2020
DOI: 10.3390/s20216131
|View full text |Cite
|
Sign up to set email alerts
|

Towards Secure and Privacy-Preserving IoT Enabled Smart Home: Architecture and Experimental Study

Abstract: Internet of Things (IoT) technology is increasingly pervasive in all aspects of our life and its usage is anticipated to significantly increase in future Smart Cities to support their myriad of revolutionary applications. This paper introduces a new architecture that can support several IoT-enabled smart home use cases, with a specified level of security and privacy preservation. The security threats that may target such an architecture are highlighted along with the cryptographic algorithms that can prevent t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(14 citation statements)
references
References 31 publications
0
12
0
Order By: Relevance
“…Location data, health metrics, financial information, and recorded conversations and interactions are sensitive information that need safeguarding and protection beyond those outlined in the Health Insurance Portability and Accountability Act (HIPAA) ( Colorafi and Bailey, 2016 , Kayaalp, 2018 ) and General Data Protection Regulation (GDPR) ( Bovenberg and Almeida, 2019 , Clarke et al, 2019 ) regulations. Some possible avenues to address these concerns include on-device analysis (for example, performing language environment analysis on the device and storing only the derived measures rather than retaining the full audio recording); on-device anonymization and data encryption; forgoing wireless or Bluetooth connectivity and opting for connected data transfer from the device to the intended data repository; and secure enclaves within the device (e.g., Apple T2 chip and Secure Enclave) ( Abu-Tair et al, 2020 , Ilokah and Eklund, 2020 ). Neuroimaging data, in particular MRI of the brain and head, offers additional and unique challenges since surface rending techniques can permit potential facial recognition and subject identification ( Prior et al, 2009 ).…”
Section: Discussionmentioning
confidence: 99%
“…Location data, health metrics, financial information, and recorded conversations and interactions are sensitive information that need safeguarding and protection beyond those outlined in the Health Insurance Portability and Accountability Act (HIPAA) ( Colorafi and Bailey, 2016 , Kayaalp, 2018 ) and General Data Protection Regulation (GDPR) ( Bovenberg and Almeida, 2019 , Clarke et al, 2019 ) regulations. Some possible avenues to address these concerns include on-device analysis (for example, performing language environment analysis on the device and storing only the derived measures rather than retaining the full audio recording); on-device anonymization and data encryption; forgoing wireless or Bluetooth connectivity and opting for connected data transfer from the device to the intended data repository; and secure enclaves within the device (e.g., Apple T2 chip and Secure Enclave) ( Abu-Tair et al, 2020 , Ilokah and Eklund, 2020 ). Neuroimaging data, in particular MRI of the brain and head, offers additional and unique challenges since surface rending techniques can permit potential facial recognition and subject identification ( Prior et al, 2009 ).…”
Section: Discussionmentioning
confidence: 99%
“…This feature makes it difficult to use mature cyberspace security solutions and integrate novel security frameworks and technologies, such as block chains (BCs) [33]. More importantly, some new attack vectors, such as energy analysis and attack [42][43][44] and energy lock vulnerability [45], may be directly introduced into SHS, resulting in information leakage, device failure, and even more serious consequences (e.g., DOS or strong magnetic field injection attack). Resource constraints should be considered from different perspectives to provide finegrained support for different security solutions.…”
Section: ) Energy Storage and Computing Powermentioning
confidence: 99%
“…By incorporating a one-time password (OTP) authentication scheme based on verification code and a physical unclonable function (PUF), a secure IFTTT-based SHS framework was proposed [139]. Before entering a system, selecting and setting up appropriate encryption algorithms for a new device is important [42] because it is the foundation and core of security in the usage phase. In hybrid architecture, the technologies of ECC, nonces, XOR, encryption hash function and other cryptographic primitives or hardware tokens were used in the remote authentication on proxy gateway [104,105].…”
Section: ) Architecture Taxonomymentioning
confidence: 99%
“…On one hand, lightweight, low-power security algorithms were proposed [ 25 ]. On the other hand, there is a novel practice to design devices with built-in secure elements [ 26 ], following the hardware-based security approach [ 27 ]. Another manufacturing-based solution to protect against physical cloning implies the use of physical, unclonable functions [ 22 , 28 ] that assigns the device a unique fingerprint.…”
Section: Security In the Internet Of Thingsmentioning
confidence: 99%