Abstract

Internet of Things (IoT) allows households to have real-time access to various services such as IP cameras for monitoring home security, automatic climate controls, doors and window access for family members including pets, mood-based home lighting, or automatic refrigerators that tell what item is going to expire at what time, etc. However, IoT has often been considered a single-domain facility that provides services to consumers, but security and privacy issues pertaining to households and residential infrastructure have not been studied thoroughly. The security of IoT -based systems requires a critical engineering infrastructure when dealing with home security. Any proposed home security framework should establish an automatic access monitoring and regular updates of the system software and firmware according to the ongoing threats. In this paper, we provide an insightful short review of security issues in smart home systems. We highlight several popular IoT protocols and provide critical analysis of their performance against various security threats. Mitigation strategies are also presented to reduce the impact of cyberattacks on smart home systems. Furthermore, our analysis shows that DDoS is one of the most common threats to smart home systems. Therefore, we developed an ML-based model to detect DDoS attacks. We employed unique characteristics of IoT traffic to engineer features that enable ML algorithms to accurately classify DDoS traffic from normal/benign traffic.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.