PRIVACY ISSUES IN SMART HOME DEVICES USING INTERNET OF THINGS – A SURVEY.

Dr. D. Usha and M. Bobby. 1. Assistant Professor,Department of Computer Science, Mother Teresa Women’s University, Kodaikanal. 2. Research Scholar, Department of Computer Science, Sri Adi Chunchanagiri Women’s College,Cumbum. ...................................................................................................................... Manuscript Info Abstract ......................... ........................................................................ Manuscript History Received: 8 August 2018 Final Accepted: 10 September 2018 Published: October 2018


ISSN: 2320-5407
Int. J. Adv. Res. 6(10), 566-568 567 In order to provide users with valuable output, the IoT architecture should guarantee the suitability and trustworthiness of the processed data. This is a major requirement of such systems in order to guarantee robustness and reliability at the service level and able to support security.

Smart Home Devices
Smart home is one in which the various electric and electronic appliances are wired up to a central computer control system so they can either be switched on and off at certain times or if certain events happen.Most homes already have a certain amount of "smartness" because many appliances already contain built-in sensors or electronic controllers.There are three broadly categorized components of an IoT automated house: hardware, software, and communication protocol. These three components are indispensable as each of these are crucial for building a smart home. Equipping the IoT network with right hardware ensures successful IoT prototype development. It will also help in coping with technological changes.It is crucial to select the right communication protocol. A well designed and tested protocol will help in avoiding performance bottlenecks and issues with device integration. Along with the communication protocol, another crucial component of the IoT network is the firmware.It would be very disastrous if private and confidential information is accessed by unauthorized intruders.With all of this IoT data being transmitted, the risk of losing privacy increases.Millions of devices interconnected and concerns over privacy increased more than ever. Data encryption is very much necessary for maintaining the privacy of the data that is shared over the internet.

Review of the Contributions:-
Freddy K Santoso, Nicholas C H Vunpresent an approach to incorporate strong security in deploying Internet of Things (IoT) for smart home system, together with due consideration given to user convenience in operating the system. The IoT smart home system runs on conventional Wi-Fi network implemented based on the AllJoyn framework, using an asymmetric Elliptic Curve Cryptography to perform the authentications during system operation. A Wi-Fi gateway is used as the center node of the system to perform the system initial configuration.It is then responsible for authenticating the communication between the IoT devices as well as providing a mean for the user to setup, access and control the system through an Android based mobile device running appropriate application program.
Noah Apthorpe, Dillon Reisman, Nick Feamste examine four IoT smart home devices (a Sense sleep monitor, a Nest Cam Indoor security camera, a WeMo switch, and an Amazon Echo) and find that their network traffic rates can reveal potentially sensitive user interactions even when the traffic is encrypted. These results indicate that a technological solution is needed to protect IoT device owner privacy, and that IoT-specific concerns must be considered in the ongoing policy debate around ISP data collection and usage.
Biljana L.Risteska StojkoskaKire V.Trivodaliev propose a holistic framework which incorporates different components from IoT architectures/frameworks proposed in the literature, in order to efficiently integrate smart home objects in a cloud-centric IoT based solution. We identify a smart home management model for the proposed framework and the main tasks that should be performed at each level. We additionally discuss practical design challenges with emphasis on data processing, as well as smart home communication protocols and their interoperability. We believe that the holistic framework ascertained in this paper can be used as a solid base for the future developers of Internet of Things based smart home solutions.

Tianyi Song,Ruinian Li,Bo Mei,Jiguo Yu,Xiuzhen
Cheng propose an improved energy-efficient, secure, and privacy-preserving communication protocol for the (Smart Home Systems) SHSs. Data transmissions within the SHS are secured by a symmetric encryption scheme with secret keys being generated by chaotic systems. Meanwhile, They incorporate message authentication codes to our scheme to guarantee data integrity and authenticity. They also provided detailed security analysis and performance evaluation in comparison with their previous work in terms of computational complexity, memory cost, and communication overhead.
Huichen Lin andNeil W. Bergmann identifies key future requirements for trusted Smart Home systems. A gateway architecture is selected as the most appropriate for resource-constrained devices, and for high system availability. Two key technologies to assist system auto-management are identified. Firstly, support for system autoconfiguration will enhance system security. Secondly, the automatic update of system software and firmware is needed to maintain ongoing secure system operation.

568
Dimitris GeneiatakisIoannis Kounelis,Ricardo Neisse set up the scene for a security and privacy threat analysis for a typical smart home architecture using off the shelf components. To do so, we employ a smart home IoT architecture that enables users to interact with it through various devices that support smart house management, and we analyze different scenarios to identify possible security and privacy issues for users.
Pawani PorambageMika Ylianttila Corinna Schmitt propose as members of the always-connected paradigm of the massive IoT world, people can scarcely control the disclosure of their personal information. The biggest challenge is to allow users to experience the best utilization of IoT-based products and services with the fewest privacy threats and failures. This article provides a holistic view of the challenges of and issues related to preserving IoT privacy, as well as the existing solutions. Privacy by design (PbD) is identified as the key solution for many IoT privacy issues.

Conclusion:-
Our conventional devices and appliances will get smarter, our lifestyle can be changed with modern technology.Smart home technology and the IoT will deliver the insight needed for people to live better liveslonger, healthier, and happier.Security and privacy at the device level, protecting the user and encrypting communication links are critical to the secure operations of IoT. Privacy principles dictate that users should be able to keep control of their data as well as to be able to opt out of the -smart‖ environment without incurring negative consequences.