Assessment of Smart Home: Security and Privacy
Assessment of Smart Home: Security and Privacy
Abstract
Home automation is now extremely common in Internet of things services and devices with a range of
assurances to improve health, lifestyle, and customer wellbeing. In terms of its success and apparent
utility for humans, intelligent homes possess various safety concerns resulting from the diversified,
vast-range, and nuanced nature of IoT. Previous studies have talked about security and privacy
issues. However, we observe that they have not addressed the risk assessment of each smart home
component and corresponding security objective along with additional factors that affect a smart
home security posture. In this study, we have proposed a framework defining a standard level of
security and then analyzing each component concerning it. There are so many vulnerabilities, but all
cannot be assessed due to the heterogeneity of devices and their connection in a small network. IoT
can support a wide range of technologies and programs in various domains, including smart cities
and smart houses. For monitoring, data exchange, and other operations in the given service, IoT
smart objects communicate with other elements such as proxies, mobile devices, and data collectors.
While such components help solve various social issues and provide consumers with modern
advanced services, their restricted computing capacities render them vulnerable to well-known
protection and privacy risks.
Key-words: IoT, Security, Smart Home System, Home Automation, Data Exchange.
1. Introduction
Smart home technology also referred to as home automation, provides house owners with
safe, affordability, power conservation, and comfort while encouraging them to monitor homes,
usually through a mobile application. In reality, a smart home is a system that provides a mobile
application to track it from your smartphone or laptop. It can monitor home appliances such as lights,
2. Conceptual Model
A smart home environment and its major components are discussed in this section. These
layers communicate with each other through signals to carry out operations. The conceptual model
reference is taken from [12].
Smart Home Systems, shown in Figure 1, are usually hardware modules composed of
cameras, smart objects, gateways, and sensors. The separate one component categories are:
Smart Home Systems are usually hardware modules composed of cameras, smart objects,
gateways, and sensors. The separate one component categories are:
Sensors: - Tests the electrical characteristics of the atmosphere or the actual object. They may
vary from movable like wristbands to immovable, for example, CCTV.
Actuators: - They perform acts like clicking ON/Off, dimming lights, closing gates, warnings,
etc.
Gateway: This is a home access point that usually helps owners or other individuals remotely
track, operate, and handle home electrical appliances and even detectors. It serves as an integration
node to transmit test value with an outside system, like the service providers.
Smart devices:- are networks made up of sensors and/or actuators. They are linked with the
smart home web. Examples here involve automated devices like a smart speaker that reacts to the
buzzer's sound and delivers access control based on real-time [13].
• Communication
Classic smart, wired home uses several protocol connectivity solutions. They range from
wired to wireless communication protocols. Sensors typically connect using home security protocols,
such as Zigbee, Z-Wave, and WPA2, and networking procedures that include Bluetooth, IEEE
802.15.4/.11ah, Wi-Fi, low-WPAN, also option of mobile technologies. GPS and RFID are also used
for tracking purposes.
Smart Hub
Wiring (if applicable)
• Services
Services are mobile programs deployed in the cloud or in the home setting responsible for
scheduling system services that are mobile programs deployed in the cloud or the home setting
responsible for scheduling, system control, decision-making, etc. Usually, households run these
applications over their smartphones or tablets to communicate with the computer locally or remotely
[14].
Smart Apps
Web access
The core objective behind conducting research is to give an overview of the privacy and
security issues in the IoT-based Smart home system. Due to vulnerabilities of the existing smart home
systems and the multiple attacks on these systems, we have challenged security [15]. Therefore, the
security of these systems is an important issue that requires analysis. The major emphasis is on
highlighting the security vulnerability and risks distributed among major portions, like human-related,
network, hardware, software, and information. It is accompanied by finding out the most and least
vulnerable components installed within the house setting based on types of attack, likelihood, and risk
score [16]. Also, keeping into consideration internal and external factors, The research would be
useful for manufacturers of home automation devices, components, and reviewers and to develop a
more secured smart system based on the risk assessment carried out. From the end-user and provider
perspective, it will be useful as they know what factors affect smart home security and make them
aware and, in turn, increase overall security posture [17].
4. Literature Review
Research attempts have been made to analyze vulnerabilities in IoT products in a smart home
setting, where security issues are addressed and attack classifications are identified. Homes are the
areas where secrecy is supposed to be preserved. IoT (Internet of things) has emerged as a reliable
technology to enhance the lives in today’s digital homes by offering a variety of automated,
interactive, and convenient services. However, maintaining safety and adequate protection for these
necessary IOT offered services are key problems within a smart home setting [18]. A study by Bugeja
et al. also speaks similarly that IoT services and devices are becoming widely attractive among smart
homes, including many attempts to raise the standard of living of individuals. However, the stratified,
complex, and web-related complexity for such space raises additional issues since personal
information is obtainable, often without the knowledge of the householder. However, the privacy and
protection need of vital technical infrastructure plus any important commercial activities turn out to
be somewhat distinct from the demands of the domestic Smart Home community, observed Lin &
Bergmann [19]. Another study states that homes are especially vulnerable to malware and data
breaches at the highest degree of smartness. So, paradoxically, the better digital a house becomes, the
more defenseless you get to be. Recent technology professionals speak on how only basic appliances,
e.g., coffee machines, can also be an intruder's gateway to the whole house, which provides
5. Research Methodology
The research question identified for this paper is an addition to the existing research. It adds to
more knowledge about the associated security issues related to a smart home.
