{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T15:03:27Z","timestamp":1745247807211,"version":"3.38.0"},"reference-count":61,"publisher":"SAGE Publications","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SCS"],"published-print":{"date-parts":[[2023,8,23]]},"abstract":"<jats:p>Assisted living environments use interconnected devices to assist people with limitations in performing daily activities. In these environments, human activity recognition is critical for detecting abnormal situations, such as falls or health problems, and providing appropriate assistance to inhabitants. Despite their advantages, assisted living environments raise security and privacy concerns due to the collection and storage of sensitive data about their inhabitants. This paper addresses security and privacy concerns related to intelligent environments designed to assist individuals with limitations. It discusses the weaknesses of IoT devices and domotic technologies and presents research conducted by authors to mitigate these issues. This study shows that, despite hardware constraints, it is possible to design a relatively secure assisted living environment that prevents hacker attacks and data leaks. Additionally, it is essential to comprehend which information should be shared with external entities, such as health care services, and when to share it to ensure the inhabitants\u2019 well-being. Our main goal has been to gather knowledge to improve the privacy and data protection of technology-rich assisted living environments implemented to assist people with limitations and their family members in performing their daily tasks.<\/jats:p>","DOI":"10.3233\/scs-230015","type":"journal-article","created":{"date-parts":[[2023,8,18]],"date-time":"2023-08-18T18:49:08Z","timestamp":1692384548000},"page":"99-121","source":"Crossref","is-referenced-by-count":2,"title":["Security and privacy concerns in assisted living environments"],"prefix":"10.1177","volume":"2","author":[{"given":"Paulo\u00a0A.","family":"Condado","sequence":"first","affiliation":[{"name":"CENSE \u2013 Center for Environmental and Sustainability Research & CHANGE \u2013 Global Change and Sustainability Institute, NOVA School of Science and Technology, NOVA University Lisbon, Campus de Caparica, 2829-516 Caparica, Portugal"}]},{"given":"Fernando\u00a0G.","family":"Lobo","sequence":"additional","affiliation":[{"name":"CENSE \u2013 Center for Environmental and Sustainability Research & CHANGE \u2013 Global Change and Sustainability Institute, Departamento de Engenharia Electr\u00f3nica e Inform\u00e1tica, Faculdade de Ci\u00eancias e Tecnologia, Universidade do Algarve, Campus de Gambelas, 8005-139 Faro, Portugal"}]}],"member":"179","reference":[{"key":"10.3233\/SCS-230015_ref1","unstructured":"J.\u00a0Abascal, Ambient intelligence for people with disabilities and elderly people, in: Proceedings of the ACM\u2019s Special Interest Group on Computer-Human Interaction (SIGCHI), Ambient Intelligence for Scientific Discovery (AISD) Workshop, 2004."},{"key":"10.3233\/SCS-230015_ref2","doi-asserted-by":"crossref","unstructured":"S.G.\u00a0Abbas, M.\u00a0Husnain, U.U.\u00a0Fayyaz, F.\u00a0Shahzad, G.A.\u00a0Shah and K.\u00a0Zafar, IoT-sphere: A framework to secure iot devices from becoming attack target and attack source, in: Proceedings of the 2020 IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, 2020, pp.\u00a01402\u20131409.","DOI":"10.1109\/TrustCom50675.2020.00189"},{"issue":"1","key":"10.3233\/SCS-230015_ref3","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.eij.2020.04.005","article-title":"A hybrid entropy-based DoS attacks detection system for software defined networks (SDN): A proposed trust mechanism","volume":"22","author":"AbdelAzim","year":"2021","journal-title":"Egyptian Informatics Journal"},{"key":"10.3233\/SCS-230015_ref4","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12398"},{"key":"10.3233\/SCS-230015_ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3395351.3399421"},{"key":"10.3233\/SCS-230015_ref7","doi-asserted-by":"crossref","unstructured":"W.\u00a0Alrajhi, D.\u00a0Alaloola and A.\u00a0Albarqawi, Smart home: Toward daily use of BCI-based systems, in: Proceedings of the 2017 International Conference on Informatics, Health & Technology (ICIHT), IEEE, 2017, pp.\u00a01\u20135.","DOI":"10.1109\/ICIHT.2017.7899002"},{"key":"10.3233\/SCS-230015_ref8","doi-asserted-by":"crossref","unstructured":"M.\u00a0Alyami, I.\u00a0Alharbi, C.\u00a0Zou, Y.\u00a0Solihin and K.\u00a0Ackerman, WiFi-based IoT devices profiling attack based on eavesdropping of encrypted wifi traffic, in: Proceedings of the 2022 IEEE Annual Consumer Communications & Networking Conference (CCNC), IEEE, 2022, pp.