Security Challenges for Users of Extensible Smart Home Hubs: A Systematic Literature Review
Abstract
:1. Introduction
2. Materials and Methods
3. Results
3.1. Summary of the Literature
3.2. Synthesis of Key Security Challenges
3.2.1. Insecure Hub Software
3.2.2. Insecure IoT Ecosystems and Integrations
3.2.3. Insecure User Configuration
3.2.4. Insecure Remote Access Configuration
3.2.5. Insecure Trigger-Action Programming
3.2.6. Insufficient Multi-User Management
3.2.7. Insecure Extension Runtime
3.2.8. Insufficient Access Control
4. Discussion
4.1. Threats to Validity
4.2. Future Research Directions
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Corno, F.; Mannella, L. A Threat Model for Extensible Smart Home Gateways. In Proceedings of the 2022 7th International Conference on Smart and Sustainable Technologies (SpliTech), Split, Croatia, 5–8 July 2022; pp. 1–6. [Google Scholar] [CrossRef]
- Statista. Global: Smart Home Number of Users 2019–2028. 2025. Available online: https://www.statista.com/forecasts/887613/number-of-smart-homes-in-the-smart-home-market-in-the-world (accessed on 24 March 2025).
- GMI. Smart Home Market Size—By Type, by Connectivity, by Price, by Application, by Distribution Channel, Forecast 2025-20349. 2025. Available online: https://www.gminsights.com/industry-analysis/smart-home-market (accessed on 12 May 2025).
- Corno, F.; Mannella, L. A Gateway-based MUD Architecture to Enhance Smart Home Security. In Proceedings of the 8th International Conference on Smart and Sustainable Technologies (SpliTech), Split, Croatia, 20–23 June 2023. [Google Scholar] [CrossRef]
- Andrade, R.O.; Ortiz-Garcés, I.; Cazares, M. Cybersecurity Attacks on Smart Home During Covid-19 Pandemic. In Proceedings of the 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4), London, UK, 27–28 July 2020; pp. 398–404. [Google Scholar] [CrossRef]
- Lazzaro, S.; De Angelis, V.; Mandalari, A.M.; Buccafurri, F. A black-box assessment of authentication and reliability in consumer IoT devices. Pervasive Mob. Comput. 2025, 110, 102045. [Google Scholar] [CrossRef]
- Samsung. Connect your home with Samsung SmartThings. Available online: https://www.samsung.com/us/smartthings/ (accessed on 18 November 2024).
- Athom. Homey—A Better Smart Home. Available online: https://homey.app/en-us/ (accessed on 20 September 2024).
- Open Home Foundation. Home Assistant. Available online: https://www.home-assistant.io/ (accessed on 19 September 2024).
- Teeuw, M. MagicMirror2. Available online: https://magicmirror.builders/ (accessed on 19 November 2024).
- openHAB Foundation. openHAB. Available online: https://www.openhab.org/ (accessed on 19 September 2024).
- Aromataris, E.; Pearson, A. The systematic review: An overview. Ajn Am. J. Nurs. 2014, 114, 53–58. [Google Scholar] [CrossRef] [PubMed]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef] [PubMed]
- Page, M.J.; Moher, D.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. PRISMA 2020 explanation and elaboration: Updated guidance and exemplars for reporting systematic reviews. BMJ 2021, 372, n160. [Google Scholar] [CrossRef] [PubMed]
- Elsevier. How do I Search in Scopus? 2024. Available online: https://service.elsevier.com/app/answers/detail/a_id/34325/ (accessed on 10 September 2024).
- Boutron, I.; Page, M.J.; Higgins, J.P.; Altman, D.G.; Lundh, A.; Hróbjartsson, A.; Group, C.B.M. Cochrane Handbook for Systematic Reviews of Interventions Version 6.5; Wiley Online Library. 2024. Chapter Considering Bias and Conflicts of Interest Among the Included Studies [Last Updated August 2022]. Available online: https://training.cochrane.org/handbook (accessed on 17 April 2025).
