Skip to main content
Top
Published in: Journal of Network and Systems Management 3/2021

01-07-2021

Cybersecurity of Smart Home Systems: Sensor Identity Protection

Authors: Yazan Alshboul, Abdel Al Raoof Bsoul, Mohammed AL Zamil, Samer Samarah

Published in: Journal of Network and Systems Management | Issue 3/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Smart home systems are designed as platforms for connecting sensors, home appliances, and devices to exchange data and, ultimately, to provide useful services to home residents. However, such systems are vulnerable to Cybersecurity attacks that can affect the reliability and integrity of the delivered services. Sensors, planted at smart homes or equipped with smart appliances, are highly exposed to identity theft. Intruders can recognize through the understanding of the exchanged data, their locations, or knowing their associated services. Such information might make the home resident vulnerable to life attacks. Therefore, protecting sensors identities in smart home systems is of high interest in this domain. This paper introduces a novel technique that protects sensors’ identity from being recognized through cordless communication environments. Our proposed approach utilizes a three-phase technique that controls a synchronized queue among connected sensors and keeps their identity hidden from outsiders. The proposed approach preserves the linearity of time that is required to manage the protection of the home network. To validate the performance of our proposed approach, we conducted experiments on four different smart homes datasets. Furthermore, we performed a sensitivity analysis to measure how our proposed approach is affected by different environmental variables. The results indicated that the proposed approach provides a significant performance in protecting sensors identities in smart home area networks. Furthermore, during the sensitivity analysis, we found that our proposed technique’s performance is highly affected by the threshold value that defines each sensor’s time interval.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zamil, M.G.A.: Multimodal daily activity recognition in smart homes. In: 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT), pp. 922–927. IEEE (2019) Zamil, M.G.A.: Multimodal daily activity recognition in smart homes. In: 2019 6th International Conference on Control, Decision and Information Technologies (CoDIT), pp. 922–927. IEEE (2019)
2.
go back to reference Iqbal, M.A., Asrafuzzaman, S.K., Arifin, M.M., Hossain, S.A: Smart home appliance control system for physically disabled people using kinect and X10. In: 2016 5th International Conference on Informatics, Electronics and Vision (ICIEV), pp. 891–896. IEEE (2016) Iqbal, M.A., Asrafuzzaman, S.K., Arifin, M.M., Hossain, S.A: Smart home appliance control system for physically disabled people using kinect and X10. In: 2016 5th International Conference on Informatics, Electronics and Vision (ICIEV), pp. 891–896. IEEE (2016)
3.
go back to reference Di Francesco, M., Anastasi, G., Conti, M., Das, S.K., Neri, V.: Reliability and energy-efficiency in IEEE 802.15. 4/ZigBee sensor networks: an adaptive and cross-layer approach. IEEE J. Sel. Areas Commun. 29(8), 1508–1524 (2011)CrossRef Di Francesco, M., Anastasi, G., Conti, M., Das, S.K., Neri, V.: Reliability and energy-efficiency in IEEE 802.15. 4/ZigBee sensor networks: an adaptive and cross-layer approach. IEEE J. Sel. Areas Commun. 29(8), 1508–1524 (2011)CrossRef
5.
go back to reference Al Zamil, M.G., Samarah, S., Rawashdeh, M., Hossain, M.S., Alhamid, M.F., Guizani, M., Alnusair, A.: False-alarm detection in the fog-based internet of connected vehicles. IEEE Trans. Veh. Technol. 68(7), 7035–7044 (2019)CrossRef Al Zamil, M.G., Samarah, S., Rawashdeh, M., Hossain, M.S., Alhamid, M.F., Guizani, M., Alnusair, A.: False-alarm detection in the fog-based internet of connected vehicles. IEEE Trans. Veh. Technol. 68(7), 7035–7044 (2019)CrossRef
6.
