Abstract
The Internet of Things is a rapidly evolving technology in which interconnected computing devices and sensors share data over the network to decipher different problems and deliver new services. For example, IoT is the key enabling technology for smart homes. Smart home technology provides many facilities to users like temperature monitoring, smoke detection, automatic light control, smart locks, etc. However, it also opens the door to new set of security and privacy issues, for example, the private data of users can be accessed by taking control over surveillance devices or activating false fire alarms, etc. These challenges make smart homes feeble to various types of security attacks and people are reluctant to adopt this technology due to the security issues. In this survey paper, we throw light on IoT, how IoT is growing, objects and their specifications, the layered structure of the IoT environment, and various security challenges for each layer that occur in the smart home. This paper not only presents the challenges and issues that emerge in IoT-based smart homes but also presents some solutions that would help to overcome these security challenges.
Similar content being viewed by others
References
Abdul-Ghani HA, Konstantas D, Mahyoub M (2018) A comprehensive IoT attacks survey based on a building-blocked reference model. Int J Adv Comput Sci Appl (IJACSA) 9(3):355–373
Ahemd MM, Shah MA, Wahid A (2017) IoT security: a layered approach for attacks and defenses. In: 2017 International Conference on Communication Technologies (ComTech), pages 104–110. IEEE
Ahlawat B, Sangwan A, Sindhu V. IoT system model, challenges and threats
Firoz A, Young-Bae K (2016) Mitigation of black hole attacks in routing protocol for low power and lossy networks. Secur Commun Networks 9(18):5143–5154
Ali W, Dustgeer G, Awais M, Shah MA (2017) IoT based smart home: security challenges, security requirements and solutions. In: 2017 23rd International Conference on Automation and Computing (ICAC), pages 1–6. IEEE
Farouq A, Tarek S, Shakshuki EM (2018) A detection and prevention technique for man in the middle attack in fog computing. Procedia Comput Sci 141:24–31
Alizai ZA, Tareen NF, Jadoon I (2018) Improved IoT device authentication scheme using device capability and digital signatures. In: 2018 International Conference on Applied and Engineering Mathematics (ICAEM), pages 1–5. IEEE
Almusaylim ZA, Noor Z (2019) A review on smart home present state and challenges: linked to context-awareness internet of things (IoT). Wirel Networks 25(6):3193–3204
Alnaeli SM, Sarnowski M, Aman MS, Abdelgawad A, Yelamarthi K (2016) Vulnerable c/c++ code usage in iot software systems. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pages 348–352. IEEE
Ruth A, Bamidele A, Mohammad H, Jibran S (2020) Internet of things: evolution and technologies from a security perspective. Sustain Cities Soc 54
Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pages 180–187. IEEE
Arabo A, Pranggono B (2013) Mobile malware and smart device security: trends, challenges and solutions. In: 2013 19th International Conference on Control Systems and Computer Science, pages 526–531. IEEE
Arış A, Oktuğ SF, Berna Örs YS (2015) Internet-of-things security: denial of service attacks. In: 2015 23nd Signal Processing and Communications Applications Conference (SIU), pages 903–906. IEEE
Arora A, Kaur A, Bhushan B, Saini H (2019) Security concerns and future trends of internet of things. In: 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Vol 1, pages 891–896. IEEE
Ashibani Y, Mahmoud QH (2018) A behavior profiling model for user authentication in IoT networks based on app usage patterns. In: IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, pages 2841–2846. IEEE
Asif W, Ghosh RI, Rajarajan M (2018) An attack tree based risk evaluation approach for the internet of things. In: Proceedings of the 8th International Conference on the Internet of Things, pages 1–8
Atlam HF, Wills GB (2020) IoT security, privacy, safety and ethics. In: Digital twin technologies and smart cities, pages 123–149. Springer
Azari A, Miao G, Stefanovic C, Popovski P (2018) Latency-energy tradeoff based on channel scheduling and repetitions in nb-IoT systems. In: 2018 IEEE Global Communications Conference (GLOBECOM), pages 1–7. IEEE
Bastos D, Shackleton M, El-Moussa F (2018) Internet of things: a survey of technologies and security risks in smart home and city environments
Bugeja J, Jacobsson A, Davidsson P (2016) On privacy and security challenges in smart connected homes. In: 2016 European Intelligence and Security Informatics Conference (EISIC), pages 172–175. IEEE
