Skip navigation

putin IS MURDERER

Please use this identifier to cite or link to this item: https://oldena.lpnu.ua/handle/ntb/47211
Full metadata record
DC FieldValueLanguage
dc.contributor.authorГаваньо, Б. І.
dc.contributor.authorHavano, B. I.
dc.date.accessioned2020-03-10T13:15:05Z-
dc.date.available2020-03-10T13:15:05Z-
dc.date.created2018-02-26
dc.date.issued2018-02-26
dc.identifier.citationГаваньо Б. І. Проблеми конфіденційності та безпеки в кіберфізичних системах інтелектуальних будинків / Б. І. Гаваньо // Вісник Національного університету “Львівська політехніка”. Серія: Комп’ютерні системи та мережі. — Львів : Видавництво Національного університету “Львівська політехніка”, 2018. — № 905. — С. 49–55.
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/47211-
dc.description.abstractРозумні будинки стають дедалі популярнішими для продуктів та послуг IoT з великою кількістю обіцянок для покращення якості життя людей. Тим не менше, гетерогенна, динамічна та пов'язана з Інтернетом природа цього середовища додає нових побоювань, оскільки приватні дані стають доступними, часто без відома власників. Ця доступність поряд із зростаючими ризиками захисту даних та порушень конфіденційності робить безпеку інтелектуального будинку важливою темою, яка заслуговує уваги. Наведено огляд проблем конфіденційності та безпеки, спрямованих на кіберфізичні системи розумних будинків. Також визначено обмеження, оцінено рішення та завдання та проблеми, які потребують подальшого дослідження.
dc.description.abstractSmart homes have become increasingly popular for IoT products and services with a lot of promises for improving the quality of life of individuals. Nevertheless, the heterogeneous, dynamic, and Internet-connected nature of this environment adds new concerns as private data becomes accessible, often without the householders’ awareness. This accessibility alongside with the rising risks of data security and privacy breaches, makes smart home security a critical topic that deserves scrutiny. In current paper, is presented an overview of challenges related to the privacy and security in the smart house cyber physical systems. Also, were realized constraints, evaluated solutions, and a several challenges and research issues where further investigation is strongly required. I have identified issues that need to be solved: risk assessment methods, information flow control accesses, identity management, and security management methods.
dc.format.extent49-55
dc.language.isouk
dc.publisherВидавництво Національного університету “Львівська політехніка”
dc.relation.ispartofВісник Національного університету “Львівська політехніка”. Серія: Комп’ютерні системи та мережі, 905, 2018
dc.relation.urihttps://goo.gl/89rRIa
dc.relation.urihttp://goo.gl/UGWb5Z
dc.subjectінтелектуальний будинок
dc.subjectкіберфізична система
dc.subjectінтернет речей
dc.subjectконфіденційність
dc.subjectбезпека
dc.subjectsmart house
dc.subjectcyber physical system
dc.subjectIoT
dc.subjectprivacy
dc.subjectsecurity
dc.titleПроблеми конфіденційності та безпеки в кіберфізичних системах інтелектуальних будинків
dc.title.alternativeProblems of privacy and security in cyber physical systems of intellectual houses
dc.typeArticle
dc.rights.holder© Національний університет “Львівська політехніка”, 2018
dc.rights.holder© Гаваньо Б. І., 2018
dc.contributor.affiliationНаціональний університет “Львівська політехніка”
dc.contributor.affiliationLviv Polytechnic National University
dc.format.pages7
dc.identifier.citationenHavano B. I. Problems of privacy and security in cyber physical systems of intellectual houses / B. I. Havano // Visnyk Natsionalnoho universytetu "Lvivska politekhnika". Serie: Kompiuterni systemy ta merezhi. — Lviv : Vydavnytstvo Natsionalnoho universytetu "Lvivska politekhnika", 2018. — No 905. — P. 49–55.
dc.relation.references1. D. J. Cook et al., “MavHome: An agent-based smart home”, IEEE International Conference on Pervasive Computing and Communications, San Diego, CA, USA, pp. 521–524, 2003.
dc.relation.references2. N. King, “Smart home – A Definition”, Milton Keynes: Intertek Research and Testing Centre, 2003.
dc.relation.references3. Statista, 2015 [Online]. Available: https://goo.gl/89rRIa.
