0% found this document useful (0 votes)
31 views6 pages

Security Framework of IoT-Based Smart Home

The document discusses security issues related to smart home technology and the Internet of Things. It proposes a framework to improve the security of IoT-based smart homes by addressing vulnerabilities and threats. The framework adds components for threat and vulnerability management and context management, and makes changes to the authorization component of an existing IoT reference architecture.

Uploaded by

N Abderrahim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views6 pages

Security Framework of IoT-Based Smart Home

The document discusses security issues related to smart home technology and the Internet of Things. It proposes a framework to improve the security of IoT-based smart homes by addressing vulnerabilities and threats. The framework adds components for threat and vulnerability management and context management, and makes changes to the authorization component of an existing IoT reference architecture.

Uploaded by

N Abderrahim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

2020 10th International Symposium on Telecommunications (IST'2020)

Security Framework of IoT-Based Smart Home


Shahrouz Sotoudeh Sattar Hashemi Hossein Gharaee Garakani
Information Technology and Communication Department of Computer and Electronic Information Technology and Communication
Research Center University of Shiraz Research Center
Tehran, Iran Shiraz, Iran Tehran, Iran
[email protected] [email protected] [email protected]

Abstract—nowadays, smart home is considered one of the such technology and hence providing various architectures and
rather prominent applications of the Internet of Things, platforms therein.
integrating high-levels of efficiency, home security, energy & cost
saving to everyone’s life. Despite all the benefits this technology Moreover, a large share of interactions between devices is
provides, privacy and security are highly concerning issues that machine-to-machine, i.e. human users are cut short on the
require more considerations. IoT-A reference architecture was interactions and thus have no control over [14]. Owing to the
2020 10th International Symposium on Telecommunications (IST) | 978-1-7281-8012-0/20/$31.00 ©2020 IEEE | DOI: 10.1109/IST50524.2020.9345886

established to evaluate current sources and protocols, ensuring issue of ownership of things and maintaining the privacy of
the compliance of things and protocols, and providing a individuals, paying attention to security details regarding
comprehensive solution for different applications of IoT. This detection, accessibility, access control, privacy and trust
paper was performed to provide a general framework for become more significant in smart objects [15]. Misuse of IoT
improving security at all levels of design, implementation, and technology in the smart home can even jeopardize human lives;
application of equipment and protocols using the IoT-A reference Therefore, security is a crucial issue to consider in
architecture by addressing security challenges in the Internet of implementing IoT technologies, necessitating extensive
Things and smart homes. This paper employs the term Security research on the matter. Guaranteeing the safety of human life,
Framework to refer to a method for applying all technologies, averting the chain of adverse events, the availability of objects,
procedures, software, and other components to provide security encryption and security-related technologies, confidentiality
in smart homes. This paper has been searched for all
and integrity of information, undeniability, compatibility of
vulnerabilities and threats of the reference architecture. In this
information and their security levels in various systems,
paper, a model has been proposed to improve reference
architecture to meet all security requirements. Considering the
authentication of objects and individuals using a set of various
theoretical evaluations performed in this paper, the proposed mechanisms like password, location and biometrics, and
framework, which was created by adding two components of different models for decentralized trust and authentication are
threat and vulnerability management and context management among such needs [16]. However, with the development of
while making some alterations to the authorization component, various Internet-connected home appliances, security and
satisfies an acceptable level of the security requirements of the privacy risks are simultaneously increasing [17]. Five general
smart home and enhances the privacy of the IoT-based smart characteristics of automation, versatility, adaptation,
home. interaction, and productivity must be provided in every smart
home [17]. Connecting to the Internet for delivering better and
Keywords—smart home, IoT, security, privacy, security more intelligent services in smart homes is of paramount
architecture importance today, while the technologies employed in smart
homes may bring about many security-related issues and
I. INTRODUCTION challenges [18]. The issue of security in smart homes is a
The Internet of Things (IoT) has been defined as the ability critical issue that is raised before selecting an apt platform for
of all things to communicate with each other and with humans, implementation, as basically an unsafe platform can provide
being identified and discovered under an integrated network grounds for various attacks such as wiretapping,
with a specific identifier and the ability for anyone, anytime, eavesdropping, Man-in-the-middle (MITM) and replay attack
and anywhere to interact with any object in any place and at [19]. Therefore, one of the most important challenges in
any time [1]. This technology involves various objects and deploying IoT is to offer an architecture that has proper
technologies such as sensors, machine-to-machine devices, security solutions and addresses issues related to the
middleware, big data, cloud computing and fog computing that communication and performance of systems which can ensure
operate on a global network [2-11]. The Internet of Things is the security and privacy of its users. This study seeks to
an evolving and transformational model with extensive interest provide a good framework for enhancing security, privacy and
in several applications, including smart homes, smart building trust for users in smart homes.
environments, and remote health-care [12]. All these fields of
application can employ IoT technology to greatly assist II. SMART HOME SECURITY
humans in improving health, reducing energy consumption, This section has been explained about theoretical
and achieving safety [13]. New environmental conditions and foundations of research on the IoT-based smart home's security
various features of devices, especially intelligent systems in the challenges and threats.
home, have led to a particular focus on security in applying

