Volume 5 , Issue 1 , PP: 5-16, 2021 | Cite this article as | XML | Html | PDF | Full Length Article
Parth Rustagi 1 * , Rohit Sroa 2 , Priyanshu Sinha 3 , Ashish Sharma4 4 , Sandeep Tayal 5
Doi: https://doi.org/10.54216/JCIM.050101
As useful as it gets to connect devices to the internet to make life easier and more comfortable, it also opens the gates to various cyber threats. The connection of Smart Home devices to the internet makes them vulnerable to malicious hackers that infiltrate the system. Hackers can penetrate these systems and have full control over devices. This can lead to denial of service, data leakage, invasion of privacy, etc. Thus security is a major aspect of Smart home devices. However, many companies manufacturing these Smart Home devices have little to no security protocols in their devices. In the process of making the IoT devices cheaper, various cost-cutting is done on the security protocols in IoT devices. In some way, many manufactures of the devices don’t even consider this as a factor to build upon. This leaves the devices vulnerable to attacks. Various authorities have worked upon to standardize the security aspects for the IoT and listed out guidelines for manufactures to follow, but many fail to abide by them. This paper introduces and talks about the various threats, various Security threats to Smart Home devices. It takes a deep dive into the solutions for the discussed threats. It also discusses their prevention. Lastly, it discusses various preventive measures and good practices to be incorporated to protect devices from any future attacks.
SQL Injection, Digital Certificate, Eavesdropping, Biometric Security, Botnets
[1] Meidan, Y., Bohadana, M., Mathov, Y., Mirsky, Y., Shabtai, A., Breitenbacher, D., & Elovici, Y. (2018, July). N-BaIoT—Network-Based Detection of IoT Botnet Deep Autoencoders. IEEE, 11.
[2] Shah, T., & Venkatesan, S. (2018, August). Authentication of IoT Device and IoT Server Using Secure Vaults. IEEE International Conference On Trust, Security And Privacy In Computing And Communications.
[3] Bijalwan, A. (2020, February). Botnet Forensic Analysis Using Machine Learning. Hindawi Security and Communications Networks,
[4] Chien, H. Y. (2018, July). Dynamic Public Key Certificates for IoT and WSN Scenarios. Computer Software and Applications Conference.
[5] Yang, A., Zhang, C., Chen, Y., Zhuansun, Y., & Liu, H. (2020, April). Security and Privacy of Smart Home Systems Based on the Internet of Things and Stereo Matching Algorithms. IEEE the Internet of Things, 10.
[6] Aly, M., Khohm,F., Haoues, M., Quintero, A., & Yacout, S(2019, June). Enforcing Security in Internet of Things frameworks: A Systematic Literature Review, Elsevier ScienceDirect, 6.
[7] Keerthi, K., Roy, I., Hazra, A., & Rebeiro, C. (2018, December). Formal Verification For Security in IoT Devices. Springer, Chem
[8] Liao, Bin., Ali, Y., Nazir, S., He, L. & Khan, H. (2020, July). Security Analysis of IoT devices by Using Mobile Computing: A Systematic Literature Review. IEEE the Internet of Things, 8