dc.relation.references4. August and Xfinity, “The Safe and Smart Home: Security in the Smart Home Era,” 2016 [Online]. Available: http://goo.gl/UGWb5Z.
dc.relation.references5. V. Srinivasan et al., “Protecting your daily in-home activity information from a wireless snooping attack,” 10th international conference on Ubiquitous computing, pp. 202–211, 2008.
dc.relation.references6. B. Ur et al., “The current state of access control for smart devices in homes,” Workshop on Home Usable Privacy and Security, 2013.
dc.relation.references7. S. Notra et al., “An experimental study of security and privacy risks with emerging household appliances”, IEEE Conference on Communications and Network Security, pp. 79–84, 2014.
dc.relation.references8. V. Sivaraman et al., “Networklevel security and privacy control for smart-home IoT devices,” Wireless and Mobile Computing, Networking and Communications, pp. 163–167, 2015.
dc.relation.references9. T. D. P. Mendes et al., “Smart home communication technologies and applications: Wireless protocol assessment for home area network resources”, Energies, vol. 8, no. 7, pp. 7279–7311, 2015.
dc.relation.references10. C. Debes et al., “Monitoring Activities of Daily Living in Smart Homes: Understanding human behavior”, IEEE Signal Processing Magazine, vol. 33, no. 2, pp. 81-94, 2016.
dc.relation.references11. C. Lee et al., “Securing smart home: Technologies, security challenges, and security requirements”, IEEE Conference on Communications and Network Security, pp. 67–72, 2014.
dc.relation.references12. K. Islam et al., “Security and privacy considerations for wireless sensor networks in smart home environments”, Computer Supported Cooperative Work in Design, IEEE 16th International Conference on, pp. 626–633, 2012.
dc.relation.references13. H. Chan and A. Perrig, “Security and privacy in sensor networks”, Computer, vol. 36, no. 10, pp. 103–105, 2003
dc.relation.references14. M. M. Hossain et al., “Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things”, Services, pp. 2128, 2015.
dc.relation.references15. M. Anwar et al., “Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges”, Health Policy and Technology, vol. 4, pp. 299–311, 2015.
dc.relation.references16. S. L. Keoh et al., “Securing the internet of things: A standardization perspective”, Internet of Things Journal, IEEE, vol. 1, no. 3, pp. 265–275, 2014.
dc.relation.references17. D. Altolini et al., “Low power link layer security for IoT: Implementation and performance analysis”, Wireless Communications and Mobile Computing Conference, pp. 919–925, 2013.
dc.relation.references18. H. C. Pohls et al., “RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects”, Wireless Communications and Networking Conference Workshops, pp. 122–127, 2014.
dc.relation.references19. G. Mantas et al., “Security in smart home environment”, Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications, pp. 170–191, 2010
dc.relation.references20. N. P. Hoang and D. Pishva, “A TOR-based anonymous communication approach to secure smart home appliances”, Advanced Communication Technology, pp. 517–525, 2015.
dc.relation.references21. A. Riahi et al., “A systemic approach for IoT security”, Distributed Computing in Sensor Systems, pp. 351–355, 2013.
dc.relation.references22. A. Jacobsson and P. Davidsson, “Towards a Model of Privacy and Security for Smart Homes,” IEEE 2nd World Forum on Internet of Things, vol. 2, pp. 727–732, 2015
dc.relation.references23. M. Henze et al., “A comprehensive approach to privacy in the cloud-based Internet of Things,” Future Generation Computer Systems, vol. 56, pp. 701–718, 2016.
dc.relation.references24. D. Barnard-Wills et al., “ENISA Threat Landscape and Good Practice Guide for Smart Home and Converged Media”, ENISA (The European Network and Information Security Agency), 2014.
dc.relation.referencesen1. D. J. Cook et al., "MavHome: An agent-based smart home", IEEE International Conference on Pervasive Computing and Communications, San Diego, CA, USA, pp. 521–524, 2003.
dc.relation.referencesen2. N. King, "Smart home – A Definition", Milton Keynes: Intertek Research and Testing Centre, 2003.
dc.relation.referencesen3. Statista, 2015 [Online]. Available: https://goo.gl/89rRIa.
dc.relation.referencesen4. August and Xfinity, "The Safe and Smart Home: Security in the Smart Home Era," 2016 [Online]. Available: http://goo.gl/UGWb5Z.