978-1-7281-8012-0/20/$31.00 ©2020 IEEE


251

Authorized licensed use limited to: Consortium - Algeria (CERIST). Downloaded on April 26,2023 at 20:19:29 UTC from IEEE Xplore. Restrictions apply.
Today, homes are highly automated using intelligent research. The functional model is an abstract-level framework
technologies. They thus can meet the demands of all residents, for understanding the main application groups and their
among which are comfort, security, and privacy, while being interactions in the IoT-A environment, which defines common
sensitive and responsive to the needs of the modern human and notions used in the development of IoT-A compatible
the living environment [20, 21]. The main automation functional perspectives [32].
applications in smart home environments are luminosity
control, heating and air conditioning, monitoring, maintaining The IoT-A functional model includes seven vertical
security and protection, telemedicine, energy consumption capabilities and two horizontal performance groups, namely
levels, control of environmental factors, and access to the management and security. The functional model's security
required information. The introduction of smart homes to the framework has consisted of 5 components that need to be
realm of The Internet of Things is associated with the optimized to improve the level of security in the architecture.
delegation of storage, processing, and data analysis to the Fig. 1 shows the components of the functional model [32].
facilities offered in cyberspace, leading to further security
challenges [22-25].
Security and privacy are major challenges of deploying IoT
in smart homes which security architecture is responsible for
covering the life cycle and IoT capabilities in this field [26,
27]. Various studies have been performed to improve the
overall security of the Internet of Things. Yet, issues such as
appropriate mechanisms for encryption, network protocols,
data and identifier management, user privacy, and reliable
architectures are still debatable [28-30]. According to the
literature on smart home security, privacy, trust, security, and
communication are among the smart homes' major challenges
[25].
Fig. 1. Functional model and components of the security framework of IoT-
Vulnerabilities in the Internet of Things and smart homes A [32].
pose a variety of threats. A number of these threats are
presented in Table 2. To provide a suitable architecture and consider the
comparison and approach of the introduced architectures, it can
Various research centers have provided comprehensive
be concluded that the model and architecture presented in IoT-
solutions called reference architectures to address the
A is far more comprehensive than the other architectures in
challenges in IoT. Wso2 architecture was proposed to provide
terms of purpose, diversity of documents, the scope of the
cloud services, Korean reference architecture was developed to
research group and its geographical area, namely European
embed this technology to the industry, while the Chinese
Union. Moreover, according to the results of previous research,
reference architecture was introduced to standardize this
offered in Table 1, it is evident that compared to other
technology in China [31].
architectures, the IoT-A architecture simultaneously meets the
The IoT-A Reference Architecture was established to two functional needs sought-after in this research [33]. Hence,
examine existing protocols and resources, ensure the considering the comprehensiveness of the IoT-A architecture
compatibility of objects and communication protocols, and and the necessity to meet various functional requirements, it is
provide a comprehensive solution for IoT's various applications employed as the reference architecture in this paper.
in the European Union. It has consisted of several sub-models,
among which the functional model is employed for this
TABLE I. APPLICATION REQUIREMENTS OF REFERENCE ARCHITECTURES [33]
Architecture IoT-A WSO2 Korean Chinese
ARM ARM ARM

Application support Reliable and secure services √ - - √


requirements connected to the human body
Functional need

Security and privacy Security audit √ √ - -


requirements

improving the overall security situation have become a priority.


So, the smart home's security needs were studied and
III. SECURITY REQUIREMENTS OF THE SMART HOME identified, the results of which are presented in Table 2.
The threats and vulnerabilities and mapping them into Applying or improving the performance of security
architectural components and recognizing the needs for mechanisms in each of these components leads to the smart

252

Authorized licensed use limited to: Consortium - Algeria (CERIST). Downloaded on April 26,2023 at 20:19:29 UTC from IEEE Xplore. Restrictions apply.
home's overall improvement. Hence, this article's main purpose The context management is responsible for identifying and
was to provide solutions for satisfying the security requirement preserving information continuously generated and exchanged
mentioned in the security component of the reference by and between users and devices. This information may
architecture. include the properties of objects, services, and entities in the
work area. The proposed mechanism is designed to identify
TABLE II. SECURITY REQUIREMENTS OF THE SMART HOME
and record existing smart objects and services using the
Requirement References discovery service and a set of repositories in the directory
Authentication [34] level. Following discovery, the information is recorded in the
Identity management [35] source directory and stored in the warehouse. These services
Privacy [34, 35]
Availability [34, 35]
are distributed and connected to their main centers in the
Resistance [34-36] service provider and transfer each directory's information to
Information security [34] the central system according to privilege and necessity. This
Access control [34] method readily offers the capability to integrate intelligent
Authorization [34] objects under different technologies and protocols [34]. Also,
Trust [35]
this component will provide up-to-date information for other
IV. THE PROPOSED SOLUTION FOR IMPROVING SECURITY security components. The interaction of this component with
other components is shown in Fig. 2.
The IoT-A ARM's functional model provides a set of
components with a certain degree of abstraction as a security
framework. The model mentioned above allows developers to
have access to various approaches to implementation
depending on the application. As a result, this study seeks to
complement the above abstract model such that the security of
smart home applications is enhanced based on the mentioned
security requirements. To this end, the context management
component was embedded in other existing security
components to collect, update, and adequately managing
information about existing objects while providing accurate
and up-to-date information. Furthermore, the component of
vulnerabilities and threat management was integrated into the 5
components of the architectural security framework for
maximum monitoring, detection, and handling of threats and Fig. 2. Components of the proposed framework.
vulnerabilities. The Authorization component has been altered
to provide access to smart home information resources with Implementing policies for controlling access requires a
maximum compliance with the privacy and security of comprehensive yet scalable decision-making mechanism,
residents, thus leading to safer grounds for other applications, which should have features such as the ability to perform
including remote health, to access the smart home. The various assessments, facilitate the management of the systems,
components of the proposed framework are compared with and background support of requirements. It should also
those of the standard IoT-A framework in Table 3. expand and decide on access control as a partnership in
several nodes in a so-called distributed manner. The method of
TABLE III. COMPARISON OF THE COMPONENTS OF THE PROPOSED distributed Authorization under the proposed security
FRAMEWORK WITH THE COMPONENTS OF IOT-A REFERENCE ARCHITECTURE
TRAFFIC PROFILES WITH PERCENTAGES IN CATEGORY I framework was devised, having in mind the interaction of the
smart home with other areas of the Internet of Things. The
Current components Proposed components
Authentication Authentication
combination of the authentication process and access
Identity management Identity management permissions can be seen in Fig. 3.
Authorization Distributed Authorization
Key exchange and management Key exchange and management
Trust and credibility Trust and credibility
Vulnerability and threat management
Context management

As shown in Table 3, two components, namely


vulnerability and threat management and context management
are added to the reference framework. At the same time,
alterations have been made to the Authorization method,
which is explained below.

253

Authorized licensed use limited to: Consortium - Algeria (CERIST). Downloaded on April 26,2023 at 20:19:29 UTC from IEEE Xplore. Restrictions apply.
Vulnerability and threat management, which somehow
plays the role of a security operation center for the smart
home, was proposed for centralized management to monitor,
detect vulnerabilities and deal with threats. It has consisted of
monitoring, data collection, analysis and response services
[35]. To function properly, and to collect new and reliable
information from the objects and services available in the
smart home, it needs to be linked to context management.
After analyzing the security information, the appropriate
diagnosis and response to the potential threat are made. It is
also used to fix and address vulnerabilities in objects. Due to
the high costs of designing, implementing and maintaining, it
is recommended to be deployed as a cloud service provider
and IoT service provider. Fig4

Fig. 4. Vulnerability & threat management.

