2023
DOI: 10.1109/ojvt.2023.3234069
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-Security of Embedded IoTs in Smart Homes: Challenges, Requirements, Countermeasures, and Trends

Abstract: Connected computers and sensors transmit data across the Internet to solve problems and generate new services (IoT). Smart homes use IoT, for example. Smart home technology can monitor temperature, detect smoke, regulate lighting automatically, and install smart locks. It also poses additional security and privacy problems, such as accessing user data through surveillance equipment or false fire alarms. Smart homes are vulnerable to numerous sorts of assaults. This survey emphasizes IoT. We discuss IoT's desig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
17
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(20 citation statements)
references
References 39 publications
(50 reference statements)
0
17
0
Order By: Relevance
“… Strong encryption: use WPA3 encryption for the Wi-Fi network. This provides strong encryption protocols to the data transmitted [ 59 ]. Secure password: set a strong and unique password on all devices and the Wi-Fi network.…”
Section: Design and Implementation Of The Proposed Sedar Systemmentioning
confidence: 99%
See 3 more Smart Citations
“… Strong encryption: use WPA3 encryption for the Wi-Fi network. This provides strong encryption protocols to the data transmitted [ 59 ]. Secure password: set a strong and unique password on all devices and the Wi-Fi network.…”
Section: Design and Implementation Of The Proposed Sedar Systemmentioning
confidence: 99%
“… Service set identifier (SSID) hiding: disable broadcasting the network name so that it is not visible to devices scanning for Wi-Fi networks. This adds an extra layer of security by making it less obvious that the network exists [ 59 ]. MAC address filtering: enable MAC address filtering on the gateway to allow only specific devices with approved MAC addresses to connect to the network [ 59 ].…”
Section: Design and Implementation Of The Proposed Sedar Systemmentioning
confidence: 99%
See 2 more Smart Citations
“…A router is a network device that connects users to the internet [13,14]. The completeness of a router's features does not rule out the possibility that someone seeking personal gain can infiltrate the network through open ports on the service used [15,16].…”
Section: Introductionmentioning
confidence: 99%