Next Article in Journal
A Miniaturized Colorimeter with a Novel Design and High Precision for Photometric Detection
Next Article in Special Issue
How to Improve Fault Tolerance in Disaster Predictions: A Case Study about Flash Floods Using IoT, ML and Real Data
Previous Article in Journal
Data-Prefetching Scheme Based on Playback Delay and Positioning Satisfaction in Peer-To-Peer Video-On-Demand System
Previous Article in Special Issue
Analysis of an ABE Scheme with Verifiable Outsourced Decryption
 
 
Article

Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

by 1 and 1,2,*
1
Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, 971 87 Luleå, Sweden
2
Faculty of Engineering, Al Azhar University, P.O. Box 83513 Qena, Egypt
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(3), 817; https://doi.org/10.3390/s18030817
Received: 19 January 2018 / Revised: 1 March 2018 / Accepted: 5 March 2018 / Published: 8 March 2018
(This article belongs to the Special Issue Security in IoT Enabled Sensors)
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. View Full-Text
Keywords: smart homes; the Internet of Things (IoT); security risk assessment; OCTAVE Allegro smart homes; the Internet of Things (IoT); security risk assessment; OCTAVE Allegro
Show Figures

Figure 1

MDPI and ACS Style

Ali, B.; Awad, A.I. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes. Sensors 2018, 18, 817. https://doi.org/10.3390/s18030817

AMA Style

Ali B, Awad AI. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes. Sensors. 2018; 18(3):817. https://doi.org/10.3390/s18030817

Chicago/Turabian Style

Ali, Bako, and Ali Ismail Awad. 2018. "Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes" Sensors 18, no. 3: 817. https://doi.org/10.3390/s18030817

Find Other Styles
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop