Systematic Literature Review on Cybersecurity Issues in the Smart Home Environment

Puspa Ira Dewi Candra Wulan, Rofiq Fauzi, Danis Putra Perdana

Submitted : 2024-02-12, Published : 2024-12-20.

Abstract

Method A literature study was conducted to examine cyber security in Smart Homes, focusing on vulnerability assessment, privacy, threat mitigation, and policy regulations. Not only smartphones have advanced technology, but smarthomes or smart homes are a technological development that allows users to control functions such as security access, temperature, lighting and home theater remotely. This is the basis for the need for user-friendly cybersecurity measures, considering the rapid adoption of IoT devices in smart homes. This literature review highlights challenges related to inconsistent regulations and varying technology standards. Significant gaps exist in user awareness, device interoperability, data privacy, and security protocols. A multidisciplinary approach that brings together technology, policy, and social science stakeholders is recommended to build a secure, efficient, and privacy-preserving smart home ecosystem

Keywords

SmartHome; CyberSecurity; Study Literature

References

M. Majchrowicz and P. Duch, “Analysis of tizen security model and ways of bypassing it on smart TV platform,” Applied Sciences (Switzerland), vol. 11, no. 24, Dec. 2021, doi: 10.3390/app112412031.

S. Parashar, M. Zaid, N. Vohra, and S. Kumar, “Advance IOT Based Home Automation,” 2018. [Online]. Available: www.IJARND.com

N. Faizah Rozy, I. Muhamad Malik Matin, T. Informatika, F. Sains dan Teknologi, and U. Syarif Hidayatullah Jakarta, “UJI KERENTANAN SMART HOME MENGGUNAKAN METODE SQUARE UNTUK MENDUKUNG SMART CAMPUS,” 2021.

T. Schiller, B. Caulkins, A. S. Wu, and S. Mondesire, “Security Awareness in Smart Homes and Internet of Things Networks through Swarm-Based Cybersecurity Penetration Testing,” Information (Switzerland), vol. 14, no. 10, Oct. 2023, doi: 10.3390/info14100536.

T. Magara and Y. Zhou, “Internet of Things (IoT) of Smart Homes: Privacy and Security,” Journal of Electrical and Computer Engineering, vol. 2024, 2024, doi: 10.1155/2024/7716956.

O. Taiwo and A. E. Ezugwu, “Internet of Things-Based Intelligent Smart Home Control System,” Security and Communication Networks, vol. 2021, 2021, doi: 10.1155/2021/9928254.

K. Hammar and R. Stadler, “Finding Effective Security Strategies through Reinforcement Learning and Self-Play”, doi: 10.13140/RG.2.2.14128.38405.

U. Pujari, P. Patil, N. Bahadure, and M. Asnodkar, “International Conference on Communication and Information Processing Internet of Things based Integrated Smart Home Automation System,” 2020. [Online]. Available: https://ssrn.com/abstract=3645458

N. Faizah Rozy, I. Muhamad Malik Matin, T. Informatika, F. Sains dan Teknologi, and U. Syarif Hidayatullah Jakarta, “UJI KERENTANAN SMART HOME MENGGUNAKAN METODE SQUARE UNTUK MENDUKUNG SMART CAMPUS,” 2021.

H. Heriadi and G. C. Pamuji, “Cyber Security in IoT communication (Internet of Things) on Smart Home,” in IOP Conference Series: Materials Science and Engineering, IOP Publishing Ltd, Aug. 2020. doi: 10.1088/1757-899X/879/1/012043.

P. Siddhanti, P. Asprion, and B. Schneider, “Cybersecurity by Design for Smart Home Environments,” in Proceedings of the 21st International Conference on Enterprise Information Systems, SCITEPRESS - Science and Technology Publications, 2019, pp. 587–595. doi: 10.5220/0007709205870595.

M. N. Aman, U. Javaid, and B. Sikdar, “IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks,” IEEE Syst J, 2021, doi: 10.1109/JSYST.2021.3070404.

P. Radoglou-Grammatikis et al., “SPEAR SIEM: A Security Information and Event Management system for the Smart Grid,” Computer Networks, vol. 193, Jul. 2021, doi: 10.1016/j.comnet.2021.108008.

G. P. Kachare, G. Choudhary, S. K. Shandilya, and V. Sihag, “Sandbox Environment for Real Time Malware Analysis of IoT Devices,” in Communications in Computer and Information Science, Springer Science and Business Media Deutschland GmbH, 2022, pp. 169–183. doi: 10.1007/978-3-031-10551-7_13.

D. Kundu, Md. E. Khallil, T. K. Das, A. Al Mamun, and A. Musha, “Smart Home Automation System Using on IoT,” Int J Sci Eng Res, vol. 11, no. 6, pp. 697–701, Jun. 2020, doi: 10.14299/ijser.2020.06.03.

Y. Zhang, P. Malacaria, G. Loukas, and E. Panaousis, “CROSS: A framework for cyber risk optimisation in smart homes,” Comput Secur, vol. 130, p. 103250, Jul. 2023, doi: 10.1016/j.cose.2023.103250.

D. Buil-Gil et al., “The digital harms of smart home devices: A systematic literature review,” Comput Human Behav, vol. 145, p. 107770, Aug. 2023, doi: 10.1016/j.chb.2023.107770.

F. T. Atmaja and I. I. Ridho, “SMART HOME SECURITY BERBASIS IOT DENGAN FITUR PUSH NOTIFICATION YANG TERINTEGRASI MELALUI APLIKASI TELEGRAM.”

“InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan”, doi: 10.30743/infotekjar.v5i2.3492.

E. CENGİZ and M. GÖK, “Reinforcement Learning Applications in Cyber Security: A Review,” Sakarya University Journal of Science, vol. 27, no. 2, pp. 481–503, Apr. 2023, doi: 10.16984/saufenbilder.1237742.

M. Patil, D. Thakare, A. Bhure, S. Kaundanyapure, and Dr. A. Mune, “An AI-Based Approach for Automating Penetration Testing,” Int J Res Appl Sci Eng Technol, vol. 12, no. 4, pp. 5019–5028, Apr. 2024, doi: 10.22214/ijraset.2024.61113.

A. Aldahmani, B. Ouni, T. Lestable, and M. Debbah, “Cyber-Security of Embedded IoTs in Smart Homes: Challenges, Requirements, Countermeasures, and Trends,” IEEE Open Journal of Vehicular Technology, vol. 4, pp. 281–292, 2023, doi: 10.1109/OJVT.2023.3234069.

M. Majchrowicz and P. Duch, “Analysis of tizen security model and ways of bypassing it on smart TV platform,” Applied Sciences (Switzerland), vol. 11, no. 24, Dec. 2021, doi: 10.3390/app112412031.

S. Supiyandi, C. Rizal, M. Iqbal, M. N. H. Siregar, and M. Eka, “Smart Home Berbasis Internet of Things (IoT) Dalam Mengendalikan dan Monitoring Keamanan Rumah,” Journal of Information System Research (JOSH), vol. 4, no. 4, pp. 1302–1307, Jul. 2023, doi: 10.47065/josh.v4i4.3822.

J. E. Klobas, T. McGill, and X. Wang, “How perceived security risk affects intention to use smart home devices: A reasoned action explanation,” Comput Secur, vol. 87, p. 101571, Nov. 2019, doi: 10.1016/j.cose.2019.101571.

M. Banerjee, J. Lee, and K.-K. R. Choo, “A blockchain future for internet of things security: a position paper,” Digital Communications and Networks, vol. 4, no. 3, pp. 149–160, Aug. 2018, doi: 10.1016/j.dcan.2017.10.006.

“10 IoT Security Concerns to Consider Before App Development.” [Online]. Available: https://www.peerbits.com/blog/10-iot-security-concerns-to-keep-in-mind-before-developing-apps.html

A. Arora, A. Kaur, B. Bhushan, and H. Saini, “Security Concerns and Future Trends of Internet of Things,” in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), IEEE, Jul. 2019, pp. 891–896. doi: 10.1109/ICICICT46008.2019.8993222.

B. Agusti Pramajuri, T. Hadyanto, and M. Ade Cipta Rahmani, “LITERATURE REVIEW : SMART HOME BASED ON IOT FOR SECURITY SYSTEM.”

C. Liang, B. Shanmugam, S. Azam, M. Jonkman, F. De Boer, and G. Narayansamy, “Intrusion Detection System for Internet of Things based on a Machine Learning approach,” in 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), IEEE, Mar. 2019, pp. 1–6. doi: 10.1109/ViTECoN.2019.8899448.

Y. Kayode Saheed, A. Idris Abiodun, S. Misra, M. Kristiansen Holone, and R. Colomo-Palacios, “A machine learning-based intrusion detection for detecting internet of things network attacks,” Alexandria Engineering Journal, vol. 61, no. 12, pp. 9395–9409, Dec. 2022, doi: 10.1016/j.aej.2022.02.063.

M. Gupta, M. Abdelsalam, S. Khorsandroo, and S. Mittal, “Security and Privacy in Smart Farming: Challenges and Opportunities,” IEEE Access, vol. 8, pp. 34564–34584, 2020, doi: 10.1109/ACCESS.2020.2975142.

M. Gupta, M. Abdelsalam, S. Khorsandroo, and S. Mittal, “Security and Privacy in Smart Farming: Challenges and Opportunities,” IEEE Access, vol. 8, pp. 34564–34584, 2020, doi: 10.1109/ACCESS.2020.2975142.

O. Gkotsopoulou et al., “Data Protection by Design for cybersecurity systems in a Smart Home environment,” in 2019 IEEE Conference on Network Softwarization (NetSoft), IEEE, Jun. 2019, pp. 101–109. doi: 10.1109/NETSOFT.2019.8806694.

A. Singh and B. Sikdar, “Adversarial Attack for Deep Learning Based IoT Appliance Classification Techniques,” in 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), IEEE, Jun. 2021, pp. 657–662. doi: 10.1109/WF-IoT51360.2021.9594946.

A. Singh and B. Sikdar, “Adversarial Attack and Defence Strategies for Deep-Learning-Based IoT Device Classification Techniques,” IEEE Internet Things J, vol. 9, no. 4, pp. 2602–2613, Feb. 2022, doi: 10.1109/JIOT.2021.3138541.

I. Listiawan, Z. Zaidir, S. Winardi, and M. Diqi, “Optimising Bcrypt Parameters: Finding the Optimal Number of Rounds for Enhanced Security and Performance,” Compiler, vol. 13, no. 1, pp. 1–10, 2024.

S. Piasecki, L. Urquhart, and P. D. McAuley, “Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards,” Computer Law & Security Review, vol. 42, p. 105542, 2021, doi: https://doi.org/10.1016/j.clsr.2021.105542.

Article Metrics

Abstract view: 0 times

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Refbacks

  • There are currently no refbacks.