{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T00:18:04Z","timestamp":1777508284800,"version":"3.51.4"},"publisher-location":"Cham","reference-count":73,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030587024","type":"print"},{"value":"9783030587031","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-58703-1_13","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T06:02:47Z","timestamp":1599544967000},"page":"211-231","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Identifying Vulnerabilities in Security and Privacy of Smart Home Devices"],"prefix":"10.1007","author":[{"given":"Chola","family":"Chhetri","sequence":"first","affiliation":[]},{"given":"Vivian","family":"Motti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"13_CR1","unstructured":"Cost of Data Breach Study (2018). \nwww.ibm.com\/security\/data-breach"},{"key":"13_CR2","doi-asserted-by":"publisher","unstructured":"Ahmad, W., Sunshine, J., Kaestner, C., Wynne, A.: Enforcing fine-grained security and privacy policies in an ecosystem within an ecosystem. In: Proceedings of the 3rd International Workshop on Mobile Development Lifecycle, MobileDeLi 2015, pp. 28\u201334. ACM, New York (2015). \nhttps:\/\/doi.org\/10.1145\/2846661.2846664","DOI":"10.1145\/2846661.2846664"},{"key":"13_CR3","doi-asserted-by":"publisher","unstructured":"Alanwar, A., Balaji, B., Tian, Y., Yang, S., Srivastava, M.: EchoSafe: sonar-based verifiable interaction with intelligent digital agents. In: Proceedings of the 1st ACM Workshop on the Internet of Safe Things, SafeThings 2017, pp. 38\u201343. ACM, New York (2017). \nhttps:\/\/doi.org\/10.1145\/3137003.3137014","DOI":"10.1145\/3137003.3137014"},{"key":"13_CR4","first-page":"1","volume":"2018","author":"R Alharbi","year":"2018","unstructured":"Alharbi, R., Aspinall, D.: An iot analysis framework: an investigation of IoT smart cameras\u2019 vulnerabilities. Living Internet Things: Cybersecur. IoT 2018, 1\u201310 (2018)","journal-title":"Living Internet Things: Cybersecur. IoT"},{"key":"13_CR5","unstructured":"Antonakakis, M., April, T., Bailey, M., Bursztein, E., Cochran, J., Durumeric, Z., Alex Halderman, J., Menscher, D., Seaman, C., Sullivan, N., Thomas, K., Zhou, Y.: Understanding the Mirai botnet. In: Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, pp. 1093\u20131110 (2017). \nhttps:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/antonakakis"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Anwar, M.N., Nazir, M., Mustafa, K.: Security threats taxonomy: smart-home perspective. In: 2017 3rd International Conference on Advances in Computing, Communication & Automation (ICACCA) (Fall), pp. 1\u20134 (2017)","DOI":"10.1109\/ICACCAF.2017.8344666"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Aouini, I., Ben Azzouz, L., Jebali, M., Saidane, L.A.: Improvements to the smart energy profile security. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1356\u20131361 (June 2017)","DOI":"10.1109\/IWCMC.2017.7986482"},{"key":"13_CR8","unstructured":"Apthorpe, N., Reisman, D., Feamster, N.: A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic. In: Data and Algorithmic Transparency Workshop (DAT), New York (2016). \nhttp:\/\/datworkshop.org\/papers\/dat16-final37.pdf"},{"key":"13_CR9","unstructured":"Apthorpe, N., Reisman, D., Sundaresan, S., Narayanan, A., Feamster, N.: Spying on the smart home: privacy attacks and defenses on encrypted IoT traffic. arXiv Preprint \narxiv:1708.05044\n\n (2017)"},{"issue":"6","key":"13_CR10","doi-asserted-by":"publisher","first-page":"5317","DOI":"10.1109\/JIOT.2018.2840451","volume":"5","author":"SM Beyer","year":"2018","unstructured":"Beyer, S.M., Mullins, B.E., Graham, S.R., Bindewald, J.M.: Pattern-of-life modeling in smart homes. IEEE Internet Things J. 5(6), 5317\u20135325 (2018)","journal-title":"IEEE Internet Things J."