2018
DOI: 10.1002/itl2.22
|View full text |Cite
|
Sign up to set email alerts
|

Securing the smart home: A real case study

Abstract: Both people and organizations are widely accepting and adopting of the functionalities offered by the smart home or smart building applications. This is due to the many advantages, in easing users' everyday life and work, provided by the emerging Internet of Things (IoT) technologies and devices—equipped with sensors, cameras, or actuators—and the ability to either to acquire information from the environment or to perform proper tasks. The main features of smart homes/buildings include real‐time monitoring, re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…This dynamic network setup opens the smart home to a greater threat landscape, with a much larger attack surface area. Devices will interact through different means, will transport and store data in different locations and will have different levels of security hardness [11].…”
Section: Security Challengesmentioning
confidence: 99%
“…This dynamic network setup opens the smart home to a greater threat landscape, with a much larger attack surface area. Devices will interact through different means, will transport and store data in different locations and will have different levels of security hardness [11].…”
Section: Security Challengesmentioning
confidence: 99%
“…Other solutions strictly regard smart buildings, which mainly include smart homes and smart offices. The work of Sicari et al uses real data sets, collected from existing smart homes (reporting information such as energy consumption and lighting), for testing a middleware conceived to evaluate the security of the information transmitted within the underlying IoT infrastructure. The middleware runs on Raspberry Pi, and it is implemented in Node.js, whereas JSON formal language and MongoDB database are used for data exchanging and storage, respectively.…”
Section: Literature and Motivationsmentioning
confidence: 99%
“…Another test‐bed consisting of a Raspberry Pi is detailed in the work of La Marra et al Furthermore, here, the final goal is to evaluate a security protocol for enforcing the usage control policies. In both the cases (ie, the works of Sicari et al and La Marra et al) the test‐beds consist of a limited number of devices, thus preventing to conduct relevant considerations about the scalability of the proposed approaches.…”
Section: Literature and Motivationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The availability of open-source prototyping and development platforms has the potential to deeply change the way IoT applications are created and this trend became even more striking with the release of some popular electronics platforms. Although there is a great appeal around these platforms for DIY (Do-It-Yourself) applications, with a lot of projects in the "Smart Home" domain [19,[29][30][31], different types of IoT applications can be designed. Nowadays, the development of smart-city systems based on such platforms is a reasonable and inexpensive choice for many projects.…”
Section: Smart Cities and Open-source Electronics Platformsmentioning
confidence: 99%