{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T02:16:28Z","timestamp":1774664188395,"version":"3.50.1"},"reference-count":36,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2016,7,13]],"date-time":"2016-07-13T00:00:00Z","timestamp":1468368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic environments, human issues may be as important as technical issues. After surveying existing solutions for enhancing IoT security, the paper identifies key future requirements for trusted Smart Home systems. A gateway architecture is selected as the most appropriate for resource-constrained devices, and for high system availability. Two key technologies to assist system auto-management are identified. Firstly, support for system auto-configuration will enhance system security. Secondly, the automatic update of system software and firmware is needed to maintain ongoing secure system operation.<\/jats:p>","DOI":"10.3390\/info7030044","type":"journal-article","created":{"date-parts":[[2016,7,13]],"date-time":"2016-07-13T09:48:45Z","timestamp":1468403325000},"page":"44","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":278,"title":["IoT Privacy and Security Challenges for Smart Home Environments"],"prefix":"10.3390","volume":"7","author":[{"given":"Huichen","family":"Lin","sequence":"first","affiliation":[{"name":"School of Information Technology and Electrical Engineering, University of Queensland, Brisbane 4072, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6279-1053","authenticated-orcid":false,"given":"Neil","family":"Bergmann","sequence":"additional","affiliation":[{"name":"School of Information Technology and Electrical Engineering, University of Queensland, Brisbane 4072, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2016,7,13]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"The internet of things: A survey","volume":"54","author":"Atzori","year":"2010","journal-title":"Comput. Netw."},{"key":"ref_2","unstructured":"Evans, D. The internet of things: How the next evolution of the internet is changing everything. Available online: http:\/\/www.cisco.com\/c\/dam\/en_us\/about\/ac79\/docs\/innov\/IoT_IBSG_0411FINAL.pdf."},{"key":"ref_3","first-page":"56","article-title":"The internet of things: A reality check","volume":"14","author":"George","year":"2012","journal-title":"IEEE Comput. Soc."},{"key":"ref_4","unstructured":"Gartner Inc. Hype cycle research methodology. Available online:http:\/\/www.gartner.com\/technology\/research\/methodologies\/hype-cycle.jsp."},{"key":"ref_5","unstructured":"European Commission The alliance for internet of things innovation (AIOTI). Available online:https:\/\/ec.europa.eu\/digital-single-market\/alliance-internet-things-innovation-aioti."},{"key":"ref_6","unstructured":"National Intelligence Council (NIC) (2008). Disruptive Civil Technologies Six Technologies with Potential Impacts on Us Interests out to 2025, National Intelligence Council (NIC). Conference Report CR."},{"key":"ref_7","unstructured":"PricewaterhouseCoopers (PwC) (2015). Information Security Breaches Survey 2015."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of things in industries: A survey","volume":"10","author":"Xu","year":"2014","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_9","first-page":"1654","article-title":"Smart hospital based on internet of things","volume":"7","author":"Yu","year":"2012","journal-title":"J. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1016\/j.pcad.2013.10.006","article-title":"Telemedicine and advances in urban and rural healthcare delivery in africa","volume":"56","author":"Mars","year":"2013","journal-title":"Prog. Cardiovasc. Dis."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1071\/AH14090","article-title":"Uptake of telehealth services funded by medicare in australia","volume":"38","author":"Wade","year":"2014","journal-title":"Aust. Health Rev."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MVT.2014.2333615","article-title":"Advances in automotive electronics (automotive electronics)","volume":"9","author":"Fleming","year":"2014","journal-title":"IEEE Veh. Technol. Mag."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1109\/SURV.2011.061411.00019","article-title":"Vehicular networking: A survey and tutorial on requirements, architectures, challenges, standards and solutions","volume":"13","author":"Karagiannis","year":"2011","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_14","first-page":"144","article-title":"Critical success factors and challenges of implementing RFID in supply chain management","volume":"10","author":"Attaran","year":"2012","journal-title":"J. Supply Chain Operat. Manag."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Zou, Z., Chen, Q., Uysal, I., and Zheng, L. (2014). Radio frequency identification enabled wireless sensing for intelligent food logistics. Philos. Trans. R. Soc. Lond. A Math. Phys. Eng. Sci., 372.","DOI":"10.1098\/rsta.2013.0313"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Ricquebourg, V., Menga, D., Durand, D., Marhic, B., Delahoche, L., and Loge, C. (2006, January 18\u201320). The Smart Home Concept: Our Immediate Future. Proceedings of the 2006 1st IEEE International Conference on E-Learning in Industrial Electronics, Hammamet, Tunisia.","DOI":"10.1109\/ICELIE.2006.347206"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1190","DOI":"10.1109\/TSMCC.2012.2189204","article-title":"A Review of Smart Homes\u2014Past, present, and future","volume":"42","author":"Alam","year":"2012","journal-title":"IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.)"