},{"key":"13_CR11","unstructured":"Braga, M.: People are complaining that Amazon Echo is responding to Ads on TV (2015)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Bugeja, J., J\u00f6nsson, D., Jacobsson, A.: An investigation of vulnerabilities in smart connected cameras. In: 2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 537\u2013542 (March 2018)","DOI":"10.1109\/PERCOMW.2018.8480184"},{"key":"13_CR13","unstructured":"Chang, V., Chundury, P., Chetty, M.: \u201cSpiders in the sky\u201d: user perceptions of drones, privacy, and security. In: Chi 2017 (2017). \nhttps:\/\/hci.princeton.edu\/wp-content\/uploads\/sites\/459\/2017\/01\/CHI2017_CameraReady.pdf"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Chatfield, B., Haddad, R.J.: RSSI-based spoofing detection in smart grid IEEE 802.11 home area networks. In: 2017 IEEE Power Energy Society Innovative Smart Grid Technologies Conference (ISGT), pp. 1\u20135 (April 2017)","DOI":"10.1109\/ISGT.2017.8086064"},{"key":"13_CR15","doi-asserted-by":"publisher","unstructured":"Chhetri, C.: Towards a smart home usable privacy framework. In: Conference Companion Publication of the 2019 on Computer Supported Cooperative Work and Social Computing, CSCW 2019, pp. 43\u201346. Association for Computing Machinery, New York (2019). \nhttps:\/\/doi.org\/10.1145\/3311957.3361849","DOI":"10.1145\/3311957.3361849"},{"key":"13_CR16","doi-asserted-by":"publisher","unstructured":"Chhetri, C., Motti, V.G.: Eliciting privacy concerns for smart home devices from a user centered perspective. In: Taylor, N.G., Christian-Lamb, C., Martin, M.H., Nardi, B. (eds.) Information in Contemporary Society, pp. 91\u2013101. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-15742-5_8","DOI":"10.1007\/978-3-030-15742-5_8"},{"key":"13_CR17","unstructured":"Cipriani, J.: What you need to know about encryption on your phone (2016). \nhttps:\/\/www.cnet.com\/news\/iphone-android-encryption-fbi\/"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Conti, M., Kaliyar, P., Rabbani, M.M., Ranise, S.: Split: a secure and scalable RPL routing protocol for Internet of Things. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 1\u20138 (2018)","DOI":"10.1109\/WiMOB.2018.8589115"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Crossman, M.A., Hong, L.: Study of authentication with IoT testbed. In: 2015 IEEE International Symposium on Technologies for Homeland Security (HST), pp. 1\u20137 (April 2015)","DOI":"10.1109\/THS.2015.7225303"},{"key":"13_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compeleceng.2017.03.008","volume":"63","author":"AK Das","year":"2017","unstructured":"Das, A.K., Zeadally, S., Wazid, M.: Lightweight authentication protocols for wearable devices. Comput. Electr. Eng. 63, 1\u201313 (2017). \nhttp:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790617305347","journal-title":"Comput. Electr. Eng."},{"key":"13_CR21","doi-asserted-by":"publisher","first-page":"4671","DOI":"10.1109\/JIOT.2018.2874222","volume":"6","author":"K Fan","year":"2019","unstructured":"Fan, K., Wang, S., Ren, Y., Yang, K., Yan, Z., Li, H., Yang, Y.: Blockchain-based secure time protection scheme in IoT. IEEE Internet Things J. 6, 4671\u20134679 (2019)","journal-title":"IEEE Internet Things J."},{"key":"13_CR22","doi-asserted-by":"publisher","unstructured":"Feng, X., Ye, M., Swaminathan, V., Wei, S.: Towards the security of motion detection-based video surveillance on IoT devices. In: Proceedings of the on Thematic Workshops of ACM Multimedia 2017, Thematic Workshops 2017, pp. 228\u2013235. ACM, New York (2017). \nhttps:\/\/doi.org\/10.1145\/3126686.3126713","DOI":"10.1145\/3126686.3126713"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 636\u2013654 (2016)","DOI":"10.1109\/SP.2016.44"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Fouda, M.M., Fadlullah, Z.M., Kato, N.: Assessing attack threat against Zigbee-based home area network for smart grid communications. In: The 2010 International Conference on Computer Engineering Systems, pp. 245\u2013250 (November 2010)","DOI":"10.1109\/ICCES.2010.5674861"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Fuller, J.D., Ramsey, B.W.: Rogue z-wave controllers: a persistent attack channel. In: 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), pp. 734\u2013741 (October 2015)","DOI":"10.1109\/LCNW.2015.7365922"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Gawade, A.U., Shekokar, N.M.: