Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent.…mehr
Smart homes use Internet-connected devices, artificial intelligence, protocols and numerous technologies to enable people to remotely monitor their home, as well as manage various systems within it via the Internet using a smartphone or a computer. A smart home is programmed to act autonomously to improve comfort levels, save energy and potentially ensure safety; the result is a better way of life. Innovative solutions continue to be developed by researchers and engineers and thus smart home technologies are constantly evolving. By the same token, cybercrime is also becoming more prevalent. Indeed, a smart home system is made up of connected devices that cybercriminals can infiltrate to access private information, commit cyber vandalism or infect devices using botnets. This book addresses cyber attacks such as sniffing, port scanning, address spoofing, session hijacking, ransomware and denial of service. It presents, analyzes and discusses the various aspects of cybersecurity as well as solutions proposed by the research community to counter the risks. Cybersecurity in Smart Homes is intended for people who wish to understand the architectures, protocols and different technologies used in smart homes.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Rida Khatoun is Associate Professor at Telecom ParisTech, France. His current research interests are focused on cybersecurity in areas such as connected cars, cloud computing and the Internet of Things, as well as cybersecurity architectures, intrusion detection systems and blockchain technology.
Inhaltsangabe
Chapter 1 Home Automation Solutions for SecureWSN 1 Corinna SCHMITT and Marvin WEBER
1.1 Introduction 2
1.2 Background 4
1.2.1 SecureWSN 4
1.2.2 Communication standards 8
1.2.3 The monitor-analyse-plan-execute-knowledge model 12
1.2.4 Hardware and libraries 14
1.3 Design decisions 15
1.3.1 Requirements 16
1.3.2 HAIFA architecture 18
1.3.3 WebMaDa integration 29
1.4 Implementation 30
1.4.1 CoMaDa integration 30
1.4.2 HAIFA's ZigBee Gateway 48
1.4.3 WebMaDa integration 55
1.4.4 Uploading HA data to WebMaDa 56
1.4.5 Sending HA messages from WebMaDa to CoMaDa 59
1.4.6 WebMaDa's frontend 62
1.5 Evaluation of HAIFA 64
1.5.1 Actuator interoperability (R1) 65
1.5.2 Rule-based automation (R2) 65
1.5.3 Node hardware interoperability (R3) 68
1.5.4 CoMaDa and WebMaDa management (R4) 68
1.6 Summary and conclusions 68
1.7 Acknowledgements 69
1.8 References 70
Chapter 2 Smart Home Device Security: A Survey of Smart Home Authentication Methods with a Focus on Mutual Authentication and Key Management Practices 75 Robinson RAJU and Melody MOH
2.1 Introduction 75
2.2 Smart home - introduction and technologies 77
2.2.1 Smart home - introduction 77
2.2.2 Smart home devices - categories 79
2.3 Smart home security 80
2.3.1 Threats 81
2.3.2 Vulnerabilities 82
2.3.3 IoT communication protocols 84
2.3.4 Enhancements to IoT communication protocols 86
2.3.5 IoT security architectures 87
2.4 Smart home authentication mechanisms 91
2.4.1 Stages of defining an authentication protocol for IoT 92
2.4.2 Taxonomy of authentication schemes for IoT 93
2.5 A primer on mutual authentication and key management terminologies 96
2.5.1 X.509 certificate 97
2.5.2 CoAP and DTLS 99
2.5.3 TLS 1.3 101
2.5.4 Key management fundamentals 102
2.6 Mutual authentication in smart home systems 104
2.6.1 Device and user onboarding 105
2.6.2 Flow of user authentication and authorization 106
2.6.3 Examples of mutual authentication schemes 107
2.7 Challenges and open research issues 112
2.8 Conclusion 113
2.9 References 114
Chapter 3 SRAM Physically Unclonable Functions for Smart Home IoT Telehealth Environments 125 Fayez GEBALI and Mohammad MAMUN
Chapter 1 Home Automation Solutions for SecureWSN 1 Corinna SCHMITT and Marvin WEBER
1.1 Introduction 2
1.2 Background 4
1.2.1 SecureWSN 4
1.2.2 Communication standards 8
1.2.3 The monitor-analyse-plan-execute-knowledge model 12
1.2.4 Hardware and libraries 14
1.3 Design decisions 15
1.3.1 Requirements 16
1.3.2 HAIFA architecture 18
1.3.3 WebMaDa integration 29
1.4 Implementation 30
1.4.1 CoMaDa integration 30
1.4.2 HAIFA's ZigBee Gateway 48
1.4.3 WebMaDa integration 55
1.4.4 Uploading HA data to WebMaDa 56
1.4.5 Sending HA messages from WebMaDa to CoMaDa 59
1.4.6 WebMaDa's frontend 62
1.5 Evaluation of HAIFA 64
1.5.1 Actuator interoperability (R1) 65
1.5.2 Rule-based automation (R2) 65
1.5.3 Node hardware interoperability (R3) 68
1.5.4 CoMaDa and WebMaDa management (R4) 68
1.6 Summary and conclusions 68
1.7 Acknowledgements 69
1.8 References 70
Chapter 2 Smart Home Device Security: A Survey of Smart Home Authentication Methods with a Focus on Mutual Authentication and Key Management Practices 75 Robinson RAJU and Melody MOH
2.1 Introduction 75
2.2 Smart home - introduction and technologies 77
2.2.1 Smart home - introduction 77
2.2.2 Smart home devices - categories 79
2.3 Smart home security 80
2.3.1 Threats 81
2.3.2 Vulnerabilities 82
2.3.3 IoT communication protocols 84
2.3.4 Enhancements to IoT communication protocols 86
2.3.5 IoT security architectures 87
2.4 Smart home authentication mechanisms 91
2.4.1 Stages of defining an authentication protocol for IoT 92
2.4.2 Taxonomy of authentication schemes for IoT 93
2.5 A primer on mutual authentication and key management terminologies 96
2.5.1 X.509 certificate 97
2.5.2 CoAP and DTLS 99
2.5.3 TLS 1.3 101
2.5.4 Key management fundamentals 102
2.6 Mutual authentication in smart home systems 104
2.6.1 Device and user onboarding 105
2.6.2 Flow of user authentication and authorization 106
2.6.3 Examples of mutual authentication schemes 107
2.7 Challenges and open research issues 112
2.8 Conclusion 113
2.9 References 114
Chapter 3 SRAM Physically Unclonable Functions for Smart Home IoT Telehealth Environments 125 Fayez GEBALI and Mohammad MAMUN