Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 12 , Issue 2 , PP: 83-98, 2023 | Cite this article as | XML | Html | PDF | Full Length Article

Protecting Smart Home from Cybersecurity Threats Strategies for Homeowners

Miguel Botto-Tobar 1 * , Sumaiya Rehan 2 , Ravi Prakash Verma 3

  • 1 Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, 5600 MB, The Netherlands; Research Group in Artificial Intelligence and Information Technology, Department of Mathematics and Physical Sciences, University of Guayaquil, Guayaquil, 090514, Ecuador - (m.a.botto.tobar@tue.nl)
  • 2 Department of Computer Science and Engineering, Babu Banarasi Das University, Lucknow, India - (sumaiyarehan@bbdu.ac.in)
  • 3 Department of Computer Science and Engineering, Babu Banarasi Das University, Lucknow, India - (raviprakashverma@bbdu.ac.in)
  • Doi: https://doi.org/10.54216/JCIM.120206

    Received: December 28, 2022 Revised: February 27, 2023 Accepted: June 09, 2023
    Abstract

    Cyberthreat proliferation parallels the rapid surge in smart home usage. While having everything in one place is convenient, it also increases your home's vulnerability to cyber threats. Such an attack could result in bodily harm, the theft of sensitive information, or both. To mitigate the effects of these threats, owners of smart homes can make efforts to prevent cybercriminals from breaking into their premises starting by updating their firmware to the most recent version, creating secure passwords, and enabling two-factor authentication. Second, people should safeguard their gadgets by creating unique user IDs, disabling unneeded functions, and always keeping a tight eye on them. Finally, they must safeguard the facility where they conduct business by installing surveillance equipment, employing electronic locks, and restricting network access. Individuals must take these safeguards, but they must also stay informed about the most recent threats to home cybersecurity and the best strategies to combat them. Smart home device owners should become acquainted with the risks to which their devices are prone and ensure that their devices are updated to the most recent versions of all available software and security upgrades. Collaboration between homeowners, connected device manufacturers, and internet service providers is required to ensure the security of a smart home. Homeowners should research the security features available in smart home devices and only buy from reputable businesses that value consumer privacy and security. As the Internet of Things (IoT) expands and develops, a data privacy standard that meets the criteria of Data protection is in great demand. Safeguarding smart family apps necessitates a community agreement and specific permission from users to store their personal information in the product's database.

    Keywords :

    Attribute-Based Access Control , Cyber Security , Data Protection , Internet of Things , Role-Based Access Control , Smart Home.

    References

    [1] Radanliev, P., De Roure, D.C., Maple, C., Nurse, J.R., Nicolescu, R., Ani, U. (2019). Cyber Risk in IoT Systems. Preprints, 43, 2019030104.

    [2] Choudhary, Y., Umamaheswari, B., Kumawat, V. (2021). A study of threats, vulnerabilities and countermeasures: An IoT perspective. Shanlax International Journal of Arts, Science, and Humanities, 8, 39-45.

    [3] Lee, I. (2020). Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management. Future Internet, 12, 157.

    [4] Kandasamy, K., Srinivas, S., Achuthan, K., Rangan, V.P. (2020). IoT cyber risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process. EURASIP Journal on Information Security, 2020, 8.

    [5] Pahlevanzadeh, B., Koleini, S., Fadilah, S.I. (2021). Security in IoT: Threats and vulnerabilities, layered architecture, encryption mechanisms, challenges and solutions. Communications in Computer and Information Science, 267-283.

    [6] Kashyap, R. (2022). Big Data and Global Software Engineering. In Research Anthology on Big Data Analytics, Architectures, and Applications (pp. 1249–1274).

    [7] Khan, Z. A., Feng, Z., Uddin, M. I., Mast, N., Shah, S. A. A., Imtiaz, M., Al-Khasawneh, M. A., & Mahmoud, M. (2020). Optimal Policy Learning for Disease Prevention Using Reinforcement Learning. Scientific Programming, 2020, Article ID 7627290, 1-13. doi: 10.1155/2020/7627290

    [8] Nair, R., Alhudhaif, A., Koundal, D., Doewes, R. I., & Sharma, P. (2021). Deep learning-based COVID-19 detection system using pulmonary CT scans. Turkish Journal of Electrical Engineering & Computer Sciences, 29(SI-1), 2716–2727.

    [9] Obaidat, M.A., Obeidat, S., Holst, J., Al Hayajneh, A., Brown, J. (2002). A comprehensive and systematic survey on the internet of things: Security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities and countermeasures. Computers, 9, 44.

    [10] Bekkali, A., Essaaidi, M., Boulmalf, M., Majdoubi, D. (2022). Systematic Literature Review of Internet of Things (IoT) Security. Advances in Industrial and Dynamical Systems and Applications (ADSA), 21, 25-39.

    [11] Albalawi, A.M., Almaiah, M.A. (2022). Assessing and reviewing of cyber-security threats, attacks, mitigation techniques in IoT environment. Journal of Theoretical and Applied Information Technology, 100, 2988-3011.

    [12] Ghazal, T.M., Afifi, M.A., Kalra, D. (2020). Security vulnerabilities, attacks, threats and the proposed countermeasures for the Internet of Things applications. Solid State Technology, 63, 31-45.

    [13] Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L.F., Abdulkadir, S.J. (2022). Detecting Cybersecurity Attacks in Internet of Things Using Artificial Intelligence Methods: A Systematic Literature Review. Electronics, 11, 198.

    [14] Sethi, P., Sarangi, S.R. (2017). Internet of things: Architectures, Protocols, and applications. Journal of Electrical and Computer Engineering, 2017, 9324035.

