Skip to main content
Log in

Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

The smart home is one of the most significant applications of Internet of Things (IoT). Smart home is basically the combination of different components like devices, hub, cloud, and smart apps. These components may often be vulnerable, and most likely to be exploited by attackers. Being the main link among all the components to establish communication, the compromised smart apps are the most threatening to smart home security. The existing surveys covers vulnerabilities and issues of smart homes and its components in various perspectives. Still, there is a gap to understand and organize the smart apps, security issues and their impact on smart homes and its stakeholders. The paper presents a systematic literature review on the smart apps related vulnerabilities, their possible threats and current state of the art of the available security mechanisms. In our survey we observed that currently research focuses on rules interaction and access control issue. The conclusive findings reveal the fact that available security mechanisms are not widely applicable and incur overheads to developers and users. The critical review of pertinent literature shows that these mechanisms are not enough to address the issues effectively. Therefore, a generalized and robust solution is essentially required to tackle the issues at their origin. We summarized the insights of our SLR, highlighting current scenario and future directions of research in this domain.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data Availability

Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.

References

  1. How IoT devices & smart home automation is entering our homes in 2020. https://www.businessinsider.com/iot-smart-home-automation?IR=T. Last accessed 17 May 2022

  2. Li, C., Liu, H., Cai, Q., Zhang, Y., Yu, Y., Li, J., Gu, D.: Passwords in the air: Harvesting Wi-Fi credentials from smartcfg provisioning. In: WiSec 2018—Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 1–11. Association for Computing Machinery (2018). https://doi.org/10.1145/3212480.3212496.

  3. Apthorpe, N., Reisman, D., Sundaresan, S., Narayanan, A., Feamster, N.: Spying on the smart home: privacy attacks and defenses on encrypted IoT traffic (2017). arXiV Preprint. arXiv:1708.05044v1

  4. Zhang, N., Mi, X., Feng, X., Wang, X., Tian, Y., Qian, F.: Dangerous skills: understanding and mitigating security risks of voice-controlled third-party functions on virtual personal assistant systems. In: 2019 IEEE Symposium on Security and Privacy (SP). pp. 1381–1396. IEEE (2019). https://doi.org/10.1109/SP.2019.00016.

  5. Soltan, S., Mittal, P., Poor, H.V.: BlackIoT: IoT botnet of high wattage devices can disrupt the power grid. In: Proceedings of 27th USENIX Security Symposium, pp. 15–32 (2018)

  6. Liu, H., Li, J., Gu, D.: Understanding the security of app-in-the-middle IoT. Comput. Secur. (2020). https://doi.org/10.1016/j.cose.2020.102000

    Article  Google Scholar 

  7. Odogwu, C.: The 5 Biggest smart home security risks and how to prevent them. https://www.makeuseof.com/the-biggest-smart-home-security-risks-and-how-to-prevent-them/

  8. Batalla, J.M., Vasilakos, A., Gajewski, M.: Secure smart homes: opportunities and challenges. ACM Comput. Surv. (2017). https://doi.org/10.1145/3122816

    Article  Google Scholar 

  9. Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: Proceedings—2016 IEEE Symposium on Security and Privacy, SP 2016. pp. 636–654. IEEE (2016). https://doi.org/10.1109/SP.2016.44.

  10. Kafle, K., Moran, K., Manandhar, S., Nadkarni, A., Poshyvanyk, D.: A study of data store-based home automation. In: CODASPY 2019—Proc. 9th ACM Conf. Data Appl. Secur. Priv. 73–84 (2019). https://doi.org/10.1145/3292006.3300031

  11. Sivakumaran, P., Blasco, J.: A study of the feasibility of co-located app attacks against BLE and a large-scale analysis of the current application-layer security landscape. In: Proc. 28th USENIX Secur. Symp., pp. 1–18 (2019)

  12. Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., Wagner, D.: Smart locks: lessons for securing commodity internet of things devices. In: Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp. 461–472 (2016)

  13. Bastys, I., Balliu, M., Sabelfeld, A.: If this then what? Controlling flows in IoT apps. In: Proceedings of the ACM Conference on Computer and Communications Security. pp. 1102–1119. ACM, New York (2018). https://doi.org/10.1145/3243734.3243841

  14. Denning, T., Kohno, T., Levy, H.M.: Computer security and the modern home. Commun. ACM 56, 94–103 (2013). https://doi.org/10.1145/2398356.2398377