dc.relation.referencesen5. V. Srinivasan et al., "Protecting your daily in-home activity information from a wireless snooping attack," 10th international conference on Ubiquitous computing, pp. 202–211, 2008.
dc.relation.referencesen6. B. Ur et al., "The current state of access control for smart devices in homes," Workshop on Home Usable Privacy and Security, 2013.
dc.relation.referencesen7. S. Notra et al., "An experimental study of security and privacy risks with emerging household appliances", IEEE Conference on Communications and Network Security, pp. 79–84, 2014.
dc.relation.referencesen8. V. Sivaraman et al., "Networklevel security and privacy control for smart-home IoT devices," Wireless and Mobile Computing, Networking and Communications, pp. 163–167, 2015.
dc.relation.referencesen9. T. D. P. Mendes et al., "Smart home communication technologies and applications: Wireless protocol assessment for home area network resources", Energies, vol. 8, no. 7, pp. 7279–7311, 2015.
dc.relation.referencesen10. C. Debes et al., "Monitoring Activities of Daily Living in Smart Homes: Understanding human behavior", IEEE Signal Processing Magazine, vol. 33, no. 2, pp. 81-94, 2016.
dc.relation.referencesen11. C. Lee et al., "Securing smart home: Technologies, security challenges, and security requirements", IEEE Conference on Communications and Network Security, pp. 67–72, 2014.
dc.relation.referencesen12. K. Islam et al., "Security and privacy considerations for wireless sensor networks in smart home environments", Computer Supported Cooperative Work in Design, IEEE 16th International Conference on, pp. 626–633, 2012.
dc.relation.referencesen13. H. Chan and A. Perrig, "Security and privacy in sensor networks", Computer, vol. 36, no. 10, pp. 103–105, 2003
dc.relation.referencesen14. M. M. Hossain et al., "Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things", Services, pp. 2128, 2015.
dc.relation.referencesen15. M. Anwar et al., "Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges", Health Policy and Technology, vol. 4, pp. 299–311, 2015.
dc.relation.referencesen16. S. L. Keoh et al., "Securing the internet of things: A standardization perspective", Internet of Things Journal, IEEE, vol. 1, no. 3, pp. 265–275, 2014.
dc.relation.referencesen17. D. Altolini et al., "Low power link layer security for IoT: Implementation and performance analysis", Wireless Communications and Mobile Computing Conference, pp. 919–925, 2013.
dc.relation.referencesen18. H. C. Pohls et al., "RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects", Wireless Communications and Networking Conference Workshops, pp. 122–127, 2014.
dc.relation.referencesen19. G. Mantas et al., "Security in smart home environment", Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications, pp. 170–191, 2010
dc.relation.referencesen20. N. P. Hoang and D. Pishva, "A TOR-based anonymous communication approach to secure smart home appliances", Advanced Communication Technology, pp. 517–525, 2015.
dc.relation.referencesen21. A. Riahi et al., "A systemic approach for IoT security", Distributed Computing in Sensor Systems, pp. 351–355, 2013.
dc.relation.referencesen22. A. Jacobsson and P. Davidsson, "Towards a Model of Privacy and Security for Smart Homes," IEEE 2nd World Forum on Internet of Things, vol. 2, pp. 727–732, 2015
dc.relation.referencesen23. M. Henze et al., "A comprehensive approach to privacy in the cloud-based Internet of Things," Future Generation Computer Systems, vol. 56, pp. 701–718, 2016.
dc.relation.referencesen24. D. Barnard-Wills et al., "ENISA Threat Landscape and Good Practice Guide for Smart Home and Converged Media", ENISA (The European Network and Information Security Agency), 2014.
dc.citation.journalTitleВісник Національного університету “Львівська політехніка”. Серія: Комп’ютерні системи та мережі
dc.citation.issue905
dc.citation.spage49
dc.citation.epage55
dc.coverage.placenameЛьвів
dc.coverage.placenameLviv
dc.subject.udc004.3
dc.subject.udc004.7
Appears in Collections:Комп'ютерні системи та мережі. – 2018. – №905

Files in This Item:
File Description SizeFormat 
2018n905_Havano_B_I-Problems_of_privacy_and_49-55.pdf667.95 kBAdobe PDFView/Open
2018n905_Havano_B_I-Problems_of_privacy_and_49-55__COVER.png371.83 kBimage/pngView/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.