Systematic Literature Review: Security Challenges of IoT-based Smart Home Systems
Abstract
Keywords
References
Karimi, K., & Atkinson, G, "What the Internet of Things (IoT) Needs to Become a Reality", Retrieved June 3, 2024, from https://www.mouser.cn/pdfdocs/INTOTHNGSWP.PDF, 2014.
Smart Home Market Size & Share will hit $53.45 Billion by 2022. (Zion Market Research) Retrieved June 3, 2024, from https://www.globenewswire.com/news-release/2017/04/12/959610/0/en/Smart-Home-Market-Size-Share-will-hit-53-45-Billion-by-2022.html, 2022
Smart home - Statistics & Facts, (Statista) Retrieved June 3, 2024, from https://www.statista.com/topics/2430/smart-homes/, 2024
Liberati, A., Altman, D. G., & Tetzlaff, J, "The PRISMA Statement for Reporting Systematic Reviews and Meta-Analyses of Studies That Evaluate Health Care Interventions: Explanation and Elaboration. Annals of Internal Medicine", 873–880, 2009.
Burhan, M., Rehman, R. A., Khan, B., & Kim, B.-S, "IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey. Sensors", 18(9), 2796-2833, 2018.
Rehman, S. U., & Manickam, S., "A Study of Smart Home Environment and its Security Threats", International Journal of Reliability, Quality and Safety Engineering, 23(3), 1640005-1640014, 2015.
Kitchenham, B. Procedures for Performing Systematic Reviews. Keele University, 7, 1-26, 2004.
Davis, J., Mengersen, K., Bennett, S., & Mazerolle, L. "Viewing systematic reviews and meta-analysis in social research through different lenses", SpringerPlus, 511-520, 2014.
Aly, M., Khomh, F., Haoues, M., & Quintero, A., "Enforcing security in Internet of Things frameworks: A Systematic Literature Review", Internet of Things, 6, 100050, 2019
Liao, B., Ali, Y., Nazir, S., & He, L., "Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review", IEEE Access, 8, 120331 – 120350, 2020.
Pico-Valencia, P., & Holgado-Terriza, J. A., "Agentification of the Internet of Things: A systematic literature review", International Journal of Distributed Sensor Networks (IJDSN), 14(10), 1-20, 2018.
Heartfield, R., Loukas, G., Budimir, S., & Bezemskij, A., "A taxonomy of cyber-physical threats and impact in the smart home", Computers & Security, 78, 398-428, 2018.
Anwar, M. N., Nazir, M., & Mustafa, K., "Security threats taxonomy: Smart-home perspective", International Conference on Advances in Computing, Communication & Automation. Dehradun, India, 2017.
Okoli, C., "A Guide to Conducting a Standalone Systematic Literature Review", Communications of the Association for Information Systems, 37(43), 879-910., 2015.
Macedo, E. L., Oliveira, E. A., & Silva, F. H., "On the security aspects of Internet of Things: A systematic literature review", Journal of Communications and Networks, 21(5), 444 – 457, 2019.
Zhang, Y., Huang, X., Chen, X., & Zhang, L. Y., "A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle", IEEE Internet of Things Journal, 7(2), 1061 – 1071, 2020.
Majumder, A. J., Veilleux, C. B., & Miller, J. D., "A Cyber-Physical System to Detect IoT Security Threats of a Smart Home Heterogeneous Wireless Sensor Node", IEEE Access, 8, 205989 – 206002, 2020.
Batalla, J. M., & Gonciarz, F., "Deployment of smart home management system at the edge: mechanisms and protocols", Neural Computing and Applications , 1301–1315, 2019.
Arif, S., Khan, M. A., Rehman, S. U., & Kabir, M. A., "Investigating Smart Home Security: Is Blockchain the Answer?", IEEE Access, 8, 117802 – 117816, 2020.
Huang, Z., Zhang, L., Meng, X., & Choo, K.-K. R., "Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home", IEEE Internet of Things Journal, 7(2), 1039 – 1047, 2019
Dey, S., & Hossain, A., "Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography", IEEE Sensors Letters, 3(4), 1-4, 2019.
Ji, X., Li, C., & Zhou, X., "Authenticating Smart Home Devices via Home Limited Channels. Transactions on Internet of Things", 1(4), 1-24, 2020.
Liu, Q., Zhang, W., Ding, S., & Li, H., "Novel secure group data exchange protocol in smart home with physical layer network coding", Sensors, 20(4), 1138-2245, 2020.
Lin, H., & Bergmann, N. W., "IoT privacy and security challenges for smart home environments. Information", 7(33), 44-59, 2016.
Xiao, Y., Jia, Y., Liu, C., Alrawais, A., & Rekik, M., "HomeShield: A Credential-Less Authentication Framework for Smart Home Systems", IEEE Internet of Things Journal, 7(9), 7903 – 7918, 2020.
Lu, Y., & Xu, L. D., "Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics", IEEE Internet of Things Journal, 6(2), 2103 – 2115, 2019.
Banerjee, S., Odelu, V., & Das, A. K., "An efficient, anonymous and robust authentication scheme for smart home environments. Sensors", 20(4), 1215-1234,2020.
Lee, Y., Rathore, S., Park, J. H., & Park, J. H., "A blockchain-based smart home gateway architecture for preventing data forgery", Human-centric Computing and Information Sciences, 10(9), 9-23, 2020.
Bogdan-CosminChifor, Bicaa, I., & Victor-ValeriuPatriciua, "A security authorization scheme for smart home Internet of Things devices", Future Generation Computer Systems, 86, 740-749, 2018.
Shuaia, M., Yu, N., & Wang, H., "Anonymous authentication scheme for smart home environment with provable security", Computers & Security, 86, 132-146, 2019.
Hong, N., Kim, M., Jun, M.-S., & Kang, J., "A study on a JWT-based user authentication and API assessment scheme using IMEI in a smart home environment", Sustainability, 9(7), 1099-2118, 2017.
Davis, B. D., Mason, J. C., & Anwar, M., "Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study", IEEE Internet of Things Journal, 7(10), 10102 – 10110, 2020.
Batalla, J. M., Vasilakos, A. V., & Gajewski, M., "Secure Smart Homes: Opportunities and Challenges", ACM Computing Surveys, 50(5), 1-32, 2017.
Awad, A., & Ali, B., "Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes", Sensors, 18(3), 817, 2018.
Sicato, J. C., Sharma, P. K., & Loia, V., "VPNFilter Malware Analysis on Cyber Threat in Smart Home Network", Applied Science, 9(13), 2763, 2019.
Ling, Z., Luo, J., Xu, Y., Gao, C., & Wu, K., "Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System", IEEE Internet of Things Journal, 4(6), 1899 – 1909, 2017.
Lee, J., Yu, S., & K. P., "Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments Sensors", 19(10), 2358-2383, 2019.
Kang, W. M., Moon, S. Y., & Park, J. H., "An enhanced security framework for home appliances in smart home Human-centric Computing and Information Sciences", 7(6), 1-12, 2017.
Anthi, E., Ahmad, S., & Rana, O., "EclipseIoT: A secure and adaptive hub for the Internet of Things", Computers & Security, 78, 477-490, 2018.
Pecorella, T., & Pierucci, L., "Network Sentiment Framework to improve security and privacy for smart home", Future Internet, 10(12), 125-139, 2018.
Anthi, E., Williams, L., Słowińska, M., & Theodorakopoulos, G., "A Supervised Intrusion Detection System for Smart Home IoT Devices", IEEE Internet of Things Journal, 6(5), 9042 – 9053, 2019.
Zainab, A., Refaat, S. S., & Bouhali, O., "Ensemble-based spam detection in smart home IOT devices time series data using machine learning techniques", Information, 11(7), 344-359, 2020.
Gajewskia, M., & Batallaab, J. M., "Two-tier anomaly detection based on traffic profiling of the home automation system", Computer Networks, 158, 46-60, 2019.
Beyer, S. M., Mullins, B. E., Graham, S. R., & Bindewald, J. M., "Pattern-of-Life Modeling in Smart Homes", IEEE Internet of Things Journal , 5(6), 5317 – 5325, 2018.
Park, M., Oh, H., & Lee, K., "Security Risk Measurement for Information Leakage in IoT-Based Smart Homes from a Situational Awareness Perspective. Sensors", 19(9), 2148-2172, 2019.
Procopiou, A., Komninos, N., & Douligeris, C., "ForChaos: Real time application DDoS detection using forecasting and chaos theory in smart home IoT network", Wireless Communications and Mobile Computing, 1(14), 1-14, 2019.
Baruah, B., & Dhal, S., "A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System", Computers & Security, 77, 21-35, 2018.
Lin, C., He, D., Kumar, N., & Huang, X., "HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes", IEEE Internet of Things Journal, 7(2), 818 – 829, 2020.
ACM Digital Library . (n.d.). Retrieved from https://dl.acm.org/search/advanced
IEEE Xplore Advacned Search. (n.d.). Retrieved from https://ieeexplore.ieee.org/search/advanced
Internet of Things (IoT). (n.d.). (ENISA), from https://www.enisa.europa.eu/topics/iot-and-smart-infrastructures/iot , Retrieved June 3, 2024.
Internet of Things: What Is IoT? IoT Security. (n.d.). (Kaspersky) Retrieved June 3, 2024, from https://www.kaspersky.com/resource-center/definitions/what-is-iot
IoT security an overview. (n.d.). (Microsoft), from https://azure.microsoft.com/en-us/overview/internet-of-things-iot/iot-security-cybersecurity/, Retrieved June 17, 2024
MDPI Advanced Search. (n.d.). Retrieved from https://www.mdpi.com/about/journals
Publications, R. G. (n.d.). Retrieved from https://www.researchgate.net/search/publication
ScienceDirect Advanced Search. (n.d.). Retrieved from https://www.sciencedirect.com/search
Scopus Document Search. (n.d.). Retrieved from https://www-scopus-com.kulibrary.vdiscovery.org/search/form.uri?display=basic
SpringerLink Avanced Search. (n.d.). Retrieved from https://link.springer.com/advanced-search
The 18 Most Popular IoT Devices, (Software Testing Help) Retrieved June 3, 2024, from https://www.softwaretestinghelp.com/iot-devices/, April 16, 2024.
Jacobsson, A., Boldt, M., & Carlsson, B., "A risk analysis of a smart home automation system", Future Generation Computer Systems, 56, 719-733, 2016.
Mocrii, D., & Chen, Y., "IoT-based smart homes: A review of system architecture, software, communications, privacy and security", Internet of Things, 1(2), 81-98, 2018.
Okoli, C., & Schabram, K., "A Guide to Conducting a Systematic Literature Review of Information Systems Research", SSRN, 26(10), 1-51, 2010.
Stellios, I., Kotzanikolaou, P., & Psarakis, M., "A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services", IEEE Communications Surveys & Tutorials, 20(4), 3453 – 3495, 2018.
Refbacks
- There are currently no refbacks.
Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272
This work is licensed under a Creative Commons Attribution 4.0 International License.