Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes

The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and ef...

Full description

Saved in:
Bibliographic Details
Published in:Sensors (Basel, Switzerland) Vol. 18; no. 3; p. 817
Main Authors: Ali, Bako, Awad, Ali Ismail
Format: Journal Article
Language:English
Published: Switzerland MDPI AG 08-03-2018
MDPI
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.
AbstractList The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.
Author Ali, Bako
Awad, Ali Ismail
AuthorAffiliation 1 Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, 971 87 Luleå, Sweden; bakoali@hotmail.com
2 Faculty of Engineering, Al Azhar University, P.O. Box 83513 Qena, Egypt
AuthorAffiliation_xml – name: 1 Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, 971 87 Luleå, Sweden; bakoali@hotmail.com
– name: 2 Faculty of Engineering, Al Azhar University, P.O. Box 83513 Qena, Egypt
Author_xml – sequence: 1
  givenname: Bako
  orcidid: 0000-0002-2309-4930
  surname: Ali
  fullname: Ali, Bako
  email: bakoali@hotmail.com
  organization: Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, 971 87 Luleå, Sweden. bakoali@hotmail.com
– sequence: 2
  givenname: Ali Ismail
  orcidid: 0000-0002-3800-0757
  surname: Awad
  fullname: Awad, Ali Ismail
  email: ali.awad@ltu.se, ali.awad@ltu.se
  organization: Faculty of Engineering, Al Azhar University, P.O. Box 83513 Qena, Egypt. ali.awad@ltu.se
BackLink https://www.ncbi.nlm.nih.gov/pubmed/29518023$$D View this record in MEDLINE/PubMed
https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-67897$$DView record from Swedish Publication Index
BookMark eNpdkttrFDEUh4NU7EUf_AdkwBcLjuYyub0U1vXShaJCa19DkjlpZ5md1GTGsv-92W5duj7l9p0vPw7nGB0McQCEXhP8gTGNP2aiMMOKyGfoiDS0qRWl-ODJ_hAd57zEmDLG1At0SDUvJZQdoe_ztYNU2aGtft6uc-dtX12Cn1I3rqvrqR8gWdf1m9MsZ8h5BcNYhZiqRbyqP9kMbXW5smmszuMK8kv0PNg-w6vH9QT9-vrlan5eX_z4tpjPLmrPsRhr56XHSkkMOHAVSOM5bawljcQt10w7IFx5yZ0ESgJmOjQNbUWjRShFbWAnaLH1ttEuzV3qSoS1ibYzDxcx3ZiSqfM9GMedU6rhGoRoKJOaCXAhlH-Atlbg4nq_deV7uJvcnu1zdz17sPXjZIRUWhb8bIsXdgWtL_1Itt-r2n8ZultzE_8YrqRQmhXBu0dBir8nyKNZddlD39sB4pQNxYRqwhnWBX37H7qMUxpKZwtFBcdSqY3wdEv5FHNOEHZhCDabATG7ASnsm6fpd-S_iWB_AU6XtmE
CitedBy_id crossref_primary_10_3390_electronics11071123
crossref_primary_10_1016_j_comnet_2019_01_023
crossref_primary_10_1016_j_cose_2021_102491
crossref_primary_10_32604_cmc_2023_031155
crossref_primary_10_1016_j_compeleceng_2023_108667
crossref_primary_10_32604_csse_2023_024605
crossref_primary_10_1007_s42979_021_00555_2
crossref_primary_10_3390_electronics9060967
crossref_primary_10_3390_su15129812
crossref_primary_10_1155_2022_2834982
crossref_primary_10_1007_s13042_020_01241_0
crossref_primary_10_3390_s23187936
crossref_primary_10_1109_ACCESS_2023_3244490
crossref_primary_10_3390_app122412688
crossref_primary_10_1016_j_iot_2022_100653
crossref_primary_10_1016_j_bcra_2023_100178
crossref_primary_10_3390_app8112305
crossref_primary_10_3390_fi11100207
crossref_primary_10_4236_jis_2020_112005
crossref_primary_10_1016_j_scs_2019_101728
crossref_primary_10_3390_s19092148
crossref_primary_10_1109_ACCESS_2020_2993548
crossref_primary_10_3390_s19081929
crossref_primary_10_3390_su142214915
crossref_primary_10_1109_ACCESS_2020_3037032
crossref_primary_10_1016_j_prime_2023_100137
crossref_primary_10_1109_JSEN_2023_3273456
crossref_primary_10_3390_s19183973
