Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and ef...
Saved in:
Published in: | Sensors (Basel, Switzerland) Vol. 18; no. 3; p. 817 |
---|---|
Main Authors: | , |
Format: | Journal Article |
Language: | English |
Published: |
Switzerland
MDPI AG
08-03-2018
MDPI |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Abstract | The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. |
---|---|
AbstractList | The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes. |
Author | Ali, Bako Awad, Ali Ismail |
AuthorAffiliation | 1 Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, 971 87 Luleå, Sweden; bakoali@hotmail.com 2 Faculty of Engineering, Al Azhar University, P.O. Box 83513 Qena, Egypt |
AuthorAffiliation_xml | – name: 1 Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, 971 87 Luleå, Sweden; bakoali@hotmail.com – name: 2 Faculty of Engineering, Al Azhar University, P.O. Box 83513 Qena, Egypt |
Author_xml | – sequence: 1 givenname: Bako orcidid: 0000-0002-2309-4930 surname: Ali fullname: Ali, Bako email: bakoali@hotmail.com organization: Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, 971 87 Luleå, Sweden. bakoali@hotmail.com – sequence: 2 givenname: Ali Ismail orcidid: 0000-0002-3800-0757 surname: Awad fullname: Awad, Ali Ismail email: ali.awad@ltu.se, ali.awad@ltu.se organization: Faculty of Engineering, Al Azhar University, P.O. Box 83513 Qena, Egypt. ali.awad@ltu.se |
BackLink | https://www.ncbi.nlm.nih.gov/pubmed/29518023$$D View this record in MEDLINE/PubMed https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-67897$$DView record from Swedish Publication Index |
BookMark | eNpdkttrFDEUh4NU7EUf_AdkwBcLjuYyub0U1vXShaJCa19DkjlpZ5md1GTGsv-92W5duj7l9p0vPw7nGB0McQCEXhP8gTGNP2aiMMOKyGfoiDS0qRWl-ODJ_hAd57zEmDLG1At0SDUvJZQdoe_ztYNU2aGtft6uc-dtX12Cn1I3rqvrqR8gWdf1m9MsZ8h5BcNYhZiqRbyqP9kMbXW5smmszuMK8kv0PNg-w6vH9QT9-vrlan5eX_z4tpjPLmrPsRhr56XHSkkMOHAVSOM5bawljcQt10w7IFx5yZ0ESgJmOjQNbUWjRShFbWAnaLH1ttEuzV3qSoS1ibYzDxcx3ZiSqfM9GMedU6rhGoRoKJOaCXAhlH-Atlbg4nq_deV7uJvcnu1zdz17sPXjZIRUWhb8bIsXdgWtL_1Itt-r2n8ZultzE_8YrqRQmhXBu0dBir8nyKNZddlD39sB4pQNxYRqwhnWBX37H7qMUxpKZwtFBcdSqY3wdEv5FHNOEHZhCDabATG7ASnsm6fpd-S_iWB_AU6XtmE |
CitedBy_id | crossref_primary_10_3390_electronics11071123 crossref_primary_10_1016_j_comnet_2019_01_023 crossref_primary_10_1016_j_cose_2021_102491 crossref_primary_10_32604_cmc_2023_031155 crossref_primary_10_1016_j_compeleceng_2023_108667 crossref_primary_10_32604_csse_2023_024605 crossref_primary_10_1007_s42979_021_00555_2 crossref_primary_10_3390_electronics9060967 crossref_primary_10_3390_su15129812 crossref_primary_10_1155_2022_2834982 crossref_primary_10_1007_s13042_020_01241_0 crossref_primary_10_3390_s23187936 crossref_primary_10_1109_ACCESS_2023_3244490 crossref_primary_10_3390_app122412688 crossref_primary_10_1016_j_iot_2022_100653 crossref_primary_10_1016_j_bcra_2023_100178 crossref_primary_10_3390_app8112305 crossref_primary_10_3390_fi11100207 crossref_primary_10_4236_jis_2020_112005 crossref_primary_10_1016_j_scs_2019_101728 crossref_primary_10_3390_s19092148 