Cybersecurity in Smart Homes

Book description

Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.

Table of contents

  1. Cover
  2. Title Page
  3. Copyright
  4. 1 Home Automation Solutions for SecureWSN
    1. 1.1. Introduction
    2. 1.2. Background
    3. 1.3. Design decisions
    4. 1.4. Implementation
    5. 1.5. Evaluation of HAIFA
    6. 1.6. Summary and conclusions
    7. 1.7. Acknowledgements
    8. 1.8. References
  5. 2 Smart Home Device Security: A Survey of Smart Home Authentication Methods with a Focus on Mutual Authentication and Key Management Practices
    1. 2.1. Introduction
    2. 2.2. Smart home – introduction and technologies
    3. 2.3. Smart home security
    4. 2.4. Smart home authentication mechanisms
    5. 2.5. A primer on mutual authentication and key management terminologies
    6. 2.6. Mutual authentication in smart home systems
    7. 2.7. Challenges and open research issues
    8. 2.8. Conclusion
    9. 2.9. References
  6. 3 SRAM Physically Unclonable Functions for Smart Home IoT Telehealth Environments
    1. 3.1. Introduction
    2. 3.2. Related literature
    3. 3.3. System design considerations
    4. 3.4. Silicon physically unclonable functions(PUF)
    5. 3.5. Convolutional encoding and Viterbi decoding the SRAM words
    6. 3.6. CMOS SRAM PUF construction
    7. 3.7. Algorithms for issuing CRP
    8. 3.8. Security of PUF-based IoT devices
    9. 3.9. Conclusions
    10. 3.10. Acknowledgements
    11. 3.11. References
  7. 4 IoT Network Security in Smart Homes
    1. 4.1. Introduction
    2. 4.2. IoT and smart home security
    3. 4.3. IoT network security
    4. 4.4. Prevailing standards and initiatives
    5. 4.5. Conclusion
    6. 4.6. References
  8. 5 IoT in a New Age of Unified and Zero-Trust Networks and Increased Privacy Protection
    1. 5.1. Introduction
    2. 5.2. Internet of Things
    3. 5.3. IoT security and privacy challenges
    4. 5.4. Literature review
    5. 5.5. Security and privacy protection with a zero-trust approach
    6. 5.6. Case study: secure and private interactive intelligent conversational systems
    7. 5.7. Discussion
    8. 5.8. Conclusion
    9. 5.9. Acknowledgements
    10. 5.10. References
  9. 6 IOT, Deep Learning and Cybersecurity in Smart Homes: A Survey
    1. 6.1. Introduction
    2. 6.2. Problems encountered
    3. 6.3. State of the art
    4. 6.4. IoT architecture
    5. 6.5. IoT security
    6. 6.6. Artificial intelligence, machine learning and deep learning
    7. 6.7. Smart homes
    8. 6.8. Anomaly detection in smart homes
    9. 6.9. Conclusion
    10. 6.10. References
  10. 7 sTiki: A Mutual Authentication Protocol for Constrained Sensor Devices
    1. 7.1. Introduction
    2. 7.2. Definitions and history of IoT
    3. 7.3. IoT-related security concerns
    4. 7.4. Background knowledge for sTiki
    5. 7.5. The sTiki protocol
    6. 7.6. sTiki’s evaluation
    7. 7.7. Summary and conclusions
    8. 7.8. Acknowledgements
    9. 7.9. References
  11. List of Authors
  12. Index
  13. End User License Agreement

Product information

  • Title: Cybersecurity in Smart Homes
  • Author(s): Rida Khatoun
  • Release date: August 2022
  • Publisher(s): Wiley-ISTE
  • ISBN: 9781789450866