{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:24:41Z","timestamp":1760300681121,"version":"3.37.3"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s40860-021-00160-3","type":"journal-article","created":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T10:02:47Z","timestamp":1638352967000},"page":"67-74","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Securing the operation of Smart Home Systems: a literature review"],"prefix":"10.1007","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5873-1899","authenticated-orcid":false,"given":"Noureddine","family":"Amraoui","sequence":"first","affiliation":[]},{"given":"Belhassen","family":"Zouari","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,1]]},"reference":[{"key":"160_CR1","doi-asserted-by":"crossref","unstructured":"Alghayadh F, Debnath D (2020) A hybrid intrusion detection system for smart home security. In: 2020 IEEE international conference on electro information technology (EIT). IEEE, pp 319\u2013323","DOI":"10.1109\/EIT48999.2020.9208296"},{"key":"160_CR2","doi-asserted-by":"publisher","first-page":"101196","DOI":"10.1016\/j.pmcj.2020.101196","volume":"67","author":"AS Alrumayh","year":"2020","unstructured":"Alrumayh AS, Lehman SM, Tan CC (2020) Context aware access control for home voice assistant in multi-occupant homes. Pervasive Mob Comput 67:101196","journal-title":"Pervasive Mob Comput"},{"key":"160_CR3","doi-asserted-by":"crossref","unstructured":"Amraoui N, Besrour A, Ksantini R, Zouari B (2019) Implicit and continuous authentication of smart home users. In: International conference on advanced information networking and applications. Springer, Berlin, pp 1228\u20131239","DOI":"10.1007\/978-3-030-15032-7_103"},{"issue":"3","key":"160_CR4","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MSP.2015.62","volume":"13","author":"P Arias-Cabarcos","year":"2015","unstructured":"Arias-Cabarcos P, Almenarez F, Trapero R, Diaz-Sanchez D, Marin A (2015) Blended identity: pervasive IdM for continuous authentication. IEEE Secur Priv 13(3):32\u201339","journal-title":"IEEE Secur Priv"},{"key":"160_CR5","doi-asserted-by":"publisher","first-page":"117802","DOI":"10.1109\/ACCESS.2020.3004662","volume":"8","author":"S Arif","year":"2020","unstructured":"Arif S, Khan MA, Rehman SU, Kabir MA, Imran M (2020) Investigating smart home security: is blockchain the answer? IEEE Access 8:117802\u2013117816","journal-title":"IEEE Access"},{"issue":"4","key":"160_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3333501","volume":"52","author":"ZB Celik","year":"2019","unstructured":"Celik ZB, Fernandes E, Pauley E, Tan G, McDaniel P (2019) Program analysis of commodity IoT applications for security and privacy: challenges and opportunities. ACM Comput Surv (CSUR) 52(4):1\u201330","journal-title":"ACM Comput Surv (CSUR)"},{"key":"160_CR7","unstructured":"Celik ZB, McDaniel P, Tan G (2018) Soteria: automated IoT safety and security analysis. In: 2018 $$\\{$$USENIX$$\\}$$ annual technical conference ($$\\{$$USENIX$$\\}$$$$\\{$$ATC$$\\}$$ 18), pp 147\u2013158"},{"key":"160_CR8","doi-asserted-by":"crossref","unstructured":"Celik ZB, Tan G, McDaniel PD (2019) IoTGuard: dynamic enforcement of security and safety policy in commodity IoT. In: NDSS","DOI":"10.14722\/ndss.2019.23326"},{"key":"160_CR9","doi-asserted-by":"crossref","unstructured":"Chi H, Zeng Q, Du X, Yu J (2020) Cross-app interference threats in smart homes: categorization, detection and handling. In: 2020 50th annual IEEE\/IFIP international conference on dependable systems and networks (DSN). IEEE, pp 