- Ogundipe, O.; Nwafor, V.; Ajuwon, A.; Uwagboe, E.; Ajisegiri, E.; Adediran, A.; Ikubanni, P.; Onu, P.; Ogunniyi, O.; Adeleke, A. Smart Home Innovations—A Mini Review. In Proceedings of the 2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG), Omu-Aran, Nigeria, 2–4 April 2024. [Google Scholar] [CrossRef]
- Rak, M.; Salzillo, G.; Granata, D. ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems. Comput. Electr. Eng. 2022, 99, 107721. [Google Scholar] [CrossRef]
- Al-Tahee, M.; Mahdi Hussin, M.; Alsalhy, M.; Diame, H.; Haroon, N.; Bafjaish, S.; Al-Mhiqani, M. A Study on Artificial Intelligence-based Security Techniques for IoT-based Systems. Fusion Pract. Appl. 2023, 13, 147–161. [Google Scholar] [CrossRef]
- Parocha, R.C.; Macabebe, E.Q.B. Implementation of Home Automation System Using OpenHAB Framework for Heterogeneous IoT Devices. In Proceedings of the IEEE International Conference on Internet of Things and Intelligence System (IoTaIS), Bali, Indonesia, 5–7 November 2019; pp. 67–73. [Google Scholar] [CrossRef]
- Yahyazadeh, M.; Podder, P.; Hoque, E.; Chowdhury, O. Expat: Expectation-based policy analysis and enforcement for appified smart-home platforms. In Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, Toronto, ON, Canada, 3–6 June 2019; pp. 61–72. [Google Scholar] [CrossRef]
- Yang, L.; Liu, X.Y.; Gong, W. Secure smart home systems: A blockchain perspective. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops, Toronto, ON, Canada, 6–9 July 2020; pp. 1003–1008. [Google Scholar] [CrossRef]
- Kanchi, S.; Karlapalem, K. A Multi Perspective Access Control in a Smart Home. In Proceedings of the 11th ACM Conference on Data and Application Security and Privacy, New York, NY, USA, 26–28 April 2021; pp. 321–323. [Google Scholar] [CrossRef]
- Mahadewa, K.; Wang, K.; Bai, G.; Shi, L.; Liu, Y.; Dong, J.; Liang, Z. Scrutinizing Implementations of Smart Home Integrations. IEEE Trans. Softw. Eng. 2021, 47, 2667–2683. [Google Scholar] [CrossRef]
- Mohammad, Z.N.; Farha, F.; Abuassba, A.O.M.; Yang, S.; Zhou, F. Access control and authorization in smart homes: A survey. Tsinghua Sci. Technol. 2021, 26, 906–917. [Google Scholar] [CrossRef]
- Setz, B.; Graef, S.; Ivanova, D.; Tiessen, A.; Aiello, M. A Comparison of Open-Source Home Automation Systems. IEEE Access 2021, 9, 167332–167352. [Google Scholar] [CrossRef]
- Amraoui, N.; Zouari, B. Securing the operation of Smart Home Systems: A literature review. J. Reliab. Intell. Environ. 2022, 8, 67–74. [Google Scholar] [CrossRef]
- Wang, T.; Zhang, K.; Chen, W.; Dou, W.; Zhu, J.; Wei, J.; Huang, T. Understanding device integration bugs in smart home system. In Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, New York, NY, USA, 18 July 2022; pp. 429–441. [Google Scholar] [CrossRef]
- Wang, Z.; Liu, D.; Sun, Y.; Pang, X.; Sun, P.; Lin, F.; Lui, J.C.S.; Ren, K. A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses. IEEE Commun. Surv. Tutor. 2022, 24, 2292–2328. [Google Scholar] [CrossRef]
- Yang, J.; Sun, L. A Comprehensive Survey of Security Issues of Smart Home System: “Spear” and “Shields,” Theory and Practice. IEEE Access 2022, 10, 124167–124192. [Google Scholar] [CrossRef]
- Olabode, S.; Owens, R.; Zhang, V.; Copilah-Ali, J.; Kolomeets, M.; Wu, H.; Malviya, S.; Markeviciute, K.; Spiliotopoulos, T.; Neesham, C.; et al. Complex online harms and the smart home: A scoping review. Future Gener. Comput. Syst. 2023, 149, 664–678. [Google Scholar] [CrossRef]
- Yuan, B.; Wan, J.; Wu, Y.H.; Zou, D.Q.; Jin, H. On the Security of Smart Home Systems: A Survey. J. Comput. Sci. Technol. 2023, 38, 228–247. [Google Scholar] [CrossRef]
- Yu, Y.; Xu, Y.; Huang, K.; Liu, J. TAPFixer: Automatic Detection and Repair of Home Automation Vulnerabilities based on Negated-property Reasoning. In Proceedings of the USENIX Security, Philadelphia, PA, USA, 14–16 August 2024. [Google Scholar]
- OWASP. OWASP Top 10:2021. 2021. Available online: https://owasp.org/Top10/A00_2021_Introduction/ (accessed on 21 November 2024).
