Open Access   Article Go Back

IoT Home Guard: Enhancing Security for Smart Home Privacy and Protection

Souvik Sikdar1 , Samya Das2 , Soham Dey3 , Radha Krishna Jana4

Section:Research Paper, Product Type: Journal Paper
Volume-11 , Issue-01 , Page no. 301-309, Nov-2023

Online published on Nov 30, 2023

Copyright © Souvik Sikdar, Samya Das, Soham Dey, Radha Krishna Jana . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Souvik Sikdar, Samya Das, Soham Dey, Radha Krishna Jana, “IoT Home Guard: Enhancing Security for Smart Home Privacy and Protection,” International Journal of Computer Sciences and Engineering, Vol.11, Issue.01, pp.301-309, 2023.

MLA Style Citation: Souvik Sikdar, Samya Das, Soham Dey, Radha Krishna Jana "IoT Home Guard: Enhancing Security for Smart Home Privacy and Protection." International Journal of Computer Sciences and Engineering 11.01 (2023): 301-309.

APA Style Citation: Souvik Sikdar, Samya Das, Soham Dey, Radha Krishna Jana, (2023). IoT Home Guard: Enhancing Security for Smart Home Privacy and Protection. International Journal of Computer Sciences and Engineering, 11(01), 301-309.

BibTex Style Citation:
@article{Sikdar_2023,
author = {Souvik Sikdar, Samya Das, Soham Dey, Radha Krishna Jana},
title = {IoT Home Guard: Enhancing Security for Smart Home Privacy and Protection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2023},
volume = {11},
Issue = {01},
month = {11},
year = {2023},
issn = {2347-2693},
pages = {301-309},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1449},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1449
TI - IoT Home Guard: Enhancing Security for Smart Home Privacy and Protection
T2 - International Journal of Computer Sciences and Engineering
AU - Souvik Sikdar, Samya Das, Soham Dey, Radha Krishna Jana
PY - 2023
DA - 2023/11/30
PB - IJCSE, Indore, INDIA
SP - 301-309
IS - 01
VL - 11
SN - 2347-2693
ER -

           

Abstract

The advent of smart homes using IoT has transformed the way households operate, providing convenience and efficiency to residents. However, the integration of IoT devices in the home network also creates security risks that may compromise the privacy and safety of individuals and households. This research paper provides an analysis of the security risks associated with smart homes using IoT, including hacking, unauthorized access, data breaches, device vulnerabilities, and insecure networks. The study also discusses the impact of these security risks on households and individuals, such as financial losses, privacy violations, physical harm, and emotional distress. The research design utilized a qualitative approach, including a literature review and interviews with experts in the field. The findings of the research emphasize the need for implementing strong security measures, such as strong passwords, two-factor authentication, encryption, and regular software updates, to mitigate the security risks associated with smart homes using IoT.

Key-Words / Index Term

Smart homes, IoT, Security risks, Hacking, Data breaches, Privacy violations.

References

[1]. Alrawais, A., & Alenezi, A. (2020). Security challenges and solutions in smart homes: A survey. IEEE Access, 8, pp.158026-158045, 2020.
[2]. Aung, M. M., & He, W. (2019). Security and privacy in smart homes: A survey. IEEE Communications Surveys & Tutorials, 21(4), pp.2971-2998, (2019.
[3]. Chow, R., & Golle, P. (2014). Security and privacy challenges in the internet of things. IEEE Security & Privacy, 12(2), pp.102-114, 2014.
[4]. Das, S., & Mukhopadhyay, S. K. (2016). Security and privacy issues in smart homes: A survey. IEEE Communications Surveys & Tutorials, 18(4), pp.2296-2327, 2016.
[5]. Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems, 29(7), pp.1645-1660, 2013.
[6]. Anderson, J., Wilson, R., & Smith, M. (2017). The Mirai Botnet attack: Analysis and implications. Journal of Cybersecurity, 10(2), 45-60.
[7]. Brown, K., & Davis, L. (2020). Enhancing IoT security: Industry-wide standards and best practices. International Journal of Information Security, 15(3), pp.167-182, 2020.
[8]. Davis, L. (2019). Recruitment methods for research participants: A systematic review. Journal of Research Methods, 25(4), pp.89-105, 2019.
[9]. Johnson, R., & Smith, A. (2018). Ethical guidelines for research with human subjects. Journal of Applied Ethics, 12(1), pp.35-50, 2018.
[10]. Jones, S., & Brown, K. (2020). Informed consent in research: Best practices and challenges. Journal of Ethics in Research, 18(2), pp.75-92, 2020.
[11]. Miller, P. (2018). Online advertising as a recruitment method in research: A comparative analysis. Journal of Research Methods, 22(3), pp.123-138, 2018.
[12]. Robinson, E. (2017). Security breaches in smart homes: Case studies and lessons learned. Journal of Cybersecurity Research, 5(1), pp.20-35, 2017.
[13]. Internet of Things Agenda (2020). IoT device security: An introduction.
[14]. McAfee. (n.d.). McAfee Labs Threats Report: March 2018.