Skip to main content
Log in

Smart home security: challenges, issues and solutions at different IoT layers

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The Internet of Things is a rapidly evolving technology in which interconnected computing devices and sensors share data over the network to decipher different problems and deliver new services. For example, IoT is the key enabling technology for smart homes. Smart home technology provides many facilities to users like temperature monitoring, smoke detection, automatic light control, smart locks, etc. However, it also opens the door to new set of security and privacy issues, for example, the private data of users can be accessed by taking control over surveillance devices or activating false fire alarms, etc. These challenges make smart homes feeble to various types of security attacks and people are reluctant to adopt this technology due to the security issues. In this survey paper, we throw light on IoT, how IoT is growing, objects and their specifications, the layered structure of the IoT environment, and various security challenges for each layer that occur in the smart home. This paper not only presents the challenges and issues that emerge in IoT-based smart homes but also presents some solutions that would help to overcome these security challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abdul-Ghani HA, Konstantas D, Mahyoub M (2018) A comprehensive IoT attacks survey based on a building-blocked reference model. Int J Adv Comput Sci Appl (IJACSA) 9(3):355–373

    Google Scholar 

  2. Ahemd MM, Shah MA, Wahid A (2017) IoT security: a layered approach for attacks and defenses. In: 2017 International Conference on Communication Technologies (ComTech), pages 104–110. IEEE

  3. Ahlawat B, Sangwan A, Sindhu V. IoT system model, challenges and threats

  4. Firoz A, Young-Bae K (2016) Mitigation of black hole attacks in routing protocol for low power and lossy networks. Secur Commun Networks 9(18):5143–5154

    Article  Google Scholar 

  5. Ali W, Dustgeer G, Awais M, Shah MA (2017) IoT based smart home: security challenges, security requirements and solutions. In: 2017 23rd International Conference on Automation and Computing (ICAC), pages 1–6. IEEE

  6. Farouq A, Tarek S, Shakshuki EM (2018) A detection and prevention technique for man in the middle attack in fog computing. Procedia Comput Sci 141:24–31

    Article  Google Scholar 

  7. Alizai ZA, Tareen NF, Jadoon I (2018) Improved IoT device authentication scheme using device capability and digital signatures. In: 2018 International Conference on Applied and Engineering Mathematics (ICAEM), pages 1–5. IEEE

  8. Almusaylim ZA, Noor Z (2019) A review on smart home present state and challenges: linked to context-awareness internet of things (IoT). Wirel Networks 25(6):3193–3204

    Article  Google Scholar 

  9. Alnaeli SM, Sarnowski M, Aman MS, Abdelgawad A, Yelamarthi K (2016) Vulnerable c/c++ code usage in iot software systems. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pages 348–352. IEEE

  10. Ruth A, Bamidele A, Mohammad H, Jibran S (2020) Internet of things: evolution and technologies from a security perspective. Sustain Cities Soc 54

  11. Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pages 180–187. IEEE

  12. Arabo A, Pranggono B (2013) Mobile malware and smart device security: trends, challenges and solutions. In: 2013 19th International Conference on Control Systems and Computer Science, pages 526–531. IEEE

  13. Arış A, Oktuğ SF, Berna Örs YS (2015) Internet-of-things security: denial of service attacks. In: 2015 23nd Signal Processing and Communications Applications Conference (SIU), pages 903–906. IEEE

  14. Arora A, Kaur A, Bhushan B, Saini H (2019) Security concerns and future trends of internet of things. In: 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Vol 1, pages 891–896. IEEE

  15. Ashibani Y, Mahmoud QH (2018) A behavior profiling model for user authentication in IoT networks based on app usage patterns. In: IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, pages 2841–2846. IEEE

  16. Asif W, Ghosh RI, Rajarajan M (2018) An attack tree based risk evaluation approach for the internet of things. In: Proceedings of the 8th International Conference on the Internet of Things, pages 1–8

  17. Atlam HF, Wills GB (2020) IoT security, privacy, safety and ethics. In: Digital twin technologies and smart cities, pages 123–149. Springer