    Article  Google Scholar 

  15. Fisher, D.: Pair of bugs open Honeywell home controllers up to easy hacks. https://threatpost.com/pair-of-bugs-open-honeywell-home-controllers-up-to-easy-hacks/113965/. Last accessed 18 May 2022

  16. Hesseldahl, A.: A Hacker’s-Eye View of the Internet of Things. https://www.vox.com/2015/4/7/11561182/a-hackers-eye-view-of-the-internet-of-things

  17. Kitchenham, B.: Procedure for undertaking systematic reviews. Joint Technical Report. Computer Science Department, Keele University, National ICT Australia Ltd (0400011T. 1) (2004)

  18. Kitchenham, B., Brereton, O.P., Budgen, D., Turner, M., Bailey, J., Linkman, S.: Systematic literature reviews in software engineering—a systematic literature review. Inf. Softw. Technol. 51, 7–15 (2009)

    Article  Google Scholar 

  19. Kitchenham, B., Pretorius, R., Budgen, D., Pearl Brereton, O., Turner, M., Niazi, M., Linkman, S.: Systematic literature reviews in software engineering—a tertiary study. Inf. Softw. Technol. 52, 792–805 (2010). https://doi.org/10.1016/j.infsof.2010.03.006

    Article  Google Scholar 

  20. Build connected IoT experiences for millions of SmartThings users. https://smartthings.developer.samsung.com/

  21. Add your service to IFTTT for free and unlock unlimited possibilities. https://ifttt.com/developers

  22. Hardt, D.: The OAuth 2.0 Authorization Framework. https://datatracker.ietf.org/doc/html/rfc6749. Last accessed 16 June 2022

  23. Nest Developers: https://developers.nest.com/guides/api/architecture-overview. Last accessed 15 July 2022

  24. How to develop for Hue?: https://developers.meethue.com/develop/get-started-2/. Last accessed 22 July 2022

  25. Hawkins, L.E.: Future of smart homes: here’s what you need to know. https://www.nasdaq.com/articles/future-of-smart-homes%3A-heres-what-you-need-to-know. Last accessed 15 Feb 2023

  26. The Foundation for Connected Things; https://csa-iot.org/all-solutions/matter/. Last accessed 14 Feb 2023

  27. Tuohy, J.P.: What Matters about Matter, the new smart home standard. https://www.theverge.com/22832127/matter-smart-home-products-thread-wifi-explainer. Last accessed 14 Feb 2023

  28. Matter Standardized application layer foundation for connected things. https://www.nordicsemi.com/Products/Matter?utm_source=google&utm_medium=cpc&utm_term=matter&utm_campaign=apac&utm_term=matterprotocol&utm_campaign=Topic+%7C+Low+Power+Cellular+%7C+North+America&utm_source=adwords&utm_medium=ppc&hsa_tgt=kwd-1543757786149. Last accessed 15 Feb 2023

  29. Korolevych, V.: The future of smart homes—what does it look like? What is the future of smart homes? If you think nothing gets better than turning on/off the lights with your voice, wait until your light bulb can study your habits and switch ON or OFF naturally. The future of Smart homes is super exciting and has e. Last accessed 17 Feb 2023.

  30. Austin, P.L.: What will smart homes look like 10 years from now? https://time.com/5634791/smart-homes-future/. Last accessed 15 Feb 2023

  31. Dieste, O., Padua, A.G.: Developing search strategies for detecting relevant experiments for systematic reviews. In: 1st International Symposium on Empirical Software Engineering and Measurement (ESEM 2007). pp. 215–224. IEEE (2007). https://doi.org/10.1109/ESEM.2007.19

  32. Wohlin, C.: Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: ACM Int. Conf. Proceeding Series (2014). https://doi.org/10.1145/2601248.2601268

  33. Fernandes, E., Rahmati, A., Jung, J., Prakash, A.: Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things (2017). arXiv preprint. arXiv:1707.00405

  34. IoTivity: http://iotivity.org/. Last accessed 10 July 2022

  35. Lee, S., Choi, J., Kim, J., Cho, B., Lee, S., Kim, H., Kim, J.: FACT: Functionality-centric access control system for IoT programming frameworks. In: Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, pp. 43–54. Association for Computing Machinery (2017). https://doi.org/10.1145/3078861.3078864