crossref_primary_10_1109_ACCESS_2019_2943929
crossref_primary_10_1016_j_future_2022_03_001
crossref_primary_10_1016_j_techsoc_2022_102118
crossref_primary_10_3390_electronics9040604
crossref_primary_10_32604_cmc_2022_026226
crossref_primary_10_48175_IJARSCT_874
crossref_primary_10_1109_ACCESS_2020_3048163
crossref_primary_10_3390_iot4020005
crossref_primary_10_3390_s19235237
crossref_primary_10_3390_risks9060113
crossref_primary_10_3390_s23020652
crossref_primary_10_1109_ACCESS_2022_3224806
crossref_primary_10_1109_JIOT_2020_2983983
crossref_primary_10_1016_j_jisa_2024_103748
crossref_primary_10_1016_j_jnca_2020_102779
crossref_primary_10_1155_2021_4401809
crossref_primary_10_1016_j_jisa_2020_102644
crossref_primary_10_1108_K_02_2021_0161
crossref_primary_10_1109_TITS_2023_3307660
crossref_primary_10_3390_electronics12183958
crossref_primary_10_1016_j_iot_2019_100129
crossref_primary_10_1016_j_jii_2023_100549
crossref_primary_10_4018_IJOCI_312222
crossref_primary_10_1016_j_procs_2018_10_199
crossref_primary_10_1515_gj_2022_0032
crossref_primary_10_1016_j_iot_2020_100162
crossref_primary_10_1109_ACCESS_2020_3017221
crossref_primary_10_3390_app11199183
crossref_primary_10_3390_app132111985
crossref_primary_10_1080_0952813X_2021_1970824
crossref_primary_10_1109_ACCESS_2019_2907602
crossref_primary_10_1002_spy2_207
crossref_primary_10_3390_electronics11050742
crossref_primary_10_3390_s19214757
crossref_primary_10_3390_s19051249
crossref_primary_10_3390_s21092986
crossref_primary_10_1016_j_future_2020_03_042
crossref_primary_10_3389_fbuil_2024_1333146
crossref_primary_10_3390_s20051389
crossref_primary_10_1145_3437537
crossref_primary_10_1109_JIOT_2021_3051467
crossref_primary_10_1155_2022_6977485
crossref_primary_10_1109_JAS_2020_1003536
crossref_primary_10_1109_ACCESS_2018_2838339
crossref_primary_10_1016_j_iot_2022_100610
crossref_primary_10_1108_LHT_11_2018_0166
crossref_primary_10_1186_s13677_018_0123_6
crossref_primary_10_3390_app13159032
crossref_primary_10_3390_electronics12143185
crossref_primary_10_1016_j_adhoc_2019_02_007
crossref_primary_10_1007_s40860_023_00202_y
crossref_primary_10_1186_s13635_020_00111_0
crossref_primary_10_3390_s23218720
crossref_primary_10_1155_2022_1833062
crossref_primary_10_1016_j_adhoc_2024_103576
crossref_primary_10_1016_j_techsoc_2021_101683
crossref_primary_10_1002_ett_3859
crossref_primary_10_1007_s11276_019_02043_1
crossref_primary_10_1016_j_tele_2020_101377
crossref_primary_10_1145_3410160
crossref_primary_10_3390_s18092796
crossref_primary_10_1109_ACCESS_2021_3054575
crossref_primary_10_3390_fi11040089
crossref_primary_10_1109_ACCESS_2021_3137175
crossref_primary_10_4108_eetsc_v6i18_2345
crossref_primary_10_3390_app9132746
crossref_primary_10_1145_3635030
crossref_primary_10_1109_ACCESS_2020_2986480
crossref_primary_10_1016_j_cose_2022_102677
crossref_primary_10_1109_TII_2022_3192035
crossref_primary_10_35848_1347_4065_abf3a0
crossref_primary_10_1145_3394504
crossref_primary_10_3390_pr10122673
crossref_primary_10_1016_j_ecolind_2020_106866
crossref_primary_10_1111_exsy_13113
crossref_primary_10_1108_ICS_04_2018_0048
crossref_primary_10_1088_1742_6596_1447_1_012054
crossref_primary_10_1109_ACCESS_2019_2942846
crossref_primary_10_1145_3510360
crossref_primary_10_1109_OJVT_2023_3234069
crossref_primary_10_1016_j_erss_2021_102211
crossref_primary_10_3390_s23156979
crossref_primary_10_1155_2020_8829595