  18. Azari A, Miao G, Stefanovic C, Popovski P (2018) Latency-energy tradeoff based on channel scheduling and repetitions in nb-IoT systems. In: 2018 IEEE Global Communications Conference (GLOBECOM), pages 1–7. IEEE

  19. Bastos D, Shackleton M, El-Moussa F (2018) Internet of things: a survey of technologies and security risks in smart home and city environments

  20. Bugeja J, Jacobsson A, Davidsson P (2016) On privacy and security challenges in smart connected homes. In: 2016 European Intelligence and Security Informatics Conference (EISIC), pages 172–175. IEEE

  21. Celesti A, Carnevale L, Galletta A, Fazio M, Villari M (2017) A watchdog service making container-based micro-services reliable in iot clouds. In: 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), pages 372–378. IEEE

  22. Cesare S (2014) Breaking the security of physical devices. Presentation at Blackhat, 14,

  23. Choi J, Jin S (2018) Security threats in connected car environment and proposal of in-vehicle infotainment-based access control mechanism. In: Advanced multimedia and ubiquitous engineering, pages 383–388. Springer

  24. Classen J, Chen J, Steinmetzer D, Hollick M, Knightly E (2015) The spy next door: eavesdropping on high throughput visible light communications. In: Proceedings of the 2nd International Workshop on Visible Light Communications Systems, pages 9–14

  25. Das D, Maity S, Nasir SB, Ghosh S, Raychowdhury A, Sen S (2017) High efficiency power side-channel attack immunity using noise injection in attenuated signature domain. In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 62–67. IEEE

  26. Datta P, Sharma B (2017) A survey on iot architectures, protocols, security and smart city based applications. In 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pages 1–5. IEEE

  27. Denning DE (2012) Stuxnet: What has changed? Futur Internet 4(3):672–687

    Article  Google Scholar 

  28. Deogirikar J, Vidhate A (2017) Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pages 32–37. IEEE

  29. Zheng D, Guangzhen S, Yun L, Meiyu W (2019) An adaptive resource allocation model with anti-jamming in IoT network. IEEE Access 7:93250–93258

    Article  Google Scholar 

  30. Xiaojiang D, Hsiao-Hwa C, Liehuang Z, Jiangli L, Zheng C (2018) Security and privacy in wireless IoT. IEEE Wirel Commun 25(6):10–11

    Article  Google Scholar 

  31. Duangphasuk S, Duangphasuk P, Thammarat C (2020) Review of internet of things (IoT): security issue and solution. In: 2020 17th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), pages 559–562. IEEE

  32. Dhar DA, Gautam S, Shalini D, Rajani S (2019) A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 19(2):326

    Article  Google Scholar 

  33. Faisal EM, Ismail AA, Hamed HFA (2018) Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput 7(1):21

    Article  Google Scholar 

  34. Evans D (2011) The internet of things: how the next evolution of the internet is changing everything. Cisco Int J Internet 3(2):123–132

    Google Scholar 

  35. Ezhilarasan E, Dinakaran M (2017) A review on mobile technologies: 3g, 4g and 5g. In: 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), pages 369–373,

  36. Fakhri D, Mutijarsa K (2018) Secure IoT communication using blockchain technology. In: 2018 International Symposium on Electronics and Smart Devices (ISESD), pages 1–6. IEEE

  37. Pallab G, Mita N, Sourav D (2018) A novel approach for detecting and mitigating the energy theft issues in the smart metering infrastructure. Technol Econ Smart Grids Sustain Energy 3(1):13

    Article  Google Scholar 

  38. Gavra V-D, Dobra I-M, Pop OA (2020) A survey on threats and security solutions for IoT. In: 2020 43rd International Spring Seminar on Electronics Technology (ISSE), pages 1–5. IEEE

  39. Gendreau AA, Moorman M (2016) Survey of intrusion detection systems towards an end to end secure internet of things. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pages 84–90. IEEE

  40. Geneiatakis D, Kounelis I, Neisse R, Nai-Fovino I, Steri G, Baldini G (2017) Security and privacy issues for an iot based smart home. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pages 1292–1297. IEEE