  36. Jia, Y.J., Chen, Q.A., Wang, S., Rahmati, A., Fernandes, E., Mao, Z.M., Prakash, A.: ContexIoT: towards providing contextual integrity to appified IoT platforms. In: Proceedings 2017 Network and Distributed System Security Symposium. Internet Society, Reston, VA (2017). https://doi.org/10.14722/ndss.2017.23051

  37. Tian, Y., Zhang, N., Lin, Y.H., Wang, X.F., Ur, B., Guo, X.Z., Tague, P.: Smartauth: User-centered authorization for the internet of things. In: Proceedings of the 26th USENIX Security Symposium, pp. 361–378. USENIX Association, Berkeley (2017)

  38. Yan, H., Wang, Y., Jia, C., Li, J., Xiang, Y., Pedrycz, W.: IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT. Futur. Gener. Comput. Syst. 95, 344–353 (2019). https://doi.org/10.1016/j.future.2018.12.061

    Article  Google Scholar 

  39. Fernandes, E., Rahmati, A., Jung, J., Prakash, A.: Security implications of permission models in smart-home application frameworks. IEEE Secur. Priv. 15, 24–30 (2017)

    Article  Google Scholar 

  40. Zhang, W., Meng, Y., Liu, Y., Zhang, X., Zhang, Y., Zhu, H.: Homonit: Monitoring smart home apps from encrypted traffic. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 1074–1088. Association for Computing Machinery, New York (2018). https://doi.org/10.1145/3243734.3243820

  41. LIFX, https://www.lifx.com/. Last accessed 15 June 2022

  42. Maiti, A., Jadliwala, M.: Light ears. In: Proceedings of ACM Interactive, Mobile, Wearable Ubiquitous Technology, vol. 3, pp. 1–27 (2019). https://doi.org/10.1145/3351256

  43. Berkay Celik, Z., McDaniel, P., Tan, G.: SOTERIA: automated IoT safety and security analysis. In: Proceedings of the 2018 USENIX Annual Technical Conference, USENIX ATC 2018, pp. 147–158 (2020)

  44. Celik, Z.B., Tan, G., McDaniel, P.: IoTGuard: dynamic enforcement of security and safety policy in commodity IoT. In: Proceedings 2019 Network and Distributed System Security Symposium. Internet Society, Reston (2019). https://doi.org/10.14722/ndss.2019.23326

  45. Nguyen, D.T., Song, C., Qian, Z., Krishnamurthy, S. V., Colbert, E.J.M., McDaniel, P.: IotSan: fortifying the safety of IoT systems. In: CoNEXT 2018—Proceedings of the 14th International Conference on Emerging Networking EXperiments and Technologies, pp. 191–203. Association for Computing Machinery (2018). https://doi.org/10.1145/3281411.3281440

  46. Wang, Q., Hassan, W.U., Bates, A., Gunter, C.: Fear and logging in the Internet of Things. In: Proceedings 2018 Network and Distributed System Security Symposium. Internet Society, Reston (2018). https://doi.org/10.14722/ndss.2018.23282

  47. Surbatovich, M., Aljuraidan, J., Bauer, L., Das, A., Jia, L.: Some recipes can do more than spoil your appetite: Analyzing the security and privacy risks of IFTTT recipes. In: 26th International World Wide Web Conference, WWW 2017, pp. 1501–1510. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland (2017). https://doi.org/10.1145/3038912.3052709

  48. Munir, S., Stankovic, J.A.: DepSys: Dependency aware integration of cyber-physical systems for smart homes. In: 2014 ACM/IEEE International Conference on Cyber-Physical Systems, ICCPS 2014, pp. 127–138. IEEE (2014). https://doi.org/10.1109/ICCPS.2014.6843717

  49. Liang, C.J.M., Karlsson, B.F., Lane, N.D., Zhao, F., Zhang, J., Pan, Z., Li, Z., Yu, Y.: SIFT: Building an Internet of safe Things. In: IPSN 2015—Proceedings of the 14th International Symposium on Information Processing in Sensor Networks (Part of CPS Week), pp. 298–309. Association for Computing Machinery (2015). https://doi.org/10.1145/2737095.2737115

  50. Sun, Y., Wu, T.Y., Li, X., Guizani, M.: A rule verification system for smart buildings. IEEE Trans. Emerg. Top. Comput. 5, 367–379 (2017). https://doi.org/10.1109/TETC.2016.2531288

    Article  Google Scholar 

  51. Sun, Y., Wang, X., Luo, H., Li, X.: Conflict detection scheme based on formal rule model for smart building systems. IEEE Trans. Hum. Mach. Syst. 45, 215–227 (2015). https://doi.org/10.1109/THMS.2014.2364613

