A Smart Home System based on Internet of Things
- URL: http://arxiv.org/abs/2009.05328v1
- Date: Fri, 11 Sep 2020 10:34:48 GMT
- Title: A Smart Home System based on Internet of Things
- Authors: Rihab Fahd Al-Mutawa, Fathy Albouraey Eassa
- Abstract summary: Authorization and authentication are challenging IoT security operations.
This paper applies an extra layer of security of multi-factor authentication to act as a prevention method for mitigating unauthorized access.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The Internet of Things (IoT) describes a network infrastructure of
identifiable things that share data through the Internet. A smart home is one
of the applications for the Internet of Things. In a smart home, household
appliances could be monitored and controlled remotely. This raises a demand for
reliable security solutions for IoT systems. Authorization and authentication
are challenging IoT security operations that need to be considered. For
instance, unauthorized access, such as cyber-attacks, to a smart home system
could cause danger by controlling sensors and actuators, opening the doors for
a thief. This paper applies an extra layer of security of multi-factor
authentication to act as a prevention method for mitigating unauthorized
access. One of those factors is face recognition, as it has recently become
popular due to its non-invasive biometric techniques, which is easy to use with
cameras attached to most trending computers and smartphones. In this paper, the
gaps in existing IoT smart home systems have been analyzed, and we have
suggested improvements for overcoming them by including necessary system
modules and enhancing user registration and log-in authentication. We propose
software architecture for implementing such a system. To the best of our
knowledge, the existing IoT smart home management research does not support
face recognition and liveness detection within the authentication operation of
their suggested software architectures.
Related papers
- Secure Ownership Management and Transfer of Consumer Internet of Things Devices with Self-sovereign Identity [1.6872118668817362]
The popularity of the Internet of Things (IoT) has driven its usage in our homes and industries over the past 10-12 years.
There have been some major issues related to identity management and ownership transfer involving IoT devices.
This article presents a Self-sovereign Identity (SSI) based system that facilitates a secure and user-centric ownership management and transfer of consumer IoT devices.
arXiv Detail & Related papers (2024-08-30T10:35:09Z) - Secure Supervised Learning-Based Smart Home Authentication Framework [0.7607700105031543]
A secure authentication protocol needs to be established between the smart devices and the user.
Most of the existing smart home authentication protocols were identified to fail in facilitating a secure mutual authentication.
SSL-SHAF is proposed as are liable mutual authentication that can be contextually imposed for better security.
arXiv Detail & Related papers (2024-02-01T13:01:47Z) - Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-based Federated Learning [52.6706505729803]
We introduce Federated Learning (FL) to collaboratively train a decentralized shared model of Intrusion Detection Systems (IDS)
FLEKD enables a more flexible aggregation method than conventional model fusion techniques.
Experiment results show that the proposed approach outperforms local training and traditional FL in terms of both speed and performance.
arXiv Detail & Related papers (2024-01-22T14:16:37Z) - Classification of cyber attacks on IoT and ubiquitous computing devices [49.1574468325115]
This paper provides a classification of IoT malware.
Major targets and used exploits for attacks are identified and referred to the specific malware.
The majority of current IoT attacks continue to be of comparably low effort and level of sophistication and could be mitigated by existing technical measures.
arXiv Detail & Related papers (2023-12-01T16:10:43Z) - Navigating the IoT landscape: Unraveling forensics, security issues, applications, research challenges, and future [6.422895251217666]
This paper reviews forensic and security issues associated with IoT in different fields.
Most IoT devices are vulnerable to attacks due to a lack of standardized security measures.
To fulfil the security-conscious needs of consumers, IoT can be used to develop a smart home system.
arXiv Detail & Related papers (2023-09-06T04:41:48Z) - When Authentication Is Not Enough: On the Security of Behavioral-Based Driver Authentication Systems [53.2306792009435]
We develop two lightweight driver authentication systems based on Random Forest and Recurrent Neural Network architectures.
We are the first to propose attacks against these systems by developing two novel evasion attacks, SMARTCAN and GANCAN.
Through our contributions, we aid practitioners in safely adopting these systems, help reduce car thefts, and enhance driver security.
arXiv Detail & Related papers (2023-06-09T14:33:26Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Smart Home, security concerns of IoT [91.3755431537592]
The IoT (Internet of Things) has become widely popular in the domestic environments.
People are renewing their homes into smart homes; however, the privacy concerns of owning many Internet connected devices with always-on environmental sensors remain insufficiently addressed.
Default and weak passwords, cheap materials and hardware, and unencrypted communication are identified as the principal threats and vulnerabilities of IoT devices.
arXiv Detail & Related papers (2020-07-06T10:36:11Z) - IoT Device Identification Using Deep Learning [43.0717346071013]
The growing use of IoT devices in organizations has increased the number of attack vectors available to attackers.
The widely adopted bring your own device (BYOD) policy which allows an employee to bring any IoT device into the workplace and attach it to an organization's network also increases the risk of attacks.
In this study, we applied deep learning on network traffic to automatically identify IoT devices connected to the network.
arXiv Detail & Related papers (2020-02-25T12:24:49Z) - Internet of Things Security, Device Authentication and Access Control: A Review [1.6502857150914574]
The Internet of Things (IoT) is one of the emerging technologies that has grabbed the attention of researchers from academia and industry.
In near future IoT is expected to be seamlessly integrated into our environment and human will be wholly dependent on this technology for comfort and easy life style.
Security and privacy of this technology is foremost important issue to resolve.
arXiv Detail & Related papers (2019-01-09T02:01:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.