crossref_primary_10_1109_ACCESS_2020_2993548 crossref_primary_10_3390_s19081929 crossref_primary_10_3390_su142214915 crossref_primary_10_1109_ACCESS_2020_3037032 crossref_primary_10_1016_j_prime_2023_100137 crossref_primary_10_1109_JSEN_2023_3273456 crossref_primary_10_3390_s19183973 crossref_primary_10_1109_ACCESS_2019_2943929 crossref_primary_10_1016_j_future_2022_03_001 crossref_primary_10_1016_j_techsoc_2022_102118 crossref_primary_10_3390_electronics9040604 crossref_primary_10_32604_cmc_2022_026226 crossref_primary_10_48175_IJARSCT_874 crossref_primary_10_1109_ACCESS_2020_3048163 crossref_primary_10_3390_iot4020005 crossref_primary_10_3390_s19235237 crossref_primary_10_3390_risks9060113 crossref_primary_10_3390_s23020652 crossref_primary_10_1109_ACCESS_2022_3224806 crossref_primary_10_1109_JIOT_2020_2983983 crossref_primary_10_1016_j_jisa_2024_103748 crossref_primary_10_1016_j_jnca_2020_102779 crossref_primary_10_1155_2021_4401809 crossref_primary_10_1016_j_jisa_2020_102644 crossref_primary_10_1108_K_02_2021_0161 crossref_primary_10_1109_TITS_2023_3307660 crossref_primary_10_3390_electronics12183958 crossref_primary_10_1016_j_iot_2019_100129 crossref_primary_10_1016_j_jii_2023_100549 crossref_primary_10_4018_IJOCI_312222 crossref_primary_10_1016_j_procs_2018_10_199 crossref_primary_10_1515_gj_2022_0032 crossref_primary_10_1016_j_iot_2020_100162 crossref_primary_10_1109_ACCESS_2020_3017221 crossref_primary_10_3390_app11199183 crossref_primary_10_3390_app132111985 crossref_primary_10_1080_0952813X_2021_1970824 crossref_primary_10_1109_ACCESS_2019_2907602 crossref_primary_10_1002_spy2_207 crossref_primary_10_3390_electronics11050742 crossref_primary_10_3390_s19214757 crossref_primary_10_3390_s19051249 crossref_primary_10_3390_s21092986 crossref_primary_10_1016_j_future_2020_03_042 crossref_primary_10_3389_fbuil_2024_1333146 crossref_primary_10_3390_s20051389 crossref_primary_10_1145_3437537 crossref_primary_10_1109_JIOT_2021_3051467 crossref_primary_10_1155_2022_6977485 crossref_primary_10_1109_JAS_2020_1003536 crossref_primary_10_1109_ACCESS_2018_2838339 crossref_primary_10_1016_j_iot_2022_100610 crossref_primary_10_1108_LHT_11_2018_0166 crossref_primary_10_1186_s13677_018_0123_6 crossref_primary_10_3390_app13159032 crossref_primary_10_3390_electronics12143185 crossref_primary_10_1016_j_adhoc_2019_02_007 crossref_primary_10_1007_s40860_023_00202_y crossref_primary_10_1186_s13635_020_00111_0 crossref_primary_10_3390_s23218720 crossref_primary_10_1155_2022_1833062 crossref_primary_10_1016_j_adhoc_2024_103576 crossref_primary_10_1016_j_techsoc_2021_101683 crossref_primary_10_1002_ett_3859 crossref_primary_10_1007_s11276_019_02043_1 crossref_primary_10_1016_j_tele_2020_101377 crossref_primary_10_1145_3410160 crossref_primary_10_3390_s18092796 crossref_primary_10_1109_ACCESS_2021_3054575 crossref_primary_10_3390_fi11040089 crossref_primary_10_1109_ACCESS_2021_3137175 crossref_primary_10_4108_eetsc_v6i18_2345 crossref_primary_10_3390_app9132746 crossref_primary_10_1145_3635030 crossref_primary_10_1109_ACCESS_2020_2986480 