\u00a0385\u2013392.","DOI":"10.1109\/CCNC49033.2022.9700674"},{"key":"10.3233\/SCS-230015_ref10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2192-1962-3-12","article-title":"Intelligent environments: A manifesto","volume":"3","author":"Augusto","year":"2013","journal-title":"Human-centric Computing and Information Sciences"},{"key":"10.3233\/SCS-230015_ref11","doi-asserted-by":"crossref","unstructured":"\u00c7.\u00a0Bak\u0131r, Single label model for confidentiality in big data, in: Proceedings of the 6th International Conference on Computer Science and Engineering (UBMK), IEEE, 2021, pp.\u00a010\u201314.","DOI":"10.1109\/UBMK52708.2021.9558938"},{"issue":"9","key":"10.3233\/SCS-230015_ref12","doi-asserted-by":"publisher","first-page":"200","DOI":"10.3390\/electronics7090200","article-title":"A plug and play IoT wi-fi smart home system for human monitoring","volume":"7","author":"Bassoli","year":"2018","journal-title":"Electronics"},{"issue":"5","key":"10.3233\/SCS-230015_ref13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3122816","article-title":"Secure smart homes: Opportunities and challenges","volume":"50","author":"Batalla","year":"2017","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"10.3233\/SCS-230015_ref14","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7841030"},{"issue":"3","key":"10.3233\/SCS-230015_ref15","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1049\/iet-smc.2020.0061","article-title":"LED lighting systems for smart buildings: A review","volume":"2","author":"Chinchero","year":"2020","journal-title":"IET Smart Cities"},{"key":"10.3233\/SCS-230015_ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70540-6_185"},{"key":"10.3233\/SCS-230015_ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2700648.2809839"},{"issue":"1","key":"10.3233\/SCS-230015_ref19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s42979-021-00983-0","article-title":"Towards richer assisted living environments","volume":"3","author":"Condado","year":"2022","journal-title":"SN Computer Science"},{"issue":"2","key":"10.3233\/SCS-230015_ref20","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1089\/tmj.2016.0258","article-title":"ROBIN, a telepresence robot to support older users monitoring and social inclusion: Development and evaluation","volume":"24","author":"Cortellessa","year":"2018","journal-title":"Telemedicine and e-Health"},{"key":"10.3233\/SCS-230015_ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3450268.3453533"},{"key":"10.3233\/SCS-230015_ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2020.105497"},{"issue":"4","key":"10.3233\/SCS-230015_ref23","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1109\/TCE.2020.3021398","article-title":"A WiFi-based smart home fall detection system using recurrent neural network","volume":"66","author":"Ding","year":"2020","journal-title":"IEEE Transactions on Consumer Electronics"},{"issue":"02","key":"10.3233\/SCS-230015_ref24","first-page":"111","article-title":"Cloud based Internet of things for smart connected objects","volume":"1","author":"Duraipandian","year":"2019","journal-title":"Journal of ISMAC"},{"key":"10.3233\/SCS-230015_ref25","doi-asserted-by":"crossref","unstructured":"G.\u00a0Edlinger, C.\u00a0Holzner and C.\u00a0Guger, A hybrid brain-computer interface for smart home control, in: Proceedings of the 14th International Conference on Human-Computer Interaction. Interaction Techniques and Environments, Springer, Berlin, Heidelberg, 2011, pp.\u00a0417\u2013426.","DOI":"10.1007\/978-3-642-21605-3_46"},{"key":"10.3233\/SCS-230015_ref26","doi-asserted-by":"crossref","unstructured":"K.A.\u00a0Faraj, M.\u00a0Mojahid and N.\u00a0Vigouroux, BigKey: A virtual keyboard for mobile devices, in: Proceedings of the 13th International Conference on Human-Computer Interaction. Part III: Ubiquitous and Intelligent Interaction, Lecture Notes in Computer Science, Vol.\u00a05612, Springer, Berlin, Heidelberg, 2009, pp.