Book description
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.
Table of contents
- Cover
- Title Page
- Copyright
- 1 Home Automation Solutions for SecureWSN
-
2 Smart Home Device Security: A Survey of Smart Home Authentication Methods with a Focus on Mutual Authentication and Key Management Practices
- 2.1. Introduction
- 2.2. Smart home – introduction and technologies
- 2.3. Smart home security
- 2.4. Smart home authentication mechanisms
- 2.5. A primer on mutual authentication and key management terminologies
- 2.6. Mutual authentication in smart home systems
- 2.7. Challenges and open research issues
- 2.8. Conclusion
- 2.9. References
-
3 SRAM Physically Unclonable Functions for Smart Home IoT Telehealth Environments
- 3.1. Introduction
- 3.2. Related literature
- 3.3. System design considerations
- 3.4. Silicon physically unclonable functions(PUF)
- 3.5. Convolutional encoding and Viterbi decoding the SRAM words
- 3.6. CMOS SRAM PUF construction
- 3.7. Algorithms for issuing CRP
- 3.8. Security of PUF-based IoT devices
- 3.9. Conclusions
- 3.10. Acknowledgements
- 3.11. References
- 4 IoT Network Security in Smart Homes
-
5 IoT in a New Age of Unified and Zero-Trust Networks and Increased Privacy Protection
- 5.1. Introduction
- 5.2. Internet of Things
- 5.3. IoT security and privacy challenges
- 5.4. Literature review
- 5.5. Security and privacy protection with a zero-trust approach
- 5.6. Case study: secure and private interactive intelligent conversational systems
- 5.7. Discussion
- 5.8. Conclusion
- 5.9. Acknowledgements
- 5.10. References
- 6 IOT, Deep Learning and Cybersecurity in Smart Homes: A Survey
- 7 sTiki: A Mutual Authentication Protocol for Constrained Sensor Devices
- List of Authors
- Index
- End User License Agreement
Product information
- Title: Cybersecurity in Smart Homes
- Author(s):
- Release date: August 2022
- Publisher(s): Wiley-ISTE
- ISBN: 9781789450866
You might also like
book
Securing the Internet of Things
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical …
article
Managing Encryption Keys
This collection of shortcuts provides a practical and concise guide to securing cloud environments. It covers …
book
Machine Learning and IoT for Intelligent Systems and Smart Applications
This book discusses algorithmic applications in the field of machine learning and IOT with pertinent applications. …
book
The Internet of Things: How Smart TVs, Smart Cars, Smart Homes, and Smart Cities Are Changing the World
How the Internet of Things will change your life: all you need to know, in plain …