https://oldena.lpnu.ua/handle/ntb/47211
Title: | Проблеми конфіденційності та безпеки в кіберфізичних системах інтелектуальних будинків |
Other Titles: | Problems of privacy and security in cyber physical systems of intellectual houses |
Authors: | Гаваньо, Б. І. Havano, B. I. |
Affiliation: | Національний університет “Львівська політехніка” Lviv Polytechnic National University |
Bibliographic description (Ukraine): | Гаваньо Б. І. Проблеми конфіденційності та безпеки в кіберфізичних системах інтелектуальних будинків / Б. І. Гаваньо // Вісник Національного університету “Львівська політехніка”. Серія: Комп’ютерні системи та мережі. — Львів : Видавництво Національного університету “Львівська політехніка”, 2018. — № 905. — С. 49–55. |
Bibliographic description (International): | Havano B. I. Problems of privacy and security in cyber physical systems of intellectual houses / B. I. Havano // Visnyk Natsionalnoho universytetu "Lvivska politekhnika". Serie: Kompiuterni systemy ta merezhi. — Lviv : Vydavnytstvo Natsionalnoho universytetu "Lvivska politekhnika", 2018. — No 905. — P. 49–55. |
Is part of: | Вісник Національного університету “Львівська політехніка”. Серія: Комп’ютерні системи та мережі, 905, 2018 |
Journal/Collection: | Вісник Національного університету “Львівська політехніка”. Серія: Комп’ютерні системи та мережі |
Issue: | 905 |
Issue Date: | 26-Feb-2018 |
Publisher: | Видавництво Національного університету “Львівська політехніка” |
Place of the edition/event: | Львів Lviv |
UDC: | 004.3 004.7 |
Keywords: | інтелектуальний будинок кіберфізична система інтернет речей конфіденційність безпека smart house cyber physical system IoT privacy security |
Number of pages: | 7 |
Page range: | 49-55 |
Start page: | 49 |
End page: | 55 |
Abstract: | Розумні будинки стають дедалі популярнішими для продуктів та послуг IoT з
великою кількістю обіцянок для покращення якості життя людей. Тим не менше,
гетерогенна, динамічна та пов'язана з Інтернетом природа цього середовища додає
нових побоювань, оскільки приватні дані стають доступними, часто без відома
власників. Ця доступність поряд із зростаючими ризиками захисту даних та порушень
конфіденційності робить безпеку інтелектуального будинку важливою темою, яка
заслуговує уваги. Наведено огляд проблем конфіденційності та безпеки, спрямованих на
кіберфізичні системи розумних будинків. Також визначено обмеження, оцінено рішення
та завдання та проблеми, які потребують подальшого дослідження. Smart homes have become increasingly popular for IoT products and services with a lot of promises for improving the quality of life of individuals. Nevertheless, the heterogeneous, dynamic, and Internet-connected nature of this environment adds new concerns as private data becomes accessible, often without the householders’ awareness. This accessibility alongside with the rising risks of data security and privacy breaches, makes smart home security a critical topic that deserves scrutiny. In current paper, is presented an overview of challenges related to the privacy and security in the smart house cyber physical systems. Also, were realized constraints, evaluated solutions, and a several challenges and research issues where further investigation is strongly required. I have identified issues that need to be solved: risk assessment methods, information flow control accesses, identity management, and security management methods. |
URI: | https://ena.lpnu.ua/handle/ntb/47211 |
Copyright owner: | © Національний університет “Львівська політехніка”, 2018 © Гаваньо Б. І., 2018 |
URL for reference material: | https://goo.gl/89rRIa http://goo.gl/UGWb5Z |
References (Ukraine): | 1. D. J. Cook et al., “MavHome: An agent-based smart home”, IEEE International Conference on Pervasive Computing and Communications, San Diego, CA, USA, pp. 521–524, 2003. 2. N. King, “Smart home – A Definition”, Milton Keynes: Intertek Research and Testing Centre, 2003. 3. Statista, 2015 [Online]. Available: https://goo.gl/89rRIa. 4. August and Xfinity, “The Safe and Smart Home: Security in the Smart Home Era,” 2016 [Online]. Available: http://goo.gl/UGWb5Z. 5. V. Srinivasan et al., “Protecting your daily in-home activity information from a wireless snooping attack,” 10th international conference on Ubiquitous computing, pp. 202–211, 2008. 6. B. Ur et al., “The current state of access control for smart devices in homes,” Workshop on Home Usable Privacy and Security, 2013. 7. S. Notra et al., “An experimental study of security and privacy risks with emerging household appliances”, IEEE Conference on Communications and Network Security, pp. 79–84, 2014. 8. V. Sivaraman et al., “Networklevel security and privacy control for smart-home IoT devices,” Wireless and Mobile Computing, Networking and Communications, pp. 163–167, 2015. 9. T. D. P. Mendes et al., “Smart home communication technologies and applications: Wireless protocol assessment for home area network resources”, Energies, vol. 8, no. 7, pp. 7279–7311, 2015. 10. C. Debes et al., “Monitoring Activities of Daily Living in Smart Homes: Understanding human behavior”, IEEE Signal Processing Magazine, vol. 33, no. 2, pp. 81-94, 2016. 11. C. Lee et al., “Securing smart home: Technologies, security challenges, and security requirements”, IEEE Conference on Communications and Network Security, pp. 67–72, 2014. 12. K. Islam et al., “Security and privacy considerations for wireless sensor networks in smart home environments”, Computer Supported Cooperative Work in Design, IEEE 16th International Conference on, pp. 626–633, 2012. 13. H. Chan and A. Perrig, “Security and privacy in sensor networks”, Computer, vol. 36, no. 10, pp. 103–105, 2003 14. M. M. Hossain et al., “Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things”, Services, pp. 2128, 2015. 