A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

[HTML][HTML] Anomaly-based cyberattacks detection for smart homes: A systematic literature review

JII Araya, H Rifà-Pous - Internet of Things, 2023 - Elsevier
Smart homes, leveraging IoT technology to interconnect various devices and appliances to
the internet, enable remote monitoring, automation, and control. However, collecting …

[PDF][PDF] Evasion Attacks and Defenses on Smart Home Physical Event Verification.

MO Ozmen, R Song, H Farrukh, ZB Celik - NDSS, 2023 - researchgate.net
In smart homes, when an actuator's state changes, it sends an event notification to the IoT
hub to report this change (eg, the door is unlocked). Prior works have shown that event …

[HTML][HTML] Smart home anomaly-based IDS: Architecture proposal and case study

A Lara, V Mayor, R Estepa, A Estepa, JE Díaz-Verdejo - Internet of Things, 2023 - Elsevier
The complexity and diversity of the technologies involved in the Internet of Things (IoT)
challenge the generalization of security solutions based on anomaly detection, which should …

Who's controlling my device? Multi-user multi-device-aware access control system for shared smart home environment

AK Sikder, L Babun, ZB Celik, H Aksu… - ACM Transactions on …, 2022 - dl.acm.org
Multiple users have access to multiple devices in a smart home system–typically through a
dedicated app installed on a mobile device. Traditional access control mechanisms consider …

[PDF][PDF] The Truth Shall Set Thee Free: Enabling Practical Forensic Capabilities in Smart Environments.

L Babun, AK Sikder, A Acar, AS Uluagac - NDSS, 2022 - ndss-symposium.org
In smart environments such as smart homes and offices, the interaction between devices,
users, and apps generate abundant data. Such data contain valuable forensic information …

TAPInspector: Safety and liveness verification of concurrent trigger-action IoT systems

Y Yu, J Liu - IEEE Transactions on Information Forensics and …, 2022 - ieeexplore.ieee.org
Trigger-action programming (TAP) is a popular end-user programming framework that can
simplify the Internet of Things (IoT) automation with simple trigger-action rules. However, it …

Sentinel: A robust intrusion detection system for IoT networks using kernel-level system information

A Cosson, AK Sikder, L Babun, ZB Celik… - Proceedings of the …, 2021 - dl.acm.org
The concept of Internet of Things (IoT) has changed the way we live by integrating
commodity devices with cyberspace to automate our everyday tasks. Nowadays, IoT devices …

The Indoor Predictability of Human Mobility: Estimating Mobility With Smart Home Sensors

T Wang, DJ Cook, TR Fischer - IEEE transactions on emerging …, 2022 - ieeexplore.ieee.org
Analyzing human mobility patterns is valuable for understanding human behavior and
providing location-anticipating services. In this work, we theoretically estimate the …

A Two-Mode, Adaptive Security Framework for Smart Home Security Applications

D Sisodia, J Li, S Mergendahl, H Cam - ACM Transactions on Internet of …, 2023 - dl.acm.org
With the growth of the Internet of Things (IoT), the number of cyber attacks on the Internet is
on the rise. However, the resource-constrained nature of IoT devices and their networks …