sensors-logo

Journal Browser

Journal Browser

Cyber-Security-Based Internet of Things for Smart Homes

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (31 December 2021) | Viewed by 7623

Special Issue Editors


E-Mail Website
Guest Editor
Information Technologies Institute, Centre for Research and Technology Hellas, Thessaloniki, Greece
Interests: Internet of Things; security of data; health care; blockchains; diseases; learning (artificial intelligence); data privacy; patient monitoring; cryptography; decision support systems; mobile robots; neural nets; authorisation; computer network security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Information Technologies Institute, Centre for Research and Technology Hellas, 57001 Thessaloniki, Greece
Interests: high-performance computing; scientific computing; parallel systems; cloud computing; machine learning; cybersecurity; simulation; service-oriented architectures

E-Mail Website
Guest Editor
Information Technologies Institute, Centre for Research and Technology Hellas, Thessaloniki, Greece
Interests: machine learning; deep learning; computer vision; Internet of Things; surveillance systems; human–computer interaction

Special Issue Information

Dear colleagues,

The rapidly evolving technology of the Internet of Things introduces new cybersecurity challenges, especially where installations handle and process personal and private data. As such, smart homes constitute an ecosystem which is prone to new complex cyberattacks and attractive to attackers.

This Special Issue aims to present recent advances in new techniques for the cyber defense of smart homes, by taking advantage of recent developments in machine, deep and federated learning, distributed ledger technologies such as blockchain, as well as behavioral monitoring of IoT devices. Topics of interest include but are not limited to the following:

  • Cybersecurity architectures for IoT and smart homes;
  • Cybersecurity analytics platforms for IoT;
  • Blockchain for IoT and smart homes;
  • Machine and deep learning for the security of IoT;
  • Behavioral monitoring of IoT;
  • Federated IoT smart home infrastructures with focus on security and privacy;
  • Cyberthreat intelligence;
  • AI-based methods for malware and ransomware;
  • Privacy and trust in IoT.

Dr. Konstantinos Votis
Dr. Konstantinos M. Giannoutakis
Dr. Nikolaos Dimitriou
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Smart homes
  • Internet of Things
  • Cyber security
  • Privacy
  • Intrusion detection systems
  • Network behavior analysis
  • Machine/deep/federated learning
  • Distributed ledger technologies

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

29 pages, 2224 KiB  
Article
Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning
by Victor Takashi Hayashi and Wilson Vicente Ruggiero
Sensors 2022, 22(4), 1325; https://0-doi-org.brum.beds.ac.uk/10.3390/s22041325 - 09 Feb 2022
Cited by 7 | Viewed by 2908
Abstract
Virtual assistants, deployed on smartphone and smart speaker devices, enable hands-free financial transactions by voice commands. Even though these voice transactions are frictionless for end users, they are susceptible to typical attacks to authentication protocols (e.g., replay). Using traditional knowledge-based or possession-based authentication [...] Read more.
Virtual assistants, deployed on smartphone and smart speaker devices, enable hands-free financial transactions by voice commands. Even though these voice transactions are frictionless for end users, they are susceptible to typical attacks to authentication protocols (e.g., replay). Using traditional knowledge-based or possession-based authentication with additional invasive interactions raises users concerns regarding security and usefulness. State-of-the-art schemes for trusted devices with physical unclonable functions (PUF) have complex enrollment processes. We propose a scheme based on a challenge response protocol with a trusted Internet of Things (IoT) autonomous device for hands-free scenarios (i.e., with no additional user interaction), integrated with smart home behavior for continuous authentication. The protocol was validated with automatic formal security analysis. A proof of concept with websockets presented an average response time of 383 ms for mutual authentication using a 6-message protocol with a simple enrollment process. We performed hands-free activity recognition of a specific user, based on smart home testbed data from a 2-month period, obtaining an accuracy of 97% and a recall of 81%. Given the data minimization privacy principle, we could reduce the total number of smart home events time series from 7 to 5. When compared with existing invasive solutions, our non-invasive mechanism contributes to the efforts to enhance the usability of financial institutions’ virtual assistants, while maintaining security and privacy. Full article
(This article belongs to the Special Issue Cyber-Security-Based Internet of Things for Smart Homes)
Show Figures

Figure 1

29 pages, 938 KiB  
Article
PRASH: A Framework for Privacy Risk Analysis of Smart Homes
by Joseph Bugeja, Andreas Jacobsson and Paul Davidsson
Sensors 2021, 21(19), 6399; https://0-doi-org.brum.beds.ac.uk/10.3390/s21196399 - 25 Sep 2021
Cited by 7 | Viewed by 3809
Abstract
Smart homes promise to improve the quality of life of residents. However, they collect vasts amounts of personal and sensitive data, making privacy protection critically important. We propose a framework, called PRASH, for modeling and analyzing the privacy risks of smart homes. It [...] Read more.
Smart homes promise to improve the quality of life of residents. However, they collect vasts amounts of personal and sensitive data, making privacy protection critically important. We propose a framework, called PRASH, for modeling and analyzing the privacy risks of smart homes. It is composed of three modules: a system model, a threat model, and a set of privacy metrics, which together are used for calculating the privacy risk exposure of a smart home system. By representing a smart home through a formal specification, PRASH allows for early identification of threats, better planning for risk management scenarios, and mitigation of potential impacts caused by attacks before they compromise the lives of residents. To demonstrate the capabilities of PRASH, an executable version of the smart home system configuration was generated using the proposed formal specification, which was then analyzed to find potential attack paths while also mitigating the impacts of those attacks. Thereby, we add important contributions to the body of knowledge on the mitigations of threat agents violating the privacy of users in their homes. Overall, the use of PRASH will help residents to preserve their right to privacy in the face of the emerging challenges affecting smart homes. Full article
(This article belongs to the Special Issue Cyber-Security-Based Internet of Things for Smart Homes)
Show Figures

Figure 1

Back to TopTop