crossref_primary_10_3390_jcp2010005
crossref_primary_10_1007_s42979_024_02702_x
crossref_primary_10_1108_JEDT_06_2021_0320
crossref_primary_10_1109_TSE_2022_3179294
crossref_primary_10_3390_s19010015
crossref_primary_10_1007_s10796_019_09970_6
crossref_primary_10_1016_j_ijdrr_2021_102141
crossref_primary_10_3390_s23042078
crossref_primary_10_1007_s10922_024_09803_1
crossref_primary_10_1016_j_adhoc_2021_102685
crossref_primary_10_1016_j_cose_2022_102718
crossref_primary_10_1016_j_cose_2021_102418
crossref_primary_10_5817_MUJLT2021_2_1
Cites_doi 10.1109/COMST.2015.2444095
10.1016/j.egypro.2017.03.238
10.1007/s10586-017-1105-z
10.3390/s17010069
10.1007/s11859-014-1031-3
10.1016/j.cose.2016.03.004
10.3390/s17091978
10.1109/TDSC.2015.2465965
10.1016/j.future.2015.09.003
10.1080/15325008.2013.832439
10.1007/s11276-014-0761-7
10.3390/fi9010007
10.1016/j.procs.2015.05.013
10.1016/j.patcog.2014.08.024
10.1016/j.engappai.2012.05.002
10.3390/s17050979
10.1109/MITP.2017.3680959
ContentType Journal Article
Copyright Copyright MDPI AG 2018
2018 by the authors. 2018
Copyright_xml – notice: Copyright MDPI AG 2018
– notice: 2018 by the authors. 2018
DBID NPM
AAYXX
CITATION
3V.
7X7
7XB
88E
8FI
8FJ
8FK
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
FYUFA
GHDGH
K9.
M0S
M1P
PIMPY
PQEST
PQQKQ
PQUKI
7X8
5PM
ADTPV
AOWAS
DOA
DOI 10.3390/s18030817
DatabaseName PubMed
CrossRef
ProQuest Central (Corporate)
Health & Medical Collection
ProQuest Central (purchase pre-March 2016)
Medical Database (Alumni Edition)
Hospital Premium Collection
Hospital Premium Collection (Alumni Edition)
ProQuest Central (Alumni) (purchase pre-March 2016)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One Community College
ProQuest Central Korea
Health Research Premium Collection
Health Research Premium Collection (Alumni)
ProQuest Health & Medical Complete (Alumni)
Health & Medical Collection (Alumni Edition)
PML(ProQuest Medical Library)
Publicly Available Content Database
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
MEDLINE - Academic
PubMed Central (Full Participant titles)
SwePub
SwePub Articles
DOAJ Directory of Open Access Journals
DatabaseTitle PubMed
CrossRef
Publicly Available Content Database
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Health & Medical Complete (Alumni)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Hospital Collection
Health Research Premium Collection (Alumni)
ProQuest Hospital Collection (Alumni)
ProQuest Central
ProQuest Health & Medical Complete
Health Research Premium Collection
ProQuest Medical Library
ProQuest One Academic UKI Edition
Health and Medicine Complete (Alumni Edition)
ProQuest Central Korea
ProQuest One Academic
ProQuest Medical Library (Alumni)
ProQuest Central (Alumni)
MEDLINE - Academic
DatabaseTitleList
MEDLINE - Academic


PubMed
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals
  url: http://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1424-8220
ExternalDocumentID oai_doaj_org_article_b5bb88459e664237936ebffd59e2da60
oai_DiVA_org_ltu_67897
10_3390_s18030817
29518023
Genre Journal Article
GroupedDBID ---
123
2WC
3V.
53G
5VS
7X7
88E
8FE
8FG
8FI
8FJ
AADQD
AAHBH
ABDBF
ABJCF
ABUWG
ADBBV
ADRAZ
AENEX
AFKRA
AFZYC
ALIPV
ALMA_UNASSIGNED_HOLDINGS
ARAPS
BENPR
BPHCQ
BVXVI
CCPQU
CS3
D1I
DU5
E3Z
EBD
ESX
F5P
FYUFA
GROUPED_DOAJ
GX1
HCIFZ
HH5
HMCUK
HYE
IPNFZ
KB.