crossref_primary_10_1016_j_cose_2022_102677 crossref_primary_10_1109_TII_2022_3192035 crossref_primary_10_35848_1347_4065_abf3a0 crossref_primary_10_1145_3394504 crossref_primary_10_3390_pr10122673 crossref_primary_10_1016_j_ecolind_2020_106866 crossref_primary_10_1111_exsy_13113 crossref_primary_10_1108_ICS_04_2018_0048 crossref_primary_10_1088_1742_6596_1447_1_012054 crossref_primary_10_1109_ACCESS_2019_2942846 crossref_primary_10_1145_3510360 crossref_primary_10_1109_OJVT_2023_3234069 crossref_primary_10_1016_j_erss_2021_102211 crossref_primary_10_3390_s23156979 crossref_primary_10_1155_2020_8829595 crossref_primary_10_3390_jcp2010005 crossref_primary_10_1007_s42979_024_02702_x crossref_primary_10_1108_JEDT_06_2021_0320 crossref_primary_10_1109_TSE_2022_3179294 crossref_primary_10_3390_s19010015 crossref_primary_10_1007_s10796_019_09970_6 crossref_primary_10_1016_j_ijdrr_2021_102141 crossref_primary_10_3390_s23042078 crossref_primary_10_1007_s10922_024_09803_1 crossref_primary_10_1016_j_adhoc_2021_102685 crossref_primary_10_1016_j_cose_2022_102718 crossref_primary_10_1016_j_cose_2021_102418 crossref_primary_10_5817_MUJLT2021_2_1 |
Cites_doi | 10.1109/COMST.2015.2444095 10.1016/j.egypro.2017.03.238 10.1007/s10586-017-1105-z 10.3390/s17010069 10.1007/s11859-014-1031-3 10.1016/j.cose.2016.03.004 10.3390/s17091978 10.1109/TDSC.2015.2465965 10.1016/j.future.2015.09.003 10.1080/15325008.2013.832439 10.1007/s11276-014-0761-7 10.3390/fi9010007 10.1016/j.procs.2015.05.013 10.1016/j.patcog.2014.08.024 10.1016/j.engappai.2012.05.002 10.3390/s17050979 10.1109/MITP.2017.3680959 |
ContentType | Journal Article |
Copyright | Copyright MDPI AG 2018 2018 by the authors. 2018 |
Copyright_xml | – notice: Copyright MDPI AG 2018 – notice: 2018 by the authors. 2018 |
DBID | NPM AAYXX CITATION 3V. 7X7 7XB 88E 8FI 8FJ 8FK ABUWG AFKRA AZQEC BENPR CCPQU DWQXO FYUFA GHDGH K9. M0S M1P PIMPY PQEST PQQKQ PQUKI 7X8 5PM ADTPV AOWAS DOA |
DOI | 10.3390/s18030817 |
DatabaseName | PubMed CrossRef ProQuest Central (Corporate) Health & Medical Collection ProQuest Central (purchase pre-March 2016) Medical Database (Alumni Edition) Hospital Premium Collection Hospital Premium Collection (Alumni Edition) ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One Community College ProQuest Central Korea Health Research Premium Collection Health Research Premium Collection (Alumni) ProQuest Health & Medical Complete (Alumni) Health & Medical Collection (Alumni Edition) PML(ProQuest Medical Library) Publicly Available Content Database ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition MEDLINE - Academic PubMed Central (Full Participant titles) SwePub SwePub Articles DOAJ Directory of Open Access Journals |
DatabaseTitle | PubMed CrossRef Publicly Available Content Database ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Health & Medical Complete (Alumni) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Hospital Collection Health Research Premium Collection (Alumni) ProQuest Hospital Collection (Alumni) ProQuest Central ProQuest Health & Medical Complete Health Research Premium Collection ProQuest Medical Library ProQuest One Academic UKI Edition Health and Medicine Complete (Alumni Edition) ProQuest Central Korea ProQuest One Academic ProQuest Medical Library (Alumni) ProQuest Central (Alumni) MEDLINE - Academic |