    Article  Google Scholar 

  52. Lin, Z., Wu, T.Y., Sun, Y., Xu, J., Obaidat, M.S.: A TAS-model-based algorithm for rule redundancy detection and scene scheduling in smart home systems. IEEE Syst. J. 12, 3018–3029 (2018). https://doi.org/10.1109/JSYST.2017.2771349

    Article  Google Scholar 

  53. Wang, Q., Datta, P., Yang, W., Liu, S., Bates, A., Gunter, C.A.: Charting the attack surface of trigger-action IoT platforms. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 1439–1453. Association for Computing Machinery (2019). https://doi.org/10.1145/3319535.3345662

  54. Nakamura, M., Ikegami, K., Matsumoto, S.: Considering impacts and requirements for better understanding of environment interactions in home network services. Comput. Netw. 57, 2442–2453 (2013). https://doi.org/10.1016/j.comnet.2013.02.024

    Article  Google Scholar 

  55. Chi, H., Zeng, Q., Du, X., Yu, J.: Cross-app interference threats in smart homes: categorization, detection and handling. In: 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 411–423. IEEE (2020). https://doi.org/10.1109/DSN48063.2020.00056

  56. Ding, W., Hu, H.: On the safety of IoT device physical interaction control. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 832–846. Association for Computing Machinery (2018). https://doi.org/10.1145/3243734.3243865

  57. Fernandes, E., Paupore, J., Rahmati, A., Simionato, D., Conti, M., Prakash, A.: Flowfence: practical data protection for emerging IoT application frameworks. In: Proceedings of the 25th USENIX Security Symposium, pp. 531–548. USENIX Association, Berkeley (2016)

  58. Junior, D.M., Gama, K., Prakash, A.: Securing IoT apps with fine-grained control of information flows (2018). arXiV Preprint. arXiv:1810.13367

  59. Berkay Celik, Z., Babun, L., Sikder, A.K., Aksu, H., Sikder, A.K., Tan, G., Mcdaniel, P., Uluagac, A.S.: Sensitive information tracking in commodity IoT. In: SEC'18: Proceedings of the 27th USENIX Conference on Security Symposium (2018)

  60. Xu, R., Zeng, Q., Zhu, L., Chi, H., Du, X., Guizani, M.: Privacy leakage in smart homes and its mitigation: IFTTT as a case study. IEEE Access. 7, 63457–63471 (2019). https://doi.org/10.1109/ACCESS.2019.2911202

    Article  Google Scholar 

  61. Mohsin, M., Sardar, M.U., Hasan, O., Anwar, Z.: IoTRiskAnalyzer: A probabilistic model checking based framework for formal risk analytics of the Internet of Things. IEEE Access. 5, 5494–5505 (2017). https://doi.org/10.1109/ACCESS.2017.2696031

    Article  Google Scholar 

  62. Mohsin, M., Anwar, Z., Husari, G., Al-Shaer, E., Rahman, M.A.: IoTSAT: a formal framework for security analysis of the Internet of Things (IoT). In: 2016 IEEE Conference on Communications and Network Security (CNS), pp. 180–188. IEEE (2016). https://doi.org/10.1109/CNS.2016.7860484

  63. Hammer-Lahav, E.: The OAuth 1.0 Protocol. http://www.delegate.org/ietf/rfc-html/rfc5849.html. Last accessed 10 June 2022

  64. Huang, P., Xu, T., Jin, X., Zhou, Y.: Defdroid: towards a more defensive mobile OS against disruptive app behavior. In: Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, pp. 221–234. ACM, New York, (2016). https://doi.org/10.1145/2906388.2906419

  65. Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., Kallitsis, M., Kumar, D., Lever, C., Ma, Z., Mason, J., Menscher, D., Seaman, C., Sullivan, N., Thomas, K., Zhou, Y.: Understanding the Mirai Botnet. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1093–1110. USENIX Association, Vancouver (2017)

  66. Lin, H., Bergmann, N.W.: IoT privacy and security challenges for smart home environments. Information 7, 44 (2016)

    Article  Google Scholar 

  67. Lee, Y., Rathore, S., Park, J.H., Park, J.H.: A blockchain-based smart home gateway architecture for preventing data forgery. Human-Centric Comput. Inf. Sci. 10, 1–14 (2020)

    Article  Google Scholar 

  68. Kotenko, I., Stepashkin, M., Doynikova, E.: Security analysis of information systems taking into account social engineering attacks. In: Proceedings of 19th Int. Euromicro Conf. Parallel, Distrib. Network-Based Process, PDP 2011. 611–618 (2011). https://doi.org/10.1109/PDP.2011.62.