KQ8
L6V
M1P
M48
M7S
MODMG
M~E
NPM
OK1
P2P
P62
PDBOC
PIMPY
PQQKQ
PROAC
PSQYO
RIG
RNS
RPM
TUS
UKHRP
XSB
~8M
AAYXX
CITATION
7XB
8FK
AZQEC
DWQXO
K9.
PQEST
PQUKI
7X8
5PM
ADTPV
AOWAS
IAO
ITC
ID FETCH-LOGICAL-c506t-bc7c08870e0f58f14c524aa1470d5939be158c75b7e21f039f442d6496f870df3
IEDL.DBID RPM
ISSN 1424-8220
IngestDate Tue Oct 22 15:15:15 EDT 2024
Tue Oct 01 22:37:11 EDT 2024
Tue Sep 17 20:58:29 EDT 2024
Fri Jun 28 03:55:46 EDT 2024
Thu Oct 10 17:59:14 EDT 2024
Fri Aug 23 03:52:08 EDT 2024
Wed Oct 16 00:59:17 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords security risk assessment
OCTAVE Allegro
smart homes
the Internet of Things (IoT)
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c506t-bc7c08870e0f58f14c524aa1470d5939be158c75b7e21f039f442d6496f870df3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0002-2309-4930
0000-0002-3800-0757
OpenAccessLink https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5876893/
PMID 29518023
PQID 2026507883
PQPubID 2032333
ParticipantIDs doaj_primary_oai_doaj_org_article_b5bb88459e664237936ebffd59e2da60
swepub_primary_oai_DiVA_org_ltu_67897
pubmedcentral_primary_oai_pubmedcentral_nih_gov_5876893
proquest_miscellaneous_2012915309
proquest_journals_2026507883
crossref_primary_10_3390_s18030817
pubmed_primary_29518023
PublicationCentury 2000
PublicationDate 2018-03-08
PublicationDateYYYYMMDD 2018-03-08
PublicationDate_xml – month: 03
  year: 2018
  text: 2018-03-08
  day: 08
PublicationDecade 2010
PublicationPlace Switzerland
PublicationPlace_xml – name: Switzerland
– name: Basel
PublicationTitle Sensors (Basel, Switzerland)
PublicationTitleAlternate Sensors (Basel)
PublicationYear 2018
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References ref57
ref12
ref56
ref59
ref14
ref58
ref53
ref52
ref55
ref10
ref54
Kyas (ref16) 2013
Ning (ref2) 2013
ref17
Yoo (ref28) 2007; 26
Awad (ref51) 2011; Volume 179
ref19
(ref8) 2003
Erdogan (ref11) 2010
Nixon (ref30) 2005
Stallings (ref48) 2014
ref50
Awad (ref63) 2013; 37
Awad (ref47) 2016
Bandyopadhyay (ref23) 2011
Okoh (ref46) 2015; Volume 9085
ref41
ref44
Suryadevara (ref5) 2015
ref49
ref7
ref4
ref6
ref40
King (ref1) 2016; 40
ref35
ref34
ref37
ref36
ref31
Caralli (ref42) 2007
ref33
ref32
Evans (ref21) 2011
ref39
ref38
Egawa (ref64) 2012; Volume 294
Awad (ref45) 2014; Volume 555
Fathy (ref62) 2012; Volume 322
ref24
Acharjya (ref18) 2017
ref26
ref25
ref20
Miller (ref3) 2015
ref22
ref65
Zupancic (ref13) 2014; 38
ref27
ref29
Aarts (ref9) 2003
ref60
Al-Qutayri (ref15) 2010
ref61
Caralli (ref43) 2007
References_xml – ident: ref4
  doi: 10.1109/COMST.2015.2444095
– ident: ref7
  doi: 10.1016/j.egypro.2017.03.238
– ident: ref20
– ident: ref24
– ident: ref27
– ident: ref61
  doi: 10.1007/s10586-017-1105-z
– volume: Volume 322
  start-page: 516
  year: 2012
  ident: ref62
  article-title: Advanced Encryption Standard Algorithm: Issues and Implementation Aspects
  contributor:
    fullname: Fathy
– year: 2015
  ident: ref3
  contributor:
    fullname: Miller
– ident: ref57
– year: 2014
  ident: ref48
  contributor:
    fullname: Stallings
– ident: ref34
– year: 2013
  ident: ref2
  contributor:
    fullname: Ning
– year: 2007
  ident: ref42
  contributor:
    fullname: Caralli
– ident: ref58
  doi: 10.3390/s17010069
– ident: ref6
– volume: Volume 9085
  start-page: 92
  year: 2015
  ident: ref46
  article-title: Biometrics Applications in e-Health Security: A Preliminary Survey
  contributor:
    fullname: Okoh
– volume: Volume 179
  start-page: 122
  year: 2011
  ident: ref51
  article-title: Fingerprint Singularity Detection: A Comparative Study