DatabaseTitleList | MEDLINE - Academic PubMed Publicly Available Content Database |
Database_xml | – sequence: 1 dbid: DOA name: Directory of Open Access Journals url: http://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1424-8220 |
ExternalDocumentID | oai_doaj_org_article_b5bb88459e664237936ebffd59e2da60 oai_DiVA_org_ltu_67897 10_3390_s18030817 29518023 |
Genre | Journal Article |
GroupedDBID | --- 123 2WC 3V. 53G 5VS 7X7 88E 8FE 8FG 8FI 8FJ AADQD AAHBH ABDBF ABJCF ABUWG ADBBV ADRAZ AENEX AFKRA AFZYC ALIPV ALMA_UNASSIGNED_HOLDINGS ARAPS BENPR BPHCQ BVXVI CCPQU CS3 D1I DU5 E3Z EBD ESX F5P FYUFA GROUPED_DOAJ GX1 HCIFZ HH5 HMCUK HYE IPNFZ KB. KQ8 L6V M1P M48 M7S MODMG M~E NPM OK1 P2P P62 PDBOC PIMPY PQQKQ PROAC PSQYO RIG RNS RPM TUS UKHRP XSB ~8M AAYXX CITATION 7XB 8FK AZQEC DWQXO K9. PQEST PQUKI 7X8 5PM ADTPV AOWAS IAO ITC |
ID | FETCH-LOGICAL-c506t-bc7c08870e0f58f14c524aa1470d5939be158c75b7e21f039f442d6496f870df3 |
IEDL.DBID | RPM |
ISSN | 1424-8220 |
IngestDate | Tue Oct 22 15:15:15 EDT 2024 Tue Oct 01 22:37:11 EDT 2024 Tue Sep 17 20:58:29 EDT 2024 Fri Jun 28 03:55:46 EDT 2024 Thu Oct 10 17:59:14 EDT 2024 Fri Aug 23 03:52:08 EDT 2024 Wed Oct 16 00:59:17 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | security risk assessment OCTAVE Allegro smart homes the Internet of Things (IoT) |
Language | English |
License | Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c506t-bc7c08870e0f58f14c524aa1470d5939be158c75b7e21f039f442d6496f870df3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ORCID | 0000-0002-2309-4930 0000-0002-3800-0757 |
OpenAccessLink | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5876893/ |
PMID | 29518023 |
PQID | 2026507883 |
PQPubID | 2032333 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_b5bb88459e664237936ebffd59e2da60 swepub_primary_oai_DiVA_org_ltu_67897 pubmedcentral_primary_oai_pubmedcentral_nih_gov_5876893 proquest_miscellaneous_2012915309 proquest_journals_2026507883 crossref_primary_10_3390_s18030817 pubmed_primary_29518023 |
PublicationCentury | 2000 |
PublicationDate | 2018-03-08 |
PublicationDateYYYYMMDD | 2018-03-08 |
PublicationDate_xml | – month: 03 year: 2018 text: 2018-03-08 day: 08 |
PublicationDecade | 2010 |
PublicationPlace | Switzerland |
PublicationPlace_xml | – name: Switzerland – name: Basel |
PublicationTitle | Sensors (Basel, Switzerland) |
PublicationTitleAlternate | Sensors (Basel) |
PublicationYear | 2018 |
Publisher | MDPI AG MDPI |
Publisher_xml | – name: MDPI AG – name: MDPI |