  69. Ashibani, Y., Kauling, D., Mahmoud, Q.H.: Design and implementation of a contextual-based continuous authentication framework for smart homes. Appl. Syst. Innov. 2, 4 (2019)

    Article  Google Scholar 

  70. Ali, B., Awad, A.I.: Cyber and physical security vulnerability assessment for IoT-based smart homes. Sensors. 18, 817 (2018)

    Article  Google Scholar 

  71. Lévy-Bencheton, C., Darra, E., Tétu, G., Dufay, G., Alattar, M.: Security and Resilience of Smart Home Environments: Good Practices and Recommendations. Publications Office of the European Union, Luxembourg (2015)

    Google Scholar 

  72. Bormann, C., Ersue, M., Keranen, A.: Terminology for constrained-node networks. In: IETF RFC, vol. 7228 (2014)

  73. Buil-Gil, D., Kemp, S., Kuenzel, S., Coventry, L., Zakhary, S., Tilley, D., Nicholson, J.: The digital harms of smart home devices: a systematic literature review. arXiv Preprint (2022). https://doi.org/10.48550/arXiv.2209.05458

  74. Bnf, B.F.: Backus Naur form. SpringerReference (2011). https://doi.org/10.1007/springerreference_8684

    Article  Google Scholar 

  75. Manning, C., Surdeanu, M., Bauer, J., Finkel, J., Bethard, S., McClosky, D.: The {S}tanford {C}ore{NLP} natural language processing toolkit. In: Proceedings of 52nd Annual Meeting of the Association for Computational Linguistics: System Demonstrations, pp. 55–60. Association for Computational Linguistics, Baltimore (2014). https://doi.org/10.3115/v1/P14-5010

  76. D’Arcy, H.: AstBuilder. http://docs.groovy-lang.org/next/html/gapi/org/codehaus/groovy/ast/builder/AstBuilder.html. last accessed 16 June 2022

  77. Bird, S.: Natural language toolkit, https://www.nltk.org/. last accessed 16 June 2022

  78. Cimatti, A., Clarke, E., Giunchiglia, E., Giunchiglia, F., Pistore, M., Roveri, M., Sebastiani, R., Tacchella, A.: NuSMV 2: an opensource tool for symbolic model checking. In: International Conference on Computer Aided Verification, pp. 359–364 (2002). https://doi.org/10.1007/3-540-45657-0_29

  79. IoTBench/IoTBench-test-suite, https://github.com/IoTBench/IoTBench-test-suite. last accessed 10 June 2022

  80. Groovy AST Transformations, https://jmusacchio.github.io/blog/2016/groovy-ast-transformations/. last accessed 25 June 2022

  81. Google: Guava: Google Core libraries for Java » 1.7.0, https://mvnrepository.com/artifact/com.google.guava/guava/1.7.0. last accessed 10 June 2022

  82. Hatcliff, J., Dwyer, M.: Using the Bandera tool set to model-check properties of concurrent Java software. In: Larsen, K.G., Nielsen, M. (eds.) CONCUR 2001—Concurrency Theory, pp. 39–58. Springer, Berlin (2001)

    Chapter  Google Scholar 

  83. Holzmann, G.J.: The model checker SPIN. IEEE Trans. Softw. Eng. 23, 279–295 (1997). https://doi.org/10.1109/32.588521

    Article  Google Scholar 

  84. Cook, D.J., Schmitter-Edgecombe, M.: Assessing the quality of activities in a smart environment. Methods Inf. Med. 48, 480–485 (2009). https://doi.org/10.3414/ME0592

    Article  Google Scholar 

  85. Dixon, C., Mahajan, R., Agarwal, S., Brush, A.J., Lee, B., Saroiu, S., Bahl, P.: An operating system for the home. In: 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12), pp. 337–352. USENIX Association, San Jose (2012)

  86. Shehata, M., Eberlein, A., Fapojuwo, A.: Using semi-formal methods for detecting interactions among smart homes policies. Sci. Comput. Program. 67, 125–161 (2007). https://doi.org/10.1016/j.scico.2006.11.002

