Smart home and legal safeguard against cyber threat: A review

Purpose - Smart home concept development is still in its infancy, however, its advantages in users’ life have widely discussed all over the nation. Despite its role in preserving energy and environment (Reinisch et al., 2010), making life convenient and easier (Robles et al., 2010), for the safet...

Full description

Saved in:
Bibliographic Details
Main Authors: Basarudin, Noor Ashikin, Yeon, Asmah Laili, Mohamed Yusoff, Zuryati, Md Dahlan, Nuarrual Hilal, Mahdzir, Nazli
Format: Conference or Workshop Item
Language:English
Published: 2017
Subjects:
Online Access:http://repo.uum.edu.my/24547/1/SICONSEM%202017%2084%2086.pdf
http://repo.uum.edu.my/24547/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uum.repo.24547
record_format eprints
spelling my.uum.repo.245472018-07-30T02:35:00Z http://repo.uum.edu.my/24547/ Smart home and legal safeguard against cyber threat: A review Basarudin, Noor Ashikin Yeon, Asmah Laili Mohamed Yusoff, Zuryati Md Dahlan, Nuarrual Hilal Mahdzir, Nazli QA75 Electronic computers. Computer science Purpose - Smart home concept development is still in its infancy, however, its advantages in users’ life have widely discussed all over the nation. Despite its role in preserving energy and environment (Reinisch et al., 2010), making life convenient and easier (Robles et al., 2010), for the safety and security purpose(Ding et al., 2011), as well as providing healthcare (Chan et al.,2008) to the inhabitants, being a connected house which relies fully on the internet connection is opened up to various threat in cyber aspect.Thus, this paper conducted a review of past literature regarding the trend of cyber threats that occur in a smart home concept and the methods of prevention that have been taken either approach in computer technology or in legal method. Methodology - This paper conducts a review on the information related to the concept of smart home and the issues revolving its susceptibility to cyber threat. Preliminary search was conducted using the search engines, google scholars and online journal database.The key term searched relevant to the topic includes ‘smart home technology system’, ‘smart home and cyber threat’, ‘smart grid attacks’, and ‘Internet of Things’. Finding of the searches were segmented according to the sub topic to be discussed thoroughly. Findings - Although there is no definite answer to what is exactly smart home should be, for the purpose of this study, author stick to the concept of a home whereby it should comprise of the digitally connected and controlled devices (Alam et al., 2012) within a house, equipped with sensors, actuators and cloud services that support automation (Aldrich, 2003), as well as control hubs to connect sensors and actuators from multiple entry points like touch pads, computer screens, telephones, and other wireless mobile devices, such as smartphones and tablets (Rodden & Benford, 2003). Smart home environment consist of internet-enabled gadget embedded in a house to share information between each other to allow the devices functioning process dubbed with Internet of Things (Tzezana, 2017). The Internet of Things as a method of today’s communication links the internet with sensors and devices to enable the connection of physical and virtual object through the exploitation of data communication (Atzori et al., 2010). Smart technology is viewed as a system or account susceptible to hack due to its open system that may expose to eavesdropping, Distributed Denial of Service (DDoS) attack, attack against authentication (Li et al., 2016), hacking activity, data stolen and data manipulation. Attack on the system will bring greater problem that leads to data intrusion and privacy issues. Thus, the interconnecting of various devices in smart home demand control of data from being manipulated, hacked or misused by hackers through the introduction of policies and regulations (Cho et al.,2015). Apart from imposing rules and regulations to curb the issues, review also will look into approach taken in technical ways to protect the system to minimize the potential attacks in the smart home system. 2017-12-04 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/24547/1/SICONSEM%202017%2084%2086.pdf Basarudin, Noor Ashikin and Yeon, Asmah Laili and Mohamed Yusoff, Zuryati and Md Dahlan, Nuarrual Hilal and Mahdzir, Nazli (2017) Smart home and legal safeguard against cyber threat: A review. In: Sintok International Conference on Social Science and Management (SICONSEM 2017), 4-5 December 2017, Adya Hotel, Langkawi Island, Kedah, Malaysia..