411\u2013423","DOI":"10.1109\/DSN48063.2020.00056"},{"key":"160_CR10","unstructured":"Chuck M (2019) Smart home technology hits 69 Technical report, MediaPost, 2019. [Online]. Accessed 06 Oct 2021"},{"key":"160_CR11","doi-asserted-by":"crossref","unstructured":"Dutta S, Chukkapalli SSL, Sulgekar M, Krithivasan S, Das PK, Joshi A et\u00a0al (2020) Context sensitive access control in smart home environments. In: 6th IEEE international conference on big data security on cloud (BigDataSecurity 2020)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00018"},{"key":"160_CR12","doi-asserted-by":"crossref","unstructured":"Gamundani AM, Phillips A, Muyingi HN (2018) An overview of potential authentication threats and attacks on internet of things (IoT): a focus on smart home applications. In: 2018 IEEE international conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData). IEEE, pp 50\u201357","DOI":"10.1109\/Cybermatics_2018.2018.00043"},{"issue":"6","key":"160_CR13","doi-asserted-by":"publisher","first-page":"10773","DOI":"10.1109\/JIOT.2019.2941767","volume":"6","author":"N Ghosh","year":"2019","unstructured":"Ghosh N, Chandra S, Sachidananda V, Elovici Y (2019) SoftAuthZ: a context-aware, behavior-based authorization framework for home IoT. IEEE Internet Things J 6(6):10773\u201310785","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"160_CR14","doi-asserted-by":"publisher","first-page":"23","DOI":"10.3233\/AIS-180509","volume":"11","author":"C Gomez","year":"2019","unstructured":"Gomez C, Chessa S, Fleury A, Roussos G, Preuveneers D (2019) Internet of things for enabling smart environments: a technology-centric perspective. J Ambient Intell Smart Environ 11(1):23\u201343","journal-title":"J Ambient Intell Smart Environ"},{"key":"160_CR15","doi-asserted-by":"crossref","unstructured":"Guth J, Breitenb\u00fccher U, Falkenthal M, Fremantle P, Kopp O, Leymann F, Reinfurt L (2018) A detailed analysis of IoT platform architectures: concepts, similarities, and differences. In: Internet of everything. Springer, Berlin, pp 81\u2013101","DOI":"10.1007\/978-981-10-5861-5_4"},{"issue":"1","key":"160_CR16","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/MNET.001.1900178","volume":"34","author":"S Hakak","year":"2020","unstructured":"Hakak S, Khan WZ, Gilkar GA, Imran M, Guizani N (2020) Securing smart cities through blockchain technology: architecture, requirements, and challenges. IEEE Netw 34(1):8\u201314","journal-title":"IEEE Netw"},{"key":"160_CR17","doi-asserted-by":"crossref","unstructured":"Han J-H, Jeon YS, Kim JN (2015) Security considerations for secure and trustworthy smart home system in the IoT environment. In: 2015 International conference on information and communication technology convergence (ICTC). IEEE, pp 1116\u20131118","DOI":"10.1109\/ICTC.2015.7354752"},{"key":"160_CR18","doi-asserted-by":"publisher","first-page":"13317","DOI":"10.1109\/ACCESS.2018.2812887","volume":"6","author":"H Jiang","year":"2018","unstructured":"Jiang H, Cai C, Ma X, Yang Y, Liu J (2018) Smart home based on WiFi sensing: a survey. IEEE Access 6:13317\u201313325","journal-title":"IEEE Access"},{"key":"160_CR19","doi-asserted-by":"crossref","unstructured":"Kong H, Lu L, Yu J, Chen Y, Tang F (2020) Continuous authentication through finger gesture interaction for smart homes using WiFi. IEEE Trans Mob Comput","DOI":"10.1109\/TMC.2020.2994955"},{"key":"160_CR20","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.adhoc.2014.11.018","volume":"27","author":"S Kumari","year":"2015","unstructured":"Kumari S, Khan MK, Atiquzzaman M (2015) User authentication schemes