IoT Home Guard: Enhancing Security for Smart Home Privacy and Protection

Authors

Keywords:

Smart homes, IoT, Security risks, Hacking, Data breaches, Privacy violations

Abstract

The advent of smart homes using IoT has transformed the way households operate, providing convenience and efficiency to residents. However, the integration of IoT devices in the home network also creates security risks that may compromise the privacy and safety of individuals and households. This research paper provides an analysis of the security risks associated with smart homes using IoT, including hacking, unauthorized access, data breaches, device vulnerabilities, and insecure networks. The study also discusses the impact of these security risks on households and individuals, such as financial losses, privacy violations, physical harm, and emotional distress. The research design utilized a qualitative approach, including a literature review and interviews with experts in the field. The findings of the research emphasize the need for implementing strong security measures, such as strong passwords, two-factor authentication, encryption, and regular software updates, to mitigate the security risks associated with smart homes using IoT.

References

[1]. Alrawais, A., & Alenezi, A. (2020). Security challenges and solutions in smart homes: A survey. IEEE Access, 8, pp.158026-158045, 2020.

[2]. Aung, M. M., & He, W. (2019). Security and privacy in smart homes: A survey. IEEE Communications Surveys & Tutorials, 21(4), pp.2971-2998, (2019.

[3]. Chow, R., & Golle, P. (2014). Security and privacy challenges in the internet of things. IEEE Security & Privacy, 12(2), pp.102-114, 2014.

[4]. Das, S., & Mukhopadhyay, S. K. (2016). Security and privacy issues in smart homes: A survey. IEEE Communications Surveys & Tutorials, 18(4), pp.2296-2327, 2016.

[5]. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), pp.1645-1660, 2013.

[6]. Anderson, J., Wilson, R., & Smith, M. (2017). The Mirai Botnet attack: Analysis and implications. Journal of Cybersecurity, 10(2), 45-60.

[7]. Brown, K., & Davis, L. (2020). Enhancing IoT security: Industry-wide standards and best practices. International Journal of Information Security, 15(3), pp.167-182, 2020.

[8]. Davis, L. (2019). Recruitment methods for research participants: A systematic review. Journal of Research Methods, 25(4), pp.89-105, 2019.

[9]. Johnson, R., & Smith, A. (2018). Ethical guidelines for research with human subjects. Journal of Applied Ethics, 12(1), pp.35-50, 2018.

[10]. Jones, S., & Brown, K. (2020). Informed consent in research: Best practices and challenges. Journal of Ethics in Research, 18(2), pp.75-92, 2020.

[11]. Miller, P. (2018). Online advertising as a recruitment method in research: A comparative analysis. Journal of Research Methods, 22(3), pp.123-138, 2018.

[12]. Robinson, E. (2017). Security breaches in smart homes: Case studies and lessons learned. Journal of Cybersecurity Research, 5(1), pp.20-35, 2017.

[13]. Internet of Things Agenda (2020). IoT device security: An introduction.

[14]. McAfee. (n.d.). McAfee Labs Threats Report: March 2018.

Downloads

Published

2023-11-30

How to Cite

[1]
Souvik Sikdar, Samya Das, Soham Dey, and Radha Krishna Jana, “IoT Home Guard: Enhancing Security for Smart Home Privacy and Protection”, Int. J. Comp. Sci. Eng., vol. 11, no. 1, pp. 301–309, Nov. 2023.