Fig 1 - uploaded by Bhabendu Kumar Mohanta
Content may be subject to copyright.
System Model of a smart home

System Model of a smart home

Source publication
Conference Paper
Full-text available
The Internet of Things (loT) is advantageous in many areas such as people, society, and industries as it interconnects a different kind of devices and information entities hence it originates a huge number of value-added services. Typically, IoT environments are comprised of many diversified devices but with limited resource. To establish an end-to...

Contexts in source publication

Context 1
... a combination of various home automation system, that can be controlled by a remote user (through Mobile phones, Tablets and Laptops etc.). As shown in the Fig 1, we consider a smart home consists of many heterogeneous devices and sensors interconnected via Zigbee or Wi-Fi in various rooms (Kitchen, Hall etc)connected to a common home server gateway which is again connected to the cloud server via the Internet. In the below figure the IoT sensors are connected to Raspberry Pi devices via WiFi, Raspberry Pi is collecting the data and storing it on cloud though Internet connection. ...
Context 2
... us consider an attack scenario in a smart home as shown in the Fig. 1., where the Home server is connected to many raspberry pis which collect data from various sensors present in the room via Wi-Fi or ZigBee. The Home Server send that information to the cloud server via the internet. The mobile phone access home server through the internet and monitor the smart rooms. Basically, for a smart home, there ...

