JIS  Vol.11 No.2 , April 2020
How Secure Having IoT Devices in Our Homes?
Abstract: Nowadays, technology has evolved to be in our daily lives to assist in making our lives easier. We now have technology helping us in our lives at home. Devices used to create our “smart home” have done a great deal in making our lives at home less burdensome, but sadly, these devices have secured our personal lives to be more accessible to outsiders. In this paper, the security of home smart devices and their communication will be researched by using other academic articles to support facts found. The operation of the devices will be discussed along with security risks and future trends on security attacks. The results found will be crucial to knowing exactly how well our own home is protected. After understanding where the risks lie and a demonstration of how hackers can take control of our smart home, solutions will be given to shield ourselves from security attacks. We protect our homes from physical threats by locking doors, but it is time we guard ourselves from cyber threats as well.
Keywords: IoT, Smart Home, Cloud
Cite this paper: Estrada, D. , Tawalbeh, L. and Vinaja, R. (2020) How Secure Having IoT Devices in Our Homes?. Journal of Information Security, 11, 81-91. doi: 10.4236/jis.2020.112005.

[1]   Dey, N., Hassanien, A.E., Bhatt, C., Ashour, A. and Satapathy, S.C. (2018) Internet of Things and Big Data Analytics toward Next-Generation Intelligence.

[2]   Kang, B., et al. (2016) Analysis of Types and Importance of Sensors in Smart Home Services. 2016 IEEE 18th International Conference on High-Performance Computing and Communications, IEEE 14th International Conference on Smart City, and IEEE 2nd International Conference on Data Science and Systems, Sydney, 1388-1389.

[3]   Bugeja, J., Jacobsson, A. and Davidsson, P. (2016) On Privacy and Security Challenges in Smart Connected Homes. 2016 European Intelligence and Security Informatics Conference (EISIC), Uppsala, 172-175.

[4]   Cao, K.J., Xu, L., Abdallah, R. and Shi, W. (2017) EdgeOSH: A Home Operating System for Internet of Everything. 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, 1756-1764.

[5]   Salami, S., Baek, J., Salah, K. and Damiani, E. (2016) Lightweight Encryption for Smart Home. 2016 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, Austria, 382-388.

[6]   Ryoo, J., et al. (2017) IoE Security Threats and You. 2017 International Conference on Software Security and Assurance (ICSSA), Altoona, PA, 13-19.

[7]   Ali, B. and Awad, A.I. (2018) Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes. Sensors, 18, 817.

[8]   Lo’ai, A.T. and Saldamli, G. (2019) Reconsidering Big Data Security and Privacy in Cloud and Mobile Cloud Systems. Journal of King Saud University-Computer and Information Sciences.

[9]   Lo’ai, A.T., Loai, Al-Qassas, R.S., Darwazeh, N.S., Jararweh, Y. and AlDosari, F. (2015) Secure and Efficient Cloud Computing Framework. 2015 International Conference on Cloud and Autonomic Computing, Cambridge, MA, 21-25 September 2015, 291-295.

[10]   S.1691-Internet of Things (IoT) Cybersecurity Improvement Act of 2017, S.1691.

[11]   Bhatt, S., Lo’ai, A.T., Chhetri, P. and Bhatt, P. (2019) Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases. 2019 4th International Conference on Fog and Mobile Edge Computing, Rome, Italy, 10-13 June 2019, 241-246.

[12]   Prospero, M. (2019) Best Smart Home Hubs of 2019.,review-3200.html

[13]   Lo’ai, A.T. and Bakhader, W. (2016) A Mobile Cloud System for Different Useful Applications. 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops, Vienna, Austria, 22-24 August 2016, 295-298.

[14]   Lo’ai, A.T., Jararweh, Y. and Mohammad, A. (2012) An Integrated Radix-4 Modular Divider/Multiplier Hardware Architecture for Cryptographic Applications. International Arab Journal of Information Technology, 9, No. 3.

[15]   Tenca, A.F. and Lo’ai, A.T. (2004) Algorithm for Unified Modular Division in GF (p) and GF (2n) Suitable for Cryptographic Hardware. Electronics Letters, 40, 304-306.

[16]   Adryan, B., Obermaier, D. and Fremantle, P. (2017) The Technical Foundations of IoT. Artech House.

[17]   Mohammad, T. and Eardley, A. (2016) Studying the Energy Consumption in Mobile Devices. Procedia Computer Science, 94, 183-189.