go back to reference Naoui, S., Elhdhili, M.E., Saidane, L.A.: Lightweight and secure password based smart home authentication protocol: LSP-SHAP. J. Netw. Syst. Manag. 27(4), 1020–1042 (2019)CrossRef Naoui, S., Elhdhili, M.E., Saidane, L.A.: Lightweight and secure password based smart home authentication protocol: LSP-SHAP. J. Netw. Syst. Manag. 27(4), 1020–1042 (2019)CrossRef
7.
go back to reference Kumar, P., Braeken, A., Gurtov, A., Iinatti, J., Ha, P.H.: Anonymous secure framework in connected smart home environments. IEEE Trans. Inf. Forensics Secur. 12(4), 968–979 (2017)CrossRef Kumar, P., Braeken, A., Gurtov, A., Iinatti, J., Ha, P.H.: Anonymous secure framework in connected smart home environments. IEEE Trans. Inf. Forensics Secur. 12(4), 968–979 (2017)CrossRef
8.
go back to reference Qiu, M., Gai, K., Xiong, Z.: Privacy-preserving wireless communications using bipartite matching in social big data. Future Gener. Comput. Syst. 87, 772–781 (2018)CrossRef Qiu, M., Gai, K., Xiong, Z.: Privacy-preserving wireless communications using bipartite matching in social big data. Future Gener. Comput. Syst. 87, 772–781 (2018)CrossRef
9.
go back to reference Gai, K., Choo, K.K.R., Qiu, M., Zhu, L.: Privacy-preserving content-oriented wireless communication in internet-of-things. IEEE Internet Things J. 5(4), 3059–3067 (2018)CrossRef Gai, K., Choo, K.K.R., Qiu, M., Zhu, L.: Privacy-preserving content-oriented wireless communication in internet-of-things. IEEE Internet Things J. 5(4), 3059–3067 (2018)CrossRef
10.
go back to reference Wu, F., Xu, L., Kumari, S., Li, X.: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J. Ambient Intell. Humaniz. Comput. 8(1), 101–116 (2017)CrossRef Wu, F., Xu, L., Kumari, S., Li, X.: A privacy-preserving and provable user authentication scheme for wireless sensor networks based on internet of things security. J. Ambient Intell. Humaniz. Comput. 8(1), 101–116 (2017)CrossRef
11.
go back to reference Yi, X., Willemson, J., Nait-Abdesselam, F.: Privacy-preserving wireless medical sensor network. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 118–125. IEEE (2013) Yi, X., Willemson, J., Nait-Abdesselam, F.: Privacy-preserving wireless medical sensor network. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 118–125. IEEE (2013)
12.
go back to reference Alami, A., Benhlima, L., Bah, S.: An overview of privacy preserving techniques in smart home wireless sensor networks. In: 2015 10th International Conference on Intelligent Systems: Theories and Applications (SITA), pp. 1–4. IEEE (2015) Alami, A., Benhlima, L., Bah, S.: An overview of privacy preserving techniques in smart home wireless sensor networks. In: 2015 10th International Conference on Intelligent Systems: Theories and Applications (SITA), pp. 1–4. IEEE (2015)
13.
go back to reference Li, C.T., Lee, C.C.: A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Model. 55(1–2), 35–44 (2012)MathSciNetCrossRef Li, C.T., Lee, C.C.: A novel user authentication and privacy preserving scheme with smart cards for wireless communications. Math. Comput. Model. 55(1–2), 35–44 (2012)MathSciNetCrossRef
14.
go back to reference Lekshmy, P.L., Rahiman, M.A.: Hybrid approach to speed-up the privacy preserving kernel K-means clustering and its application in social distributed environment. J. Netw. Syst. Manag. 28(2), 398–422 (2020)CrossRef Lekshmy, P.L., Rahiman, M.A.: Hybrid approach to speed-up the privacy preserving kernel K-means clustering and its application in social distributed environment. J. Netw. Syst. Manag. 28(2), 398–422 (2020)CrossRef
15.
go back to reference Al Ridhawi, I., Otoum, S., Aloqaily, M., Jararweh, Y., Baker, T.: Providing secure and reliable communication for next generation networks in smart cities. Sustain. Cities Soc. 56, 102080 (2020)CrossRef Al Ridhawi, I., Otoum, S., Aloqaily, M., Jararweh, Y., Baker, T.: Providing secure and reliable communication for next generation networks in smart cities. Sustain. Cities Soc. 56, 102080 (2020)CrossRef
16.