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Basarudin, Noor Ashikin
Yeon, Asmah Laili
Mohamed Yusoff, Zuryati
Md Dahlan, Nuarrual Hilal
Mahdzir, Nazli
Smart home and legal safeguard against cyber threat: A review
description Purpose - Smart home concept development is still in its infancy, however, its advantages in users’ life have widely discussed all over the nation. Despite its role in preserving energy and environment (Reinisch et al., 2010), making life convenient and easier (Robles et al., 2010), for the safety and security purpose(Ding et al., 2011), as well as providing healthcare (Chan et al.,2008) to the inhabitants, being a connected house which relies fully on the internet connection is opened up to various threat in cyber aspect.Thus, this paper conducted a review of past literature regarding the trend of cyber threats that occur in a smart home concept and the methods of prevention that have been taken either approach in computer technology or in legal method. Methodology - This paper conducts a review on the information related to the concept of smart home and the issues revolving its susceptibility to cyber threat. Preliminary search was conducted using the search engines, google scholars and online journal database.The key term searched relevant to the topic includes ‘smart home technology system’, ‘smart home and cyber threat’, ‘smart grid attacks’, and ‘Internet of Things’. Finding of the searches were segmented according to the sub topic to be discussed thoroughly. Findings - Although there is no definite answer to what is exactly smart home should be, for the purpose of this study, author stick to the concept of a home whereby it should comprise of the digitally connected and controlled devices (Alam et al., 2012) within a house, equipped with sensors, actuators and cloud services that support automation (Aldrich, 2003), as well as control hubs to connect sensors and actuators from multiple entry points like touch pads, computer screens, telephones, and other wireless mobile devices, such as smartphones and tablets (Rodden & Benford, 2003). Smart home environment consist of internet-enabled gadget embedded in a house to share information between each other to allow the devices functioning process dubbed with Internet of Things (Tzezana, 2017). The Internet of Things as a method of today’s communication links the internet with sensors and devices to enable the connection of physical and virtual object through the exploitation of data communication (Atzori et al., 2010). Smart technology is viewed as a system or account susceptible to hack due to its open system that may expose to eavesdropping, Distributed Denial of Service (DDoS) attack, attack against authentication (Li et al., 2016), hacking activity, data stolen and data manipulation. Attack on the system will bring greater problem that leads to data intrusion and privacy issues. Thus, the interconnecting of various devices in smart home demand control of data from being manipulated, hacked or misused by hackers through the introduction of policies and regulations (Cho et al.,2015). Apart from imposing rules and regulations to curb the issues, review also will look into approach taken in technical ways to protect the system to minimize the potential attacks in the smart home system.
format Conference or Workshop Item
author Basarudin, Noor Ashikin
Yeon, Asmah Laili
Mohamed Yusoff, Zuryati
Md Dahlan, Nuarrual Hilal
Mahdzir, Nazli
author_facet Basarudin, Noor Ashikin
Yeon, Asmah Laili
Mohamed Yusoff, Zuryati
Md Dahlan, Nuarrual Hilal
Mahdzir, Nazli
author_sort Basarudin, Noor Ashikin
title Smart home and legal safeguard against cyber threat: A review
title_short Smart home and legal safeguard against cyber threat: A review
title_full Smart home and legal safeguard against cyber threat: A review
title_fullStr Smart home and legal safeguard against cyber threat: A review
title_full_unstemmed Smart home and legal safeguard against cyber threat: A review
title_sort smart home and legal safeguard against cyber threat: a review
publishDate 2017
url http://repo.uum.edu.my/24547/1/SICONSEM%202017%2084%2086.pdf
http://repo.uum.edu.my/24547/
_version_ 1644284077664108544
score 13.160551