  41. Ghafir I, Prenosil V, Alhejailan A, Hammoudeh M (2016) Social engineering attack strategies and defence approaches. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pages 145–149. IEEE

  42. Ghasemi M, Saadaat M, Ghollasi O (2019) Threats of social engineering attacks against security of internet of things (IoT). In: Fundamental research in electrical engineering, pages 957–968. Springer

  43. Gill RK, Sachdeva M (2018) Detection of hello flood attack on leach in wireless sensor networks. In: Next-generation networks, pages 377–387. Springer

  44. Gupta Brij B, Arachchilage Nalin AG, Psannis Kostas E (2018) Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommun Syst 67(2):247–267

    Article  Google Scholar 

  45. Hallman R, Bryan J, Palavicini G, Divita J, Romero-Mariona J (2017) Ioddos-the internet of distributed denial of sevice attacks. In: 2nd International Conference on Internet of Things, Big Data and Security. SCITEPRESS, pages 47–58

  46. Hariri Reihaneh H, Fredericks Erik M, Bowers Kate M (2019) Uncertainty in big data analytics: survey, opportunities, and challenges. J Big Data 6(1):44

    Article  Google Scholar 

  47. Vikas H, Vinay C, Vikas S, Divyansh J, Pranav G, Biplab S (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743

    Article  Google Scholar 

  48. Daojing H, Ran Y, Sammy C, Mohsen G, Yanping X (2018) Privacy in the internet of things for smart healthcare. IEEE Commun Mag 56(4):38–44

    Article  Google Scholar 

  49. Mahmud Hossain SM, Riazul I, Farman A, Kyung-Sup K, Ragib H (2018) An internet of things-based health prescription assistant and its security system design. Futur Gener Comput Syst 82:422–439

    Article  Google Scholar 

  50. Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. In: 2015 IEEE World Congress on Services, pages 21–28. IEEE

  51. Hussain F, Hussain R, Hassan SA, Hossain E (2020) Machine learning in IoT security: current solutions and future challenges. IEEE Commun Surv Tutor

  52. Ida IB, Jemai A, Loukil A (2016) A survey on security of IoT in the context of ehealth and clouds. In: 2016 11th International Design and Test Symposium (IDT), pages 25–30. IEEE

  53. Islam K, Shen W, Wang X (2012) Security and privacy considerations for wireless sensor networks in smart home environments. In: Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pages 626–633. IEEE

  54. ISO/IEC. Iso/iec 27005:2018 (2018). https://www.iso.org/standard/75281.html

  55. Kanwal J, Ali SM, Ahmad A, Ali KH, Carsten M, Din IU (2020) Proactive forensics in IoT: privacy-aware log-preservation architecture in fog-enabled-cloud using holochain and containerization technologies. Electron 9(7):1172

    Article  Google Scholar 

  56. Jayakumar H, Raha A, Kim Y, Sutar S, Lee WS, Raghunathan V (2016) Energy-efficient system design for IoT devices. In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pages 298–301. IEEE

  57. Kalra N, Sharma A, Kumar N, Singh R, Gehlot A (2018) Design and development of IoT-based transmission line monitoring system. In: Intelligent communication, control and devices, pages 465–471. Springer

  58. Hazalila K, Hairulnizam M, Abawajy JH (2018) Clone tag detection in distributed rfid systems. PloS one 13(3)

  59. Kamel Samah Osama M, Hegazi Nadia H (2018) A proposed model of IoT security management system based on a study of internet of things (IoT) security. Int J Sci Eng Res 9(9):1227–1244

    Google Scholar 

  60. Kanuparthi A, Karri R, Addepalli S (2013) Hardware and embedded security in the context of internet of things. In: Proceedings of the 2013 ACM Workshop on Security, Privacy and Dependability for Cyber Vehicles, pages 61–64

  61. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2–3):293–315

  62. Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) An ids framework for internet of things empowered by 6lowpan. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pages 1337–1340