go back to reference Samarah, S., Zamil, M.G.A., Rawashdeh, M., Hossain, M.S., Muhammad, G., Alamri, A.: Transferring activity recognition models in FOG computing architecture. J. Parallel Distrib. Comput. 122, 122–130 (2018)CrossRef Samarah, S., Zamil, M.G.A., Rawashdeh, M., Hossain, M.S., Muhammad, G., Alamri, A.: Transferring activity recognition models in FOG computing architecture. J. Parallel Distrib. Comput. 122, 122–130 (2018)CrossRef
17.
go back to reference Zamil, M.G.A., Samarah, S., Rawashdeh, M., Karime, A., Hossain, M.S.: Multimedia-oriented action recognition in Smart City-based IoT using multilayer perceptron. Multimed. Tools Appl. 78(21), 30315–30329 (2019)CrossRef Zamil, M.G.A., Samarah, S., Rawashdeh, M., Karime, A., Hossain, M.S.: Multimedia-oriented action recognition in Smart City-based IoT using multilayer perceptron. Multimed. Tools Appl. 78(21), 30315–30329 (2019)CrossRef
18.
go back to reference Aloqaily, M., Otoum, S., Al Ridhawi, I., Jararweh, Y.: An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw. 90, 101842 (2019)CrossRef Aloqaily, M., Otoum, S., Al Ridhawi, I., Jararweh, Y.: An intrusion detection system for connected vehicles in smart cities. Ad Hoc Netw. 90, 101842 (2019)CrossRef
19.
go back to reference Dou, N., Mei, Y., Yanjuan, Z., Yan, Z.: The networking technology within smart home system-ZigBee technology. In: 2009 International Forum on Computer Science-Technology and Applications, vol. 2, pp. 29–33. IEEE (2009) Dou, N., Mei, Y., Yanjuan, Z., Yan, Z.: The networking technology within smart home system-ZigBee technology. In: 2009 International Forum on Computer Science-Technology and Applications, vol. 2, pp. 29–33. IEEE (2009)
20.
go back to reference Liu, B.: Wireless broadband networks in complex mine environment. In: International Conference on Information Computing and Applications, pp. 82–90. Springer, Berlin (2013) Liu, B.: Wireless broadband networks in complex mine environment. In: International Conference on Information Computing and Applications, pp. 82–90. Springer, Berlin (2013)
21.
22.
go back to reference Rid, T., Buchanan, B.: Attributing cyber attacks. J. Strateg. Stud. 38(1–2), 4–37 (2015)CrossRef Rid, T., Buchanan, B.: Attributing cyber attacks. J. Strateg. Stud. 38(1–2), 4–37 (2015)CrossRef
23.
go back to reference Hachmi, F., Boujenfa, K., Limam, M.: Enhancing the accuracy of intrusion detection systems by reducing the rates of false positives and false negatives through multi-objective optimization. J. Netw. Syst. Manag. 27(1), 93–120 (2019)CrossRef Hachmi, F., Boujenfa, K., Limam, M.: Enhancing the accuracy of intrusion detection systems by reducing the rates of false positives and false negatives through multi-objective optimization. J. Netw. Syst. Manag. 27(1), 93–120 (2019)CrossRef
24.
go back to reference Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47 (2002) Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47 (2002)
25.
go back to reference Al Ridhawi, I., Kotb, Y.: A secure service-specific overlay composition model for cloud networks. Softw. Netw. 2018(1), 221–240 (2018) Al Ridhawi, I., Kotb, Y.: A secure service-specific overlay composition model for cloud networks. Softw. Netw. 2018(1), 221–240 (2018)
26.
go back to reference Hoang, N.P., Pishva, D.: A TOR-based anonymous communication approach to secure smart home appliances. In: 2015 17th International Conference on Advanced Communication Technology (ICACT), pp. 517–525. IEEE (2015) Hoang, N.P., Pishva, D.: A TOR-based anonymous communication approach to secure smart home appliances. In: 2015 17th International Conference on Advanced Communication Technology (ICACT), pp. 517–525. IEEE (2015)
27.
go back to reference Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., Sain, M.: Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 16(1), 254–264 (2015)CrossRef Kumar, P., Gurtov, A., Iinatti, J., Ylianttila, M., Sain, M.: Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens. J. 16(1), 254–264 (2015)CrossRef
28.
