2020
DOI: 10.1109/jiot.2020.3003621
|View full text |Cite
|
Sign up to set email alerts
|

HomeShield: A Credential-Less Authentication Framework for Smart Home Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…Device actuations can lead to unintentional consequences if trigger-action rules are being used in different contexts [28], if they include external trigger-action platforms [8], or if they include hidden inter-app interactions through physical channels [11]. These issues have been addressed through more fine-grained permission systems and policy frameworks [28,50,54], better logging for forensic purposes [52],…”
Section: Security Of Smart Home Systemsmentioning
confidence: 99%
“…Device actuations can lead to unintentional consequences if trigger-action rules are being used in different contexts [28], if they include external trigger-action platforms [8], or if they include hidden inter-app interactions through physical channels [11]. These issues have been addressed through more fine-grained permission systems and policy frameworks [28,50,54], better logging for forensic purposes [52],…”
Section: Security Of Smart Home Systemsmentioning
confidence: 99%
“…IoT-based infrastructure in the digital community makes cyberattacks a risky possibility. For example, smart home [33] and smart transportation [61] have shown vulnerabilities. In order to assess their customers' daily routines, smart device makers, for instance, gather data about their customers.…”
Section: Securitymentioning
confidence: 99%
“…Data from IoT applications must be protected from theft and tampering and stay confidential. For example, the intersection between the IoT and blockchain technologies has emerged, which provides a kind of secure solutions [61,63,64] . Although device-to-device communication has improved, there are still problems with scalability, availability, and response time.…”
Section: Securitymentioning
confidence: 99%
“…LoRaWAN framework from [184] supports adaptive connection model for remote access. HomeShield framework discussed in [185] is solving open port attacks problem to operate without special credential where security is provided by an authentication algorithm. An ioT-Connect framework is providing security by communication protocols which operate to control device connections to the infrastructure [33], while tests on intrusion detection models can be found in [186].…”
Section: B Security In Data Managementmentioning
confidence: 99%