for wireless sensor networks: a review. Ad Hoc Netw 27:159\u2013194","journal-title":"Ad Hoc Netw"},{"key":"160_CR21","doi-asserted-by":"crossref","unstructured":"Kuyucu MK, Bahtiyar \u015e, \u0130nce G (2019) Security and privacy in the smart home: a survey of issues and mitigation strategies. In: 2019 4th International conference on computer science and engineering (UBMK). IEEE, pp 113\u2013118","DOI":"10.1109\/UBMK.2019.8907037"},{"issue":"9","key":"160_CR22","doi-asserted-by":"publisher","first-page":"9128","DOI":"10.1109\/JIOT.2020.3004077","volume":"7","author":"Y Liang","year":"2020","unstructured":"Liang Y, Samtani S, Guo B, Yu Z (2020) Behavioral biometrics for continuous authentication in the internet-of-things era: an artificial intelligence perspective. IEEE Internet Things J 7(9):9128\u20139143","journal-title":"IEEE Internet Things J"},{"key":"160_CR23","doi-asserted-by":"crossref","unstructured":"Martin V, Cao Q, Benson T (2017) Fending off IoT-hunting attacks at home networks. In: Proceedings of the 2nd workshop on cloud-assisted networking, pp 67\u201372","DOI":"10.1145\/3155921.3160640"},{"key":"160_CR24","unstructured":"Miessler D (2015) Securing the internet of things: mapping attack surface areas using the OWASP IoT top 10. In: RSA conference"},{"issue":"12","key":"160_CR25","doi-asserted-by":"publisher","first-page":"2832","DOI":"10.3390\/s19122832","volume":"19","author":"P Nespoli","year":"2019","unstructured":"Nespoli P, Zago M, Celdr\u00e1n AH, P\u00e9rez MG, M\u00e1rmol FG, Garc\u00eda Clemente FJ (2019) PALOT: profiling and authenticating users leveraging internet of things. Sensors 19(12):2832","journal-title":"Sensors"},{"key":"160_CR26","unstructured":"Omolola O, More S, Fasllija E, Wagner G, Alber L (2019) Policy-based access control for the IoT and smart cities. Open Identity Summit 2019"},{"key":"160_CR27","doi-asserted-by":"crossref","unstructured":"Ongun T, Oprea A, Nita-Rotaru C, Christodorescu M, Salajegheh N (2018) The house that knows you: user authentication based on IoT data. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 2255\u20132257","DOI":"10.1145\/3243734.3278523"},{"issue":"5","key":"160_CR28","first-page":"261","volume":"13","author":"Z Pan","year":"2019","unstructured":"Pan Z, Pacheco J, Hariri S, Chen Y, Liu B (2019) Context aware anomaly behavior analysis for smart home systems. Int J Inf Commun Eng 13(5):261\u2013274","journal-title":"Int J Inf Commun Eng"},{"key":"160_CR29","unstructured":"Panwar N, Sharma S, Mehrotra S, Krzywiecki \u0141, Venkatasubramanian N (2019) Smart home survey on security and privacy. arXiv preprint arXiv:1904.05476"},{"key":"160_CR30","doi-asserted-by":"crossref","unstructured":"Powell MP, McCarthy JJ, Tang CY, Stouffer KA, Zimmerman TA, Barker WC, Ogunyale T, Wynne DM (2020) Securing manufacturing industrial control systems: behavioral anomaly detection","DOI":"10.6028\/NIST.IR.8219"},{"key":"160_CR31","doi-asserted-by":"crossref","unstructured":"Rahmati A, Fernandes E, Eykholt K, Prakash A (2018) Tyche: a risk-based permission model for smart homes. In: 2018 IEEE cybersecurity development (SecDev). IEEE, pp 29\u201336","DOI":"10.1109\/SecDev.2018.00012"},{"key":"160_CR32","doi-asserted-by":"crossref","unstructured":"Rath AT, Colin J-N (2017) Strengthening access control in case of compromised accounts in smart home. In: 2017 IEEE 13th international conference on wireless and mobile computing, networking and communications (WiMob). IEEE, pp 1\u20138","DOI":"10.1109\/WiMOB.2017.8115827"},{"key":"160_CR33","doi-asserted-by":"crossref","unstructured":"Ray AK, Bagwari