go back to reference Santoso, F.K., Vun, N.C.: Securing IoT for smart home system. In: 2015 International Symposium on Consumer Electronics (ISCE), pp. 1–2. IEEE (2015) Santoso, F.K., Vun, N.C.: Securing IoT for smart home system. In: 2015 International Symposium on Consumer Electronics (ISCE), pp. 1–2. IEEE (2015)
29.
go back to reference Ayday, E., Rajagopal, S.: Secure device authentication mechanisms for the smart grid-enabled home area networks (No. REP_WORK) (2013) Ayday, E., Rajagopal, S.: Secure device authentication mechanisms for the smart grid-enabled home area networks (No. REP_WORK) (2013)
30.
go back to reference Logue, J.D., Supramaniam, S., Hardison, O.B., Luxemberg, J.A.: U.S. Patent No. 8,539,567. U.S. Patent and Trademark Office, Washington, DC (2013) Logue, J.D., Supramaniam, S., Hardison, O.B., Luxemberg, J.A.: U.S. Patent No. 8,539,567. U.S. Patent and Trademark Office, Washington, DC (2013)
31.
go back to reference Nadi, R.A., Zamil, M.G.A.: A profile based data segmentation for in-home activity recognition. Int. J. Sens. Netw. 29(1), 28–37 (2019)CrossRef Nadi, R.A., Zamil, M.G.A.: A profile based data segmentation for in-home activity recognition. Int. J. Sens. Netw. 29(1), 28–37 (2019)CrossRef
32.
go back to reference Al Zamil, M.G., Betin Can, A.: A model based on multi-features to enhance healthcare and medical document retrieval. Inform. Health Soc. Care 36(2), 100–115 (2011)CrossRef Al Zamil, M.G., Betin Can, A.: A model based on multi-features to enhance healthcare and medical document retrieval. Inform. Health Soc. Care 36(2), 100–115 (2011)CrossRef
33.
go back to reference Zuhairy, R.M., Al Zamil, M.G.: Energy-efficient load balancing in wireless sensor network: an application of multinomial regression analysis. Int. J. Distrib. Sens. Netw. 14(3), 1550147718764641 (2018)CrossRef Zuhairy, R.M., Al Zamil, M.G.: Energy-efficient load balancing in wireless sensor network: an application of multinomial regression analysis. Int. J. Distrib. Sens. Netw. 14(3), 1550147718764641 (2018)CrossRef
34.
go back to reference Nasrallah, A., Balasubramanian, V., Thyagaturu, A., Reisslein, M., ElBakoury, H.: Reconfiguration algorithms for high precision communications in time sensitive networks: time-aware shaper configuration with IEEE 802.1 qcc (extended version). arXiv preprint arXiv:1906.11596 (2019) Nasrallah, A., Balasubramanian, V., Thyagaturu, A., Reisslein, M., ElBakoury, H.: Reconfiguration algorithms for high precision communications in time sensitive networks: time-aware shaper configuration with IEEE 802.1 qcc (extended version). arXiv preprint arXiv:​1906.​11596 (2019)
35.
go back to reference Clarke Jr., E.M., Grumberg, O., Kroening, D., Peled, D., Veith, H.: Model Checking. MIT Press, Cambridge (2018)MATH Clarke Jr., E.M., Grumberg, O., Kroening, D., Peled, D., Veith, H.: Model Checking. MIT Press, Cambridge (2018)MATH
36.
go back to reference Al Zamil, M.G., Samarah, S.: Application of design for verification to smart sensory systems. In: Qatar Foundation Annual Research Conference Proceedings Volume 2014 Issue 1, Vol. 2014, No. 1, p. ITPP0366. Hamad bin Khalifa University Press (HBKU Press) (2014) Al Zamil, M.G., Samarah, S.: Application of design for verification to smart sensory systems. In: Qatar Foundation Annual Research Conference Proceedings Volume 2014 Issue 1, Vol. 2014, No. 1, p. ITPP0366. Hamad bin Khalifa University Press (HBKU Press) (2014)
37.
go back to reference Larsen, K.G., Pettersson, P., Yi, W.: UPPAAL in a nutshell. Int. J. Softw. Tools Technol. Transf. 1(1–2), 134–152 (1997)CrossRef Larsen, K.G., Pettersson, P., Yi, W.: UPPAAL in a nutshell. Int. J. Softw. Tools Technol. Transf. 1(1–2), 134–152 (1997)CrossRef
Metadata
Title
Cybersecurity of Smart Home Systems: Sensor Identity Protection
Authors
Yazan Alshboul
Abdel Al Raoof Bsoul
Mohammed AL Zamil
Samer Samarah
Publication date
01-07-2021
Publisher
Springer US
Published in
Journal of Network and Systems Management / Issue 3/2021
Print ISSN: 1064-7570
Electronic ISSN: 1573-7705
DOI
https://doi.org/10.1007/s10922-021-09586-9

Other articles of this Issue 3/2021

Journal of Network and Systems Management 3/2021 Go to the issue

Premium Partner