Systematic Literature Review: Security Challenges of IoT-based Smart Home Systems

Kalim Uddin Qureshi, Abdullah Ali Ben-Nakhi, Mostafa Abd El-barr

Abstract


Internet of things has a wide range of applications such as healthcare, agriculture, transportation, and industrial manufacturing. Smart homes automation occupies a large segment of applications. Due to the proliferation of IoT-based smart homes systems, the attack vector on these devices expanded and became a target for attackers. Although these devices are improving constantly, security is still a challenge for them. The lack of security standardizations and hardware limitations resulted in a slow or lack of security practices in these devices. In this study, we conduct a systematic literature review to identify the exposed threats in the last five years in these devices and introduce novel countermeasures to mitigate the security issues. IEEE, ACM, Scopus, Science Direct, Springer, and MDPI [54] databases were selected for the systematic review. The result of the systematic review were 731 articles collected. Based on reading the abstract, 605 articles were excluded, and 41 articles were excluded based on reading the full text. The result 70 articles were filtered using quality assessment criteria which resulted in 35 articles related to our search domain and answering the research questions. Additionally, a survey is conducted to elicit experts in the field knowledge to enhance our findings.

Keywords


Smart Homes Security IoT Systematic Literature Review

References


Karimi, K., & Atkinson, G, "What the Internet of Things (IoT) Needs to Become a Reality", Retrieved June 3, 2024, from https://www.mouser.cn/pdfdocs/INTOTHNGSWP.PDF, 2014.

Smart Home Market Size & Share will hit $53.45 Billion by 2022. (Zion Market Research) Retrieved June 3, 2024, from https://www.globenewswire.com/news-release/2017/04/12/959610/0/en/Smart-Home-Market-Size-Share-will-hit-53-45-Billion-by-2022.html, 2022

Smart home - Statistics & Facts, (Statista) Retrieved June 3, 2024, from https://www.statista.com/topics/2430/smart-homes/, 2024

Liberati, A., Altman, D. G., & Tetzlaff, J, "The PRISMA Statement for Reporting Systematic Reviews and Meta-Analyses of Studies That Evaluate Health Care Interventions: Explanation and Elaboration. Annals of Internal Medicine", 873–880, 2009.

Burhan, M., Rehman, R. A., Khan, B., & Kim, B.-S, "IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey. Sensors", 18(9), 2796-2833, 2018.

Rehman, S. U., & Manickam, S., "A Study of Smart Home Environment and its Security Threats", International Journal of Reliability, Quality and Safety Engineering, 23(3), 1640005-1640014, 2015.

Kitchenham, B. Procedures for Performing Systematic Reviews. Keele University, 7, 1-26, 2004.

Davis, J., Mengersen, K., Bennett, S., & Mazerolle, L. "Viewing systematic reviews and meta-analysis in social research through different lenses", SpringerPlus, 511-520, 2014.

Aly, M., Khomh, F., Haoues, M., & Quintero, A., "Enforcing security in Internet of Things frameworks: A Systematic Literature Review", Internet of Things, 6, 100050, 2019

Liao, B., Ali, Y., Nazir, S., & He, L., "Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review", IEEE Access, 8, 120331 – 120350, 2020.

Pico-Valencia, P., & Holgado-Terriza, J. A., "Agentification of the Internet of Things: A systematic literature review", International Journal of Distributed Sensor Networks (IJDSN), 14(10), 1-20, 2018.

Heartfield, R., Loukas, G., Budimir, S., & Bezemskij, A., "A taxonomy of cyber-physical threats and impact in the smart home", Computers & Security, 78, 398-428, 2018.

Anwar, M. N., Nazir, M., & Mustafa, K., "Security threats taxonomy: Smart-home perspective", International Conference on Advances in Computing, Communication & Automation. Dehradun, India, 2017.

Okoli, C., "A Guide to Conducting a Standalone Systematic Literature Review", Communications of the Association for Information Systems, 37(43), 879-910., 2015.

Macedo, E. L., Oliveira, E. A., & Silva, F. H., "On the security aspects of Internet of Things: A systematic literature review", Journal of Communications and Networks, 21(5), 444 – 457, 2019.

Zhang, Y., Huang, X., Chen, X., & Zhang, L. Y., "A Hybrid Key Agreement Scheme for Smart Homes Using the Merkle Puzzle", IEEE Internet of Things Journal, 7(2), 1061 – 1071, 2020.

Majumder, A. J., Veilleux, C. B., & Miller, J. D., "A Cyber-Physical System to Detect IoT Security Threats of a Smart Home Heterogeneous Wireless Sensor Node", IEEE Access, 8, 205989 – 206002, 2020.

Batalla, J. M., & Gonciarz, F., "Deployment of smart home management system at the edge: mechanisms and protocols", Neural Computing and Applications , 1301–1315, 2019.

Arif, S., Khan, M. A., Rehman, S. U., & Kabir, M. A., "Investigating Smart Home Security: Is Blockchain the Answer?", IEEE Access, 8, 117802 – 117816, 2020.

Huang, Z., Zhang, L., Meng, X., & Choo, K.-K. R., "Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home", IEEE Internet of Things Journal, 7(2), 1039 – 1047, 2019

Dey, S., & Hossain, A., "Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography", IEEE Sensors Letters, 3(4), 1-4, 2019.

Ji, X., Li, C., & Zhou, X., "Authenticating Smart Home Devices via Home Limited Channels. Transactions on Internet of Things", 1(4), 1-24, 2020.

Liu, Q., Zhang, W., Ding, S., & Li, H., "Novel secure group data exchange protocol in smart home with physical layer network coding", Sensors, 20(4), 1138-2245, 2020.

Lin, H., & Bergmann, N. W., "IoT privacy and security challenges for smart home environments. Information", 7(33), 44-59, 2016.

Xiao, Y., Jia, Y., Liu, C., Alrawais, A., & Rekik, M., "HomeShield: A Credential-Less Authentication Framework for Smart Home Systems", IEEE Internet of Things Journal, 7(9), 7903 – 7918, 2020.

Lu, Y., & Xu, L. D., "Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics", IEEE Internet of Things Journal, 6(2), 2103 – 2115, 2019.

Banerjee, S., Odelu, V., & Das, A. K., "An efficient, anonymous and robust authentication scheme for smart home environments. Sensors", 20(4), 1215-1234,2020.

Lee, Y., Rathore, S., Park, J. H., & Park, J. H., "A blockchain-based smart home gateway architecture for preventing data forgery", Human-centric Computing and Information Sciences, 10(9), 9-23, 2020.

Bogdan-CosminChifor, Bicaa, I., & Victor-ValeriuPatriciua, "A security authorization scheme for smart home Internet of Things devices", Future Generation Computer Systems, 86, 740-749, 2018.

Shuaia, M., Yu, N., & Wang, H., "Anonymous authentication scheme for smart home environment with provable security", Computers & Security, 86, 132-146, 2019.

Hong, N., Kim, M., Jun, M.-S., & Kang, J., "A study on a JWT-based user authentication and API assessment scheme using IMEI in a smart home environment", Sustainability, 9(7), 1099-2118, 2017.

Davis, B. D., Mason, J. C., & Anwar, M., "Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study", IEEE Internet of Things Journal, 7(10), 10102 – 10110, 2020.

Batalla, J. M., Vasilakos, A. V., & Gajewski, M., "Secure Smart Homes: Opportunities and Challenges", ACM Computing Surveys, 50(5), 1-32, 2017.

Awad, A., & Ali, B., "Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes", Sensors, 18(3), 817, 2018.

Sicato, J. C., Sharma, P. K., & Loia, V., "VPNFilter Malware Analysis on Cyber Threat in Smart Home Network", Applied Science, 9(13), 2763, 2019.

Ling, Z., Luo, J., Xu, Y., Gao, C., & Wu, K., "Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System", IEEE Internet of Things Journal, 4(6), 1899 – 1909, 2017.

Lee, J., Yu, S., & K. P., "Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments Sensors", 19(10), 2358-2383, 2019.

Kang, W. M., Moon, S. Y., & Park, J. H., "An enhanced security framework for home appliances in smart home Human-centric Computing and Information Sciences", 7(6), 1-12, 2017.

Anthi, E., Ahmad, S., & Rana, O., "EclipseIoT: A secure and adaptive hub for the Internet of Things", Computers & Security, 78, 477-490, 2018.

Pecorella, T., & Pierucci, L., "Network Sentiment Framework to improve security and privacy for smart home", Future Internet, 10(12), 125-139, 2018.

Anthi, E., Williams, L., Słowińska, M., & Theodorakopoulos, G., "A Supervised Intrusion Detection System for Smart Home IoT Devices", IEEE Internet of Things Journal, 6(5), 9042 – 9053, 2019.

Zainab, A., Refaat, S. S., & Bouhali, O., "Ensemble-based spam detection in smart home IOT devices time series data using machine learning techniques", Information, 11(7), 344-359, 2020.

Gajewskia, M., & Batallaab, J. M., "Two-tier anomaly detection based on traffic profiling of the home automation system", Computer Networks, 158, 46-60, 2019.

Beyer, S. M., Mullins, B. E., Graham, S. R., & Bindewald, J. M., "Pattern-of-Life Modeling in Smart Homes", IEEE Internet of Things Journal , 5(6), 5317 – 5325, 2018.

Park, M., Oh, H., & Lee, K., "Security Risk Measurement for Information Leakage in IoT-Based Smart Homes from a Situational Awareness Perspective. Sensors", 19(9), 2148-2172, 2019.

Procopiou, A., Komninos, N., & Douligeris, C., "ForChaos: Real time application DDoS detection using forecasting and chaos theory in smart home IoT network", Wireless Communications and Mobile Computing, 1(14), 1-14, 2019.

Baruah, B., & Dhal, S., "A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System", Computers & Security, 77, 21-35, 2018.

Lin, C., He, D., Kumar, N., & Huang, X., "HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes", IEEE Internet of Things Journal, 7(2), 818 – 829, 2020.

ACM Digital Library . (n.d.). Retrieved from https://dl.acm.org/search/advanced

IEEE Xplore Advacned Search. (n.d.). Retrieved from https://ieeexplore.ieee.org/search/advanced

Internet of Things (IoT). (n.d.). (ENISA), from https://www.enisa.europa.eu/topics/iot-and-smart-infrastructures/iot , Retrieved June 3, 2024.

Internet of Things: What Is IoT? IoT Security. (n.d.). (Kaspersky) Retrieved June 3, 2024, from https://www.kaspersky.com/resource-center/definitions/what-is-iot

IoT security an overview. (n.d.). (Microsoft), from https://azure.microsoft.com/en-us/overview/internet-of-things-iot/iot-security-cybersecurity/, Retrieved June 17, 2024

MDPI Advanced Search. (n.d.). Retrieved from https://www.mdpi.com/about/journals

Publications, R. G. (n.d.). Retrieved from https://www.researchgate.net/search/publication

ScienceDirect Advanced Search. (n.d.). Retrieved from https://www.sciencedirect.com/search

Scopus Document Search. (n.d.). Retrieved from https://www-scopus-com.kulibrary.vdiscovery.org/search/form.uri?display=basic

SpringerLink Avanced Search. (n.d.). Retrieved from https://link.springer.com/advanced-search

The 18 Most Popular IoT Devices, (Software Testing Help) Retrieved June 3, 2024, from https://www.softwaretestinghelp.com/iot-devices/, April 16, 2024.

Jacobsson, A., Boldt, M., & Carlsson, B., "A risk analysis of a smart home automation system", Future Generation Computer Systems, 56, 719-733, 2016.

Mocrii, D., & Chen, Y., "IoT-based smart homes: A review of system architecture, software, communications, privacy and security", Internet of Things, 1(2), 81-98, 2018.

Okoli, C., & Schabram, K., "A Guide to Conducting a Systematic Literature Review of Information Systems Research", SSRN, 26(10), 1-51, 2010.

Stellios, I., Kotzanikolaou, P., & Psarakis, M., "A Survey of IoT-Enabled Cyberattacks: Assessing Attack Paths to Critical Infrastructures and Services", IEEE Communications Surveys & Tutorials, 20(4), 3453 – 3495, 2018.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


 

Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
ISSN 2089-3272

Creative Commons Licence

This work is licensed under a Creative Commons Attribution 4.0 International License.

web analytics
View IJEEI Stats