References | ref57 ref12 ref56 ref59 ref14 ref58 ref53 ref52 ref55 ref10 ref54 Kyas (ref16) 2013 Ning (ref2) 2013 ref17 Yoo (ref28) 2007; 26 Awad (ref51) 2011; Volume 179 ref19 (ref8) 2003 Erdogan (ref11) 2010 Nixon (ref30) 2005 Stallings (ref48) 2014 ref50 Awad (ref63) 2013; 37 Awad (ref47) 2016 Bandyopadhyay (ref23) 2011 Okoh (ref46) 2015; Volume 9085 ref41 ref44 Suryadevara (ref5) 2015 ref49 ref7 ref4 ref6 ref40 King (ref1) 2016; 40 ref35 ref34 ref37 ref36 ref31 Caralli (ref42) 2007 ref33 ref32 Evans (ref21) 2011 ref39 ref38 Egawa (ref64) 2012; Volume 294 Awad (ref45) 2014; Volume 555 Fathy (ref62) 2012; Volume 322 ref24 Acharjya (ref18) 2017 ref26 ref25 ref20 Miller (ref3) 2015 ref22 ref65 Zupancic (ref13) 2014; 38 ref27 ref29 Aarts (ref9) 2003 ref60 Al-Qutayri (ref15) 2010 ref61 Caralli (ref43) 2007 |
References_xml | – ident: ref4 doi: 10.1109/COMST.2015.2444095 – ident: ref7 doi: 10.1016/j.egypro.2017.03.238 – ident: ref20 – ident: ref24 – ident: ref27 – ident: ref61 doi: 10.1007/s10586-017-1105-z – volume: Volume 322 start-page: 516 year: 2012 ident: ref62 article-title: Advanced Encryption Standard Algorithm: Issues and Implementation Aspects contributor: fullname: Fathy – year: 2015 ident: ref3 contributor: fullname: Miller – ident: ref57 – year: 2014 ident: ref48 contributor: fullname: Stallings – ident: ref34 – year: 2013 ident: ref2 contributor: fullname: Ning – year: 2007 ident: ref42 contributor: fullname: Caralli – ident: ref58 doi: 10.3390/s17010069 – ident: ref6 – volume: Volume 9085 start-page: 92 year: 2015 ident: ref46 article-title: Biometrics Applications in e-Health Security: A Preliminary Survey contributor: fullname: Okoh – volume: Volume 179 start-page: 122 year: 2011 ident: ref51 article-title: Fingerprint Singularity Detection: A Comparative Study contributor: fullname: Awad – volume: 37 start-page: 279 year: 2013 ident: ref63 article-title: Fingerprint Local Invariant Feature Extraction on GPU with CUDA publication-title: Informatica (Slovenia) contributor: fullname: Awad – year: 2011 ident: ref21 contributor: fullname: Evans – ident: ref40 – ident: ref50 – volume: Volume 294 start-page: 231 year: 2012 ident: ref64 article-title: Evaluation of Acceleration Algorithm for Biometric Identification contributor: fullname: Egawa – ident: ref26 – year: 2015 ident: ref5 contributor: fullname: Suryadevara – ident: ref37 doi: 10.1007/s11859-014-1031-3 – start-page: 288 year: 2011 ident: ref23 article-title: A Survey of Middleware for Internet of Things contributor: fullname: Bandyopadhyay – year: 2003 ident: ref9 contributor: fullname: Aarts – ident: ref44 doi: 10.1016/j.cose.2016.03.004 – ident: ref54 – ident: ref33 – ident: ref59 doi: 10.3390/s17091978 – ident: ref39 – start-page: 1 year: 2010 ident: ref15 article-title: IIntegrated Wireless Technologies for Smart Homes Applications contributor: fullname: Al-Qutayri – ident: ref53 doi: 10.1109/TDSC.2015.2465965 – ident: ref35 doi: 10.1016/j.future.2015.09.003 – start-page: 1 year: 2003 ident: ref8 article-title: Inside the Smart Home: Ideas, Possibilities and Methods – volume: Volume 555 start-page: 47 year: 2014 ident: ref45 article-title: Impact of Some Biometric Modalities on Forensic Science contributor: fullname: Awad – ident: ref12 doi: 10.1080/15325008.2013.832439 – ident: ref29 – ident: ref41 – year: 2017 ident: ref18 contributor: fullname: Acharjya – ident: ref22 – ident: ref36 doi: 10.1007/s11276-014-0761-7 – volume: 40 start-page: 133 year: 2016 ident: ref1 article-title: A Distributed Security Mechanism for Resource-Constrained IoT Devices publication-title: Informatica (Slovenia) contributor: fullname: King – start-page: 891 year: 2016 ident: ref47 article-title: Fast Fingerprint Orientation Field Estimation Incorporating General Purpose GPU contributor: fullname: Awad – ident: ref19 – ident: ref32 – year: 2007 ident: ref43 contributor: fullname: Caralli – ident: ref55 – volume: 26 year: 2007 ident: ref28 article-title: Home-network Security Model in Ubiquitous Environment publication-title: Proc. World Acad. Sci. Eng. Technol. contributor: fullname: Yoo – ident: ref25 doi: 10.3390/fi9010007 – start-page: 572 year: 2010 ident: ref11 article-title: Mobility Monitoring by Using RSSI in Wireless Sensor Networks contributor: fullname: Erdogan – year: 2013 ident: ref16 contributor: fullname: Kyas – ident: ref60 doi: 10.1016/j.procs.2015.05.013 – ident: ref56 doi: 10.1016/j.patcog.2014.08.024 – ident: ref49 – ident: ref52 – ident: ref17 doi: 10.1016/j.engappai.2012.05.002 – start-page: 249 year: 2005 ident: ref30 article-title: Security, Privacy and Trust Issues in Smart Environments contributor: fullname: Nixon – ident: ref65 doi: 10.3390/s17050979 – ident: ref10 – volume: 38 start-page: 171 year: 2014 ident: ref13 article-title: Smart-home Energy Management in the Context of Occupants’ Activity publication-title: Informatica (Slovenia) contributor: fullname: Zupancic – ident: ref14 – ident: ref31 – ident: ref38 doi: 10.1109/MITP.2017.3680959 |
SSID | ssj0023338 |
Score | 2.6382663 |
Snippet | The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users.... The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users.... |
SourceID | doaj swepub pubmedcentral proquest crossref pubmed |
SourceType | Open Website Open Access Repository Aggregation Database Index Database |
StartPage | 817 |
SubjectTerms | Containers Cybersecurity Information systems Informationssystem Inhabitants Internet of Things Life assessment OCTAVE Allegro security risk assessment Smart buildings smart homes Smart houses the Internet of Things (IoT) Vulnerability |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB5BT3BAQHkESuUiOEZN7Di2j9uXyqVC2lJxi-KXqNRmUXdz6L9nxskGIpC49OqHZH_jxzca-xuAT7ZUFNALuS2Fy6vI29w4WeVOUMgXCX8IFNE9X6qL7_rklGRyplRf9CZskAcegDu00lqtK2lCXdMTDiPqYGP0WMB9Ww_eemG2ztToagn0vAYdIYFO_eG61KTLkrKS_b59kkj_v5jl3w8kZzKi6eo5ew7PRs7IFsNYX8Cj0L2Ep38oCe7CxfG9DXes7Tz7OiLPlmNqOnbV35C2dHoGe88WkxYnQ8LKvqwu8yO8yjxb3iIajPKmr1_Bt7PTy-PzfEyVkDtZ1JvcOuXovChCEaWOZeUkr9q2rFSBSAljQym1U9KqwMtYCBOrivu6MnXETj6K17DTrbrwFhgvvVW2jpL-J6jItaPIbE0pOlonpM_g4xbC5uegiNGgJ0E4NxPOGRwRuFMDErFOBWjaZjRt8z_TZrC3NU0z7qx1w9FpRA6rtcjgYKrGPUGBjrYLq57aIIvBo7wwGbwZLDmNhCOlJNG7DNTMxrOhzmu66x9Jd1vizYH0LoPPw2qYdTm5vlqk2d1s-gYZgFHvHgKD9_AEZ5N-QRZ6D3Y2d334AI_Xvt9PK_4XqEEGAQ priority: 102 providerName: Directory of Open Access Journals |
Title | Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes |
URI | https://www.ncbi.nlm.nih.gov/pubmed/29518023 https://www.proquest.com/docview/2026507883 https://search.proquest.com/docview/2012915309 https://pubmed.ncbi.nlm.nih.gov/PMC5876893 https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-67897 https://doaj.org/article/b5bb88459e664237936ebffd59e2da60 |
Volume | 18 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9swDCaWnrbDsPe8dYU6bEc3tmVZ8jFNW7SHFQXSFbsZlixtARKnSOJD__1I-YEZ7WlXy4IpkhJJk_oI8E3HkhJ6NtQxN2HqkjLMjUhDwynliw6_tZTRvVzI61_q7JxgckR_F8YX7Ru9PKlX65N6-cfXVt6vzbSvE5ve_JgL3MJoZ6cTmKCC9iF6F2VxDLpaCCGO8fx0FyuCZImp216C7gQBno1skIfqf8q_fFwmOQIT9Qbo4hW87DxHNmspfA3PbP0GXvyDJ_gWrucP2m5ZWVfspuM_W3QN6thdsyKEaV8M-8BmAyInQ7eVXW1uw1M0aBVbrJEHjLqn797Bz4vz2_ll2DVMCI2Isn2ojTR0akQ2ckK5ODUiScsyTmVUiZzn2sZCGSm0tEnsIp67NE2qLM0zh5Mqx9_DQb2p7UdgSVxpqTMn6JaCdIkylJ_NqFFHabioAvjas7C4b3ExCowniOXFwPIATom5wwsEZe0fbLa_i06ghRZaK5WK3GYZ1ejkPLPaOSTYJlWZRQEc9qIpuv21KxIMHdGTVYoHcDwM486gdEdZ201D76Avgwd6lAfwoZXkQEmvCQHIkYxHpI5HUBk9-nanfAF8b7VhNOVseTfzq1vtmwL9gFx--u8vfIbnuAR_ATJSh3Cw3zb2C0x2VXPk_xwceb3_C5ZxBz8 |
link.rule.ids | 230,315,730,783,787,867,888,2109,27936,27937,53804,53806 |
linkProvider | National Library of Medicine |
linkToHtml | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fb9MwED6x8QB74PdGYIBB8Jg1ie3Yeey6TZ3YqkktE29R7NhQqU2ntnnYf8_ZSSoieNprnCgX313uO935O4CvKhauoGdCFVMdMpsUYaY5CzV1JV8E_Ma4iu54KiY_5dm5o8nh3VkY37Sv1fykWixPqvlv31t5t9SDrk9scHM94ujCGGcHe_AY_TViXZLe5lkU066GRIhiRj_YxNKRssRu3l6CgMJRnvWikCfr_x_C_LdRskcn6kPQxfMHCv8CnrWYkwyb5ZfwyFSv4OAvJsLXMBndK7MmRVWSm1ZzZNqOtiO39cJxU_s22nsy3HF5EgS85HI1C08xFJZkukQBiJu7vnkDPy7OZ6Nx2I5aCDWP0m2otNDufxOZyHJpY6Z5wooiZiIqeUYzZWIuteBKmCS2Ec0sY0mZsiy1-FBp6SHsV6vKvAWSxKUSKrXcnW8QNpHaVXZTN-Kj0JSXAXzptj6_axg1csxEnKrynaoCOHVK2d3gSLD9hdX6V97uZq64UlIynpk0dd09GU2NshYFNklZpFEAx51K89YzN3mCSSdiYClpAJ93y-hTrlBSVGZVu3sQBWEoiLIAjhoL2EnSWVAAomcbPVH7K2gJnre71XwA3xor6j1yNr8d-q9bbOscEUQm3j34DZ_gyXh2fZVfXU6-v4en-Dn-GGUkj2F_u67NB9jblPVH7zV_APifG-w |
linkToPdf | http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lj9MwEB6xi4TgwHshsIBBcMzm4dhxjt12q10BVaUuK25R7NhQqU2rtjnsv2fsPEQEJ7gmtmJ7ZjLfaMbfAHyUUWoTetqXEVV-YuLCzxRLfEVtyhcBv9Y2o3u5SGffxeTC0uT0rb5c0b6Sy7NqtT6rlj9dbeV2rYKuTiyYfx0zNGH0s8G2NMER3EWbDXkXqLexFsXQqyESohjVB_tIWGKWyPbcixFUWNqzgSdyhP1_Q5l_FksOKEWdG5o--o8NPIaHLfYko2bIE7ijq6fw4DdGwmcwG99KvSNFVZJ5K0GyaFvckZt6ZTmqXTntLRn1nJ4EgS-52lz75-gSS7JY4yKI7b--fw7fphfX40u_bbngKxbygy9Vqux_J9ShYcJEiWJxUhRRkoYly2gmdcSESplMdRyZkGYmSeKSJxk3OKk09ASOq02lXwKJo1Kmkhtm7zmkJhbKZni5bfVRKMpKDz50x59vG2aNHCMSK668F5cH51Yw_QBLhu0ebHY_8vZEc8mkFCJhmebcVvlklGtpDC5Yx2XBQw9OO7HmrYXu8xiDT8TCQlAP3vev0bZswqSo9Ka2YxANoUsIMw9eNFrQr6TTIg_SgX4Mljp8g9rg-Ltb6XvwqdGkwZTJ8mbkdrc61DkiiSx99c9feAf35pNp_uVq9vk13MfduNuUoTiF48Ou1m_gaF_Wb53h_ALhvx5s |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+and+Physical+Security+Vulnerability+Assessment+for+IoT-Based+Smart+Homes&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Ali%2C+Bako&rft.au=Awad%2C+Ali+Ismail&rft.date=2018-03-08&rft.eissn=1424-8220&rft.volume=18&rft.issue=3&rft_id=info:doi/10.3390%2Fs18030817&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon |