Smart home and legal safeguard against cyber threat: A review
Purpose - Smart home concept development is still in its infancy, however, its advantages in users’ life have widely discussed all over the nation. Despite its role in preserving energy and environment (Reinisch et al., 2010), making life convenient and easier (Robles et al., 2010), for the safet...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2017
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/24547/1/SICONSEM%202017%2084%2086.pdf http://repo.uum.edu.my/24547/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Utara Malaysia |
Language: | English |
id |
my.uum.repo.24547 |
---|---|
record_format |
eprints |
spelling |
my.uum.repo.245472018-07-30T02:35:00Z http://repo.uum.edu.my/24547/ Smart home and legal safeguard against cyber threat: A review Basarudin, Noor Ashikin Yeon, Asmah Laili Mohamed Yusoff, Zuryati Md Dahlan, Nuarrual Hilal Mahdzir, Nazli QA75 Electronic computers. Computer science Purpose - Smart home concept development is still in its infancy, however, its advantages in users’ life have widely discussed all over the nation. Despite its role in preserving energy and environment (Reinisch et al., 2010), making life convenient and easier (Robles et al., 2010), for the safety and security purpose(Ding et al., 2011), as well as providing healthcare (Chan et al.,2008) to the inhabitants, being a connected house which relies fully on the internet connection is opened up to various threat in cyber aspect.Thus, this paper conducted a review of past literature regarding the trend of cyber threats that occur in a smart home concept and the methods of prevention that have been taken either approach in computer technology or in legal method. Methodology - This paper conducts a review on the information related to the concept of smart home and the issues revolving its susceptibility to cyber threat. Preliminary search was conducted using the search engines, google scholars and online journal database.The key term searched relevant to the topic includes ‘smart home technology system’, ‘smart home and cyber threat’, ‘smart grid attacks’, and ‘Internet of Things’. Finding of the searches were segmented according to the sub topic to be discussed thoroughly. Findings - Although there is no definite answer to what is exactly smart home should be, for the purpose of this study, author stick to the concept of a home whereby it should comprise of the digitally connected and controlled devices (Alam et al., 2012) within a house, equipped with sensors, actuators and cloud services that support automation (Aldrich, 2003), as well as control hubs to connect sensors and actuators from multiple entry points like touch pads, computer screens, telephones, and other wireless mobile devices, such as smartphones and tablets (Rodden & Benford, 2003). Smart home environment consist of internet-enabled gadget embedded in a house to share information between each other to allow the devices functioning process dubbed with Internet of Things (Tzezana, 2017). The Internet of Things as a method of today’s communication links the internet with sensors and devices to enable the connection of physical and virtual object through the exploitation of data communication (Atzori et al., 2010). Smart technology is viewed as a system or account susceptible to hack due to its open system that may expose to eavesdropping, Distributed Denial of Service (DDoS) attack, attack against authentication (Li et al., 2016), hacking activity, data stolen and data manipulation. Attack on the system will bring greater problem that leads to data intrusion and privacy issues. Thus, the interconnecting of various devices in smart home demand control of data from being manipulated, hacked or misused by hackers through the introduction of policies and regulations (Cho et al.,2015). Apart from imposing rules and regulations to curb the issues, review also will look into approach taken in technical ways to protect the system to minimize the potential attacks in the smart home system. 2017-12-04 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/24547/1/SICONSEM%202017%2084%2086.pdf Basarudin, Noor Ashikin and Yeon, Asmah Laili and Mohamed Yusoff, Zuryati and Md Dahlan, Nuarrual Hilal and Mahdzir, Nazli (2017) Smart home and legal safeguard against cyber threat: A review. In: Sintok International Conference on Social Science and Management (SICONSEM 2017), 4-5 December 2017, Adya Hotel, Langkawi Island, Kedah, Malaysia.. |