15. M. Anwar et al., “Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges”, Health Policy and Technology, vol. 4, pp. 299–311, 2015. 16. S. L. Keoh et al., “Securing the internet of things: A standardization perspective”, Internet of Things Journal, IEEE, vol. 1, no. 3, pp. 265–275, 2014. 17. D. Altolini et al., “Low power link layer security for IoT: Implementation and performance analysis”, Wireless Communications and Mobile Computing Conference, pp. 919–925, 2013. 18. H. C. Pohls et al., “RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects”, Wireless Communications and Networking Conference Workshops, pp. 122–127, 2014. 19. G. Mantas et al., “Security in smart home environment”, Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications, pp. 170–191, 2010 20. N. P. Hoang and D. Pishva, “A TOR-based anonymous communication approach to secure smart home appliances”, Advanced Communication Technology, pp. 517–525, 2015. 21. A. Riahi et al., “A systemic approach for IoT security”, Distributed Computing in Sensor Systems, pp. 351–355, 2013. 22. A. Jacobsson and P. Davidsson, “Towards a Model of Privacy and Security for Smart Homes,” IEEE 2nd World Forum on Internet of Things, vol. 2, pp. 727–732, 2015 23. M. Henze et al., “A comprehensive approach to privacy in the cloud-based Internet of Things,” Future Generation Computer Systems, vol. 56, pp. 701–718, 2016. 24. D. Barnard-Wills et al., “ENISA Threat Landscape and Good Practice Guide for Smart Home and Converged Media”, ENISA (The European Network and Information Security Agency), 2014. |
References (International): | 1. D. J. Cook et al., "MavHome: An agent-based smart home", IEEE International Conference on Pervasive Computing and Communications, San Diego, CA, USA, pp. 521–524, 2003. 2. N. King, "Smart home – A Definition", Milton Keynes: Intertek Research and Testing Centre, 2003. 3. Statista, 2015 [Online]. Available: https://goo.gl/89rRIa. 4. August and Xfinity, "The Safe and Smart Home: Security in the Smart Home Era," 2016 [Online]. Available: http://goo.gl/UGWb5Z. 5. V. Srinivasan et al., "Protecting your daily in-home activity information from a wireless snooping attack," 10th international conference on Ubiquitous computing, pp. 202–211, 2008. 6. B. Ur et al., "The current state of access control for smart devices in homes," Workshop on Home Usable Privacy and Security, 2013. 7. S. Notra et al., "An experimental study of security and privacy risks with emerging household appliances", IEEE Conference on Communications and Network Security, pp. 79–84, 2014. 8. V. Sivaraman et al., "Networklevel security and privacy control for smart-home IoT devices," Wireless and Mobile Computing, Networking and Communications, pp. 163–167, 2015. 9. T. D. P. Mendes et al., "Smart home communication technologies and applications: Wireless protocol assessment for home area network resources", Energies, vol. 8, no. 7, pp. 7279–7311, 2015. 10. C. Debes et al., "Monitoring Activities of Daily Living in Smart Homes: Understanding human behavior", IEEE Signal Processing Magazine, vol. 33, no. 2, pp. 81-94, 2016. 11. C. Lee et al., "Securing smart home: Technologies, security challenges, and security requirements", IEEE Conference on Communications and Network Security, pp. 67–72, 2014. 12. K. Islam et al., "Security and privacy considerations for wireless sensor networks in smart home environments", Computer Supported Cooperative Work in Design, IEEE 16th International Conference on, pp. 626–633, 2012. 13. H. Chan and A. Perrig, "Security and privacy in sensor networks", Computer, vol. 36, no. 10, pp. 103–105, 2003 14. M. M. Hossain et al., "Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things", Services, pp. 2128, 2015. 15. M. Anwar et al., "Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges", Health Policy and Technology, vol. 4, pp. 299–311, 2015. 16. S. L. Keoh et al., "Securing the internet of things: A standardization perspective", Internet of Things Journal, IEEE, vol. 1, no. 3, pp. 265–275, 2014. 17. D. Altolini et al., "Low power link layer security for IoT: Implementation and performance analysis", Wireless Communications and Mobile Computing Conference, pp. 919–925, 2013. 18. H. C. Pohls et al., "RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects", Wireless Communications and Networking Conference Workshops, pp. 122–127, 2014. 19. G. Mantas et al., "Security in smart home environment", Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications, pp. 170–191, 2010 20. N. P. Hoang and D. Pishva, "A TOR-based anonymous communication approach to secure smart home appliances", Advanced Communication Technology, pp. 517–525, 2015. 21. A. Riahi et al., "A systemic approach for IoT security", Distributed Computing in Sensor Systems, pp. 351–355, 2013. 22. A. Jacobsson and P. Davidsson, "Towards a Model of Privacy and Security for Smart Homes," IEEE 2nd World Forum on Internet of Things, vol. 2, pp. 727–732, 2015 23. M. Henze et al., "A comprehensive approach to privacy in the cloud-based Internet of Things," Future Generation Computer Systems, vol. 56, pp. 701–718, 2016. 24. D. Barnard-Wills et al., "ENISA Threat Landscape and Good Practice Guide for Smart Home and Converged Media", ENISA (The European Network and Information Security Agency), 2014. |
Content type: | Article |
Appears in Collections: | Комп'ютерні системи та мережі. – 2018. – №905 |
File | Description | Size | Format | |
---|---|---|---|---|
2018n905_Havano_B_I-Problems_of_privacy_and_49-55.pdf | 667.95 kB | Adobe PDF | View/Open | |
2018n905_Havano_B_I-Problems_of_privacy_and_49-55__COVER.png | 371.83 kB | image/png | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.