Citations

... Currently, almost all data is transferred across computer networks, rendering it vulnerable to various forms of assaults. In order to safeguard data integrity and protect it from numerous threats, data must be encrypted before being delivered or stored [1]. At this moment, steganography comes into play and is essential for safeguarding the data. ...
... The smart refrigerator is able to place order to retail, fruits, vegetables shops which are registered and also send notification to the owner or user.IoT smart things make the living standard more comfortable. Paper [18] explains smart home system designed by author which is based on IoT technology. The traditional home system can be converted into smart home system using IoT and fog computing where home monitoring take place remotely and processing instantly. ...
Article
Full-text available
As we know IOT is the technology which is most frequently used in number of areas and application since last 10 to 12 years. Using IOT many smart things are communicated via wired and wireless medium and also process, compute and monitor various scenarios in real time. These smart things are different in nature and also having low storage, low power and low processing speed. There are many securities and privacy issues found in traditional system, the existing protocols used in traditional system was not up to mark for IOT. In this review paper, firstly the author explained brief about IOT and its applications. The main security problem ARC (Availability, Reliability and confidentially) and layer-wise problem also identified. After that authors study two main technology ML and block chain for finding privacy issue in Internet of Things. In the last section of this review paper the security problems are rectified and solved by machine learning and block chain and research challenges also mention.
... The results exhibited that the developed model was efficient for saving the band width and communication energy and alleviated computing and communicating costs of sensor nodes consisted of limited resources. Vidya Rao, et.al (2020) projected a hybrid authentication and data integrity technique in which digital signature and encryption method was deployed based on ECC (elliptic curve cryptography) [15]. Raspberry Pi-3 was utilized to conduct the experimentation. ...
Article
Full-text available
IoT applications such as smart homes can monitor and control users' household chores anytime and anywhere. Similarly, Body Area Networks (BANs) can monitor the physical condition of a patient via various wearable sensors. Several authentication protocols have been proposed for embedded devices based on hash chains, symmetric cryptography, or PKC (public-key cryptography). Nevertheless, approaches based on hash chains and symmetric cryptography require storing large amounts of data regarding user identities and equivalent symmetric ECC keys with an increase in the number of devices. More seriously, updating a user's key and establishing a session key in such a protocol is a complex task. The various key authentication protocol for internet of things are reviewed in this paper. The major techniques which are already been proposed are focused on the complexity of the authentication model.
... The main entry points for both these attacks are the EV, the EV driver (e.g. the credentials of his credit card, the access account for the reservation/billing application), and the CS [24], [39], [62]. The masquerading attacks are mostly used to disrupt and to affect the integrity of the charging service, while the impersonation attacks are used by the malicious party so that the service's control will be taken over and the service's availability will be disrupted [143]. ...
Preprint
Full-text available
The increased use of smart Electric Vehicles (EVs) and Plug-in Electric Vehicles (PEV) opened a new area of research and development. The number of EV charging sites has considerably increased in residential as well as in public areas. Within these EV charging sites, various entities need to communicate in a secure and efficient way. The Open Charge Point Protocol (OCPP) offers a way to coordinate this communication and is already being used in many implementations. However, only the latest OCPP 2.0 version of the protocol includes certain security features. In this article, we present the entities that take part in an OCPP-based smart charging scenario, we identify security issues and threats and present solutions that have been proposed by scholars.We identify open security issues for OCPP and propose future research directions for the security enhancement of the protocol.
... In our approach, we extract temporal context and environmental context from system log, aggregate (embed) these hybrid contexts, and construct a learning-based classifier to identify the abnormal events Vulnerable smart devices may be controlled by an attacker remotely to launch abnormal events or distort device states [9]. The related attacks include network penetration, firmware backdoor exploitation [16], replay attacks [17,18], and man-in-the-middle attacks [19,20] In addition to devices, smart applications (apps for short) also contribute to system vulnerabilities. Without the knowledge of users' environment settings and behavioral patterns [21], it is challenging for smart apps to precisely define a condition, such as "at home," because the hardware/software settings and user behavioral patterns (e.g., wake-up time, bedtime, and time to take a shower) vary in homes. ...
Article
Full-text available
As a typical application of Internet of Things (IoT), home automation systems, namely, smart homes, provide a more convenient and intelligent life experience through event recognition, automation control, and remote device access. However, smart home systems have also given rise to new complications for security issues. As an event-driven IoT system, smart home environments are vulnerable to security attacks, and vulnerable devices are far-spread due to the quick development cycles. Attack vectors to smart homes inevitably manifest in abnormal event contexts. In this paper, we propose HomeGuardian, a context-based approach to identify abnormal events in smart homes. In our approach, we extract temporal context and environmental context from system logs, aggregate (embed) these hybrid contexts, and construct a learning-based classifier to identify the abnormal events. We develop a testbed to implement and evaluate our approach.
... Existing algorithms or protocols are not appropriate for solving security issues due to resource constraint devices. Therefore, lightweight protocols are required for IoT devices, where Satapathy et al. [3] designed an elliptic curve cryptography (ECC) algorithm and used the small key size for IoT applications. ...
Article