V. ANALYSIS OF THE PROPOSED SOLUTION


In this paper, the security requirements as well as needs of
IoT-based smart homes were outlined. In the functional model
of IoT-A architecture, a general security framework with a
certain degree of abstraction was considered to establish
security. Moreover, a novel framework was proposed for
improving security in the field of smart home applications as a
Fig. 3. Distributed mechanisms of evaluation and Authorization between the
new solution along with making alterations to the
smart home and smart health. aforementioned security model. These changes included the
addition of two components of context management and
Based on the above figure, the requester sends the access vulnerabilities and threats management and the application of
request to the policy enforcement point (PEP). The PEP sends assessment and Authorization in a distributed manner. The
a request for information to the context handler (CH). Since purpose of the new framework was to maximize the security
the decision-making function is in another area, i.e., the smart needs of the smart home. The results are presented
home, the context handler sends a request to the context theoretically and from the integration of successful solutions
management (CM) to complete information on the requested of previous researches with a degree of abstraction. Therefore,
resource attribute. It also sends a message to the distributed analysis and comparison methods are used to evaluate the
decision point (DPDP) to make the appropriate decision. The proposed theoretical model.
CM requests information from its counterpoint, the context
In the following section, each of the proposed components
management of the smart home. The DPDP also requests a
is analyzed based on its functions and security purpose. Table
decision from its counterpart in the smart home. The context
4 shows the functions of the component and the intended
handler in the smart home is responsible for receiving all the
security objectives provided by each component.
requests.
In the following, the proposed model is compared with
The policy administration point (PAP) provides policies existing solutions.
and policy sets to the policy decision point (PDP). Based on
existing policies and the characteristics of the requested The framework provided in the IoT-A reference
resource, the PDP sends the necessary conclusion response to architecture has five standard components for providing the
the CH, which in turn submits the decisions to the DPDP. security of the components. These components are designed
Also, it provides the requested features to the CM. The CH and implemented according to the needs of the security
delivers the information sent from the smart home to the PEP, standard. Table 5 compares the security objectives met by the
where the requirements are reviewed and, if approved, grants two basic security architectural frameworks and the proposed
access to the resource, otherwise it denies access. framework.

254

Authorized licensed use limited to: Consortium - Algeria (CERIST). Downloaded on April 26,2023 at 20:19:29 UTC from IEEE Xplore. Restrictions apply.
TABLE IV. COMPONENTS OF THE PROPOSED SOLUTION ALONG WITH Application security - 
FUNCTIONS AND SECURITY PURPOSE Trust and Service credit  
Proposed The function of the Intended security credibility Service trust  
component component objectives Privacy  
Management of identities, Context Freshness and accuracy - 
Identity User privacy management of information
aliases, and relevant access
management Service privacy Confidentiality of - 
policies
Authentication information in the scope
Authentication Authentication of entities of application
Responsibility
Availability of - 
Service access control information
Controlling access to
Data privacy
Authorization services
Data integrity VI. CONCLUSIONS AND SUGGESTIONS
Controlling access over Service privacy
infrastructure control Service availability The purpose of this paper was to provide a security
Confidentiality of framework by modifying and adding the necessary
communications components to the existing security framework of the IoT-A
Accuracy of reference architecture for increased security in IoT-based
Key management Managing and exchanging
communication
and exchange encryption keys
non-repudiation smart homes. The addition of context management to the
forward and backward components of the security framework contributes to the
secrecy identification and collection of data from smart resources and
Confidentiality objects, as well as information about smart home
Information integrity
Accuracy of
communication protocols. In the proposed framework, various
Vulnerability and Discovering vulnerabilities alterations have been applied to the method of controlling
information
threat management and threats
Privacy evaluation and Authorization tasks, the anticipated result of
Communication which is the optimal operation of this mechanism in a
security
distributed manner using field management. The component
of vulnerability and threat management is also embedded in
Collecting user credit Service credit
Trust and credibility points and calculating Service trust
the framework, posing as a step towards centralized security
service trust level Privacy management. Based on previous research and comparisons
and evaluations tables in this paper, the proposed model is
theoretically able to meet the security needs of the IoT-A-
Freshness and
Gathering information on accuracy of
based smart home.
Context
objects, resources and information
management The review performed before this research indicate a
services Privacy
Availability significant lack of standard and common architecture for this
technology. Considering the breadth of activities and studies
TABLE V. SECURITY COMPONENTS OF THE ARCHITECURE AND
on proposing novel methods or standardization in this field,
PROPOSED FRAMEWORK [25,32] the implementation of more comprehensive study projects is
highly recommended. The component of identity management
Security Desired security goals Architecture Proposed
component and authentication is implemented in the framework provided
Identity Privacy of users   using the mechanisms proposed by the reference architecture.
management Service Privacy   Owing to the emergence of cloud mechanisms and their ever-
Responsibility   increasing deployment in this field, it is suggested to use cloud
Authorization Service access control   identity management or identity as a service to focus on
Data privacy  
Data accuracy   management and improve security in this field as well as to
Service privacy   reduce costs.
Service availability  
Privacy of the   REFERENCES
functional domain [1] J. Zheng, C. D. S. R. Bisdikian, and H. Mouftah, "The Internet of
Key management Confidentiality of   Things," IEEE Commun. Mag., vol. 49, no. 11, pp. 30-31, 2011.
and exchange communications
Communication   [2] T. Fan, and Y. Chen, “A scheme of data management in the Internet of
integrity Things,” in 2010 2nd IEEE International Conference on Network
Non-repudiation   Infrastructure and Digital Content, IEEE, 2010, pp. 110-114.
Forward and backward   [3] Y. Yu, J. Wang, and G. Zhou, “The exploration in the education of
secrecy professionals in applied internet of things engineering,” in 2010 4th
Vulnerability and Hardening -  International Conference on Distance Learning and Education, IEEE,
threat Confidentiality -  2010, pp. 74-77.
management Information integrity - 
Accuracy of information -  [4] Y. Huang, and G. Li, "Descriptive models for the Internet of Things," in
Privacy -  Intelligent Control and Information Processing (ICICIP), 2010
Communication security -  International Conference on, 2010.

