Systematic Literature Review on Cybersecurity Issues in the Smart Home Environment
Submitted : 2024-02-12, Published : 2024-12-20.
Abstract
Keywords
References
M. Majchrowicz and P. Duch, “Analysis of tizen security model and ways of bypassing it on smart TV platform,” Applied Sciences (Switzerland), vol. 11, no. 24, Dec. 2021, doi: 10.3390/app112412031.
S. Parashar, M. Zaid, N. Vohra, and S. Kumar, “Advance IOT Based Home Automation,” 2018. [Online]. Available: www.IJARND.com
N. Faizah Rozy, I. Muhamad Malik Matin, T. Informatika, F. Sains dan Teknologi, and U. Syarif Hidayatullah Jakarta, “UJI KERENTANAN SMART HOME MENGGUNAKAN METODE SQUARE UNTUK MENDUKUNG SMART CAMPUS,” 2021.
T. Schiller, B. Caulkins, A. S. Wu, and S. Mondesire, “Security Awareness in Smart Homes and Internet of Things Networks through Swarm-Based Cybersecurity Penetration Testing,” Information (Switzerland), vol. 14, no. 10, Oct. 2023, doi: 10.3390/info14100536.
T. Magara and Y. Zhou, “Internet of Things (IoT) of Smart Homes: Privacy and Security,” Journal of Electrical and Computer Engineering, vol. 2024, 2024, doi: 10.1155/2024/7716956.
O. Taiwo and A. E. Ezugwu, “Internet of Things-Based Intelligent Smart Home Control System,” Security and Communication Networks, vol. 2021, 2021, doi: 10.1155/2021/9928254.
K. Hammar and R. Stadler, “Finding Effective Security Strategies through Reinforcement Learning and Self-Play”, doi: 10.13140/RG.2.2.14128.38405.
U. Pujari, P. Patil, N. Bahadure, and M. Asnodkar, “International Conference on Communication and Information Processing Internet of Things based Integrated Smart Home Automation System,” 2020. [Online]. Available: https://ssrn.com/abstract=3645458
N. Faizah Rozy, I. Muhamad Malik Matin, T. Informatika, F. Sains dan Teknologi, and U. Syarif Hidayatullah Jakarta, “UJI KERENTANAN SMART HOME MENGGUNAKAN METODE SQUARE UNTUK MENDUKUNG SMART CAMPUS,” 2021.
H. Heriadi and G. C. Pamuji, “Cyber Security in IoT communication (Internet of Things) on Smart Home,” in IOP Conference Series: Materials Science and Engineering, IOP Publishing Ltd, Aug. 2020. doi: 10.1088/1757-899X/879/1/012043.
P. Siddhanti, P. Asprion, and B. Schneider, “Cybersecurity by Design for Smart Home Environments,” in Proceedings of the 21st International Conference on Enterprise Information Systems, SCITEPRESS - Science and Technology Publications, 2019, pp. 587–595. doi: 10.5220/0007709205870595.
M. N. Aman, U. Javaid, and B. Sikdar, “IoT-Proctor: A Secure and Lightweight Device Patching Framework for Mitigating Malware Spread in IoT Networks,” IEEE Syst J, 2021, doi: 10.1109/JSYST.2021.3070404.
P. Radoglou-Grammatikis et al., “SPEAR SIEM: A Security Information and Event Management system for the Smart Grid,” Computer Networks, vol. 193, Jul. 2021, doi: 10.1016/j.comnet.2021.108008.
G. P. Kachare, G. Choudhary, S. K. Shandilya, and V. Sihag, “Sandbox Environment for Real Time Malware Analysis of IoT Devices,” in Communications in Computer and Information Science, Springer Science and Business Media Deutschland GmbH, 2022, pp. 169–183. doi: 10.1007/978-3-031-10551-7_13.
D. Kundu, Md. E. Khallil, T. K. Das, A. Al Mamun, and A. Musha, “Smart Home Automation System Using on IoT,” Int J Sci Eng Res, vol. 11, no. 6, pp. 697–701, Jun. 2020, doi: 10.14299/ijser.2020.06.03.
Y. Zhang, P. Malacaria, G. Loukas, and E. Panaousis, “CROSS: A framework for cyber risk optimisation in smart homes,” Comput Secur, vol. 130, p. 103250, Jul. 2023, doi: 10.1016/j.cose.2023.103250.
D. Buil-Gil et al., “The digital harms of smart home devices: A systematic literature review,” Comput Human Behav, vol. 145, p. 107770, Aug. 2023, doi: 10.1016/j.chb.2023.107770.
F. T. Atmaja and I. I. Ridho, “SMART HOME SECURITY BERBASIS IOT DENGAN FITUR PUSH NOTIFICATION YANG TERINTEGRASI MELALUI APLIKASI TELEGRAM.”
“InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan”, doi: 10.30743/infotekjar.v5i2.3492.
E. CENGİZ and M. GÖK, “Reinforcement Learning Applications in Cyber Security: A Review,” Sakarya University Journal of Science, vol. 27, no. 2, pp. 481–503, Apr. 2023, doi: 10.16984/saufenbilder.1237742.
