DOI QR코드

DOI QR Code

Vulnerability Analysis Model for IoT Smart Home Camera

  • Aljahdali, Asia Othman (College of Computer Science and Engineering, University of Jeddah) ;
  • Alsaidi, Nawal (College of Computer Science and Engineering, University of Jeddah) ;
  • Alsafri, Maram (College of Computer Science and Engineering, University of Jeddah)
  • Received : 2022.07.05
  • Published : 2022.07.30

Abstract

Today's Internet of Things (IoT) has had a dramatic increase in the use of various daily aspects. As a consequence, many homes adopt IoT technology to move towards the smart home. So, the home can be called smart when it has a range of smart devices that are united into one network, such as cameras, sensors, etc. While IoT smart home devices bring numerous benefits to human life, there are many security concerns associated with these devices. These security concerns, such as user privacy, can result in an insecure application. In this research, we focused on analyzing the vulnerabilities of IoT smart home cameras. This will be done by designing a new model that follows the STRIDE approach to identify these threats in order to afford an efficient and secure IoT device. Then, apply a number of test cases on a smart home camera in order to verify the usage of the proposed model. Lastly, we present a scheme for mitigation techniques to prevent any vulnerabilities that might occur in IoT devices.

Keywords

References

  1. Aldowah, Hanan, Shafiq Ul Rehman, and Irfan Umar. "Security in internet of things: issues, challenges and solutions." International Conference of Reliable Information and Communication Technology. Springer, Cham, 2018.
  2. Chifor, Bogdan-Cosmin, et al. "Security-oriented framework for internet of things smart-home applications." 2019 22nd International Conference on Control Systems and Computer Science (CSCS). IEEE, 2019.
  3. Devi, T. Rajani. "Importance of Testing in Software Development Life Cycle." International Journal of Scientific & Engineering Research 3.5 (2012): 1-5.
  4. Gan, Gang, Zeyong Lu, and Jun Jiang. "Internet of things security analysis." 2011 international conference on internet technology and applications. IEEE, 2011.
  5. Hossain, Nazmul, et al. "A Security Framework for IoT based Smart Home Automation System." Global Journal of Computer Science and Technology (2018).
  6. Jabbar, Waheb A., et al. "Design and implementation of IoT-based automation system for smart home." 2018 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2018.
  7. Kang, Won Min, Seo Yeon Moon, and Jong Hyuk Park. "An enhanced security framework for home appliances in smart home." Human-centric Computing and Information Sciences 7.1 (2017): 1-12. https://doi.org/10.1186/s13673-016-0083-0
  8. Marjani, Mohsen, et al. "Big IoT data analytics: architecture, opportunities, and open research challenges." ieee access 5 (2017): 5247-5261. https://doi.org/10.1109/ACCESS.2017.2689040
  9. Shostack, Adam. Threat modeling: Designing for security. John Wiley & Sons, 2014.
  10. Sobin, C. C. "A survey on architecture, protocols and challenges in IoT." Wireless Personal Communications 112.3 (2020): 1383-1429. https://doi.org/10.1007/s11277-020-07108-5
  11. Sotoudeh, Shahrouz, Sattar Hashemi, and Hossein Gharaee Garakani. "Security Framework of IoT-Based Smart Home." 2020 10th International Symposium on Telecommunications (IST). IEEE, 2020.