Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
7
Page No.
1804 - 1812
Practical Security Considerations of Smart Home via. Vulnerability and
Threat Analysis
Authors :
Sungbum Ahn
and
Youngsook Lee
References
Ablondi, W., 2014. 2014 Smart home systems and services forecast global total. Strategy Analytics Inc., Newton, Massachusetts. https://www.strategyanalytics.com/access-services/devices/connected-home/smart-home/reports/report-detail/2014-smart-home-systems-and-services-forecast-global-total#.WwPsZrg6Fkh
Aloul, F., A.R. Al-Ali, R. Al-Dalky, M. Al-Mardini and W. El-Hajj, 2012. Smart grid security: Threats, vulnerabilities and solutions. Intl. J. Smart Grid Clean Energy, 1: 1-6.
Atamli, A.W. and A. Martin, 2014. Threat-based security analysis for the internet of things. Proceedings of the 2014 International Workshop on Secure Internet of Things (SIoT), September 10, 2014, IEEE, Wroclaw, Poland, ISBN:978-1-4799-7908-0, pp: 35-43.
Bagci, I.E., S. Raza, T. Chung, U. Roedig and T. Voigt, 2013. Combined secure storage and communication for the internet of things. Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor Mesh and Ad Hoc Communications and Networks (SECON), June 24-27, 2013, IEEE, New Orleans, Louisiana, USA., ISBN:978-1-4799-0228-6, pp: 523-531.
Barcena, M.B. and C. Wueest, 2015. Insecurity in the Internet of Things. Security Response, Symantec. https://scholar.googleusercontent.com/scholar?q=cache:2r8IEtM10KQJ:scholar.google.com/+Insecurity+in+the+Internet+of+Things&hl=en&as_sdt=0,5
Botta, A., W.D. Donato, V. Persico and A. Pescape, 2014. On the integration of cloud computing and internet of things. Proceedings of the 2014 International Conference on Future Internet of Things and Cloud (FiCloud’14), August 27-29, 2014, IEEE, Barcelona, Spain, ISBN:978-1-4799-4357-9, pp: 23-30.
Byun, J., B. Jeon, J. Noh, Y. Kim and S. Park, 2012. An intelligent self-adjusting sensor for smart home services based on ZigBee communications. Consum. Electron. Trans., 58: 794-802.
CrossRef | Direct Link | Grobauer, B., T. Walloschek and E. Stocker, 2011. Understanding cloud computing vulnerabilities. IEEE Secur. Privacy, 9: 50-57.
CrossRef | Direct Link | Harper, R., 2006. Inside the Smart Home. Springer, Berlin, Germany, ISBN:1-85233-688-9, Pages: 263.
Kavitha, T. and D. Sridharan, 2010. Security vulnerabilities in wireless sensor networks: A survey. J. Inf. Assur. Secur., 5: 31-44.
Kubler, S., K. Framling and A. Buda, 2015. A standardized approach to deal with firewall and mobility policies in the IoT. Pervasive Mob. Comput., 20: 100-114.
Direct Link | Lee, J.Y., W.C. Lin and Y.H. Huang, 2014. A lightweight authentication protocol for internet of things. Proceedings of the 2014 IEEE International Symposium on Next-Generation Electronics (ISNE), May 7-10, 2014, IEEE, Kwei-Shan, Taiwan, ISBN:978-1-4799-4779-9, pp: 1-2.
Raza, S., H. Shafagh, K. Hewage, R. Hummen and T. Voigt, 2013. Lithe: Lightweight secure CoAP for the internet of things. IEEE. Sens. J., 13: 3711-3720.
CrossRef | Direct Link | Schreier, M., 2014. Qualitative Content Analysis. In: The Sage Handbook of Qualitative Data Analysis, Flick, U. (Ed.). Sage, Thousand Oaks, California, pp: 170-183.
Wichers, D., 2013. Owasp top-10 2013. OWASP Foundation, Maryland, USA. https://www.owasp.org/images/1/17/OWASP_Top-10_2013--AppSec_EU_2013_-_Dave_Wichers.pdf
Wood, A.D. and J.A. Stankovic, 2002. Denial of service in sensor networks. IEEE Comput. Mag., 35: 54-62.
Direct Link | Yoon, S., H. Park and H.S. Yoo, 2015. Security Issues on Smarthome in IoT Environment. In: Computer Science and its Applications, Park, J., I. Stojmenovic, H. Jeong and G. Yi (Eds.). Springer, Berlin, Germany, ISBN:978-3-662-45401-5, pp: 691-696.
Zhang, Z.K., M.C.Y. Cho, C.W. Wang, C.W. Hsu and C.K. Chen
et al., 2014. IoT security: Ongoing challenges and research opportunities. Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications (SOCA), November 17-19, 2014, IEEE, Matsue, Japan, ISBN:978-1-4799-6833-6, pp: 230-234.