Abstract
The Internet of Things (IoT) security framework for smart home-connected devices is all those applications and tools that connect to the internet and each other on a home network. During the evaluation of IoT with IPv6 and 5G networks, the IoT system becomes a beneficial system in a smart home. IoT system does have some gaps that can adversely affect its efficacy and consumption at home. For instance, threats on data such as data leakage or the breach, data sovereignty, and data loss can harm data. Hackers can attack and manipulate data through modification. IoT is associated with location, visual and behavioural privacy threats. IoT is faced with software and hardware threats that can affect any device connected to IoT. However, physical security and software security in the smart home system. The expected result is to make all devices secured and hard to break through securing levels of entity authentication. Proposed on how to create ToT is built and tested before actualizing their designs at different smart homes. Concisely, a well-secured ToT will be beneficial to the many smart homes and neighbourhood housings because it enables web and network sharing.
Introduction
The Internet of Things (IoT) is all those applications and devices that are connected to the internet and each other on a home network. The IoT is a discover era of computing in which each conceivable object is connected to a smart device permitting data collection and communication through the Internet. Indeed, being able to control your home devices remotely would make your life goes with ease, which will need protection against intruders. A smart home can include devices such as home Wi-Fi router, security cameras CCTV, air-conditioner, lamps, doors, and even laundry machines. So, Cybercriminals can confer the power of your IoT devices. As it is well known that cybercriminals have hijacked baby monitors and spied on people using their webcams, and they can attack locally and globally. Therefore, smart home security starts with the Wi-Fi router, as it is the "front door" to your smart home, should be solid and prepared with strong locks.
Several steps should be followed when setting up a smart home with a user that should secure the network and each device. Our results demonstrate some of the effective defenses against cyberattacks; the router name and location, strong encryption method such as WPA2, create a separate network for guests so that they do not connect to the private Wi-Fi, change default usernames and passwords for all devices, all usernames and passwords should have to be both unique and complex since strong PIN protection ensures safety, Check the setting for the devices as some default settings could benefit the manufacturer more than they benefit us, All features of the smart home devices should be assessed to disable those that are not needed. The same approach should be used for devices that are not currently used, especially cameras. It is better to turn them off when they are not needed since they can be used as an extra chance to hack the system.
Besides, it is essential to update software regularly; however, it is critical to use only those updates that are provided by the manufacturer to make sure that they do not include any viruses that can harm the system and create a door for hackers. Two-factor authentication — such as a one-time code sent to owner cell phone — can keep the bad guys out of our home. This strategy ensures the authentication of the devices before transmitting or receiving data, avoid public Wi-Fi networks, Smart homes give users access to home aspects from any location. Through the mobile application, users can monitor their homes. If users on public Wi-Fi owners of a smart home must use a VPN, such as Norton Secure VPN, they offer several privacy and security features for both public and home Wi-Fi. By following these steps, users of smart homes will enjoy comfort and safety.
1.2 Problem Statement
During the evaluation of the Internet of Things (IoT) and with IPv6 and 5G network (IoT) system become a beneficial system in a smart home. IoT system does have some gaps that can adversely affect its efficacy and consumption at home. For instance, threats on data such as data leakage or the breach, data sovereignty, and data loss, this can harm data.
Hackers can exploit and manipulate data through modification. IoT is associated with location, visual, and behavioural privacy threats, mainly when CCTV, auto door, PC are attacked. IoT is faced with software and hardware threats that can affect any device connected to IoT. Therefore, the study seeks to apply physical security and software security in the smart home system. The expected result is to make all devices secured and hard to break through securing levels of entity authentication. In this situation, we are going to secure privacy by securing the network so the attackers can't access any of the devices in a smart home.
1.3 Objectives
- To determine and demonstrate risks associated with IoT in smart homes.
- To determine a comprehensive review of IoT in smart homes.
- To secure IoT) in a smart home by securing the network in the front door of the smart home to secure each device connecting to the system in the smart home.
- To Build a smart wireless home security system which sends alerts to the owner in case of any intruder to the IoT
1.4 Scope
IoT has some limitations. For instance, it is parallel to the privacy protection policy of the data. Since it violates the data security, it faces challenges in its application in homes because it does not present an efficient mechanism for ensuring information is secure during encryption. The IoT is prone to hacking, which hurt the data and the users of the devices, limiting the number of people who prefer to install IoT at their homes. The IoT operation is usually controlled by the administrator, and this limits other users a chance to exercise self-reliance in terms of technological exploration.
The IoT is a technical application. Therefore, it is complicated to implement in smart homes because it is challenging to connect other devices. The use of the internet presenting cybercriminals with the opportunity to intrude into such systems and perform desired operations for their benefits. It is from the fact that such allows access regardless of one's geographical location. In a smart home, privacy is one of the significant wants with the implementation of IoT. Such is related to only limiting access to authorized personnel. The adoption phase is providing a chance for the selection of appropriate technology. Cryptography established to aid in maintaining privacy to such systems significantly. The integration to every device connected to the central internet server of the home. An addition to this would be an authentication platform that allows the verification of all data relayed through this system.
1.5 Literature Review of Related Work
The IoT is a wide-ranging network of interconnected components that work together through coordination, acknowledgment, and sharing of resources within a system. The smart architectures offer an optimal ambient setting for people who reside in smart offices and homes, as well as adjacent environments. From 2000, the world has experienced an explosive spread of smartphones, which has simplified the lives of users. The advent of smartphones was accompanied by new smart devices such as smart air conditioners, smart refrigerators, smart TVs, and tablets, which has expanded their areas from individual use to homes and businesses. Presently, smart home services have been the center of attention as human-centric services since they provide settings where appliances in homes, are connected to the internet for user experience and service. When applying IoT security frameworks in smart home service, it is critical to consider the security of the devices (Shouran, Zaied, Ahmad, and Tri 3-8). According to Al-Ali, Mohammed, and Rizwan (319-327), an enhanced IoT framework for security offers integrity using access control and self-signing approaches to prevent security threats like code fabrication, leakage, and data modification and sharing as seen in figure one below (Al-Ali, Mohammed, and Rizwan 319-327).
Existing smart home systems with different communication protocolsIn smart home settings, wireless networks are used to provide services. Attackers can invade or breach a smart device connected to the wireless network. It becomes crucial to explore the security requirements for secure smart homes such as certification, accessibility, and integrity. There are numerous devices whose security is not found in smart homes (Al-Ali, Mohammed, and Rizwan 319-327).
In instances where an attacker introduces a destructive code or a copied module in a smart device, there is a possibility of contaminating a smart home setting. Subsequently, the device devices linked to the smart network can be used for malicious objectives, including distributed denial of service, leaking personal information, and denial of service (Hui et al. 360). Additionally, in cases where a modified module is disguised as a standard module by an attacker, the module can be used as a secret point of unauthorized entry for destructive actions that can decrease the functionality of the standard module, which deteriorates availability. This creates a need for authentication of devices that can be accomplished using certificates as well as designing a high standard system using an IP protocol in which each home should have its IP address as illustrated in figure two (Al-Ali, Mohammed, and Rizwan 319-327).
IoT devices share data with external networks using wireless networks. Most smart home services are structured around wireless home networks that process the functions of the connected home. In IoT that lack security, the users can incur fiscal losses because of the unauthorized access to information or hacking. In case data is stolen by an attacker, there is a possibility of fabrication and modification of the data. The fabricated data may result in malfunctioning smart devices, which creates deterioration of the availability of smart devices to the users (Mocrii et al. 83). Negatively affected availability may overload devices and trigger fires. These malfunctions are linked to financial losses like increased electricity consumption and the risk of life (Ali, and Awad 4). Availability can be secured through limiting other actions that are not essential while granting functions access rights through establishing strong access controls.
Cite this page
Research Paper on IoT Security Framework for Smart Home Devices: A Review. (2023, Aug 29). Retrieved from https://proessays.net/essays/research-paper-on-iot-security-framework-for-smart-home-devices-a-review
If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:
- Digitalizing Medical Records as a Strategy of the Clinic
- Disruptive Technology and Final Paper - Management Essay Example
- Strategic Human Resource Management for Service Innovation at Singapore Airlines
- Business Digital Transformation by Sandeep Raut Paper Example
- Essay Sample on Recent Cyber Attack at Wolverine Solutions Group (WSG)
- Research Paper on Google in the US and China
- Essay Sample on G1000 Avionics Systems: Potential Failures and System Overview