DC Field | Value | Language |
dc.contributor.author | Гаваньо, Б. І. | |
dc.contributor.author | Havano, B. I. | |
dc.date.accessioned | 2020-03-10T13:15:05Z | - |
dc.date.available | 2020-03-10T13:15:05Z | - |
dc.date.created | 2018-02-26 | |
dc.date.issued | 2018-02-26 | |
dc.identifier.citation | Гаваньо Б. І. Проблеми конфіденційності та безпеки в кіберфізичних системах інтелектуальних будинків / Б. І. Гаваньо // Вісник Національного університету “Львівська політехніка”. Серія: Комп’ютерні системи та мережі. — Львів : Видавництво Національного університету “Львівська політехніка”, 2018. — № 905. — С. 49–55. | |
dc.identifier.uri | https://ena.lpnu.ua/handle/ntb/47211 | - |
dc.description.abstract | Розумні будинки стають дедалі популярнішими для продуктів та послуг IoT з
великою кількістю обіцянок для покращення якості життя людей. Тим не менше,
гетерогенна, динамічна та пов'язана з Інтернетом природа цього середовища додає
нових побоювань, оскільки приватні дані стають доступними, часто без відома
власників. Ця доступність поряд із зростаючими ризиками захисту даних та порушень
конфіденційності робить безпеку інтелектуального будинку важливою темою, яка
заслуговує уваги. Наведено огляд проблем конфіденційності та безпеки, спрямованих на
кіберфізичні системи розумних будинків. Також визначено обмеження, оцінено рішення
та завдання та проблеми, які потребують подальшого дослідження. | |
dc.description.abstract | Smart homes have become increasingly popular for IoT products and services with a lot of
promises for improving the quality of life of individuals. Nevertheless, the heterogeneous,
dynamic, and Internet-connected nature of this environment adds new concerns as private data
becomes accessible, often without the householders’ awareness. This accessibility alongside with
the rising risks of data security and privacy breaches, makes smart home security a critical topic
that deserves scrutiny. In current paper, is presented an overview of challenges related to the
privacy and security in the smart house cyber physical systems. Also, were realized constraints,
evaluated solutions, and a several challenges and research issues where further investigation is
strongly required. I have identified issues that need to be solved: risk assessment methods,
information flow control accesses, identity management, and security management methods. | |
dc.format.extent | 49-55 | |
dc.language.iso | uk | |
dc.publisher | Видавництво Національного університету “Львівська політехніка” | |
dc.relation.ispartof | Вісник Національного університету “Львівська політехніка”. Серія: Комп’ютерні системи та мережі, 905, 2018 | |
dc.relation.uri | https://goo.gl/89rRIa | |
dc.relation.uri | http://goo.gl/UGWb5Z | |
dc.subject | інтелектуальний будинок | |
dc.subject | кіберфізична система | |
dc.subject | інтернет речей | |
dc.subject | конфіденційність | |
dc.subject | безпека | |
dc.subject | smart house | |
dc.subject | cyber physical system | |
dc.subject | IoT | |
dc.subject | privacy | |
dc.subject | security | |
dc.title | Проблеми конфіденційності та безпеки в кіберфізичних системах інтелектуальних будинків | |
dc.title.alternative | Problems of privacy and security in cyber physical systems of intellectual houses | |
dc.type | Article | |
dc.rights.holder | © Національний університет “Львівська політехніка”, 2018 | |
dc.rights.holder | © Гаваньо Б. І., 2018 | |
dc.contributor.affiliation | Національний університет “Львівська політехніка” | |
dc.contributor.affiliation | Lviv Polytechnic National University | |
dc.format.pages | 7 | |
dc.identifier.citationen | Havano B. I. Problems of privacy and security in cyber physical systems of intellectual houses / B. I. Havano // Visnyk Natsionalnoho universytetu "Lvivska politekhnika". Serie: Kompiuterni systemy ta merezhi. — Lviv : Vydavnytstvo Natsionalnoho universytetu "Lvivska politekhnika", 2018. — No 905. — P. 49–55. | |
dc.relation.references | 1. D. J. Cook et al., “MavHome: An agent-based smart home”, IEEE International Conference on Pervasive Computing and Communications, San Diego, CA, USA, pp. 521–524, 2003. | |
dc.relation.references | 2. N. King, “Smart home – A Definition”, Milton Keynes: Intertek Research and Testing Centre, 2003. | |
dc.relation.references | 3. Statista, 2015 [Online]. Available: https://goo.gl/89rRIa. | |