255

Authorized licensed use limited to: Consortium - Algeria (CERIST). Downloaded on April 26,2023 at 20:19:29 UTC from IEEE Xplore. Restrictions apply.
[5] K. Ashton, “That ‘internet of things’ thing,” RFID J., vol. 22, no. 7, pp. [27] G. Gan, Z. Lu, and J. Jiang, “Internet of things security analysis,” in
97-114, 2009. 2011 international conference on internet technology and applications,
IEEE, 2011, pp. 1-4.
[6] G. T. Ferguson, “Have your objects call my objects,” Harv. Bus. Rev.,
vol. 80, no. 6, pp. 138-144, 2002. [28] M. Katagi, and S. Moriai, Lightweight cryptography for the internet of
things, Sony Corporation, 2008, pp. 7-10.
[7] L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,”
Comput. Netw., vol. 54, no. 15, pp. 2787-2805, 2010. [29] S. Babar, A. Stango, N. Prasad, J. Sen, and R. Prasad, "Proposed
embedded security framework for internet of things (IoT)," in 2011 2nd
[8] G. Lawton, “Machine-to-machine technology gears up for growth,” International Conference on Wireless Communication, Vehicular
Computer, vol. 9, pp. 12-15, 2004. Technology, Information Theory and Aerospace & Electronic Systems
[9] A. Gandomi, and M. Haider, “Beyond the hype: Big data concepts, Technology (Wireless VITAE), IEEE, 2011, pp. 1-5.
methods, and analytics,” Int. J. Inf. Manag., vol. 35, no. 2, pp. 137-144, [30] R. Roman, P. Najera, and J. Lopez, “Securing the internet of things,”
2015. Computer, vol. 9, pp. 51-58, 2011.
[10] S. Zhang, S. Zhang, X. Chen, and X. Huo, “Cloud computing research [31] S. Chen, H. Xu, D. Liu, B. Hu, and H. Wang, "A vision of IoT:
and development trend,” in Paper presented at the Future Networks. Applications, challenges, and opportunities with China perspective,"
ICFN'10. Second International Conference on., 2010. IEEE Internet Things J., vol. 1, no. 4, pp. 349-359, 2014.
[11] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. [32] I. FhG, S. H. SAP, E. H. HSG, C. Jardak, A. O. CEA, A. Serbanati, and
Ayyash, “Internet of things: A survey on enabling technologies, J. W. Walewski, Internet of things-architecture iot-a deliverable d1. 3–
protocols, and applications,” IEEE Commun. Surv. Tutor., vol. 17, no. updated reference model for IoT v1. 5, 2012.
4, pp. 2374-2376, 2015.
[33] A. Torkaman, and M. A. Seyyedi, “Analyzing IoT reference architecture
[12] S. Pirbhulal, O.W. Amuel, W. Wu, A.K. Sangaiah, and G. Li, “A joint models,” Int. J. Comput. Sci. Software Engin., vol. 5, no. 8, p. 154,
resource-aware and medical data security framework for wearable 2016.
healthcare systems,” Future Gener Comput Syst., vol. 95, pp. 382-391,
2019. [34] M. M. Hossain, M. Fotouhi, R. Hasan, “Towards an analysis of security
issues, challenges, and open problems in the internet of things,” in 2015
[13] D. Vinodhan, and A. Vinnarasi, “IOT Based Smart Home,” Int. J. Innov. IEEE World Congress on Services, IEEE, 2015, pp. 21-28.
Res. Sci. Eng. Technol., vol. 5, pp. 35-38, 2016.
[35] A. Riahi, E. Natalizio, Y. Challal, N. Mitton, A. Iera, “A systemic and
[14] M. O’Neill, “Insecurity by design: Today’s IoT device security cognitive approach for IoT security,” in 2014 International Conference
problem,” Engin., vol. 21, no. 1, pp. 48-49, 2016. on Computing, Networking and Communications (ICNC), IEEE, 2014,
[15] Q. Jing, A. V. Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the pp. 183-188.
Internet of Things: perspectives and challenges,” Wirel. Netw., vol. 20, [36] C. Lee, L. Zappaterra, K. Choi, H.-A. Choi, “Securing smart home:
no. 8, pp. 2481-2501, 2014. Technologies, security challenges, and security requirements,” in 2014
[16] E. Nimmermark, and A. Larsson, “Comparison of IoT frameworks for IEEE Conference on Communications and Network Security, IEEE,
the smart home,” MSc thesis, Department of Electrical and Information 2014, pp. 67-72.
Technology, Faculty of Engineering, LTH, Lund University, 2016. [37] J. L. Hernández-Ramos, M. V. Moreno, J. B. Bernabé, D. G. Carrillo,
[17] G. Lobaccaro, S. Carlucci, and E. Löfström, “A review of systems and and A. F. Skarmeta, “SAFIR: Secure access framework for IoT-enabled
technologies for smart homes and smart grids,” Energies, vol. 9, no. 5, p. services on smart buildings,” J. Comput. Syst. Sci., vol. 81, no. 8, pp.
348, 2016. 1452-1463, 2015.