    [15] Yousuf, T., Mahmoud, R., Aloul, F., Zualkernan, I. (2015). Internet of things (IOT) security: Current status, challenges and countermeasures. International Journal of Information Security Research, 5, 608-616.

    [16] Kashyap, R. (2021). Machine learning and internet of things for smart processing. In Artificial Intelligence to Solve Pervasive Internet of Things Issues (pp. 161–181).

    [17] Nair, R., Vishwakarma, S., Soni, M., Patel, T., & Joshi, S. (2021). Detection of covid-19 cases through X-ray images using hybrid deep neural network. World Journal of Engineering, 19(1), 33–39.

    [18] Shah, S. A. A., Uddin, I., Aziz, F., Ahmad, S., Al-Khasawneh, M. A., & Sharaf, M. (2020). An Enhanced Deep Neural Network for Predicting Workplace Absenteeism. Complexity, 2020, Article ID 5843932, 1-12. doi: 10.1155/2020/5843932

    [19] Deogirikar, J., Vidhate, A. (2017). Security attacks in IoT: A survey. In Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), Palladam, India, 10-11 February 2017, 32-37.

    [20] Hamid, G.H., Alisa, Z.T. (2021). A survey on IOT Application Layer Protocols. Indonesian Journal of Electrical Engineering and Computer Science, 21, 1663.

    [21] Nebbione, G., Calzarossa, M.C. (2020). Security of IOT Application Layer Protocols: Challenges and findings. Future Internet, 12, 55.

    [22] Bibi, N., Iqbal, F., Akhtar, S., Anwar, R., Bibi, S. (2021). A Survey of Application Layer Protocols of Internet of Things. International Journal of Computer Science and Network Security, 21, 301-311.

    [23] Mitra, D., Goswami, S., Hati, D., Roy, S. (2021). Comparative Study Of Iot Protocols Pjaee. Smart Applications and Data Analysis for Smart Cities (SADASC’18), 17, 2020.

    [24] Dange, S., Chatterjee, M. (2019). IOT botnet: The largest threat to the IOT Network. Advances in Intelligent Systems and Computing, 22, 137-157.

    [25] Ali, M.H., Jaber, M.M., Abd, S.K., Rehman, A., Awan, M.J., Damaševičius, R., Bahaj, S.A. (2022). Threat analysis and distributed denial of service (ddos) attack recognition in the internet of things (IOT). Electronics, 11, 494.

    [26] Kashyap, R. (2022). Machine Learning, data mining for IOT-based systems. In Research Anthology on Machine Learning Techniques, Methods, and Applications (pp. 447–471).

    [27] Ramirez-Asis, E., Bolivar, R. P., Gonzales, L. A., Chaudhury, S., Kashyap, R., Alsanie, W. F., & Viju, G. K. (2022). A lightweight hybrid dilated ghost model-based approach for the prognosis of breast cancer. Computational Intelligence and Neuroscience, 2022, 1–10.

    [28] Mohanakurup, V., Parambil Gangadharan, S. M., Goel, P., Verma, D., Alshehri, S., Kashyap, R., & Malakhil, B. (2022). Breast cancer detection on histopathological images using a composite dilated Backbone Network. Computational Intelligence and Neuroscience, 2022, 1–10.

    [29] Nair, R., Singh, D. K., Ashu, & Bakshi, S. (2020). Hand gesture recognition system for physically challenged people using IOT. In 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS).

    [30] Uddin, M. I., Shah, S. A. A., & Al-Khasawneh, M. A. (2020). A Novel Deep Convolutional Neural Network Model to Monitor People following Guidelines to Avoid COVID-19. Journal of Sensors, 2020, Article ID 8856801, 1-15. doi: 10.1155/2020/8856801

     

    Cite This Article As :
    Botto-Tobar, Miguel. , Rehan, Sumaiya. , Prakash, Ravi. Protecting Smart Home from Cybersecurity Threats Strategies for Homeowners. Journal of Cybersecurity and Information Management, vol. , no. , 2023, pp. 83-98. DOI: https://doi.org/10.54216/JCIM.120206
    Botto-Tobar, M. Rehan, S. Prakash, R. (2023). Protecting Smart Home from Cybersecurity Threats Strategies for Homeowners. Journal of Cybersecurity and Information Management, (), 83-98. DOI: https://doi.org/10.54216/JCIM.120206
    Botto-Tobar, Miguel. Rehan, Sumaiya. Prakash, Ravi. Protecting Smart Home from Cybersecurity Threats Strategies for Homeowners. Journal of Cybersecurity and Information Management , no. (2023): 83-98. DOI: https://doi.org/10.54216/JCIM.120206
    Botto-Tobar, M. , Rehan, S. , Prakash, R. (2023) . Protecting Smart Home from Cybersecurity Threats Strategies for Homeowners. Journal of Cybersecurity and Information Management , () , 83-98 . DOI: https://doi.org/10.54216/JCIM.120206
    Botto-Tobar M. , Rehan S. , Prakash R. [2023]. Protecting Smart Home from Cybersecurity Threats Strategies for Homeowners. Journal of Cybersecurity and Information Management. (): 83-98. DOI: https://doi.org/10.54216/JCIM.120206
    Botto-Tobar, M. Rehan, S. Prakash, R. "Protecting Smart Home from Cybersecurity Threats Strategies for Homeowners," Journal of Cybersecurity and Information Management, vol. , no. , pp. 83-98, 2023. DOI: https://doi.org/10.54216/JCIM.120206