4.7 Article

A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses

Journal

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
Volume 24, Issue 4, Pages 2292-2328

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/COMST.2022.3201557

Keywords

Home automation systems; IoT; security and privacy; cloud computing; data analysis

Funding

  1. National Natural Science Foundation of China [62122066, U20A20182, 61872274]
  2. National Key Research and Development Program of China [2021ZD0112803]
  3. GRF's RIF [R4032-18]
  4. Key Research and Development Program of Zhejiang [2022C01018]

Ask authors/readers for more resources

With the development of communication technologies and IoT infrastructures, home automation systems have become popular for providing convenient smart-home services. However, there are security risks in the deployment and application of these systems, which require research on attack and defense. This paper presents a comprehensive survey on the security of home automation systems, including system architecture, attack classification, vulnerability analysis, security requirements, existing defense methods, and open issues for future research.
With recent advances in communication technologies and Internet of Things (IoT) infrastructures, home automation (HA) systems have emerged as a new promising paradigm that provides convenient smart-home services to users. However, there exist various security risks during the deployment and application of HA systems, which pose severe security threats to users. On the one hand, traditional IoT security threats (e.g., device intrusion, protocol vulnerabilities, and so on) are inherent to HA systems. On the other hand, as the core of HA systems, the Trigger-Action Programming (TAP) model organizes cloud platforms, local hubs, and smart devices through user-customized rules, but the complex interactions involved bring new challenges to the security of HA systems. These two kinds of security issues have attracted widespread attention from both academia and industry, and explorations on both attack and defense have been made. However, there is not yet a survey that provides a summary of the overall HA systems' security research. In this paper, we conduct a comprehensive survey of the state-of-the-art literature on HA system security from aspects of attack and defense. We first give a brief introduction to the HA system architecture and present a general workflow of HA systems. Then, we review and classify the relevant attacks based on the HA architecture, with an explicit analysis of vulnerabilities exploited by these attacks. We further elaborate on the security requirements of HA systems and provide detailed descriptions and comparisons of existing defenses methods. Finally, we conclude with a thorough discussion of open issues for future research.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available