M. Patil, D. Thakare, A. Bhure, S. Kaundanyapure, and Dr. A. Mune, “An AI-Based Approach for Automating Penetration Testing,” Int J Res Appl Sci Eng Technol, vol. 12, no. 4, pp. 5019–5028, Apr. 2024, doi: 10.22214/ijraset.2024.61113.
A. Aldahmani, B. Ouni, T. Lestable, and M. Debbah, “Cyber-Security of Embedded IoTs in Smart Homes: Challenges, Requirements, Countermeasures, and Trends,” IEEE Open Journal of Vehicular Technology, vol. 4, pp. 281–292, 2023, doi: 10.1109/OJVT.2023.3234069.
M. Majchrowicz and P. Duch, “Analysis of tizen security model and ways of bypassing it on smart TV platform,” Applied Sciences (Switzerland), vol. 11, no. 24, Dec. 2021, doi: 10.3390/app112412031.
S. Supiyandi, C. Rizal, M. Iqbal, M. N. H. Siregar, and M. Eka, “Smart Home Berbasis Internet of Things (IoT) Dalam Mengendalikan dan Monitoring Keamanan Rumah,” Journal of Information System Research (JOSH), vol. 4, no. 4, pp. 1302–1307, Jul. 2023, doi: 10.47065/josh.v4i4.3822.
J. E. Klobas, T. McGill, and X. Wang, “How perceived security risk affects intention to use smart home devices: A reasoned action explanation,” Comput Secur, vol. 87, p. 101571, Nov. 2019, doi: 10.1016/j.cose.2019.101571.
M. Banerjee, J. Lee, and K.-K. R. Choo, “A blockchain future for internet of things security: a position paper,” Digital Communications and Networks, vol. 4, no. 3, pp. 149–160, Aug. 2018, doi: 10.1016/j.dcan.2017.10.006.
“10 IoT Security Concerns to Consider Before App Development.” [Online]. Available: https://www.peerbits.com/blog/10-iot-security-concerns-to-keep-in-mind-before-developing-apps.html
A. Arora, A. Kaur, B. Bhushan, and H. Saini, “Security Concerns and Future Trends of Internet of Things,” in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), IEEE, Jul. 2019, pp. 891–896. doi: 10.1109/ICICICT46008.2019.8993222.
B. Agusti Pramajuri, T. Hadyanto, and M. Ade Cipta Rahmani, “LITERATURE REVIEW : SMART HOME BASED ON IOT FOR SECURITY SYSTEM.”
C. Liang, B. Shanmugam, S. Azam, M. Jonkman, F. De Boer, and G. Narayansamy, “Intrusion Detection System for Internet of Things based on a Machine Learning approach,” in 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), IEEE, Mar. 2019, pp. 1–6. doi: 10.1109/ViTECoN.2019.8899448.
Y. Kayode Saheed, A. Idris Abiodun, S. Misra, M. Kristiansen Holone, and R. Colomo-Palacios, “A machine learning-based intrusion detection for detecting internet of things network attacks,” Alexandria Engineering Journal, vol. 61, no. 12, pp. 9395–9409, Dec. 2022, doi: 10.1016/j.aej.2022.02.063.
M. Gupta, M. Abdelsalam, S. Khorsandroo, and S. Mittal, “Security and Privacy in Smart Farming: Challenges and Opportunities,” IEEE Access, vol. 8, pp. 34564–34584, 2020, doi: 10.1109/ACCESS.2020.2975142.
M. Gupta, M. Abdelsalam, S. Khorsandroo, and S. Mittal, “Security and Privacy in Smart Farming: Challenges and Opportunities,” IEEE Access, vol. 8, pp. 34564–34584, 2020, doi: 10.1109/ACCESS.2020.2975142.
O. Gkotsopoulou et al., “Data Protection by Design for cybersecurity systems in a Smart Home environment,” in 2019 IEEE Conference on Network Softwarization (NetSoft), IEEE, Jun. 2019, pp. 101–109. doi: 10.1109/NETSOFT.2019.8806694.
A. Singh and B. Sikdar, “Adversarial Attack for Deep Learning Based IoT Appliance Classification Techniques,” in 2021 IEEE 7th World Forum on Internet of Things (WF-IoT), IEEE, Jun. 2021, pp. 657–662. doi: 10.1109/WF-IoT51360.2021.9594946.
A. Singh and B. Sikdar, “Adversarial Attack and Defence Strategies for Deep-Learning-Based IoT Device Classification Techniques,” IEEE Internet Things J, vol. 9, no. 4, pp. 2602–2613, Feb. 2022, doi: 10.1109/JIOT.2021.3138541.
I. Listiawan, Z. Zaidir, S. Winardi, and M. Diqi, “Optimising Bcrypt Parameters: Finding the Optimal Number of Rounds for Enhanced Security and Performance,” Compiler, vol. 13, no. 1, pp. 1–10, 2024.
S. Piasecki, L. Urquhart, and P. D. McAuley, “Defence against the dark artefacts: Smart home cybercrimes and cybersecurity standards,” Computer Law & Security Review, vol. 42, p. 105542, 2021, doi: https://doi.org/10.1016/j.clsr.2021.105542.
Article Metrics
Abstract view: 0 times
This work is licensed under a Creative Commons Attribution 4.0 International License.
Refbacks
- There are currently no refbacks.