Lightweight secure RPL: a need in IoT. In: 2017 International Conference on Information Technology (ICIT), pp. 214\u2013219 (December 2017)","DOI":"10.1109\/ICIT.2017.31"},{"key":"13_CR27","doi-asserted-by":"crossref","unstructured":"Gong, S., Li, H.: Anybody home? Keeping user presence privacy for advanced metering in future smart grid. In: 2011 IEEE GLOBECOM Workshops (GC Wkshps), pp. 1211\u20131215 (December 2011)","DOI":"10.1109\/GLOCOMW.2011.6162374"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Gyory, N., Chuah, M.: IoTOne: integrated platform for heterogeneous IoT devices. In: 2017 International Conference on Computing, Networking and Communications (ICNC), pp. 783\u2013787 (January 2017)","DOI":"10.1109\/ICCNC.2017.7876230"},{"key":"13_CR29","unstructured":"Hill, K.: How a creep hacked a baby monitor to say lewd things to a 2-year-old. Forbes.com (2013)"},{"issue":"2011","key":"13_CR30","first-page":"269","volume":"4","author":"R Hoenkamp","year":"2014","unstructured":"Hoenkamp, R., Huitema, G.B., de Moor-van Vugt, A.J.C.: The neglected consumer: the case of the smart meter rollout in the Netherlands. Renew. Energy Law Policy 4(2011), 269\u2013282 (2014)","journal-title":"Renew. Energy Law Policy"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Hsieh, W., Leu, J.: A dynamic identity user authentication scheme in wireless sensor networks. In: 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 1132\u20131137 (July 2013)","DOI":"10.1109\/IWCMC.2013.6583716"},{"key":"13_CR32","unstructured":"Hung, M.: Leading the IoT. Gartner Inc., Stamford (2017). \nhttps:\/\/www.gartner.com\/imagesrv\/books\/iot\/iotEbook_digital.pdf"},{"key":"13_CR33","doi-asserted-by":"crossref","unstructured":"De Jesus Martins, R., Schaurich, V.G., Knob, L.A.D., Wickboldt, J.A., Filho, A.S., Granville, L.Z., Pias, M.: Performance analysis of 6LoWPAN and CoAP for secure communications in smart homes. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp. 1027\u20131034 (March 2016)","DOI":"10.1109\/AINA.2016.82"},{"key":"13_CR34","doi-asserted-by":"publisher","unstructured":"Jia, X., Li, X., Gao, Y.: A novel semi-automatic vulnerability detection system for smart home. In: Proceedings of the International Conference on Big Data and Internet of Thing, BDIOT2017, pp. 195\u2013199. ACM, New York (2017). \nhttps:\/\/doi.org\/10.1145\/3175684.3175718","DOI":"10.1145\/3175684.3175718"},{"key":"13_CR35","doi-asserted-by":"crossref","unstructured":"Jia, Y., Xiao, Y., Yu, J., Cheng, X., Liang, Z., Wan, Z.: A novel graph-based mechanism for identifying traffic vulnerabilities in smart home IoT. In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, pp. 1493\u20131501 (April 2018)","DOI":"10.1109\/INFOCOM.2018.8486369"},{"key":"13_CR36","doi-asserted-by":"publisher","unstructured":"Johnson, R., Elsabagh, M., Stavrou, A., Offutt, J.: Dazed droids: a longitudinal study of android inter-app vulnerabilities. In: Proceedings of the 2018 on Asia Conference on Computer and Communications Security, ASIACCS 2018, pp. 777\u2013791. ACM, New York (2018). \nhttps:\/\/doi.org\/10.1145\/3196494.3196549","DOI":"10.1145\/3196494.3196549"},{"issue":"7","key":"13_CR37","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"key":"13_CR38","doi-asserted-by":"publisher","first-page":"102:1","DOI":"10.1145\/3274371","volume":"2","author":"J Lau","year":"2018","unstructured":"Lau, J., Zimmerman, B., Schaub, F.: Alexa, are you listening? Privacy perceptions, concerns and privacy-seeking behaviors with smart speakers. Proc. ACM Hum.-Comput. Interact. 2, 102:1\u2013102:31 (2018)","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"13_CR39","doi-asserted-by":"crossref","unstructured":"Lee, C., Zappaterra, L., Choi, K., Choi, H.-A.: Securing smart home: technologies, security challenges, and security requirements. In: 2014 IEEE Conference on Communications and Network Security, pp. 67\u201372 (October 2014)","DOI":"10.1109\/CNS.2014.6997467"},{"issue":"1","key":"13_CR40","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s00779-017-1084-3","volume":"22","author":"M Lei","year":"2018","unstructured":"Lei, M., Yang, Y., Ma, N., Sun, H., Zhou, C., Ma, M.: Dynamically enabled defense effectiveness evaluation of a home Internet based on vulnerability analysis and attack layer measurement. Pers. Ubiquit. Comput. 