institution |
Universiti Utara Malaysia |
building |
UUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Utara Malaysia |
content_source |
UUM Institutionali Repository |
url_provider |
http://repo.uum.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Basarudin, Noor Ashikin Yeon, Asmah Laili Mohamed Yusoff, Zuryati Md Dahlan, Nuarrual Hilal Mahdzir, Nazli Smart home and legal safeguard against cyber threat: A review |
description |
Purpose - Smart home concept development is still in its infancy, however, its advantages in
users’ life have widely discussed all over the nation. Despite its role in preserving energy and
environment (Reinisch et al., 2010), making life convenient and easier (Robles et al., 2010), for
the safety and security purpose(Ding et al., 2011), as well as providing healthcare (Chan et al.,2008) to the inhabitants, being a connected house which relies fully on the internet connection is opened up to various threat in cyber aspect.Thus, this paper conducted a review of past literature regarding the trend of cyber threats that occur in a smart home concept and the methods of prevention that have been taken either approach in computer technology or in legal method. Methodology - This paper conducts a review on the information related to the concept of smart home and the issues revolving its susceptibility to cyber threat. Preliminary search was conducted
using the search engines, google scholars and online journal database.The key term searched
relevant to the topic includes ‘smart home technology system’, ‘smart home and cyber threat’,
‘smart grid attacks’, and ‘Internet of Things’. Finding of the searches were segmented according
to the sub topic to be discussed thoroughly. Findings - Although there is no definite answer to what is exactly smart home should be, for
the purpose of this study, author stick to the concept of a home whereby it should comprise
of the digitally connected and controlled devices (Alam et al., 2012) within a house, equipped
with sensors, actuators and cloud services that support automation (Aldrich, 2003), as well
as control hubs to connect sensors and actuators from multiple entry points like touch pads,
computer screens, telephones, and other wireless mobile devices, such as smartphones and
tablets (Rodden & Benford, 2003). Smart home environment consist of internet-enabled gadget
embedded in a house to share information between each other to allow the devices functioning
process dubbed with Internet of Things (Tzezana, 2017). The Internet of Things as a method of today’s communication links the internet with sensors and devices to enable the connection of
physical and virtual object through the exploitation of data communication (Atzori et al., 2010).
Smart technology is viewed as a system or account susceptible to hack due to its open system
that may expose to eavesdropping, Distributed Denial of Service (DDoS) attack, attack against
authentication (Li et al., 2016), hacking activity, data stolen and data manipulation. Attack on the system will bring greater problem that leads to data intrusion and privacy issues. Thus, the interconnecting of various devices in smart home demand control of data from being manipulated, hacked or misused by hackers through the introduction of policies and regulations (Cho et al.,2015). Apart from imposing rules and regulations to curb the issues, review also will look into approach taken in technical ways to protect the system to minimize the potential attacks in the smart home system. |
format |
Conference or Workshop Item |
author |
Basarudin, Noor Ashikin Yeon, Asmah Laili Mohamed Yusoff, Zuryati Md Dahlan, Nuarrual Hilal Mahdzir, Nazli |
author_facet |
Basarudin, Noor Ashikin Yeon, Asmah Laili Mohamed Yusoff, Zuryati Md Dahlan, Nuarrual Hilal Mahdzir, Nazli |
author_sort |
Basarudin, Noor Ashikin |
title |
Smart home and legal safeguard against cyber threat: A review |
title_short |
Smart home and legal safeguard against cyber threat: A review |
title_full |
Smart home and legal safeguard against cyber threat: A review |
title_fullStr |
Smart home and legal safeguard against cyber threat: A review |
title_full_unstemmed |
Smart home and legal safeguard against cyber threat: A review |
title_sort |
smart home and legal safeguard against cyber threat: a review |
publishDate |
2017 |
url |
http://repo.uum.edu.my/24547/1/SICONSEM%202017%2084%2086.pdf http://repo.uum.edu.my/24547/ |
_version_ |
1644284077664108544 |