2017
DOI: 10.18046/syt.v15i43.2710
|View full text |Cite
|
Sign up to set email alerts
|

Implementing secure smart home using existing infrastructure

Abstract: The emergence of Internet of Things [IoT] paves the path of the smart home.  A smart home learns the habits of residents to make intelligent decision, which requires knowledge to be communicated and stored. The communication of generated data creates loop-hole in security and privacy of the user of smart home. Another challenging issue while designing a smart home is that legacy home appliances lack the smart connectivity. This paper focuses on designing a secure architecture to access smart home appliances, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The centralized secure device communication structure has the advantage of being fast and intuitive, although the entire network may be exposed to risk if the central server is attacked. 11,12 The blockchain-based distributed ledger method protects data by verifying integrity by sharing a hash block using a peer-to-peer (P2P) technique. This distributed ledger method can have strong security verified by multiple nodes.…”
Section: Iot Control Scheme In a Smart Homementioning
confidence: 99%
See 1 more Smart Citation
“…The centralized secure device communication structure has the advantage of being fast and intuitive, although the entire network may be exposed to risk if the central server is attacked. 11,12 The blockchain-based distributed ledger method protects data by verifying integrity by sharing a hash block using a peer-to-peer (P2P) technique. This distributed ledger method can have strong security verified by multiple nodes.…”
Section: Iot Control Scheme In a Smart Homementioning
confidence: 99%
“…Accordingly, issues on privacy and security protection are increasing on an unprecedented scale. [11][12][13] Security for a home network should prevent attacks caused by the exposure of sensitive information and forging data when transmitting unauthorized access to a device. [14][15][16] The Mirai botnet attack (see Figure 1) that occurred around October 2016 was a computer virus incident.…”
Section: Introductionmentioning
confidence: 99%