22(1), 153\u2013162 (2018). \nhttps:\/\/doi.org\/10.1007\/s00779-017-1084-3","journal-title":"Pers. Ubiquit. Comput."},{"key":"13_CR41","doi-asserted-by":"crossref","unstructured":"Lei, X., Tu, G., Liu, A.X., Li, C., Xie, T.: The insecurity of home digital voice assistants - vulnerabilities, attacks and countermeasures. In: 2018 IEEE Conference on Communications and Network Security (CNS), pp. 1\u20139 (May 2018)","DOI":"10.1109\/CNS.2018.8433167"},{"issue":"3","key":"13_CR42","doi-asserted-by":"publisher","first-page":"1540","DOI":"10.1109\/TSG.2012.2203156","volume":"3","author":"H Li","year":"2012","unstructured":"Li, H., Gong, S., Lai, L., Han, Z., Qiu, R.C., Yang, D.: Efficient and secure wireless communications for advanced metering infrastructure in smart grids. IEEE Trans. Smart Grid 3(3), 1540\u20131551 (2012)","journal-title":"IEEE Trans. Smart Grid"},{"issue":"6","key":"13_CR43","doi-asserted-by":"publisher","first-page":"1899","DOI":"10.1109\/JIOT.2017.2707465","volume":"4","author":"Z Ling","year":"2017","unstructured":"Ling, Z., Luo, J., Xu, Y., Gao, C., Wu, K., Fu, X.: Security vulnerabilities of Internet of Things: a case study of the smart plug system. IEEE Internet Things J. 4(6), 1899\u20131909 (2017)","journal-title":"IEEE Internet Things J."},{"key":"13_CR44","doi-asserted-by":"publisher","unstructured":"Liu, H., Li, C., Jin, X., Li, J., Zhang, Y., Gu, D.: Smart solution, poor protection: an empirical study of security and privacy issues in developing and deploying smart home devices. In: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, IoTS&P 2017, pp. 13\u201318. ACM, New York (2017). \nhttps:\/\/doi.org\/10.1145\/3139937.3139948","DOI":"10.1145\/3139937.3139948"},{"issue":"2","key":"13_CR45","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1109\/TDSC.2015.2427841","volume":"13","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Hu, S., Ho, T.: Leveraging strategic detection techniques for smart home pricing cyberattacks. IEEE Trans. Dependable Secur. Comput. 13(2), 220\u2013235 (2016)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"13_CR46","unstructured":"Liu, Y., Hu, S., Ho, T.Y.: Vulnerability assessment and defense technology for smart home cybersecurity considering pricing cyberattacks. In: Proceedings of the 2014 IEEE\/ACM International Conference on Computer-Aided Design, ICCAD 2014, pp. 183\u2013190. IEEE Press, Piscataway (2014). \nhttp:\/\/dl.acm.org\/citation.cfm?id=2691365.2691404"},{"key":"13_CR47","doi-asserted-by":"publisher","unstructured":"Liu, Y., Hu, S., Wu, J., Shi, Y., Jin, Y., Hu, Y., Li, X.: Impact assessment of net metering on smart home cyberattack detection. In: Proceedings of the 52nd Annual Design Automation Conference, DAC 2015, pp. 97:1\u201397:6. ACM, New York (2015). \nhttps:\/\/doi.org\/10.1145\/2744769.2747930","DOI":"10.1145\/2744769.2747930"},{"key":"13_CR48","doi-asserted-by":"publisher","unstructured":"Ma, X., Goonawardene, N., Tan, H.P.: Identifying elderly with poor sleep quality using unobtrusive in-home sensors for early intervention. In: Proceedings of the 4th EAI International Conference on Smart Objects and Technologies for Social Good, Goodtechs 2018, pp. 94\u201399. ACM, New York (2018). \nhttps:\/\/doi.org\/10.1145\/3284869.3284894","DOI":"10.1145\/3284869.3284894"},{"key":"13_CR49","doi-asserted-by":"crossref","unstructured":"Mahadewa, K.T., Wang, K., Bai, G., Shi, L., Dong, J.S., Liang, Z.: Homescan: scrutinizing implementations of smart home integrations. In: 2018 23rd International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 21\u201330 (December 2018)","DOI":"10.1109\/ICECCS2018.2018.00011"},{"key":"13_CR50","doi-asserted-by":"crossref","unstructured":"Malik, K.M., Malik, H., Baumann, R.: Towards vulnerability analysis of voice-driven interfaces and countermeasures for replay attacks. In: 2019 