A (2020) IoT based smart home: security aspects and security architecture. In: 2020 IEEE 9th international conference on communication systems and network technologies (CSNT). IEEE, pp 218\u2013222","DOI":"10.1109\/CSNT48778.2020.9115737"},{"key":"160_CR34","unstructured":"S\u00e1nchez PMS, Valero JMJ, Celdr\u00e1n AH, Bovet G, P\u00e9rez MG, P\u00e9rez GM (2020) A survey on device behavior fingerprinting: Data sources, techniques, application scenarios, and datasets. arXiv preprint. arXiv:2008.03343"},{"key":"160_CR35","doi-asserted-by":"publisher","first-page":"128362","DOI":"10.1109\/ACCESS.2020.3008610","volume":"8","author":"QI Sarhan","year":"2020","unstructured":"Sarhan QI (2020) Systematic survey on smart home safety and security systems using the arduino platform. IEEE Access 8:128362\u2013128384","journal-title":"IEEE Access"},{"key":"160_CR36","doi-asserted-by":"publisher","first-page":"112505","DOI":"10.1109\/ACCESS.2019.2932400","volume":"7","author":"SW Shah","year":"2019","unstructured":"Shah SW, Kanhere SS (2019) Recent trends in user authentication\u2014a survey. IEEE Access 7:112505\u2013112519","journal-title":"IEEE Access"},{"issue":"4","key":"160_CR37","first-page":"975","volume":"16","author":"JCS Sicato","year":"2020","unstructured":"Sicato JCS, Singh SK, Rathore S, Park JH (2020) A comprehensive analyses of intrusion detection system for IoT environment. J Inf Process Syst 16(4):975\u2013990","journal-title":"J Inf Process Syst"},{"issue":"2","key":"160_CR38","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/COMST.2021.3064507","volume":"23","author":"AK Sikder","year":"2021","unstructured":"Sikder AK, Petracca G, Aksu H, Jaeger T, Uluagac AS (2021) A survey on sensor-based threats and attacks to smart devices and applications. IEEE Commun Surv Tutor 23(2):1125\u20131159","journal-title":"IEEE Commun Surv Tutor"},{"key":"160_CR39","doi-asserted-by":"crossref","unstructured":"Singh MP, Sural S, Atluri V, Vaidya J (2019) Security analysis of unified access control policies. In: International conference on secure knowledge management in artificial intelligence era. Springer, Berlin, pp 126\u2013146","DOI":"10.1007\/978-981-15-3817-9_8"},{"key":"160_CR40","unstructured":"Sivanathan A (2020) IoT behavioral monitoring via network traffic analysis. arXiv preprint. arXiv:2001.10632"},{"key":"160_CR41","doi-asserted-by":"crossref","unstructured":"Teixeira D, Assun\u00e7\u00e3o L, Paiva S (2020) Security of smart home-smartphones systems. In: 2020 15th Iberian conference on information systems and technologies (CISTI). IEEE, pp 1\u20135","DOI":"10.23919\/CISTI49556.2020.9141025"},{"key":"160_CR42","unstructured":"Tian Y, Zhang N, Lin Y-H, Wang XF, Ur B, Guo X, Tague P (2017) Smartauth: user-centered authorization for the internet of things. In: 26th $$\\{$$USENIX$$\\}$$ security symposium ($$\\{$$USENIX$$\\}$$ security 17), pp 361\u2013378"},{"key":"160_CR43","doi-asserted-by":"crossref","unstructured":"Touqeer H, Zaman S, Amin R, Hussain M, Al-Turjman F, Bilal M (2021) Smart home security: challenges, issues and solutions at different IoT layers. J Supercomput 1\u201337","DOI":"10.1007\/s11227-021-03825-1"},{"key":"160_CR44","doi-asserted-by":"crossref","unstructured":"ur\u00a0Rehman S, Gruhn V (2018) An approach to secure smart homes in cyber-physical systems\/internet-of-things. In: 2018 Fifth international conference on software defined systems (SDS). IEEE, pp 126\u2013129","DOI":"10.1109\/SDS.2018.8370433"},{"issue":"1","key":"160_CR45","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/JIOT.2017.2780232","volume":"5","author":"M