Security of Smart Home Solution Based on Secure Piggybacked Key Exchange Mechanism

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Internet of Things (IoT)-based smart home appliance control provides better and comfortable living. The home control system includes temperature control, lighting control, air quality control, security system, and water control, etc. A smart system could be used to monitor all the home control systems by maintaining the required parameters in an appropriate range. The extensive utilization of IoTbased smart appliances for controlling the operations of home devices raises an issue of data security. The highly sensitive data is vulnerable to data leakage. A strong authentication mechanism is required for ensuring the integrity and confidentiality of data shared over an unsecured network. This chapter discusses secure data transmission and key exchange for ensuring the confidentiality of data. IoT devices have a major constraint of power and small size, which leads to restricting the computation to simple. Complex computation and extra overheads could not be deployed on the small processing devices. The widespread popularity of smart IoT-based home automation systems should be strongly secured to prevent any outside interventions and security threats. Thus, research in the field of IoT device security is of great importance by making use of already available security algorithms. Emerging trends and existing security challenges of IoT-based applications are discussed.

Cite

CITATION STYLE

APA

Arora, J., & Singh, S. (2023). Security of Smart Home Solution Based on Secure Piggybacked Key Exchange Mechanism. In Machine Intelligence, Big Data Analytics, and IoT in Image Processing: Practical Applications (pp. 399–417). wiley. https://doi.org/10.1002/9781119865513.ch16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free