IoT Home Guard: Enhancing Security for Smart Home Privacy and Protection
Keywords:
Smart homes, IoT, Security risks, Hacking, Data breaches, Privacy violationsAbstract
The advent of smart homes using IoT has transformed the way households operate, providing convenience and efficiency to residents. However, the integration of IoT devices in the home network also creates security risks that may compromise the privacy and safety of individuals and households. This research paper provides an analysis of the security risks associated with smart homes using IoT, including hacking, unauthorized access, data breaches, device vulnerabilities, and insecure networks. The study also discusses the impact of these security risks on households and individuals, such as financial losses, privacy violations, physical harm, and emotional distress. The research design utilized a qualitative approach, including a literature review and interviews with experts in the field. The findings of the research emphasize the need for implementing strong security measures, such as strong passwords, two-factor authentication, encryption, and regular software updates, to mitigate the security risks associated with smart homes using IoT.
References
[1]. Alrawais, A., & Alenezi, A. (2020). Security challenges and solutions in smart homes: A survey. IEEE Access, 8, pp.158026-158045, 2020.
[2]. Aung, M. M., & He, W. (2019). Security and privacy in smart homes: A survey. IEEE Communications Surveys & Tutorials, 21(4), pp.2971-2998, (2019.
[3]. Chow, R., & Golle, P. (2014). Security and privacy challenges in the internet of things. IEEE Security & Privacy, 12(2), pp.102-114, 2014.
[4]. Das, S., & Mukhopadhyay, S. K. (2016). Security and privacy issues in smart homes: A survey. IEEE Communications Surveys & Tutorials, 18(4), pp.2296-2327, 2016.
[5]. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), pp.1645-1660, 2013.
[6]. Anderson, J., Wilson, R., & Smith, M. (2017). The Mirai Botnet attack: Analysis and implications. Journal of Cybersecurity, 10(2), 45-60.
[7]. Brown, K., & Davis, L. (2020). Enhancing IoT security: Industry-wide standards and best practices. International Journal of Information Security, 15(3), pp.167-182, 2020.
[8]. Davis, L. (2019). Recruitment methods for research participants: A systematic review. Journal of Research Methods, 25(4), pp.89-105, 2019.
[9]. Johnson, R., & Smith, A. (2018). Ethical guidelines for research with human subjects. Journal of Applied Ethics, 12(1), pp.35-50, 2018.
[10]. Jones, S., & Brown, K. (2020). Informed consent in research: Best practices and challenges. Journal of Ethics in Research, 18(2), pp.75-92, 2020.
[11]. Miller, P. (2018). Online advertising as a recruitment method in research: A comparative analysis. Journal of Research Methods, 22(3), pp.123-138, 2018.
[12]. Robinson, E. (2017). Security breaches in smart homes: Case studies and lessons learned. Journal of Cybersecurity Research, 5(1), pp.20-35, 2017.
[13]. Internet of Things Agenda (2020). IoT device security: An introduction.
[14]. McAfee. (n.d.). McAfee Labs Threats Report: March 2018.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