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), pp. 523\u2013528 (March 2019)","DOI":"10.1109\/MIPR.2019.00106"},{"key":"13_CR51","doi-asserted-by":"crossref","unstructured":"McMahon, E., Patton, M., Samtani, S., Chen, H.: Benchmarking vulnerability assessment tools for enhanced cyber-physical system (CPS) resiliency. In: 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 100\u2013105 (November 2018)","DOI":"10.1109\/ISI.2018.8587353"},{"key":"13_CR52","doi-asserted-by":"publisher","unstructured":"Meng, Y., Wang, Z., Zhang, W., Wu, P., Zhu, H., Liang, X., Liu, Y.: Wivo: enhancing the security of voice control system via wireless signal in IoT environment. In: Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, Mobihoc 2018, pp. 81\u201390. ACM, New York (2018). \nhttps:\/\/doi.org\/10.1145\/3209582.3209591","DOI":"10.1145\/3209582.3209591"},{"key":"13_CR53","doi-asserted-by":"crossref","unstructured":"Menon, D.M., Radhika, N.: Anomaly detection in smart grid traffic data for home area network. In: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1\u20134 (March 2016)","DOI":"10.1109\/ICCPCT.2016.7530186"},{"key":"13_CR54","doi-asserted-by":"crossref","unstructured":"Moody, M., Hunter, A.: Exploiting known vulnerabilities of a smart thermostat. In: 2016 14th Annual Conference on Privacy, Security and Trust (PST), pp. 50\u201353 (December 2016)","DOI":"10.1109\/PST.2016.7906936"},{"issue":"4","key":"13_CR55","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","volume":"5","author":"A Mosenia","year":"2016","unstructured":"Mosenia, A., Jha, N.K.: A comprehensive study of security of Internet-of-Things. IEEE Trans. Emerg. Top. Comput. 5(4), 586\u2013602 (2016)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"issue":"2","key":"13_CR56","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1109\/JSYST.2013.2260700","volume":"8","author":"V Namboodiri","year":"2014","unstructured":"Namboodiri, V., Aravinthan, V., Mohapatra, S.N., Karimi, B., Jewell, W.: Toward a secure wireless-based home area network for metering in smart grids. IEEE Syst. J. 8(2), 509\u2013520 (2014)","journal-title":"IEEE Syst. J."},{"key":"13_CR57","doi-asserted-by":"crossref","unstructured":"Roux, J., Alata, E., Auriol, G., Ka\u00e2niche, M., Nicomette, V., Cayre, R.: RadIoT: radio communications intrusion detection for IoT - a protocol independent approach. In: 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA), pp. 1\u20138 (November 2018)","DOI":"10.1109\/NCA.2018.8548286"},{"key":"13_CR58","doi-asserted-by":"crossref","unstructured":"Roux, J., Alata, E., Auriol, G., Nicomette, V., K\u00e2aniche, M.: Toward an intrusion detection approach for IoT based on radio communications profiling. In: 2017 13th European Dependable Computing Conference (EDCC), pp. 147\u2013150 (September 2017)","DOI":"10.1109\/EDCC.2017.11"},{"key":"13_CR59","unstructured":"Salami, S.A., Baek, J., Salah, K., Damiani, E.: Lightweight encryption for smart home. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 382\u2013388 (August 2016)"},{"key":"13_CR60","doi-asserted-by":"crossref","unstructured":"Saleh, M., Al Barghuthi, N.B., Alawadhi, K., Sallal, F., Ferrah, A.: Streamlining \u201csmart grid end point devices\u201d vulnerability testing using single board computer. In: 2018 Advances in Science and Engineering Technology International Conferences (ASET), pp. 1\u20136 (February 2018)","DOI":"10.1109\/ICASET.2018.8376802"},{"key":"13_CR61","doi-asserted-by":"crossref","unstructured":"Sanchez, I., Satta, R., Fovino, I.N., Baldini, G., Steri, G., Shaw, D., Ciardulli, A.: Privacy leakages in smart home wireless technologies. In: 2014 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20136 (October 2014)","DOI":"10.1109\/CCST.2014.6986977"},{"key":"13_CR62","doi-asserted-by":"crossref","unstructured":"Shen, T., Ma, M.: Security enhancements on home area networks in smart grids. In: 2016 IEEE Region 10 Conference (TENCON), pp. 2444\u20132447 (November 2016)","DOI":"10.1109\/TENCON.2016.7848471"},{"key":"13_CR63","doi-asserted-by":"crossref","unstructured":"Sivanathan, A., Loi, F., Gharakheili, H.H., Sivaraman, V.: Experimental evaluation of cybersecurity threats to the smart-home. In: 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1\u20136 (December 2017)","DOI":"10.1109\/ANTS.2017.8384143"},{"key":"13_CR64","doi-asserted-by":"publisher","unstructured":"Sivaraman, V., Chan, D., Earl, D., Boreli, R.: Smart-phones attacking smart-homes. In: Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec 2016, pp. 195\u2013200. ACM, New York (2016). \nhttps:\/\/doi.org\/10.1145\/2939918.2939925","DOI":"10.1145\/2939918.2939925"},{"issue":"6","key":"13_CR65","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MWC.2017.1800120","volume":"25","author":"A Sun","year":"2018","unstructured":"Sun, A., Gong, W., Shea, R., Liu, J.: A castle of glass: leaky IoT appliances in modern smart homes. IEEE Wirel. Commun. 25(6), 32\u201337 (2018)","journal-title":"IEEE Wirel. Commun."},{"key":"13_CR66","doi-asserted-by":"publisher","unstructured":"Tabrizi, F.M., Pattabiraman, K.: Intrusion detection system for embedded systems. In: Proceedings of the Doctoral Symposium of the 16th International Middleware Conference, Middleware Doct Symposium 2015, pp. 9:1\u20139:4. ACM, New York (2015). \nhttps:\/\/doi.org\/10.1145\/2843966.2843975","DOI":"10.1145\/2843966.2843975"},{"key":"13_CR67","doi-asserted-by":"crossref","unstructured":"Tekeoglu, A., Tosun, A.: Blackbox security evaluation of Chromecast network communications. In: 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC), pp. 1\u20132 (December 2014)","DOI":"10.1109\/PCCC.2014.7017050"},{"key":"13_CR68","doi-asserted-by":"crossref","unstructured":"Tekeoglu, A., Tosun, A.: A closer look into privacy and security of Chromecast multimedia cloud communications. In: 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 121\u2013126 (April 2015)","DOI":"10.1109\/INFCOMW.2015.7179371"},{"key":"13_CR69","doi-asserted-by":"crossref","unstructured":"Trimananda, R., Younis, A., Wang, B., Xu, B., Demsky, B., Xu, G.: Vigilia: securing smart home edge computing. In: 2018 IEEE\/ACM Symposium on Edge Computing (SEC), pp. 74\u201389 (October 2018)","DOI":"10.1109\/SEC.2018.00013"},{"key":"13_CR70","doi-asserted-by":"publisher","unstructured":"Whitehurst, L.N., Andel, T.R., McDonald, J.T.: Exploring security in ZigBee networks. In: Proceedings of the 9th Annual Cyber and Information Security Research Conference, CISR 2014, pp. 25\u201328. ACM, New York (2014). \nhttps:\/\/doi.org\/10.1145\/2602087.2602090","DOI":"10.1145\/2602087.2602090"},{"key":"13_CR71","doi-asserted-by":"crossref","unstructured":"Wurm, J., Hoang, K., Arias, O., Sadeghi, A., Jin, Y.: Security analysis on consumer and industrial IoT devices. In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pp. 519\u2013524 (January 2016)","DOI":"10.1109\/ASPDAC.2016.7428064"},{"key":"13_CR72","unstructured":"Zeng, E., Mare, S., Roesner, F.: End user security & privacy concerns with smart homes. In: Symposium on Usable Privacy and Security (SOUPS) (2017)"},{"key":"13_CR73","doi-asserted-by":"crossref","unstructured":"Zhang, M., Liu, Y., Wang, J., Hu, Y.: A new approach to security analysis of wireless sensor networks for smart home systems. In: 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 318\u2013323 (September 2016)","DOI":"10.1109\/INCoS.2016.15"}],"container-title":["Advances in Intelligent Systems and Computing","National Cyber Summit (NCS) Research Track 2020"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58703-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T06:08:22Z","timestamp":1599545302000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-58703-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9783030587024","9783030587031"],"references-count":73,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58703-1_13","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Cyber Summit","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Huntsville, AL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ncs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.nationalcybersummit.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}