Celesti A, Carnevale L, Galletta A, Fazio M, Villari M (2017) A watchdog service making container-based micro-services reliable in iot clouds. In: 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), pages 372–378. IEEE
Cesare S (2014) Breaking the security of physical devices. Presentation at Blackhat, 14,
Choi J, Jin S (2018) Security threats in connected car environment and proposal of in-vehicle infotainment-based access control mechanism. In: Advanced multimedia and ubiquitous engineering, pages 383–388. Springer
Classen J, Chen J, Steinmetzer D, Hollick M, Knightly E (2015) The spy next door: eavesdropping on high throughput visible light communications. In: Proceedings of the 2nd International Workshop on Visible Light Communications Systems, pages 9–14
Das D, Maity S, Nasir SB, Ghosh S, Raychowdhury A, Sen S (2017) High efficiency power side-channel attack immunity using noise injection in attenuated signature domain. In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 62–67. IEEE
Datta P, Sharma B (2017) A survey on iot architectures, protocols, security and smart city based applications. In 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pages 1–5. IEEE
Denning DE (2012) Stuxnet: What has changed? Futur Internet 4(3):672–687
Deogirikar J, Vidhate A (2017) Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pages 32–37. IEEE
Zheng D, Guangzhen S, Yun L, Meiyu W (2019) An adaptive resource allocation model with anti-jamming in IoT network. IEEE Access 7:93250–93258
Xiaojiang D, Hsiao-Hwa C, Liehuang Z, Jiangli L, Zheng C (2018) Security and privacy in wireless IoT. IEEE Wirel Commun 25(6):10–11
Duangphasuk S, Duangphasuk P, Thammarat C (2020) Review of internet of things (IoT): security issue and solution. In: 2020 17th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), pages 559–562. IEEE
Dhar DA, Gautam S, Shalini D, Rajani S (2019) A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 19(2):326
Faisal EM, Ismail AA, Hamed HFA (2018) Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput 7(1):21
Evans D (2011) The internet of things: how the next evolution of the internet is changing everything. Cisco Int J Internet 3(2):123–132
Ezhilarasan E, Dinakaran M (2017) A review on mobile technologies: 3g, 4g and 5g. In: 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), pages 369–373,
Fakhri D, Mutijarsa K (2018) Secure IoT communication using blockchain technology. In: 2018 International Symposium on Electronics and Smart Devices (ISESD), pages 1–6. IEEE
Pallab G, Mita N, Sourav D (2018) A novel approach for detecting and mitigating the energy theft issues in the smart metering infrastructure. Technol Econ Smart Grids Sustain Energy 3(1):13
Gavra V-D, Dobra I-M, Pop OA (2020) A survey on threats and security solutions for IoT. In: 2020 43rd International Spring Seminar on Electronics Technology (ISSE), pages 1–5. IEEE
Gendreau AA, Moorman M (2016) Survey of intrusion detection systems towards an end to end secure internet of things. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pages 84–90. IEEE
Geneiatakis D, Kounelis I, Neisse R, Nai-Fovino I, Steri G, Baldini G (2017) Security and privacy issues for an iot based smart home. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pages 1292–1297. IEEE
Ghafir I, Prenosil V, Alhejailan A, Hammoudeh M (2016) Social engineering attack strategies and defence approaches. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pages 145–149. IEEE
Ghasemi M, Saadaat M, Ghollasi O (2019) Threats of social engineering attacks against security of internet of things (IoT). In: Fundamental research in electrical engineering, pages 957–968. Springer
Gill RK, Sachdeva M (2018) Detection of hello flood attack on leach in wireless sensor networks. In: Next-generation networks, pages 377–387. Springer
Gupta Brij B, Arachchilage Nalin AG, Psannis Kostas E (2018) Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommun Syst 67(2):247–267
Hallman R, Bryan J, Palavicini G, Divita J, Romero-Mariona J (2017) Ioddos-the internet of distributed denial of sevice attacks. In: 2nd International Conference on Internet of Things, Big Data and Security. SCITEPRESS, pages 47–58
Hariri Reihaneh H, Fredericks Erik M, Bowers Kate M (2019) Uncertainty in big data analytics: survey, opportunities, and challenges. J Big Data 6(1):44
Vikas H, Vinay C, Vikas S, Divyansh J, Pranav G, Biplab S (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743
Daojing H, Ran Y, Sammy C, Mohsen G, Yanping X (2018) Privacy in the internet of things for smart healthcare. IEEE Commun Mag 56(4):38–44
