Authentication and access control methods for secured smart home IoT service environment

0Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The development of the Internet of Things has increased the interconnections between things, and the IoT has been applied not only to our everyday life but also to various industrial fields. A variety of services are being developed for many people to use for the IoT environment. More focus is also being put on the smart home service market which applies the IoT to the residential space - an area close to an area close to their everyday life among the IoT services. Though the smart home service market is growing and being used in a variety of fields, security threats exist - such as data fabrication and falsification, illegal authentication and privacy violation. When the device data of the smart home becomes exposed to the security threats, there is also a risk of a secondary damage due to the nature of the smart home environment. Therefore, this paper proposes figuring out related security threats and requirements for a safe access to the smart home system in the IoT environment, as well as safe authentication and access control methods. It is expected that the analysis of the stability and efficiency of the proposed methods will be used as the base research on the security in the rapidly-growing smart home service environment.

Cite

CITATION STYLE

APA

Oh, S. Y., & Lee, A. (2019). Authentication and access control methods for secured smart home IoT service environment. International Journal of Recent Technology and Engineering, 8(2 Special Issue 6), 330–335. https://doi.org/10.35940/ijrte.B1063.0782S619

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free