  63. Kaur M, Kalra S (2018) Security in IoT-based smart grid through quantum key distribution. In: Advances in computer and computational sciences, pages 523–530. Springer

  64. Khan F, Gawade A Secure data management in smart meter as an application of IoT

  65. Hasan AK, Munam AS, Khan S, Ali I, Imran M (2019) Perception layer security in internet of things. Futur Gener Comput Syst 100:144–164

  66. Kim D-Y (2014) Cyber security issues imposed on nuclear power plants. Ann Nuclear Energy 65:141–143

    Article  Google Scholar 

  67. Kim Y-P, Yoo S, Yoo C (2015) Daot: dynamic and energy-aware authentication for smart home appliances in internet of things. In: 2015 IEEE International Conference on Consumer Electronics (ICCE), pages 196–197. IEEE

  68. Ko E, Kim T, Kim H (2018) Management platform of threats information in IoT environment. J Ambient Intell Humanized Comput 9(4):1167–1176

  69. Komninos N, Philippou E, Pitsillides A (2014) Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun Surv Tutor 16(4):1933–1954

  70. Konidala DM, Kim D, Chan YY, Lee B (2011) Security framework for rfid-based applications in smart home environment. J Inf Process Syst 7(1):111–120

  71. Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput Electr Eng 39(1):34–46

  72. Kozlov D, Veijalainen J, Ali Y (2012) Security and privacy threats in IoT architectures. In: BODYNETS, pages 256–262

  73. Kumar SA, Vealey T, Srivastava H (2016) Security in internet of things: challenges, solutions and future directions. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 5772–5781. IEEE

  74. Kumar S, Sahoo S, Mahapatra A, Swain AK, Mahapatra KK (2017) Security enhancements to system on chip devices for iot perception layer. In: 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), pages 151–156. IEEE

  75. Li H, Chen Y, He Z (2012) The survey of rfid attacks and defenses. In: 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing, pages 1–4. IEEE

  76. Li S, Da Li X, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17(2):243–259

  77. Li X, Wang H, Dai H-N, Wang Y , Zhao Q (2016) An analytical study on eavesdropping attacks in wireless nets of things. Mob Inform Syst

  78. Li Z, Yin X, Geng Z, Zhang H, Li P, Sun Y, Zhang H, Li L (2013) Research on pki-like protocol for the internet of things. In: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation, pages 915–918. IEEE

  79. Lin H, Bergmann NW (2016) IoT privacy and security challenges for smart home environments. Information 7(3):44

  80. Liu J, Xiao Y, Chen CLP (2012) Authentication and access control in the internet of things. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pages 588–592. IEEE

  81. Liu Y, Briones J, Zhou R, Magotra N (2017) Study of secure boot with a fpga-based IoT device. In: 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), pages 1053–1056. IEEE

  82. Maurer U (2011) Constructive cryptography—a new paradigm for security definitions and proofs. In: Joint Workshop on Theory of Security and Applications, pages 33–56. Springer

  83. Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Int Things J 6(5):8182–8201

  84. Shunmei M, Zijian G, Qianmu L, Hao W, Hong-Ning D, Lianyong Q (2020) Security-driven hybrid collaborative recommendation method for cloud-based IoT services. Comput Secur 97

  85. Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: Vision, applications and research challenges. Ad Hoc Networks 10(7):1497–1516

  86. Mosenia A, Jha Niraj K (2016) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586–602

  87. Mujica G, Portilla J (2019) Distributed reprogramming on the edge: a new collaborative code dissemination strategy for IoT. Electronics 8(3):267

  88. Muthukrishnan H, Sunita B, Najeerabanu S, Yasuvanth V (2020) Observational study of wpan and lpwa technologies for various IoT devices and its applications

  89. Nirmal K, Janet B, Kumar R (2020) Analyzing and eliminating phishing threats in IoT, network and other web applications using iterative intersection. Peer-to-Peer Network Appl, pages 1–13,

  90. Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53–57

  91. Perwej Y, Omer MK, Sheta OE, Harb HAM, Adrees MS (2019) The future of internet of things (iot) and its empowering technology. Int J Eng Sci, 20192

