This paper investigates the vulnerability of data transmission protocols used in smart home control systems, focusing on analyzing the communication protocols used in these systems. The spread of interconnected devices and the Internet of Things (IoT) has led to growing concerns about data privacy, unauthorized access, and potential cyberattacks. An in-depth analysis of various communication protocols used in the smart home environment was conducted, which allowed us to identify their advantages and disadvantages from a security perspective. Based on the analysis, recommendations are made for selecting communication protocols that meet the principles of security and confidentiality in the “Smart Home” environment.
1. S. Türkyılmaz and E. Altindag, “Analysis of Smart Home Systems in the Context of the Internet of Things in Terms of Consumer Experience,” EconJournals, vol. 12, no. 1, 2022. https://doi.org/10.32479/irmm.12709
2. M. H. Kabir, and M. T. Ahmed, "IoT-based low-cost smart home automation and security system using wireless technology," Aust. J. Eng. Innov. Technol., vol. 5, no. 3, pp. 101–112, 2023. https://doi.org/10.34104/ajeit.023.01010112
3.A. M. Yang, C. Zhang, Y. Chen, Y. Zhuansun, and H. Liu, "Security and Privacy of Smart Home Systems Based on the Internet of Things and Stereo Matching Algorithms," IEEE Internet Things J., vol. 7, no. 4, pp. 2521– 2530, 2020. https://doi.org/10.1109/JIOT.2019.2946214
4. A. T. Kouanou, C. T. Tchapga, M. S. Ekonde, V. Monthe, B. A. Mezatio, J. Manga, G. R. Simo, and Y. Muhozam, "Securing Data in an Internet of Things Network Using Blockchain Technology: Smart Home Case," SN Comput. Sci., vol. 3, no. 2, p. 167, 2022. https://doi.org/10.1007/s42979-022-01065-5
5. G. Goyal, P. Liu, and S. Sural, "Securing Smart Home IoT Systems with Attribute-Based Access Control," SAT-CPS@CODASPY, pp. 37–46, 2022. https://doi.org/10.1145/3510547.3517920
6. K. Taghizad-Tavana, M. Ghanbari-Ghalehjoughi, N. Razzaghi-Asl, S. Nojavan, and A. Alizadeh, «An Overview of the Architecture of Home Energy Management System as Microgrids, Automation Systems, Communication Protocols, Security, and Cyber Challenges,» Sustainability, vol. 14, p. 15938, 2022. https://doi.org/10.3390/su142315938
7. M. A. N. Abrishamchi, A. H. Abdullah, A. D. Cheok, and K. S. Bielawski, "Side channel attacks on smart home systems: A short overview," IECON, pp. 8144–8149, 2017. https://doi.org/10.1109/IECON.2017.8217429
8. G. Kaur and K. S. Saini, "Securing Network Communication Between Motes Using Hierarchical Group Key Management Scheme Using Threshold Cryptography in Smart Home Using Internet of Things," in Computing and Network Sustainability, H. Vishwakarma and S. Akashe, Eds., vol. 12, Springer, Singapore, 2017. https://doi.org/10.1007/978-981-10-3935-5_21
9. M. Mamdouh, A. I. Awad, H. F. A. Hamed, and A. A. M. Khalaf, "Outlook on Security and Privacy in IoHT: Key Challenges and Future Vision," AICV, pp. 721–730, 2020. https://doi.org/10.1007/978-3-030-44289-7_67
10. Y. Wan, K. Xu, G. Xue, and F. Wang, «IoTArgos: A Multi-Layer Security Monitoring System for Internetof-Things in Smart Homes,» INFOCOM, pp. 874–883, 2020. https://doi.org/10.1109/INFOCOM41043.2020.9155424
11. F. Hussain and M. Qi, "Integrated Privacy-Preserving Framework for Smart Home," ICNC-FSKD, pp. 1246– 1253, 2018. https://doi.org/10.1109/FSKD.2018.8687201
12. S. J. Danbatta and A. Varol, «Comparison of Zigbee, Z-Wave, Wi-Fi, and Bluetooth Wireless Technologies Used in Home Automation,» ISDFS, pp. 1–5, 2019. https://doi.org/10.1109/ISDFS.2019.8757472
13. M. Tahir, et al., "Wi-Fi Aided Home Energy Management System and AC Prediction through Temperature and Humidity Sensors," in Proc. 2022 Int. Conf. on Cyber Resilience (ICCR), Dubai, UAE, 2022, pp. 1-9, doi: 10.1109/ICCR56254.2022.9995822.
14. S. Rohini and K. Venkatasubramanian, «Z-Wave based Zoning Sensor for Smart Thermostats,» Indian J. Sci. Technol., vol. 8, no. 20, Aug. 2015, doi: 10.17485/ijst/2015/v8i20/79081.
15. Z. Zhao, K. Agbossou, and A. Cardenas, «Connectivity for Home Energy Management applications,» in Proc. 2016 IEEE PES Asia-Pacific Power and Energy Eng. Conf. (APPEEC), Xi’an, 2016, pp. 2175-2180, doi: 10.1109/APPEEC.2016.7779872.
16. B. Mbarek, B. Buhnova, and T. Pitner, «SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems,» IWCMC, pp. 1373–1378, 2019. 17. S. N. Khan, F. Loukil, C. Ghedira-Guegan, E. Benkhelifa, and A. Bani-Hani, «Blockchain smart contracts: Applications, challenges, and future trends,» Peer-to-Peer Networking and Applications, vol. 14, pp. 2901–2925, 2021. https://doi.org/10.1007/s12083-021-01127-0
18. J. Xue, C. Xu, and Y. Zhang, «Private Blockchain-Based Secure Access Control for Smart Home Systems,» KSII Trans. Internet Inf. Syst., vol. 12, pp. 6057–6078, 2018, doi: 10.3837/tiis.2018.12.024.
19. D. Mourtzis, J. Angelopoulos, and N. Panopoulos, "Smart Manufacturing and Tactile Internet Based on 5G in Industry 4.0: Challenges, Applications, and New Trends," Electronics, vol. 10, 2021, doi: 10.3390/electronics10243175.
20. D. Shin, K. Yun, J. Kim, P. V. Astillo, J.-N. Kim, and I. You, "A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks," in IEEE Access, vol. 7, pp. 142531-142550, 2019, doi: 10.1109/ACCESS.2019.2943929