dc.relation.references | 4. August and Xfinity, “The Safe and Smart Home: Security in the Smart Home Era,” 2016 [Online]. Available: http://goo.gl/UGWb5Z. | |
dc.relation.references | 5. V. Srinivasan et al., “Protecting your daily in-home activity information from a wireless snooping attack,” 10th international conference on Ubiquitous computing, pp. 202–211, 2008. | |
dc.relation.references | 6. B. Ur et al., “The current state of access control for smart devices in homes,” Workshop on Home Usable Privacy and Security, 2013. | |
dc.relation.references | 7. S. Notra et al., “An experimental study of security and privacy risks with emerging household appliances”, IEEE Conference on Communications and Network Security, pp. 79–84, 2014. | |
dc.relation.references | 8. V. Sivaraman et al., “Networklevel security and privacy control for smart-home IoT devices,” Wireless and Mobile Computing, Networking and Communications, pp. 163–167, 2015. | |
dc.relation.references | 9. T. D. P. Mendes et al., “Smart home communication technologies and applications: Wireless protocol assessment for home area network resources”, Energies, vol. 8, no. 7, pp. 7279–7311, 2015. | |
dc.relation.references | 10. C. Debes et al., “Monitoring Activities of Daily Living in Smart Homes: Understanding human behavior”, IEEE Signal Processing Magazine, vol. 33, no. 2, pp. 81-94, 2016. | |
dc.relation.references | 11. C. Lee et al., “Securing smart home: Technologies, security challenges, and security requirements”, IEEE Conference on Communications and Network Security, pp. 67–72, 2014. | |
dc.relation.references | 12. K. Islam et al., “Security and privacy considerations for wireless sensor networks in smart home environments”, Computer Supported Cooperative Work in Design, IEEE 16th International Conference on, pp. 626–633, 2012. | |
dc.relation.references | 13. H. Chan and A. Perrig, “Security and privacy in sensor networks”, Computer, vol. 36, no. 10, pp. 103–105, 2003 | |
dc.relation.references | 14. M. M. Hossain et al., “Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things”, Services, pp. 2128, 2015. | |
dc.relation.references | 15. M. Anwar et al., “Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges”, Health Policy and Technology, vol. 4, pp. 299–311, 2015. | |
dc.relation.references | 16. S. L. Keoh et al., “Securing the internet of things: A standardization perspective”, Internet of Things Journal, IEEE, vol. 1, no. 3, pp. 265–275, 2014. | |
dc.relation.references | 17. D. Altolini et al., “Low power link layer security for IoT: Implementation and performance analysis”, Wireless Communications and Mobile Computing Conference, pp. 919–925, 2013. | |
dc.relation.references | 18. H. C. Pohls et al., “RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects”, Wireless Communications and Networking Conference Workshops, pp. 122–127, 2014. | |
dc.relation.references | 19. G. Mantas et al., “Security in smart home environment”, Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications, pp. 170–191, 2010 | |
dc.relation.references | 20. N. P. Hoang and D. Pishva, “A TOR-based anonymous communication approach to secure smart home appliances”, Advanced Communication Technology, pp. 517–525, 2015. | |
dc.relation.references | 21. A. Riahi et al., “A systemic approach for IoT security”, Distributed Computing in Sensor Systems, pp. 351–355, 2013. | |
dc.relation.references | 22. A. Jacobsson and P. Davidsson, “Towards a Model of Privacy and Security for Smart Homes,” IEEE 2nd World Forum on Internet of Things, vol. 2, pp. 727–732, 2015 | |
dc.relation.references | 23. M. Henze et al., “A comprehensive approach to privacy in the cloud-based Internet of Things,” Future Generation Computer Systems, vol. 56, pp. 701–718, 2016. | |
dc.relation.references | 24. D. Barnard-Wills et al., “ENISA Threat Landscape and Good Practice Guide for Smart Home and Converged Media”, ENISA (The European Network and Information Security Agency), 2014. | |
dc.relation.referencesen | 1. D. J. Cook et al., "MavHome: An agent-based smart home", IEEE International Conference on Pervasive Computing and Communications, San Diego, CA, USA, pp. 521–524, 2003. | |
dc.relation.referencesen | 2. N. King, "Smart home – A Definition", Milton Keynes: Intertek Research and Testing Centre, 2003. | |
dc.relation.referencesen | 3. Statista, 2015 [Online]. Available: https://goo.gl/89rRIa. | |