The living standards of human lives in societies are enhanced and move towards sophisticated automation by implementing the Internet of Things (IoT) in their daily life. However, limited storage, power and computational capabilities are presented in IoT devices. Hence, users' data are collected using various devices, and they can be modified and sent to the clouds. People can access the data from anywhere and anytime due to access credentials, and this leads to problems such as an explosion of sensitive information and loss of trust between parties. Privacy and security issues are raised from this explosion of users' personal information over the IoT environment, and this must be addressed. However, researchers focused on this as a major concern for IoT. In this research work, the explanation of data privacy is given, and in order to fulfil its requirements, privacy-preserving techniques are studied. Differential privacy is the most widely used technique to ensure the user's data privacy, which is also discussed in this work. Before uploading any data to cloud storage, it must be encrypted using cryptographic techniques, where the importance of these techniques are also presented in the survey. More data are collected via wearable devices in IoT, and its challenges along with privacy management are given in the study. Finally, the threats and major challenges of privacy with its future directions about IoT based applications' privacy is explained.
... The main entry points for both these attacks are the EV, the EV driver (e.g. the credentials of his credit card, the access account for the reservation/billing application), and the CS [24], [39], [62]. The masquerading attacks are mostly used to disrupt and to affect the integrity of the charging service, while the impersonation attacks are used by the malicious party so that the service's control will be taken over and the service's availability will be disrupted [143]. ...
Article
Full-text available
The increased use of smart Electric Vehicles (EVs) and Plug-in Electric Vehicles (PEV) opened a new area of research and development. The number of EV charging sites has considerably increased in residential as well as in public areas. Within these EV charging sites, various entities need to communicate in a secure and efficient way. The Open Charge Point Protocol (OCPP) offers a way to coordinate this communication and is already being used in many implementations. However, only the latest OCPP 2.0 version of the protocol includes certain security features. In this article, we present the entities that take part in an OCPP-based smart charging scenario, we identify security issues and threats and present solutions that have been proposed by scholars.We identify open security issues for OCPP and propose future research directions for the security enhancement of the protocol.
... In the past few years, many researchers have been proposed symmetric/asymmetric-based AKA schemes for smart homes [23]- [25] to overcome the above-mentioned security flaws. In 2011, Vaidya et al. [26] proposed an ECC-based secure and lightweight AKA scheme for smart home networks. ...
Article
Full-text available
Smart homes are an emerging paradigm of Internet of Things (IoT) in which users can remotely control various home devices via the internet anytime and anywhere. However, smart home environments are vulnerable to security attacks because an attacker can inject, insert, intercept, delete, and modify transmitted messages over an insecure channel. Thus, secure and lightweight authentication protocols are essential to ensure useful services in smart home environments. In 2021, Kaur and Kumar presented a two-factor based user authentication protocol for smart homes using elliptic curve cryptosystems (ECC). Unfortunately, we demonstrate that their scheme cannot resist security attacks such as impersonation and session key disclosure attacks, and also ensure secure user authentication. Moreover, their scheme is not suitable in smart home environments because it utilizes public-key cryptosystems such as ECC. Hence, we design a secure and lightweight three-factor based privacy-preserving authentication scheme for IoT-enabled smart home environments to overcome the security problems of Kaur and Kumar’s protocol. We prove the security of the proposed scheme by using informal and formal security analyses such as the ROR model and AVISPA simulation. In addition, we compare the performance and security features between the proposed scheme and related schemes. The proposed scheme better provides security and efficiency compared with the previous schemes and is more suitable than previous schemes for IoT-enabled smart home environments.
... This research can also be strengthened by incorporating other social capital dimensions such as structural and cognitive in the research framework. To reduce the likelihood of occurrence of common method variance in the research, future researchers should attempt to reproduce the outcomes of the current report, if possible, on after-effects assessed by using other data collection using Internet of Things enable smart devices 73 techniques, building trust management 74 in emerging technology or including different types of samples, to avoid the self-report way of data collection. ...
Article
Full-text available
The present research is inclined to study the relationship between two important forms of “Contract” in employment relations, psychological contract and knowledge contract, and job outcomes, i.e. employee retention and employee satisfaction. For this purpose, the data were collected from 268 employees working in the IT sector from North India. The results suggest the mediating impact of the psychological contract in the relationship between knowledge contract and job outcomes. Besides, this study develops a theoretical model that establishes the relationship between knowledge sharing and knowledge integration that plays a major role in employee satisfaction as well as retention of employees in the organization.
... This has led researchers to consider ECC as a lightweight authentication scheme in many IoT applications [23][24][25]. Currently, it is the security backbone for many applications and systems, such as mobile devices and network protocols [26,27]. Mathematically, the ECC can be defined using the Weierstrass equation as: ...
Article
Full-text available
With the progressive development of a wide range of applications, interconnect things and internet of things (IoT) became an imperative required trend by industries and academicians. IoT became a base infrastructure for remote access or control depending on internet protocol (IP) networks, especially after the COVID-19 pandemic. The huge application domain’s infrastructure, which depends on IoT, requires a trusted connection to guarantee security and privacy while transferring data. This paper proposes a hybrid identity authentication pipeline that integrates three schemes, namely, an elliptic curve cryptography (ECC) scheme is integrated with the Ong, Schnorr, and Shamir (OSS) signature scheme and chaotic maps. The latter satisfies both security and guarantee criteria. The novelty of the proposal is in using chaotic mapping and a cyclic group to deduce a substitution box (S-Box) and a reversible matrix as a portion of the OSS signature equation. The ECC-based security part is an efficient public key cryptography mechanism with less computational cost, which makes it the most convenient to be used in IoT devices for authentication and privacy. The strength of the proposed scheme relies on combining the discrete logarithm problem (DLP) and integer factorization problem (IFP). The proposed approach was simulated using Lab-View and compared with other state-of-the art schemes. Extensive simulation results and analysis of the security and time rendering results confirmed its durability against different types of attacks, such as linear and differential attacks.