\u00a03\u201310.","DOI":"10.1007\/978-3-642-02580-8_1"},{"key":"10.3233\/SCS-230015_ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LCN48667.2020.9314782"},{"issue":"1","key":"10.3233\/SCS-230015_ref28","doi-asserted-by":"publisher","first-page":"1739","DOI":"10.1007\/s10586-017-1105-z","article-title":"A distributed IDS architecture model for smart home systems","volume":"22","author":"Gajewski","year":"2019","journal-title":"Cluster Computing"},{"key":"10.3233\/SCS-230015_ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1294211.1294253"},{"issue":"2","key":"10.3233\/SCS-230015_ref30","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1080\/0144929X.2014.981584","article-title":"Improving accessibility of mobile devices with EasyWrite","volume":"34","author":"Godinho","year":"2015","journal-title":"Behaviour & Information Technology"},{"key":"10.3233\/SCS-230015_ref32","doi-asserted-by":"publisher","DOI":"10.1109\/iNIS.2016.017"},{"key":"10.3233\/SCS-230015_ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1639642.1639661"},{"key":"10.3233\/SCS-230015_ref34","doi-asserted-by":"publisher","DOI":"10.15439\/2019F177"},{"issue":"2","key":"10.3233\/SCS-230015_ref35","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/JBHI.2019.2918412","article-title":"Efficient activity recognition in smart homes using delayed fuzzy temporal windows on binary sensors","volume":"24","author":"Hamad","year":"2019","journal-title":"IEEE journal of biomedical and health informatics"},{"issue":"1","key":"10.3233\/SCS-230015_ref36","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MNET.2018.1800194","article-title":"Security analysis of a space-based wireless network","volume":"33","author":"He","year":"2019","journal-title":"IEEE Network"},{"key":"10.3233\/SCS-230015_ref37","doi-asserted-by":"publisher","first-page":"1720","DOI":"10.1109\/TIFS.2020.3042049","article-title":"Self-configurable cyber-physical intrusion detection for smart homes using reinforcement learning","volume":"16","author":"Heartfield","year":"2020","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"2","key":"10.3233\/SCS-230015_ref38","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.11591\/ijeecs.v23.i2.pp1059-1067","article-title":"Accelerating the update of a DL-based IDS for IoT using deep transfer learning","volume":"23","author":"Idrissi","year":"2021","journal-title":"Indonesian Journal of Electrical Engineering and Computer Science"},{"issue":"5","key":"10.3233\/SCS-230015_ref39","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/S1470-2045(08)70128-1","article-title":"Improvement of informed consent and the quality of consent documents","volume":"9","author":"Jefford","year":"2008","journal-title":"The lancet oncology"},{"issue":"3","key":"10.3233\/SCS-230015_ref40","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/MITP.2022.3147968","article-title":"Trusted platform module-based privacy in the public cloud: Challenges and future perspective","volume":"24","author":"Jha","year":"2022","journal-title":"IT Professional"},{"key":"10.3233\/SCS-230015_ref42","doi-asserted-by":"crossref","unstructured":"S.\u00a0Jones, S.\u00a0Hara and J.\u00a0Augusto, eFRIEND: An ethical framework for intelligent environment development, in: Proceedings of the 7th International Conference on PErvasive Technologies Related to Assistive Environments, 2014, pp.\u00a01\u20134.","DOI":"10.1145\/2674396.2674410"},{"key":"10.3233\/SCS-230015_ref44","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipad013"},{"key":"10.3233\/SCS-230015_ref45","doi-asserted-by":"crossref","unstructured":"M.\u00a0Kasmi, F.\u00a0Bahloul and H.\u00a0Tkitek, Smart home based on Internet of things and cloud computing, in: Proceedings of the 2016 International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), IEEE, 2016, pp.\u00a082\u201386.","DOI":"10.1109\/SETIT.2016.7939846"},{"key":"10.3233\/SCS-230015_ref46","doi-asserted-by":"crossref","unstructured":"P.\u00a0Kokkinos, T.A.\u00a0Varvarigou, A.\u00a0Kretsis, P.\u00a0Soumplis and E.A.\u00a0Varvarigos, Cost and utilization optimization of Amazon ec2 instances, in: Proceedings of the 2013 IEEE International Conference on Cloud Computing, IEEE, 2013, pp.\u00a0518\u2013525.","DOI":"10.1109\/CLOUD.2013.52"},{"key":"10.3233\/SCS-230015_ref47","doi-asserted-by":"crossref","unstructured":"S.\u00a0Miniaoui, S.\u00a0Atalla and K.F.B.\u00a0Hashim, Introducing innovative item management process towards providing smart fridges, in: Proceedings of the 2nd International Conference on Communication Engineering and Technology (ICCET), IEEE, 2019, pp.\u00a062\u201367.","DOI":"10.1109\/ICCET.2019.8726900"},{"key":"10.3233\/SCS-230015_ref48","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2018.8355147"},{"key":"10.3233\/SCS-230015_ref49","doi-asserted-by":"crossref","unstructured":"R.\u00a0Pottier and J.-M.\u00a0Menaud, Privacy-aware data storage in cloud computing, in: CLOSER, 2017, pp.