Wazid","year":"2017","unstructured":"Wazid M, Das AK, Odelu V, Kumar N, Conti M, Jo M (2017) Design of secure user authenticated key management protocol for generic IoT networks. IEEE Internet Things J 5(1):269\u2013282","journal-title":"IEEE Internet Things J"},{"issue":"9","key":"160_CR46","doi-asserted-by":"publisher","first-page":"7903","DOI":"10.1109\/JIOT.2020.3003621","volume":"7","author":"Y Xiao","year":"2020","unstructured":"Xiao Y, Jia Y, Liu C, Alrawais A, Rekik M, Shan Z (2020) HomeShield: a credential-less authentication framework for smart home systems. IEEE Internet Things J 7(9):7903\u20137918","journal-title":"IEEE Internet Things J"},{"key":"160_CR47","doi-asserted-by":"publisher","first-page":"106526","DOI":"10.1016\/j.compeleceng.2019.106526","volume":"81","author":"S Xie","year":"2020","unstructured":"Xie S, Zheng Z, Chen W, Wu J, Dai H-N, Imran M (2020) Blockchain for cloud exchange: a survey. Comput Electr Eng 81:106526","journal-title":"Comput Electr Eng"},{"key":"160_CR48","doi-asserted-by":"crossref","unstructured":"Yahyazadeh M, Podder P, Hoque E, Chowdhury O (2019) Expat: expectation-based policy analysis and enforcement for appified smart-home platforms. In: Proceedings of the 24th ACM symposium on access control models and technologies, pp 61\u201372","DOI":"10.1145\/3322431.3325107"},{"key":"160_CR49","doi-asserted-by":"crossref","unstructured":"Yamauchi M, Ohsita Y, Murata M, Ueda K, Kato Y (2020) Anomaly detection in smart home operation from user behaviors and home conditions. IEEE Trans Consum Electron 66(2):183\u2013192","DOI":"10.1109\/TCE.2020.2981636"},{"key":"160_CR50","doi-asserted-by":"crossref","unstructured":"Yoo SG et\u00a0al (2018) Security over smart home automation systems: a survey. In: International conference of research applied to defense and security. Springer, Berlin, pp 87\u201396","DOI":"10.1007\/978-3-319-78605-6_7"},{"key":"160_CR51","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.jnca.2017.02.009","volume":"84","author":"BB Zarpel\u00e3o","year":"2017","unstructured":"Zarpel\u00e3o BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Netw Comput Appl 84:25\u201337","journal-title":"J Netw Comput Appl"},{"key":"160_CR52","doi-asserted-by":"crossref","unstructured":"Zhang W, Meng Y, Liu Y, Zhang X, Zhang Y, Zhu H (2018) Homonit: monitoring smart home apps from encrypted traffic. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security, pp 1074\u2013108","DOI":"10.1145\/3243734.3243820"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-021-00160-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-021-00160-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-021-00160-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T13:23:20Z","timestamp":1646832200000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-021-00160-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,1]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["160"],"URL":"https:\/\/doi.org\/10.1007\/s40860-021-00160-3","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"type":"print","value":"2199-4668"},{"type":"electronic","value":"2199-4676"}],"subject":[],"published":{"date-parts":[[2021,12,1]]},"assertion":[{"value":"1 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 December 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Noureddine Amraoui declares that he has no conflict of interest. Belhassen Zouari declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Research involving human participants and\/or animals"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}