Autors: Gergov, I. G., Tsochev, G. R., Nenova, M. V.
Title: Security Vulnerabilities of Smart Home: A Case Study of Smart Camera
Keywords: internet of things, penetration testing, security, smart camera, smart home, threat modelling

Abstract: During the last decade Internet of Things (IoT) enables people to enhance the security level of home through inter-connected devices. The smart security system can integrate surveillance cameras, motion sensors, door/window sensors, and smart locks, all connected to a central hub. With IoT can be monitored and controlled the security remotely, to receive real-time alerts, and even automate actions based on specific events when un-authorized access is detected. This research is related to the security issues of smart home cameras. The aim of the paper is to make analysis of smart home camera security problems and trends and to show their level of protection.

References

  1. Schiller, T.; Caulkins, B.; Wu, A.S.; Mondesire, S. Security Awareness in Smart Homes and Internet of Things Networks through Swarm-Based Cybersecurity Penetration Testing. Information 2023, 14, 536. https://doi.org/10.3390/info14100536
  2. Hassebo, A.; Tealab, M. Global Models of Smart Cities and Potential IoT Applications: A Review. IoT 2023, 4, 366-411. https://doi.org/10.3390/iot4030017
  3. Bellini, P.; Nesi, P.; Pantaleo, G. IoT-Enabled Smart Cities: A Review of Concepts, Frameworks and Key Technologies. Appl. Sci. 2022, 12, 1607.
  4. Mora, N.; Matrella, G.; Ciampolini, P. Cloud-Based Behavioral Monitoring in Smart Homes. Sensors 2018, 18, 1951. https://doi.org/10.3390/s18061951
  5. Jang, I.; Lee, D.; Choi, J.; Son, Y. An Approach to Share Self-Taught Knowledge between Home IoT Devices at the Edge. Sensors 2019
  6. Kotenko, I.; Izrailov, K.; Buinevich, M. Analytical Modeling for Identification of the Machine Code Architecture of Cyberphysical Devices in Smart Homes. Sensors 2022, 22, 1017. https://doi.org/10.3390/s22031017
  7. Khanneh, S.; Anu, V. Security Requirements Prioritization Techniques: A Survey and Classification Framework. Software 2022, 1, 450-472.
  8. De, S.J., Le Métayer, D.: Privacy risk analysis. In: Synthesis Series. Morgan & Claypool Publishers (2016)
  9. “CVE-2017-11632.” Available from MITRE, CVE-ID CVE-2017-11632., Feburary 2018. [Online]. Available: http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2017-11632

Issue

National Conference with International Participation, TELECOM, 2026, Albania, https://doi.org/10.1109/TELECOM66943.2025.11304063

Вид: публикация в международен форум, публикация в реферирано издание, индексирана в Scopus