    Article  MathSciNet  Google Scholar 

  87. Sang, J., Ye, C., Hu, H., Li, R., Fu, L., Yang, D., Xiang, H., Fu, C.: Semantic Web-based policy interaction detection method with rules in smart home for detecting interactions among user policies. IET Commun. 5, 2451–2460 (2011). https://doi.org/10.1049/iet-com.2010.0615

    Article  MathSciNet  Google Scholar 

  88. Xu, Y., Niu, W., Tang, H., Li, G., Zhao, Z., Ci, S.: A policy-based web service redundancy detection in wireless sensor networks. J. Netw. Syst. Manag. 21, 384–407 (2013). https://doi.org/10.1007/s10922-012-9237-1

    Article  Google Scholar 

  89. Rocha, C., Meseguer, J., Muñoz, C.: Rewriting modulo SMT and open system analysis. J. Log. Algebr. Methods Program. 86, 269–297 (2017). https://doi.org/10.1016/j.jlamp.2016.10.001

    Article  MathSciNet  Google Scholar 

  90. Manning, C.D., Bauer, J., Finkel, J., Bethard, S.J.: The Stanford CoreNLP Natural Language Processing Toolkit. Aclweb.Org., pp. 55–60 (2014)

  91. Word2vec/Glove/Doc2Vec. (2022)

  92. K-Means Clustering Algorithm: https://www.geeksforgeeks.org/k-means-clustering-introduction/. last accessed 25 June 2022

  93. Puterman, M.L.: Markov Decision Processes: Discrete Stochastic Dynamic Programming. Wiley, New York (1994)

    Book  Google Scholar 

  94. Kwiatkowska, M., Norman, G., Parker, D.: PRISM 4.0: Verification of probabilistic real-time systems. In: International Conference on Computer Aided Verification, pp. 585–591 (2011)

  95. De Moura, L., Bjørner, N.: Satisfiability modulo theories: Introduction and applications. Commun. ACM 54, 69–77 (2011). https://doi.org/10.1145/1995376.1995394

    Article  Google Scholar 

  96. Bjørner, N., de Moura, L.: Z3: an efficient SMT solver. In: Tools and. Algorithms for the Construction and Analysis (TACAS) (2008)

  97. Bianco, A., de Alfaro, L.: Model checking of probabilistic and nondeterministic systems. In: International Conference on Foundations of Software Technology and Theoretical Computer Science, pp. 499–513 (1995)

  98. Arzt, S., Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., Le Traon, Y., Octeau, D., McDaniel, P.: FlowDroid. ACM SIGPLAN Not. 49, 259–269 (2014). https://doi.org/10.1145/2666356.2594299

    Article  Google Scholar 

  99. Myers, A.C.: JFlow. In: Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp. 228–241. ACM, New York (1999). https://doi.org/10.1145/292540.292561

  100. Helsley, M.: LXC: Linux container tools (2017). https://developer.ibm.com/tutorials/l-lxc-containers/

  101. Goldberg, Y., Levy, O.: word2vec Explained: deriving Mikolov et al.’s negative-sampling word-embedding method. arXiv Preprint (2014). https://doi.org/10.48550/arXiv.1402.3722

  102. Meseguer, J.: Conditional rewriting logic as a unified model of concurrency. Theor. Comput. Sci. 96, 73–155 (1992)

    Article  MathSciNet  Google Scholar 

Download references

Funding

The authors did not receive support from any organization for the submitted work.

Author information

Authors and Affiliations

Authors

Contributions

Conceptualization and idea of this article: [Adeeb Mansoor Ansari]; literature search and data analysis: [Adeeb Mansoor Ansari, Mohammed Nazir and Khurram Mustafa]; writing—original draft preparation: [Adeeb Mansoor Ansari]; writing—review and editing: [Adeeb Mansoor Ansari, Mohammed Nazir and Khurram Mustafa]; supervision: [Mohammed Nazir and Khurram Mustafa].

Corresponding author

Correspondence to Adeeb Mansoor Ansari.

Ethics declarations

Conflict of interest

On behalf of all authors, the corresponding author states that there is no conflict of interest. The authors have no relevant financial or non-financial interests to disclose.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ansari, A.M., Nazir, M. & Mustafa, K. Smart Homes App Vulnerabilities, Threats, and Solutions: A Systematic Literature Review. J Netw Syst Manage 32, 29 (2024). https://doi.org/10.1007/s10922-024-09803-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10922-024-09803-1

Keywords

Navigation