  92. Pongle P, Chavan G (2015) A survey: attacks on rpl and 6lowpan in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pages 1–6. IEEE

  93. Porkodi R, Bhuvaneswari V (2014) The internet of things (IoT) applications and communication enabling technology standards: an overview. In: 2014 International Conference on Intelligent Computing Applications, pages 324–329. IEEE

  94. Prokofiev AO, Smirnova YS, Surov VA (2018) A method to detect internet of things botnets. In: 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pages 105–108. IEEE

  95. Ramesh G, Krishnamurthi I, Sampath Sree Kumar K (2014) An efficacious method for detecting phishing webpages through target domain identification. Decis Support Syst 61:12–22

  96. Tariq AR, Haq EU (2018) Security challenges facing iot layers and its protective measures. Int J Comput Appl 975:8887

  97. Rizvi S, Kurtz A, Pfeffer J, Rizvi M (2018) Securing the internet of things (IoT): a security taxonomy for IoT. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pages 163–168. IEEE

  98. Roberts CM (2006) Radio frequency identification (rfid). Comput Sec 25(1):18–26

    Article  Google Scholar 

  99. Robles RJ, Kim T, Cook D, Das S (2010) A review on security in smart home development. Int J Adv Sci Technol 15

  100. Rodrigues Luis, Guerreiro Joel, Correia Noélia (2020) Reload/coap architecture for the federation of wireless sensor networks. Peer-to-Peer Networking and Applications 13(1):27–37

    Article  Google Scholar 

  101. Said O, Albagory Y, Nofal M, Fahad AR (2017) Iot-rtp and IoT-rtcp: adaptive protocols for multimedia transmission over internet of things environments. IEEE access 5:16757–16773

  102. Salman O, Elhajj I, Chehab A, Kayssi A (2018) Iot survey: an sdn and fog computing perspective. Comput Networks 143:221–246

  103. Sarkar AR, Sanyal G, Majumder S (2016) Application of wireless technology for a vision based rehabilitation system. In: 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pages 106–111. IEEE

  104. Savola RM, Abie H, Sihvonen M (2012) Towards metrics-driven adaptive security management in e-health iot applications. In BodyNets, pages 276–281

  105. Sethi P, Sarangi SR (2017) Internet of things: architectures, protocols, and applications. J Electr Comput Eng

  106. Shamsoshoara A, Korenda A, Afghah F, Zeadally S (2019) A survey on hardware-based security mechanisms for internet of things. arXiv preprint arXiv:1907.12525

  107. Sharma P, Zawar S, Patil Suryakant B (2016) Ransomware analysis: internet of things (IoT) security issues challenges and open problems inthe context of worldwide scenario of security of systems and malware attacks. Int Conf Recent Innov Eng Manag 2:177–184

    Google Scholar 

  108. Siddiqui ST, Alam S, Ahmad R, Shuaib M (2020) Security threats, attacks, and possible countermeasures in internet of things. In: Advances in data and information sciences, pages 35–46. Springer

  109. Silva I, Leandro R, Macedo D, Luiz AG (2013) A dependability evaluation tool for the internet of things. Comput Electr Eng 39(7):2005–2018

  110. Sivaraman V, Gharakheili HH, Vishwanath A, Boreli R, Mehani O (2015) Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pages 163–167. IEEE

  111. Sonar K, Upadhyay H (2014) A survey: Ddos attack on internet of things. Int J Eng Res Dev 10(11):58–63

  112. Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering, Vol. 3, pages 648–651. IEEE

  113. Swamy SN, Jadhav D, Kulkarni N (2017) Security threats in the application layer in IoT applications. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pages 477–480. IEEE

  114. Tang X, Ren P, Han Z (2018) Jamming mitigation via hierarchical security game for IoT communications. IEEE Access 6:5766–5779

  115. Thangavel C, Sudhaman P (2017) Security challenges in the IoT paradigm for enterprise information systems. In: Connected environments for the internet of things, pages 3–17. Springer