Mahmud Hossain SM, Riazul I, Farman A, Kyung-Sup K, Ragib H (2018) An internet of things-based health prescription assistant and its security system design. Futur Gener Comput Syst 82:422–439
Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. In: 2015 IEEE World Congress on Services, pages 21–28. IEEE
Hussain F, Hussain R, Hassan SA, Hossain E (2020) Machine learning in IoT security: current solutions and future challenges. IEEE Commun Surv Tutor
Ida IB, Jemai A, Loukil A (2016) A survey on security of IoT in the context of ehealth and clouds. In: 2016 11th International Design and Test Symposium (IDT), pages 25–30. IEEE
Islam K, Shen W, Wang X (2012) Security and privacy considerations for wireless sensor networks in smart home environments. In: Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pages 626–633. IEEE
ISO/IEC. Iso/iec 27005:2018 (2018). https://www.iso.org/standard/75281.html
Kanwal J, Ali SM, Ahmad A, Ali KH, Carsten M, Din IU (2020) Proactive forensics in IoT: privacy-aware log-preservation architecture in fog-enabled-cloud using holochain and containerization technologies. Electron 9(7):1172
Jayakumar H, Raha A, Kim Y, Sutar S, Lee WS, Raghunathan V (2016) Energy-efficient system design for IoT devices. In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pages 298–301. IEEE
Kalra N, Sharma A, Kumar N, Singh R, Gehlot A (2018) Design and development of IoT-based transmission line monitoring system. In: Intelligent communication, control and devices, pages 465–471. Springer
Hazalila K, Hairulnizam M, Abawajy JH (2018) Clone tag detection in distributed rfid systems. PloS one 13(3)
Kamel Samah Osama M, Hegazi Nadia H (2018) A proposed model of IoT security management system based on a study of internet of things (IoT) security. Int J Sci Eng Res 9(9):1227–1244
Kanuparthi A, Karri R, Addepalli S (2013) Hardware and embedded security in the context of internet of things. In: Proceedings of the 2013 ACM Workshop on Security, Privacy and Dependability for Cyber Vehicles, pages 61–64
Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2–3):293–315
Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) An ids framework for internet of things empowered by 6lowpan. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pages 1337–1340
Kaur M, Kalra S (2018) Security in IoT-based smart grid through quantum key distribution. In: Advances in computer and computational sciences, pages 523–530. Springer
Khan F, Gawade A Secure data management in smart meter as an application of IoT
Hasan AK, Munam AS, Khan S, Ali I, Imran M (2019) Perception layer security in internet of things. Futur Gener Comput Syst 100:144–164
Kim D-Y (2014) Cyber security issues imposed on nuclear power plants. Ann Nuclear Energy 65:141–143
Kim Y-P, Yoo S, Yoo C (2015) Daot: dynamic and energy-aware authentication for smart home appliances in internet of things. In: 2015 IEEE International Conference on Consumer Electronics (ICCE), pages 196–197. IEEE
Ko E, Kim T, Kim H (2018) Management platform of threats information in IoT environment. J Ambient Intell Humanized Comput 9(4):1167–1176
Komninos N, Philippou E, Pitsillides A (2014) Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun Surv Tutor 16(4):1933–1954
Konidala DM, Kim D, Chan YY, Lee B (2011) Security framework for rfid-based applications in smart home environment. J Inf Process Syst 7(1):111–120
Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput Electr Eng 39(1):34–46
Kozlov D, Veijalainen J, Ali Y (2012) Security and privacy threats in IoT architectures. In: BODYNETS, pages 256–262
Kumar SA, Vealey T, Srivastava H (2016) Security in internet of things: challenges, solutions and future directions. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 5772–5781. IEEE
Kumar S, Sahoo S, Mahapatra A, Swain AK, Mahapatra KK (2017) Security enhancements to system on chip devices for iot perception layer. In: 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), pages 151–156. IEEE
Li H, Chen Y, He Z (2012) The survey of rfid attacks and defenses. In: 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing, pages 1–4. IEEE
Li S, Da Li X, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17(2):243–259
Li X, Wang H, Dai H-N, Wang Y , Zhao Q (2016) An analytical study on eavesdropping attacks in wireless nets of things. Mob Inform Syst
Li Z, Yin X, Geng Z, Zhang H, Li P, Sun Y, Zhang H, Li L (2013) Research on pki-like protocol for the internet of things. In: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation, pages 915–918. IEEE
Lin H, Bergmann NW (2016) IoT privacy and security challenges for smart home environments. Information 7(3):44
Liu J, Xiao Y, Chen CLP (2012) Authentication and access control in the internet of things. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pages 588–592. IEEE
Liu Y, Briones J, Zhou R, Magotra N (2017) Study of secure boot with a fpga-based IoT device. In: 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), pages 1053–1056. IEEE
Maurer U (2011) Constructive cryptography—a new paradigm for security definitions and proofs. In: Joint Workshop on Theory of Security and Applications, pages 33–56. Springer
Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Int Things J 6(5):8182–8201
Shunmei M, Zijian G, Qianmu L, Hao W, Hong-Ning D, Lianyong Q (2020) Security-driven hybrid collaborative recommendation method for cloud-based IoT services. Comput Secur 97
Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: Vision, applications and research challenges. Ad Hoc Networks 10(7):1497–1516
Mosenia A, Jha Niraj K (2016) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586–602
Mujica G, Portilla J (2019) Distributed reprogramming on the edge: a new collaborative code dissemination strategy for IoT. Electronics 8(3):267
Muthukrishnan H, Sunita B, Najeerabanu S, Yasuvanth V (2020) Observational study of wpan and lpwa technologies for various IoT devices and its applications
Nirmal K, Janet B, Kumar R (2020) Analyzing and eliminating phishing threats in IoT, network and other web applications using iterative intersection. Peer-to-Peer Network Appl, pages 1–13,
Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53–57
Perwej Y, Omer MK, Sheta OE, Harb HAM, Adrees MS (2019) The future of internet of things (iot) and its empowering technology. Int J Eng Sci, 20192
Pongle P, Chavan G (2015) A survey: attacks on rpl and 6lowpan in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pages 1–6. IEEE
Porkodi R, Bhuvaneswari V (2014) The internet of things (IoT) applications and communication enabling technology standards: an overview. In: 2014 International Conference on Intelligent Computing Applications, pages 324–329. IEEE
Prokofiev AO, Smirnova YS, Surov VA (2018) A method to detect internet of things botnets. In: 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pages 105–108. IEEE
Ramesh G, Krishnamurthi I, Sampath Sree Kumar K (2014) An efficacious method for detecting phishing webpages through target domain identification. Decis Support Syst 61:12–22
Tariq AR, Haq EU (2018) Security challenges facing iot layers and its protective measures. Int J Comput Appl 975:8887
Rizvi S, Kurtz A, Pfeffer J, Rizvi M (2018) Securing the internet of things (IoT): a security taxonomy for IoT. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pages 163–168. IEEE
Roberts CM (2006) Radio frequency identification (rfid). Comput Sec 25(1):18–26
Robles RJ, Kim T, Cook D, Das S (2010) A review on security in smart home development. Int J Adv Sci Technol 15
Rodrigues Luis, Guerreiro Joel, Correia Noélia (2020) Reload/coap architecture for the federation of wireless sensor networks. Peer-to-Peer Networking and Applications 13(1):27–37
Said O, Albagory Y, Nofal M, Fahad AR (2017) Iot-rtp and IoT-rtcp: adaptive protocols for multimedia transmission over internet of things environments. IEEE access 5:16757–16773
Salman O, Elhajj I, Chehab A, Kayssi A (2018) Iot survey: an sdn and fog computing perspective. Comput Networks 143:221–246
Sarkar AR, Sanyal G, Majumder S (2016) Application of wireless technology for a vision based rehabilitation system. In: 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pages 106–111. IEEE
Savola RM, Abie H, Sihvonen M (2012) Towards metrics-driven adaptive security management in e-health iot applications. In BodyNets, pages 276–281
Sethi P, Sarangi SR (2017) Internet of things: architectures, protocols, and applications. J Electr Comput Eng
Shamsoshoara A, Korenda A, Afghah F, Zeadally S (2019) A survey on hardware-based security mechanisms for internet of things. arXiv preprint arXiv:1907.12525
Sharma P, Zawar S, Patil Suryakant B (2016) Ransomware analysis: internet of things (IoT) security issues challenges and open problems inthe context of worldwide scenario of security of systems and malware attacks. Int Conf Recent Innov Eng Manag 2:177–184
Siddiqui ST, Alam S, Ahmad R, Shuaib M (2020) Security threats, attacks, and possible countermeasures in internet of things. In: Advances in data and information sciences, pages 35–46. Springer
Silva I, Leandro R, Macedo D, Luiz AG (2013) A dependability evaluation tool for the internet of things. Comput Electr Eng 39(7):2005–2018
Sivaraman V, Gharakheili HH, Vishwanath A, Boreli R, Mehani O (2015) Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pages 163–167. IEEE
Sonar K, Upadhyay H (2014) A survey: Ddos attack on internet of things. Int J Eng Res Dev 10(11):58–63
Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering, Vol. 3, pages 648–651. IEEE
Swamy SN, Jadhav D, Kulkarni N (2017) Security threats in the application layer in IoT applications. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pages 477–480. IEEE
Tang X, Ren P, Han Z (2018) Jamming mitigation via hierarchical security game for IoT communications. IEEE Access 6:5766–5779
Thangavel C, Sudhaman P (2017) Security challenges in the IoT paradigm for enterprise information systems. In: Connected environments for the internet of things, pages 3–17. Springer
Varga P, Plosz S, Soos G, Hegedus C (2017) Security threats and issues in automation IoT. In: 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), pages 1–6. IEEE
Vashi S, Ram J, Modi J, Verma S, Prakash C (2017) Internet of things (IoT): a vision, architectural elements, and security issues. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pages 492–496. IEEE
Venkata Abhishek N, Tandon A, Lim TJ, Sikdar B (2018) Detecting forwarding misbehavior in clustered iot networks. In: Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, pages 1–6
Vimal Jerald A, Rabara SA, Bai TDP (2015) Internet of things (IoT) based smart environment integrating various business applications. Int J Comput Appl 128(8):32–37
von Tschirschnitz M, Peuckert L, Franzen F, Grossklags J (2020) Method confusion attack on bluetooth pairing. Under submission
Vuppala S, Alie El-Din M, Kuenzi A (2019) Moving target defense mechanism for side-channel attacks. IEEE Syst J 14(2):1810–1819
Wallrabenstein JR (2016) Practical and secure IoT device authentication using physical unclonable functions. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pages 99–106. IEEE
Wang P, Chaudhry S, Li L, Li S, Tryfonas T, Li H (2016) The internet of things: a security point of view. Internet Res
Wang Z (2019) Identity-based verifiable aggregator oblivious encryption and its applications in smart grids. IEEE Trans Sustain Comput
Wei D, Qiu X (2018) Status-based detection of malicious code in internet of things (IoT) devices. In: 2018 IEEE Conference on Communications and Network Security (CNS), pages 1–7. IEEE
Werbach K, Mehta A (2014) The spectrum opportunity: sharing as the solution to the wireless crunch. Int J Commun 8:22
Werner M, Unterluggauer T, Schaffenrath D, Mangard S (2018) Sponge-based control-flow protection for IoT devices. In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pages 214–226. IEEE
Whittaker C, Ryner B, Nazif M (2010) Large-scale automatic classification of phishing pages
Winter T, Thubert P, Brandt A, Hui JW, Kelsey R, Levis P, Pister K, Struik R, Vasseur J-P, Alexander RK, et al (2012) Rpl: Ipv6 routing protocol for low-power and lossy networks. rfc, 6550:1–157
Wu M, Lu T-J, Ling F-Y, Sun J, Du H-Y (2010) Research on the architecture of internet of things. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), Vol 5, pages V5–484. IEEE
Xiang G, Hong J, Rose CP, Cranor L (2011) Cantina+ a feature-rich machine learning framework for detecting phishing web sites. ACM Trans Inform Syst Secur (TISSEC) 14(2):1–28
Xiaohui X (2013) Study on security problems and key technologies of the internet of things. In: 2013 International Conference on Computational and Information Sciences, pages 407–410. IEEE
Yoon S, Park H, Yoo HS (2015) Security issues on smarthome in IoT environment. In: Computer science and its applications, pages 691–696. Springer
Zarpelão BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Network Comput Appl84:25–37
Zeng X, Martinez T (2003) A noise filtering method using neural networks. In: IEEE International Workshop on Soft Computing Techniques in Instrumentation, Measurement and Related Applications, 2003. SCIMA 2003 pages 26–31. IEEE
Zhang T, Antunes H, Aggarwal S (2014) Defending connected vehicles against malware: Challenges and a solution framework. IEEE Internet Things J 1(1):10–21
Zhao W, Yang S, Luo X (2020) On threat analysis of IoT-based systems: a survey. In: 2020 IEEE International Conference on Smart Internet of Things (SmartIoT), pages 205–212. IEEE
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Touqeer, H., Zaman, S., Amin, R. et al. Smart home security: challenges, issues and solutions at different IoT layers. J Supercomput 77, 14053–14089 (2021). https://doi.org/10.1007/s11227-021-03825-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-021-03825-1