\u00a0377\u2013384.","DOI":"10.5220\/0006294204050412"},{"key":"10.3233\/SCS-230015_ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN48656.2020.9016455"},{"issue":"21","key":"10.3233\/SCS-230015_ref51","doi-asserted-by":"publisher","first-page":"21999","DOI":"10.1109\/JIOT.2022.3181701","article-title":"Development of a real-time wearable fall detection system in the context of Internet of things","volume":"9","author":"Qian","year":"2022","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/SCS-230015_ref52","doi-asserted-by":"crossref","unstructured":"R.\u00a0Raj and N.\u00a0Rai, Voice controlled cyber-physical system for smart home, in: Proceedings of the Workshop Program of the 19th International Conference on Distributed Computing and Networking, 2018, pp.\u00a01\u20135.","DOI":"10.1145\/3170521.3170550"},{"issue":"15","key":"10.3233\/SCS-230015_ref53","doi-asserted-by":"publisher","first-page":"5621","DOI":"10.3390\/s22155621","article-title":"Transfer-learning-based intrusion detection framework in IoT networks","volume":"22","author":"Rodr\u00edguez","year":"2022","journal-title":"Sensors"},{"key":"10.3233\/SCS-230015_ref54","first-page":"5","article-title":"The GDPR as global data protection regulation?","volume":"114","author":"Ryngaert","year":"2020","journal-title":"American Journal of International Law"},{"key":"10.3233\/SCS-230015_ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2018.00225"},{"key":"10.3233\/SCS-230015_ref56","doi-asserted-by":"crossref","unstructured":"M.\u00a0Serror, M.\u00a0Henze, S.\u00a0Hack, M.\u00a0Schuba and K.\u00a0Wehrle, Towards in-network security for smart homes, in: Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018, pp.\u00a01\u20138.","DOI":"10.1145\/3230833.3232802"},{"issue":"2","key":"10.3233\/SCS-230015_ref57","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.11591\/eei.v10i2.2741","article-title":"Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome IoT architecture","volume":"10","author":"Simadiputra","year":"2021","journal-title":"Bulletin of Electrical Engineering and Informatics"},{"key":"10.3233\/SCS-230015_ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69775-8_12"},{"key":"10.3233\/SCS-230015_ref59","doi-asserted-by":"publisher","DOI":"10.1109\/WICT.2011.6141282"},{"key":"10.3233\/SCS-230015_ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3384419.3430727"},{"key":"10.3233\/SCS-230015_ref61","doi-asserted-by":"crossref","unstructured":"K.\u00a0Vertanen and P.O.\u00a0Kristensson, Parakeet: A continuous speech recognition system for mobile touch-screen devices, in: Proceedings of the 14th International Conference on Intelligent User Interfaces, IUI\u201909, ACM Press, New York, NY, USA, 2009, pp.\u00a0237\u2013246.","DOI":"10.1145\/1502650.1502685"},{"key":"10.3233\/SCS-230015_ref63","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796908"},{"key":"10.3233\/SCS-230015_ref64","doi-asserted-by":"publisher","first-page":"14759","DOI":"10.1007\/s10586-018-2388-4","article-title":"Security algorithm of Internet of things based on ZigBee protocol","volume":"22","author":"Wang","year":"2019","journal-title":"Cluster Computing"},{"key":"10.3233\/SCS-230015_ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124845"},{"key":"10.3233\/SCS-230015_ref66","doi-asserted-by":"crossref","unstructured":"C.\u00a0Ye, P.P.\u00a0Indra and D.\u00a0Aspinall, Retrofitting security and privacy measures to smart home devices, in: Proceedings of the 2019 IEEE International Conference on Internet of Things: Systems, Management and Security, IEEE, 2019, pp.\u00a0283\u2013290.","DOI":"10.1109\/IOTSMS48152.2019.8939272"},{"issue":"1","key":"10.3233\/SCS-230015_ref67","first-page":"1","article-title":"The effect of the GDPR on privacy policies: Recent progress and future promise","volume":"12","author":"Zaeem","year":"2020","journal-title":"ACM Transactions on Management Information Systems (TMIS)"},{"key":"10.3233\/SCS-230015_ref68","doi-asserted-by":"crossref","unstructured":"S.\u00a0Zheng, N.\u00a0Apthorpe, M.\u00a0Chetty and N.\u00a0Feamster, User perceptions of smart home IoT privacy, in: Proceedings of the 2018 ACM on Human-Computer Interaction 2(CSCW), 2018, pp.\u00a01\u201320.","DOI":"10.1145\/3274469"}],"container-title":["Journal of Smart Cities and Society"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/SCS-230015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T02:38:53Z","timestamp":1741660733000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/SCS-230015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,23]]},"references-count":61,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/scs-230015","relation":{},"ISSN":["2772-3585","2772-3577"],"issn-type":[{"type":"electronic","value":"2772-3585"},{"type":"print","value":"2772-3577"}],"subject":[],"published":{"date-parts":[[2023,8,23]]}}}