Securing IoT for smart home system

FK Santoso, NCH Vun - 2015 international symposium on …, 2015 - ieeexplore.ieee.org
IoT smart home system that uses a gateway to enable secure communication between IoT
devices… user friendly interface running on mobile devices such as the ubiquitous smart phone. …

A supervised intrusion detection system for smart home IoT devices

E Anthi, L Williams, M Słowińska… - … Internet of Things …, 2019 - ieeexplore.ieee.org
… has on average 8, 5.4, and 2.5 smart devices, respectively. The testbed used to support the
… popular IoT devices; and thus is a representative example of a traditional smart home. Such …

HomeSnitch: Behavior transparency and control for smart home IoT devices

TJ OConnor, R Mohamed, M Miettinen… - Proceedings of the 12th …, 2019 - dl.acm.org
… We con gured HS to log and classify all smart home IoT device tra c in our environment
over two days. We correlated user activities (eg, turning on/o lights, resetting the co ee pot lter, …

Network-level security and privacy control for smart-home IoT devices

V Sivaraman, HH Gharakheili… - 2015 IEEE 11th …, 2015 - ieeexplore.ieee.org
smart-home devices. We believe our work is a first step towards IoT security that applies to a
broad range of IoT devices; … solution to several other smart-home devices for which we have …

User perceptions of smart home IoT privacy

S Zheng, N Apthorpe, M Chetty… - Proceedings of the ACM on …, 2018 - dl.acm.org
IoT devices, perceptions of smart home privacy risks, and actions taken to protect their privacy
from those external to the home who create, manage, track, or regulate IoT devicesdevice

Smart IoT devices in the home: Security and privacy implications

V Sivaraman, HH Gharakheili… - IEEE Technology …, 2018 - ieeexplore.ieee.org
… Consumers may expect their service providers will not on-sell data generated by their
smarthome IoT devices, for example, despite some license agreements allowing just that. Any …

Low-cost flow-based security solutions for smart-home IoT devices

A Sivanathan, D Sherratt… - 2016 IEEE …, 2016 - ieeexplore.ieee.org
… Traffic: The aim is to experiment on a smart-home environment comprising real IoT
devices and validate our approach by launching internal and external attacks to IoT devices. …

Vulnerability studies and security postures of IoT devices: A smart home case study

BD Davis, JC Mason, M Anwar - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
… Unbeknownst to the users, with adoption of these “smart home” technologies… smart home
IoT devices. We started with a literature review on known vulnerability studies of the IoT devices

[HTML][HTML] Ensemble machine learning approach for classification of IoT devices in smart home

I Cvitić, D Peraković, M Periša, B Gupta - International Journal of Machine …, 2021 - Springer
… a smart home where the number and types of devices grow daily. This research uses a total
of 41 IoT devices… generated by IoT devices. Research has shown that it is possible to classify …

ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices

SS Gill, P Garraghan, R Buyya - Journal of Systems and Software, 2019 - Elsevier
… an example smart home case study, we interconnected multiple IoT devices wirelessly
controllable by using a smartphone. The scenario we have created consists of a home consisting …