dc.relation.referencesen | 4. August and Xfinity, "The Safe and Smart Home: Security in the Smart Home Era," 2016 [Online]. Available: http://goo.gl/UGWb5Z. | |
dc.relation.referencesen | 5. V. Srinivasan et al., "Protecting your daily in-home activity information from a wireless snooping attack," 10th international conference on Ubiquitous computing, pp. 202–211, 2008. | |
dc.relation.referencesen | 6. B. Ur et al., "The current state of access control for smart devices in homes," Workshop on Home Usable Privacy and Security, 2013. | |
dc.relation.referencesen | 7. S. Notra et al., "An experimental study of security and privacy risks with emerging household appliances", IEEE Conference on Communications and Network Security, pp. 79–84, 2014. | |
dc.relation.referencesen | 8. V. Sivaraman et al., "Networklevel security and privacy control for smart-home IoT devices," Wireless and Mobile Computing, Networking and Communications, pp. 163–167, 2015. | |
dc.relation.referencesen | 9. T. D. P. Mendes et al., "Smart home communication technologies and applications: Wireless protocol assessment for home area network resources", Energies, vol. 8, no. 7, pp. 7279–7311, 2015. | |
dc.relation.referencesen | 10. C. Debes et al., "Monitoring Activities of Daily Living in Smart Homes: Understanding human behavior", IEEE Signal Processing Magazine, vol. 33, no. 2, pp. 81-94, 2016. | |
dc.relation.referencesen | 11. C. Lee et al., "Securing smart home: Technologies, security challenges, and security requirements", IEEE Conference on Communications and Network Security, pp. 67–72, 2014. | |
dc.relation.referencesen | 12. K. Islam et al., "Security and privacy considerations for wireless sensor networks in smart home environments", Computer Supported Cooperative Work in Design, IEEE 16th International Conference on, pp. 626–633, 2012. | |
dc.relation.referencesen | 13. H. Chan and A. Perrig, "Security and privacy in sensor networks", Computer, vol. 36, no. 10, pp. 103–105, 2003 | |
dc.relation.referencesen | 14. M. M. Hossain et al., "Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things", Services, pp. 2128, 2015. | |
dc.relation.referencesen | 15. M. Anwar et al., "Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges", Health Policy and Technology, vol. 4, pp. 299–311, 2015. | |
dc.relation.referencesen | 16. S. L. Keoh et al., "Securing the internet of things: A standardization perspective", Internet of Things Journal, IEEE, vol. 1, no. 3, pp. 265–275, 2014. | |
dc.relation.referencesen | 17. D. Altolini et al., "Low power link layer security for IoT: Implementation and performance analysis", Wireless Communications and Mobile Computing Conference, pp. 919–925, 2013. | |
dc.relation.referencesen | 18. H. C. Pohls et al., "RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects", Wireless Communications and Networking Conference Workshops, pp. 122–127, 2014. | |
dc.relation.referencesen | 19. G. Mantas et al., "Security in smart home environment", Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications, pp. 170–191, 2010 | |
dc.relation.referencesen | 20. N. P. Hoang and D. Pishva, "A TOR-based anonymous communication approach to secure smart home appliances", Advanced Communication Technology, pp. 517–525, 2015. | |
dc.relation.referencesen | 21. A. Riahi et al., "A systemic approach for IoT security", Distributed Computing in Sensor Systems, pp. 351–355, 2013. | |
dc.relation.referencesen | 22. A. Jacobsson and P. Davidsson, "Towards a Model of Privacy and Security for Smart Homes," IEEE 2nd World Forum on Internet of Things, vol. 2, pp. 727–732, 2015 | |
dc.relation.referencesen | 23. M. Henze et al., "A comprehensive approach to privacy in the cloud-based Internet of Things," Future Generation Computer Systems, vol. 56, pp. 701–718, 2016. | |
dc.relation.referencesen | 24. D. Barnard-Wills et al., "ENISA Threat Landscape and Good Practice Guide for Smart Home and Converged Media", ENISA (The European Network and Information Security Agency), 2014. | |
dc.citation.journalTitle | Вісник Національного університету “Львівська політехніка”. Серія: Комп’ютерні системи та мережі | |
dc.citation.issue | 905 | |
dc.citation.spage | 49 | |
dc.citation.epage | 55 | |
dc.coverage.placename | Львів | |
dc.coverage.placename | Lviv | |
dc.subject.udc | 004.3 | |
dc.subject.udc | 004.7 | |
Appears in Collections: | Комп'ютерні системи та мережі. – 2018. – №905
|