Server Using Secure Vaults. IEEE International Conference On Trust, Security And Privacy In Computing And Communications. Bijalwan, A. (2020, February). Botnet Forensic Analysis Using Machine Learning. Hindawi Security and Communications Networks, Chien, H. Y. (2018, July). Dynamic Public Key Certificates for IoT and WSN Scenarios. Computer Software and Applications Conference.  Yang, A., Zhang, C., Chen, Y., Zhuansun, Y., & Liu, H. (2020, April). Security and Privacy of Smart Home Systems Based on the Internet of Things and Stereo Matching Algorithms. IEEE the Internet of Things, 10. Aly, M., Khohm,F., Haoues, M., Quintero, A., & Yacout, S(2019, June).  Enforcing Security in Internet of Things frameworks: A Systematic Literature Review, Elsevier ScienceDirect, 6. Keerthi, K., Roy, I., Hazra, A., & Rebeiro, C. (2018, December). Formal Verification For Security in IoT Devices. Springer, Chem  Liao, Bin., Ali, Y., Nazir, S., He, L. & Khan, H. (2020, July). Security Analysis of IoT devices by Using Mobile Computing: A Systematic Literature Review. IEEE the Internet of Things, 8