  contributor:
    fullname: Awad
– volume: 37
  start-page: 279
  year: 2013
  ident: ref63
  article-title: Fingerprint Local Invariant Feature Extraction on GPU with CUDA
  publication-title: Informatica (Slovenia)
  contributor:
    fullname: Awad
– year: 2011
  ident: ref21
  contributor:
    fullname: Evans
– ident: ref40
– ident: ref50
– volume: Volume 294
  start-page: 231
  year: 2012
  ident: ref64
  article-title: Evaluation of Acceleration Algorithm for Biometric Identification
  contributor:
    fullname: Egawa
– ident: ref26
– year: 2015
  ident: ref5
  contributor:
    fullname: Suryadevara
– ident: ref37
  doi: 10.1007/s11859-014-1031-3
– start-page: 288
  year: 2011
  ident: ref23
  article-title: A Survey of Middleware for Internet of Things
  contributor:
    fullname: Bandyopadhyay
– year: 2003
  ident: ref9
  contributor:
    fullname: Aarts
– ident: ref44
  doi: 10.1016/j.cose.2016.03.004
– ident: ref54
– ident: ref33
– ident: ref59
  doi: 10.3390/s17091978
– ident: ref39
– start-page: 1
  year: 2010
  ident: ref15
  article-title: IIntegrated Wireless Technologies for Smart Homes Applications
  contributor:
    fullname: Al-Qutayri
– ident: ref53
  doi: 10.1109/TDSC.2015.2465965
– ident: ref35
  doi: 10.1016/j.future.2015.09.003
– start-page: 1
  year: 2003
  ident: ref8
  article-title: Inside the Smart Home: Ideas, Possibilities and Methods
– volume: Volume 555
  start-page: 47
  year: 2014
  ident: ref45
  article-title: Impact of Some Biometric Modalities on Forensic Science
  contributor:
    fullname: Awad
– ident: ref12
  doi: 10.1080/15325008.2013.832439
– ident: ref29
– ident: ref41
– year: 2017
  ident: ref18
  contributor:
    fullname: Acharjya
– ident: ref22
– ident: ref36
  doi: 10.1007/s11276-014-0761-7
– volume: 40
  start-page: 133
  year: 2016
  ident: ref1
  article-title: A Distributed Security Mechanism for Resource-Constrained IoT Devices
  publication-title: Informatica (Slovenia)
  contributor:
    fullname: King
– start-page: 891
  year: 2016
  ident: ref47
  article-title: Fast Fingerprint Orientation Field Estimation Incorporating General Purpose GPU
  contributor:
    fullname: Awad
– ident: ref19
– ident: ref32
– year: 2007
  ident: ref43
  contributor:
    fullname: Caralli
– ident: ref55
– volume: 26
  year: 2007
  ident: ref28
  article-title: Home-network Security Model in Ubiquitous Environment
  publication-title: Proc. World Acad. Sci. Eng. Technol.
  contributor:
    fullname: Yoo
– ident: ref25
  doi: 10.3390/fi9010007
– start-page: 572
  year: 2010
  ident: ref11
  article-title: Mobility Monitoring by Using RSSI in Wireless Sensor Networks
  contributor:
    fullname: Erdogan
– year: 2013
  ident: ref16
  contributor:
    fullname: Kyas
– ident: ref60
  doi: 10.1016/j.procs.2015.05.013
– ident: ref56
  doi: 10.1016/j.patcog.2014.08.024
– ident: ref49
– ident: ref52
– ident: ref17
  doi: 10.1016/j.engappai.2012.05.002
– start-page: 249
  year: 2005
  ident: ref30
  article-title: Security, Privacy and Trust Issues in Smart Environments
  contributor:
    fullname: Nixon
– ident: ref65
  doi: 10.3390/s17050979
– ident: ref10
– volume: 38
  start-page: 171
  year: 2014
  ident: ref13
  article-title: Smart-home Energy Management in the Context of Occupants’ Activity
  publication-title: Informatica (Slovenia)
  contributor:
    fullname: Zupancic
– ident: ref14
– ident: ref31
– ident: ref38
  doi: 10.1109/MITP.2017.3680959
SSID ssj0023338
Score 2.6382663
Snippet The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users....