  116. Varga P, Plosz S, Soos G, Hegedus C (2017) Security threats and issues in automation IoT. In: 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), pages 1–6. IEEE

  117. Vashi S, Ram J, Modi J, Verma S, Prakash C (2017) Internet of things (IoT): a vision, architectural elements, and security issues. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pages 492–496. IEEE

  118. Venkata Abhishek N, Tandon A, Lim TJ, Sikdar B (2018) Detecting forwarding misbehavior in clustered iot networks. In: Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, pages 1–6

  119. Vimal Jerald A, Rabara SA, Bai TDP (2015) Internet of things (IoT) based smart environment integrating various business applications. Int J Comput Appl 128(8):32–37

    Google Scholar 

  120. von Tschirschnitz M, Peuckert L, Franzen F, Grossklags J (2020) Method confusion attack on bluetooth pairing. Under submission

  121. Vuppala S, Alie El-Din M, Kuenzi A (2019) Moving target defense mechanism for side-channel attacks. IEEE Syst J 14(2):1810–1819

  122. Wallrabenstein JR (2016) Practical and secure IoT device authentication using physical unclonable functions. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pages 99–106. IEEE

  123. Wang P, Chaudhry S, Li L, Li S, Tryfonas T, Li H (2016) The internet of things: a security point of view. Internet Res

  124. Wang Z (2019) Identity-based verifiable aggregator oblivious encryption and its applications in smart grids. IEEE Trans Sustain Comput

  125. Wei D, Qiu X (2018) Status-based detection of malicious code in internet of things (IoT) devices. In: 2018 IEEE Conference on Communications and Network Security (CNS), pages 1–7. IEEE

  126. Werbach K, Mehta A (2014) The spectrum opportunity: sharing as the solution to the wireless crunch. Int J Commun 8:22

  127. Werner M, Unterluggauer T, Schaffenrath D, Mangard S (2018) Sponge-based control-flow protection for IoT devices. In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pages 214–226. IEEE

  128. Whittaker C, Ryner B, Nazif M (2010) Large-scale automatic classification of phishing pages

  129. Winter T, Thubert P, Brandt A, Hui JW, Kelsey R, Levis P, Pister K, Struik R, Vasseur J-P, Alexander RK, et al (2012) Rpl: Ipv6 routing protocol for low-power and lossy networks. rfc, 6550:1–157

  130. Wu M, Lu T-J, Ling F-Y, Sun J, Du H-Y (2010) Research on the architecture of internet of things. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), Vol 5, pages V5–484. IEEE

  131. Xiang G, Hong J, Rose CP, Cranor L (2011) Cantina+ a feature-rich machine learning framework for detecting phishing web sites. ACM Trans Inform Syst Secur (TISSEC) 14(2):1–28

  132. Xiaohui X (2013) Study on security problems and key technologies of the internet of things. In: 2013 International Conference on Computational and Information Sciences, pages 407–410. IEEE

  133. Yoon S, Park H, Yoo HS (2015) Security issues on smarthome in IoT environment. In: Computer science and its applications, pages 691–696. Springer

  134. Zarpelão BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Network Comput Appl84:25–37

  135. Zeng X, Martinez T (2003) A noise filtering method using neural networks. In: IEEE International Workshop on Soft Computing Techniques in Instrumentation, Measurement and Related Applications, 2003. SCIMA 2003 pages 26–31. IEEE

  136. Zhang T, Antunes H, Aggarwal S (2014) Defending connected vehicles against malware: Challenges and a solution framework. IEEE Internet Things J 1(1):10–21

  137. Zhao W, Yang S, Luo X (2020) On threat analysis of IoT-based systems: a survey. In: 2020 IEEE International Conference on Smart Internet of Things (SmartIoT), pages 205–212. IEEE

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Rashid Amin or Muhammad Bilal.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Touqeer, H., Zaman, S., Amin, R. et al. Smart home security: challenges, issues and solutions at different IoT layers. J Supercomput 77, 14053–14089 (2021). https://doi.org/10.1007/s11227-021-03825-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-021-03825-1

Keywords

Navigation