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Patton, M., Gross, E., Chinn, R., Forbis, S., Walker, L., and Hsinchun, C. (2014, January 24\u201326). Uninvited connections: A study of vulnerable devices on the Internet of Things (IoT). Proceedings of the 2014 IEEE Joint Intelligence and Security Informatics Conference (JISIC), The Hague, The Netherlands.","DOI":"10.1109\/JISIC.2014.43"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Durumeric, Z., Adrian, D., Mirian, A., Bailey, M., and Halderman, J.A. (2015, January 12\u201316). A search engine backed by internet-wide scanning. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA.","DOI":"10.1145\/2810103.2813703"},{"key":"ref_20","unstructured":"Hui, J. (2011). Compression Format for Ipv6 Datagrams over IEEE 802.15.4-Based Networks, Internet Engineering Task Force. RFC 6282."},{"key":"ref_21","unstructured":"Winter, T., and Thubert, P. (2012). RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks, Internet Engineering Task Force. RFC 6550."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Shelby, Z., Hartke, K., and Bormann, C. (2014). The Constrained Application Protocol (Coap), Internet Engineering Task Force. RFC 7252.","DOI":"10.17487\/rfc7252"},{"key":"ref_23","unstructured":"Shelby, Z., and Bormann, C. (2011). 6lowpan: The Wireless Embedded Internet, John Wiley & Sons."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Raza, S., Duquennoy, S., Chung, T., Yazar, D., Voigt, T., and Roedig, U. (2011, January 27\u201329). Securing Communication in 6lowpan with Compressed Ipsec. Proceedings of the 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS), Barcelona, Spain.","DOI":"10.1109\/DCOSS.2011.5982177"},{"key":"ref_25","unstructured":"Yue, Q., and Maode, M. (2015, January 8\u201312). An authentication and key establishment scheme to enhance security for m2m in 6lowpans. Proceedings of the 2015 IEEE International Conference on Communication Workshop (ICCW), London, UK."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Perrey, H., Landsmann, M., Ugus, O., Schmidt, T.C., and Wahlisch, M. (2013). Trail: Topology Authentication in RPL, arXiv:1312.0984v2.","DOI":"10.1109\/INFCOMW.2013.6970745"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1587\/comex.4.340","article-title":"Secure parent node selection scheme in route construction to exclude attacking nodes from rpl network","volume":"4","author":"Kenji","year":"2015","journal-title":"IEICE Commun. Exp."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Dierks, T., and Rescorla, E. (2008). The Transport Layer Security (Tls) Protocol Version 1.2, Internet Engineering Task Force. RFC 5246.","DOI":"10.17487\/rfc5246"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Rescorla, E., and Modadugu, N. (2012). Datagram Transport Layer Security Version 1.2, Internet Engineering Task Force. RFC 6347.","DOI":"10.17487\/rfc6347"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Conzon, D., Bolognesi, T., Brizzi, P., Lotito, A., Tomasi, R., and Spirito, M.A. (August, January 30). The virtus middleware: An xmpp based architecture for secure iot communications. Proceedings of the 2012 21st International Conference on Computer Communications and Networks (ICCCN), Munich, Germany.","DOI":"10.1109\/ICCCN.2012.6289309"},{"key":"ref_31","unstructured":"Caro-Benito, R.J., Garrido-M\u00e1rquez, D., Plaza-Tron, P., Sanz-Mart\u00edn, N., Serrano-Mart\u00edn, J.L., and Castro, R.R. (2009). Proceedings of ICT-MobileSummit, ScienceOpen."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Kovatsch, M., Lanter, M., and Shelby, Z. (2014, January 6\u20138). Californium: Scalable cloud services for the internet of things with coap. Proceedings of the 2014 International Conference on the Internet of Things (IoT), Cambridge, MA, USA.","DOI":"10.1109\/IOT.2014.7030106"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Alohali, B., Merabti, M., and Kifayat, K. (2014, January 25\u201326). A secure scheme for a smart house based on cloud of things (cot). Proceedings of the 2014 6th Computer Science and Electronic Engineering Conference (CEEC), Colchester, UK.","DOI":"10.1109\/CEEC.2014.6958565"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Ding, F., Song, A., Tong, E., and Li, J. (2016). A smart gateway architecture for improving efficiency of home network applications. J. Sens., 2016.","DOI":"10.1155\/2016\/2197237"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Bergmann, N.W., and Robinson, P.J. (2012, January 14\u201317). Server-based internet of things architecture. Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA.","DOI":"10.1109\/CCNC.2012.6181122"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.adhoc.2015.05.017","article-title":"Gitar: Generic extension for internet-of-things architectures enabling dynamic updates of network and application modules","volume":"36","author":"Ruckebusch","year":"2016","journal-title":"Ad Hoc Netw."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/7\/3\/44\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:26:03Z","timestamp":1760210763000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/7\/3\/44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,13]]},"references-count":36,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2016,9]]}},"alternative-id":["info7030044"],"URL":"https:\/\/doi.org\/10.3390\/info7030044","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,13]]}}}