[18] H. K. Jonnalagadda, “Secure Communication Scheme in Smart Home [38] N. Miloslavskaya, and A. Tolstoy, “New SIEM System for the Internet
Environment,” MSc thesis, University of South Florida, 2016. of Things,” in In World Conference on Information Systems and
Technologies, Springer, Cham. April., 2019, pp. 317-327.
[19] F. Johari, The security of communication protocols used for Internet of
Things, LU-CS-EX 2015-42, 2015.
[20] F. Kausar, E. Al Eisa, and I. Bakhsh, "Intelligent home monitoring using
RSSI in wireless sensor networks," Int. J. Comput. Net. Communicate.,
vol. 4, no. 6, p. 33, 2012.
[21] S. Marzano, The new every day: Views on ambient intelligence, 010
Publishers., 2003.
[22] A. Saad al-sumaiti, M. H. Ahmed, and M. M. Salama, “Smart home
activities: A literature review,” Electr Pow. Compo. Sys. vol. 42, no. 3-
4, pp. 294-305, 2014.
[23] W. Granzer, W. Kastner, G. Neugschwandtner, and F. Praus, A modular
architecture for building automation systems, na, 2006.
[24] M. A. Al-Qutayri, and J. S. Jeedella, “Integrated wireless technologies
for smart homes applications,” in Smart Home Systems, Intech Open,
2010.
[25] B. L. R. Stojkoska, and K. V. Trivodaliev, "A review of Internet of
Things for the smart home: Challenges and solutions," J. Clean. Prod.,
vol. 140, pp. 1454-1464, 2017.
[26] T. Heer, O. Garcia-Morchon, R. Hummen, S. L. Keoh, S. S. Kumar, and
K. Wehrle, “Security Challenges in the IP-based Internet of Things,”
Wirel. Pers. Commun., vol. 61, no. 3, pp. 527-542, 2011.

256

Authorized licensed use limited to: Consortium - Algeria (CERIST). Downloaded on April 26,2023 at 20:19:29 UTC from IEEE Xplore. Restrictions apply.

You might also like