Q1. Are the current smart home environment security problems and privacy issues well
addressed?
Q2. Do the smart home system components meet or fulfill the proposed security standards?
Systematic Literature Review has been carried out in conjunction with current exploration to
address research questions. The intention is to start by phases of the organizing, implementation, and
documentation of the evaluation to support the execution of the literature review.
Key findings have been outlined by entering tags for a particular journal or web search
service. Relevant keywords are chosen along with conditional 'and' and 'or' operators to help find
better results. So, the threads in the sample were:
Studies to be included in this SLR report empirical findings and could be papers on Smart
home security, privacy and security issues of IoT-based smart home, challenges implementing smart
home. The inclusion criteria were: English Paper, Paper having relevant information related to
smart home, smart home cybersecurity. The exclusion criteria were: Non-English paper, a paper
that is unclear and duplicate, paper related to the connection between a smart home and a smart city.
The original searches for the selected keyword for the topic identified 90 articles, conference
papers, and chapters. Upon elimination of redundant findings, this was limited to 70. From remaining,
the articles left to be read upon applying inclusion/exclusion criteria were 50 with the review, a risk
assessment/analysis is also going to be carried out that will contain Risk, Vulnerability, Threat vector,
Impact, risk score under which security requirement (Confidentiality, Integrity, Availability,
Authenticity, Authorization) the risk identified will fall in the defined security requirements needed
for the securing functioning of a smart home are used later during risk assessment part so that we can
group which risks impact which requirement.
The smart home concept is modeled on convenience by connectivity and the automation of
efficiency processes. When homeowners choose the idea of clever home, they must also be aware of
the threats posed by the clever home as cybercriminals trawl the Internet and build hacks directed at a
clever property. In response, the desired intelligent homeowner must take a security measure. Smart
home protection will begin with understanding and take the appropriate measures to protect your
home network’s integrity.
Potential security risks include eavesdropping, Distributed Denial of Service (DDoS) attack,
data spill, etc. Home automation is also under threat of unauthorized access.
Table 2 - A Risk Assessment Matrix Describing Component Vulnerabilities/Threat Vector Together with their Likelihood,
Potential Risk, Risk Score, Security Objective, and Impact
Table 3 - Internal and External Factors Affecting Security Posture of Smart Home System
Internal factors External factors
Constrained System resources Lack of dedicated professionals
Failure of home devices Moderate intake of quality standards
Power and internet malfunction Time analysis
External Factors
The serious challenges in a smart world are mainly security and privacy. Smart
computers/devices are quite vulnerable to attacks, resulting in data loss and identity breaches.
8. Conclusion
The topic of cybersecurity is much more closely related to the Smart Home Environment than
is commonly assumed. People have been producing a large volume of personal data due to the
increased use of smart devices, posing a significant privacy danger, particularly as this data is stored
in small smart devices that are more vulnerable to privacy, mostly achieved without the user's
understanding. Third parties gather and store any of this data, and in some situations, this is achieved
without the user's permission. It is also crucial to consider the data after it has been obtained from the
end-user. The result would remain the same if the data were stolen from an unreliable machine or
When we transition into the next generation, more and more devices will continue to connect.
For future scope in smart home security, we should seek to view the local network as a whole and
create a framework that can quickly detect the intruder and his actions during the attack. This paper
presents opportunities for potential research work in this area. There is also the scope of examination
of security of components with other devices, such as remote access from a far location and social
impact of smart home security. Artificial intelligence can greatly improve smart home security and
also blockchain.
References
Abdur, M., Habib, S., Ali, M., & Ullah, S. (2017). Security Issues in the Internet of Things (IoT): A
Comprehensive Study. International Journal of Advanced Computer Science and Applications, 8(6).
Alam, T., A. Salem, A., O. Alsharif, A., & M. Alhejaili, A. (2020). Smart home automation towards
the development of smart cities. Computer Science and Information Technologies, 1(1), 17–25.
https://doi.org/10.11591/csit.v1i1.p17-25
Ali, B., & Awad, A. I. (2018). Cyber and physical security vulnerability assessment for IoT-based
smart homes. Sensors (Switzerland), 18(3), 1–17.
Almusaylim, Z. A., & Zaman, N. (2019). A review on smart home present state and challenges:
linked to context-awareness Internet of things (IoT). Wireless Networks, 25(6), 3193–3204.
Anthi, E., Williams, L., Slowinska, M., Theodorakopoulos, G., & Burnap, P. (2019). A Supervised
Intrusion Detection System for Smart Home IoT Devices. IEEE Internet of Things Journal, 6(5),
9042–9053.
Banham, R. (2017). Cyber Scorekeepers. Rmmagazine.
http://www.rmmagazine.com/2017/11/01/cyber-scorekeepers/
Batalla, J. M., Vasilakos, A., & Gajewski, M. (2017). Secure Smart Homes: Opportunities and
challenges. ACM Computing Surveys, 50(5).
Bugeja, J., Jacobsson, A., & Davidsson, P. (2016). On Privacy and Security in Smart Homes. 2016
European Intelligence and Security Informatics Conference (EISIC), 172–175.