Problems of privacy and security in cyber physical systems of intellectual houses

: pp. 49 - 55
Lviv Polytechnic National University, Computer Engineering Department

Smart homes have become increasingly popular for IoT products and services with a lot of promises for improving the quality of life of individuals. Nevertheless, the heterogeneous, dynamic, and Internet-connected nature of this environment adds new concerns as private data becomes accessible, often without the householders’ awareness. This accessibility alongside with the rising risks of data security and privacy breaches, makes smart home security a critical topic that deserves scrutiny. In current paper, is presented an overview of challenges related to the privacy and security in the smart house cyber physical systems. Also, were realized constraints, evaluated solutions, and a several challenges and research issues where further investigation is strongly required. I have identified issues that need to be solved: risk assessment methods, information flow control accesses, identity management, and security management methods.

  1. D. J. Cook et al., “MavHome: An agent-based smart home”, IEEE International Conference on Pervasive Computing and Communications, San Diego, CA, USA, pp. 521–524, 2003.
  2. N. King, “Smart home – A Definition”, Milton Keynes: Intertek Research and Testing Centre, 2003.
  3. Statista, 2015 [Online]. Available:
  4. August and Xfinity, “The Safe and Smart Home: Security in the Smart Home Era,” 2016 [Online]. Available:
  5. V. Srinivasan et al., “Protecting your daily in-home activity information from a wireless snooping attack,” 10th international conference on Ubiquitous computing, pp. 202–211, 2008.
  6. B. Ur et al., “The current state of access control for smart devices in homes,” Workshop on Home Usable Privacy and Security, 2013.
  7. S. Notra et al., “An experimental study of security and privacy risks with emerging household appliances”, IEEE Conference on Communications and Network Security, pp. 79–84, 2014.
  8. V. Sivaraman et al., “Networklevel security and privacy control for smart-home IoT devices,” Wireless and Mobile Computing, Networking and Communications, pp. 163–167, 2015.
  9. T. D. P. Mendes et al., “Smart home communication technologies and applications: Wireless protocol assessment for home area network resources”, Energies, vol. 8, no. 7, pp. 7279–7311, 2015.
  10. C. Debes et al., “Monitoring Activities of Daily Living in Smart Homes: Understanding human behavior”, IEEE Signal Processing Magazine, vol. 33, no. 2, pp. 81-94, 2016.
  11. C. Lee et al., “Securing smart home: Technologies, security challenges, and security requirements”, IEEE Conference on Communications and Network Security, pp. 67–72, 2014.
  12. K. Islam et al., “Security and privacy considerations for wireless sensor networks in smart home environments”, Computer Supported Cooperative Work in Design, IEEE 16th International Conference on, pp. 626–633, 2012.
  13. H. Chan and A. Perrig, “Security and privacy in sensor networks”, Computer, vol. 36, no. 10, pp. 103–105, 2003
  14. M. M. Hossain et al., “Towards an Analysis of Security Issues, Challenges, and Open Problems in the Internet of Things”, Services, pp. 2128, 2015.
  15. M. Anwar et al., “Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges”, Health Policy and Technology, vol. 4, pp. 299–311, 2015.
  16. S. L. Keoh et al., “Securing the internet of things: A standardization perspective”, Internet of Things Journal, IEEE, vol. 1, no. 3, pp. 265–275, 2014.
  17. D. Altolini et al., “Low power link layer security for IoT: Implementation and performance analysis”, Wireless Communications and Mobile Computing Conference, pp. 919–925, 2013.
  18. H. C. Pohls et al., “RERUM: Building a reliable IoT upon privacy-and security-enabled smart objects”, Wireless Communications and Networking Conference Workshops, pp. 122–127, 2014.
  19. G. Mantas et al., “Security in smart home environment”, Wireless Technologies for Ambient Assisted Living and Healthcare: Systems and Applications, pp. 170–191, 2010
  20. N. P. Hoang and D. Pishva, “A TOR-based anonymous communication approach to secure smart home appliances”, Advanced Communication Technology, pp. 517–525, 2015.
  21. A. Riahi et al., “A systemic approach for IoT security”, Distributed Computing in Sensor Systems, pp. 351–355, 2013.
  22. A. Jacobsson and P. Davidsson, “Towards a Model of Privacy and Security for Smart Homes,” IEEE 2nd World Forum on Internet of Things, vol. 2, pp. 727–732, 2015
  23. M. Henze et al., “A comprehensive approach to privacy in the cloud-based Internet of Things,” Future Generation Computer Systems, vol. 56, pp. 701–718, 2016.
  24. D. Barnard-Wills et al., “ENISA Threat Landscape and Good Practice Guide for Smart Home and Converged Media”, ENISA (The European Network and Information Security Agency), 2014.