- OWASP. OWASP IoT Top 10:2018. 2018. Available online: https://web.archive.org/web/20200416105630/https://owasp.org/www-pdf-archive/OWASP-IoT-Top-10-2018-final.pdf (accessed on 21 November 2024).
Keyword | Results |
---|---|
“smart home …” | 2116 |
“home automation …” | 1711 |
“smart house …” | 1273 |
“home integration …” | 9 |
“… system” | 3700 |
“… gateway” | 83 |
“… hub” | 33 |
Total | 3789 |
Keyword | Results |
---|---|
“security” | 1053 |
“attack” | 213 |
“threat” | 131 |
“open-source” | 81 |
Total | 1153 |
# | Query | Scopus |
---|---|---|
1 | “smart home” OR “smart house” | 105,991 |
2 | “home automation” OR “home integration” | 20,546 |
3 | TAK(( #1 OR #2 ) W/0 ( “system” OR “gateway” OR “hub” )) | 3789 |
4 | #3 AND TAK(security OR attack OR threat OR open-source) | 1153 |
5 | #4 AND PUB > 2018 AND LAN( english ) | 713 |
# | Criterion |
---|---|
1 | The study is a proceeding, patent, blog, web page, or advert. |
2 | The study is unavailable with university access or is retracted. |
3 | The study does not primarily cover smart home hubs. |
4 | The study does not primarily cover cybersecurity or extensible smart home hubs. |
5 | The study does not cover cybersecurity and smart home hubs. |
6 | The study primarily covers a single feature in general smart home hubs. |
7 | The study primarily covers a prototype smart home hub. |
# | Category |
---|---|
A01 | Broken Access Control |
A02 | Cryptographic Failure |
A03 | Injection |
A04 | Insecure Design |
A05 | Security Misconfiguration |
A06 | Vulnerable or Outdated Components |
A07 | Identification and Authentication Failures |
A08 | Software and Data Integrity Failures |
A09 | Security Logging and Monitoring Failures |
A10 | Server Side Request Forgery (SSRF) |
# | Category |
---|---|
1 | Weak, Guessable, or Hardcoded Passwords |
2 | Insecure Network Services |
3 | Insecure Ecosystem Interfaces |
4 | Lack of Secure Update Mechanism |
5 | Use of Insecure or Outdated Components |
6 | Insufficient Privacy Protection |
7 | Insecure Data Transfer and Storage |
8 | Lack of Device Management |
9 | Insecure Default Settings |
10 | Lack of Physical Hardening |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Thingnes, T.R.; Meland, P.H. Security Challenges for Users of Extensible Smart Home Hubs: A Systematic Literature Review. Future Internet 2025, 17, 238. https://doi.org/10.3390/fi17060238
Thingnes TR, Meland PH. Security Challenges for Users of Extensible Smart Home Hubs: A Systematic Literature Review. Future Internet. 2025; 17(6):238. https://doi.org/10.3390/fi17060238
Chicago/Turabian StyleThingnes, Tobias Rødahl, and Per Håkon Meland. 2025. "Security Challenges for Users of Extensible Smart Home Hubs: A Systematic Literature Review" Future Internet 17, no. 6: 238. https://doi.org/10.3390/fi17060238
APA StyleThingnes, T. R., & Meland, P. H. (2025). Security Challenges for Users of Extensible Smart Home Hubs: A Systematic Literature Review. Future Internet, 17(6), 238. https://doi.org/10.3390/fi17060238