The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users....
SourceID doaj
swepub
pubmedcentral
proquest
crossref
pubmed
SourceType Open Website
Open Access Repository
Aggregation Database
Index Database
StartPage 817
SubjectTerms Containers
Cybersecurity
Information systems
Informationssystem
Inhabitants
Internet of Things
Life assessment
OCTAVE Allegro
security risk assessment
Smart buildings
smart homes
Smart houses
the Internet of Things (IoT)
Vulnerability
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwEB5BT3BAQHkESuUiOEZN7Di2j9uXyqVC2lJxi-KXqNRmUXdz6L9nxskGIpC49OqHZH_jxzca-xuAT7ZUFNALuS2Fy6vI29w4WeVOUMgXCX8IFNE9X6qL7_rklGRyplRf9CZskAcegDu00lqtK2lCXdMTDiPqYGP0WMB9Ww_eemG2ztToagn0vAYdIYFO_eG61KTLkrKS_b59kkj_v5jl3w8kZzKi6eo5ew7PRs7IFsNYX8Cj0L2Ep38oCe7CxfG9DXes7Tz7OiLPlmNqOnbV35C2dHoGe88WkxYnQ8LKvqwu8yO8yjxb3iIajPKmr1_Bt7PTy-PzfEyVkDtZ1JvcOuXovChCEaWOZeUkr9q2rFSBSAljQym1U9KqwMtYCBOrivu6MnXETj6K17DTrbrwFhgvvVW2jpL-J6jItaPIbE0pOlonpM_g4xbC5uegiNGgJ0E4NxPOGRwRuFMDErFOBWjaZjRt8z_TZrC3NU0z7qx1w9FpRA6rtcjgYKrGPUGBjrYLq57aIIvBo7wwGbwZLDmNhCOlJNG7DNTMxrOhzmu66x9Jd1vizYH0LoPPw2qYdTm5vlqk2d1s-gYZgFHvHgKD9_AEZ5N-QRZ6D3Y2d334AI_Xvt9PK_4XqEEGAQ
  priority: 102
  providerName: Directory of Open Access Journals
Title Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes
URI https://www.ncbi.nlm.nih.gov/pubmed/29518023
https://www.proquest.com/docview/2026507883
https://search.proquest.com/docview/2012915309
https://pubmed.ncbi.nlm.nih.gov/PMC5876893
https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-67897
https://doaj.org/article/b5bb88459e664237936ebffd59e2da60
Volume 18
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9swDCaWnrbDsPe8dYU6bEc3tmVZ8jFNW7SHFQXSFbsZlixtARKnSOJD__1I-YEZ7WlXy4IpkhJJk_oI8E3HkhJ6NtQxN2HqkjLMjUhDwynliw6_tZTRvVzI61_q7JxgckR_F8YX7Ru9PKlX65N6-cfXVt6vzbSvE5ve_JgL3MJoZ6cTmKCC9iF6F2VxDLpaCCGO8fx0FyuCZImp216C7gQBno1skIfqf8q_fFwmOQIT9Qbo4hW87DxHNmspfA3PbP0GXvyDJ_gWrucP2m5ZWVfspuM_W3QN6thdsyKEaV8M-8BmAyInQ7eVXW1uw1M0aBVbrJEHjLqn797Bz4vz2_ll2DVMCI2Isn2ojTR0akQ2ckK5ODUiScsyTmVUiZzn2sZCGSm0tEnsIp67NE2qLM0zh5Mqx9_DQb2p7UdgSVxpqTMn6JaCdIkylJ_NqFFHabioAvjas7C4b3ExCowniOXFwPIATom5wwsEZe0fbLa_i06ghRZaK5WK3GYZ1ejkPLPaOSTYJlWZRQEc9qIpuv21KxIMHdGTVYoHcDwM486gdEdZ201D76Avgwd6lAfwoZXkQEmvCQHIkYxHpI5HUBk9-nanfAF8b7VhNOVseTfzq1vtmwL9gFx--u8vfIbnuAR_ATJSh3Cw3zb2C0x2VXPk_xwceb3_C5ZxBz8
link.rule.ids 230,315,730,783,787,867,888,2109,27936,27937,53804,53806
linkProvider National Library of Medicine
linkToHtml http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3fb9MwED6x8QB74PdGYIBB8Jg1ie3Yeey6TZ3YqkktE29R7NhQqU2ntnnYf8_ZSSoieNprnCgX313uO935O4CvKhauoGdCFVMdMpsUYaY5CzV1JV8E_Ma4iu54KiY_5dm5o8nh3VkY37Sv1fykWixPqvlv31t5t9SDrk9scHM94ujCGGcHe_AY_TViXZLe5lkU066GRIhiRj_YxNKRssRu3l6CgMJRnvWikCfr_x_C_LdRskcn6kPQxfMHCv8CnrWYkwyb5ZfwyFSv4OAvJsLXMBndK7MmRVWSm1ZzZNqOtiO39cJxU_s22nsy3HF5EgS85HI1C08xFJZkukQBiJu7vnkDPy7OZ6Nx2I5aCDWP0m2otNDufxOZyHJpY6Z5wooiZiIqeUYzZWIuteBKmCS2Ec0sY0mZsiy1-FBp6SHsV6vKvAWSxKUSKrXcnW8QNpHaVXZTN-Kj0JSXAXzptj6_axg1csxEnKrynaoCOHVK2d3gSLD9hdX6V97uZq64UlIynpk0dd09GU2NshYFNklZpFEAx51K89YzN3mCSSdiYClpAJ93y-hTrlBSVGZVu3sQBWEoiLIAjhoL2EnSWVAAomcbPVH7K2gJnre71XwA3xor6j1yNr8d-q9bbOscEUQm3j34DZ_gyXh2fZVfXU6-v4en-Dn-GGUkj2F_u67NB9jblPVH7zV_APifG-w
linkToPdf http://sdu.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lj9MwEB6xi4TgwHshsIBBcMzm4dhxjt12q10BVaUuK25R7NhQqU2rtjnsv2fsPEQEJ7gmtmJ7ZjLfaMbfAHyUUWoTetqXEVV-YuLCzxRLfEVtyhcBv9Y2o3u5SGffxeTC0uT0rb5c0b6Sy7NqtT6rlj9dbeV2rYKuTiyYfx0zNGH0s8G2NMER3EWbDXkXqLexFsXQqyESohjVB_tIWGKWyPbcixFUWNqzgSdyhP1_Q5l_FksOKEWdG5o--o8NPIaHLfYko2bIE7ijq6fw4DdGwmcwG99KvSNFVZJ5K0GyaFvckZt6ZTmqXTntLRn1nJ4EgS-52lz75-gSS7JY4yKI7b--fw7fphfX40u_bbngKxbygy9Vqux_J9ShYcJEiWJxUhRRkoYly2gmdcSESplMdRyZkGYmSeKSJxk3OKk09ASOq02lXwKJo1Kmkhtm7zmkJhbKZni5bfVRKMpKDz50x59vG2aNHCMSK668F5cH51Yw_QBLhu0ebHY_8vZEc8mkFCJhmebcVvlklGtpDC5Yx2XBQw9OO7HmrYXu8xiDT8TCQlAP3vev0bZswqSo9Ka2YxANoUsIMw9eNFrQr6TTIg_SgX4Mljp8g9rg-Ltb6XvwqdGkwZTJ8mbkdrc61DkiiSx99c9feAf35pNp_uVq9vk13MfduNuUoTiF48Ou1m_gaF_Wb53h_ALhvx5s
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+and+Physical+Security+Vulnerability+Assessment+for+IoT-Based+Smart+Homes&rft.jtitle=Sensors+%28Basel%2C+Switzerland%29&rft.au=Ali%2C+Bako&rft.au=Awad%2C+Ali+Ismail&rft.date=2018-03-08&rft.eissn=1424-8220&rft.volume=18&rft.issue=3&rft_id=info:doi/10.3390%2Fs18030817&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1424-8220&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1424-8220&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1424-8220&client=summon