08Oct 2018

PRIVACY ISSUES IN SMART HOME DEVICES USING INTERNET OF THINGS A SURVEY.

  • Assistant Professor,Department of Computer Science, Mother Teresa Women?s University, Kodaikanal.
  • Research Scholar, Department of Computer Science, Sri Adi Chunchanagiri Women?s College,Cumbum.
Crossref Cited-by Linking logo
  • Abstract
  • Keywords
  • References
  • Cite This Article as
  • Corresponding Author

With the use of smart sensor technology, any electronics devices or appliances can be designed to connect to internet.Most of the people thinks that life can be even better with new advancement in modern technology like IoT. Applying security in Internet of Things environments has been identified as one of the top hurdles for realizing the vision of smart, energy-efficient homes.The nature of smart homes unavoidably raises security and privacy concerns. As all the smart home appliances, industrial machinery, public sector services and many other devices all are connected to the Internet, a lot of information is available on it. This information is prone to attack by hackers.In this paper, we present a SURVEY of the privacy issues directed towards the smart home devices.


  1. Roman, P. Najera, J. Lopez, "Securing the Internet of Things,"Computer , vol.44, no.9, pp.51,58, Sept. 2011
  2. Alcaide, A., Palomar, E., Montero-Castillo, J., & Ribagorda, A. (2013). ?Anonymous authentication for privacy-preserving IOT target-driv-en applications.? Computers & Security, 37, 111?123Al
  3. Roberto Minerva, Abiy Biru, "Towards a Definition of the Internet of Things,"IEEE IoT Initiative white paper.
  4. Liu, Y. Xiao, and C. L. P. Chen. "Authentication and Access Control in the Internet of Things," In IEEE 32nd InternationalConference on Distributed Computing Systems Workshops, June2012.
  5. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, "Lithe: Lightweight Secure CoAP for the Internet of Things," in IEEESensors Journal, Vol. 13(10), 2013.
  6. S. Ning, H. Liu; Y, L.T. "Cyberentity Security in the Internet of Things,"Computer, vol.46, no.4, pp.46,53, April 2013
  7. Santoso, Freddy K., and Nicholas CH Vun. "Securing IoT for smart home system." In?Consumer Electronics (ISCE), 2015 IEEE International Symposium on, pp. 1-2. IEEE, 2015.
  8. Lindsay, Greg, Beau Woods, and Joshua Corman.?Smart homes and the internet of things. Atlantic Council, 2016.
  9. Brown, Eric. "Who needs the internet of things?."?Linux. com. Retrieved?23 (2016).
  10. Porambage, Pawani, Mika Ylianttila, Corinna Schmitt, Pardeep Kumar, Andrei Gurtov, and Athanasios V. Vasilakos. "The quest for privacy in the internet of things."?IEEE Cloud Computing?2 (2016): 36-45.
  11. Lin, Huichen, and Neil W. Bergmann. "IoT privacy and security challenges for smart home environments."?Information?7, no. 3 (2016): 44.
  12. Song, Tianyi, Ruinian Li, Bo Mei, Jiguo Yu, Xiaoshuang Xing, and Xiuzhen Cheng. "A privacy preserving communication protocol for IoT applications in smart homes."?IEEE Internet of Things Journal?4, no. 6 (2017): 1844-1852.
  13. Geneiatakis, Dimitris, Ioannis Kounelis, Ricardo Neisse, Igor Nai-Fovino, Gary Steri, and Gianmarco Baldini. "Security and privacy issues for an IoT based smart home." In?Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017 40th International Convention on, pp. 1292-1297. IEEE, 2017.
  14. Stojkoska, Biljana L. Risteska, and Kire V. Trivodaliev. "A review of Internet of Things for smart home: Challenges and solutions."?Journal of Cleaner Production?140 (2017): 1454-1464.
  15. Apthorpe, Noah, Dillon Reisman, and Nick Feamster. "A smart home is no castle: Privacy vulnerabilities of encrypted IoT traffic."?arXiv preprint arXiv:1705.06805?(2017).
  16. Yang, Heetae, Wonji Lee, and Hwansoo Lee. "IoT Smart Home Adoption: The Importance of Proper Level Automation."?Journal of Sensors?2018 (2018).

[D. Usha and M. Bobby. (2018); PRIVACY ISSUES IN SMART HOME DEVICES USING INTERNET OF THINGS A SURVEY. Int. J. of Adv. Res. 6 (Oct). 566-568] (ISSN 2320-5407). www.journalijar.com


Dr.D.Usha
Mother Teresa Women's University

DOI:


Article DOI: 10.21474/IJAR01/7839      
DOI URL: http://dx.doi.org/10.21474/IJAR01/7839