Assessment of Smart Home: Security and Privacy

Home automation is now extremely common in Internet of things services and devices with a range of assurances to improve health, lifestyle, and customer wellbeing. In terms of its success and apparent utility for humans, intelligent homes possess various safety concerns resulting from the diversified, vast-range, and nuanced nature of IoT. Previous studies have talked about security and privacy issues. However, we observe that they have not addressed the risk assessment of each smart home component and corresponding security objective along with additional factors that affect a smart home security posture. In this study, we have proposed a framework defining a standard level of security and then analyzing each component concerning it. There are so many vulnerabilities, but all cannot be assessed due to the heterogeneity of devices and their connection in a small network. IoT can support a wide range of technologies and programs in various domains, including smart cities and smart houses. For monitoring, data exchange, and other operations in the given service, IoT smart objects communicate with other elements such as proxies, mobile devices, and data collectors. While such components help solve various social issues and provide consumers with modern advanced services, their restricted computing capacities render them vulnerable to well-known protection and privacy risks.


Introduction
Smart home technology also referred to as home automation, provides house owners with safe, affordability, power conservation, and comfort while encouraging them to monitor homes, usually through a mobile application.In reality, a smart home is a system that provides a mobile application to track it from your smartphone or laptop.It can monitor home appliances such as lights, ventilation, air conditioning, smart door doors, etc. Bluetooth or Wi-Fi is used to monitor devices remotely [1].Smart home emphasizes the automated regulation of home appliances such as intelligent lighting, ventilation, and heating.Although industry strives to manufacture specified goods, such as the thermostat, smart lights, work has tried to understand the wide spectrum of solutions introduced at home.The devices inside the system are configured to the main hub that governs the movement of information among them, controlled and operated by end-user through mobile or web applications [2].
While it is evident that potentially numerous IoT devices and applications seem to be currently active in the smart home market, they usually come into one of the following categories: Entertainment, Monitoring and Safety, Household Maintenance, Lighting, Fitness, and Power & Resource Management.Over the last few years, rapid development or shift has witnessed voice technology adaptation in many computing applications.One of the most significant innovations that use voice technology is Smart Home Personal Assistants (SPA), e.g., Amazon Echo, Google Home, etc. Connected home systems can be categorized into two major categories: remotely operated or locally controlled systems [3].The local system uses an in-house controller to operatee.A smart home device is interconnected via the Internet, enabling users to monitor operations like home protection, temperature, lighting, etc. Users can install anything in the home that uses electricity on your home network and at your command [4].It includes various devices that have hit the market that regulate and control all devices such as Zigbee, Z-wave, Lutron, and Wink.So, the design of the Smart local system, the reality is that it is still linked with the external world through the back door by extracting data from homeowners and the Internet, poses a range of security issues.They are systems that integrate most users' digital devices and offer them a portal to control anything.However, generally, they come along with a mobile application, and that you can access them from wherever you want.Present Smart home systems include cloud-based Samsung Smart Things and Amazon AWS, and also several other IoTs.An example, in which a home device sensitizes the surrounding atmosphere and submits the overall collected data directly to the cloud or else from a central hub [5].The smart house is packed with hundreds of sensors that are doing measurements in conjunction with several other evidence, including smart devices that will be used for customization, automatic services, and enhancing the quality and usability of the occupants.Technically speaking, the smart home model consists of five essential elements: device control, sensors and actuators, network controllers, the controller, and the remote-control devices.A smart home provides various security, childcare, healthcare, eldercare, energy efficiency, and management [6].However, this smart home model has essential aspects of information protection and privacy.making the device intelligible and accessible to all applications [10].To promote the introduction and acceptance of home automation technologies, it is indeed vital to explore the user's view also, the current smart home conditions.There is a significant necessity to reassess the theories and concepts considering the rapid growth rate of studies in this field.
The project discusses privacy and security issues related to smart home systems and their components and segregating them based on Confidentiality, Integrity, Availability, Authenticity, and Authorization, which are also the security objectives of a Smart Home system.Lastly, we will give an overview of the mitigation options that can be implemented for developing a more secure home network [11].
The rest of the paper is structured, as Section 2 will be explaining the objective, Section 3 will be Literature Review.Section 4 is a conceptual model of how a smart home system looks.Section 5 is a research methodology, and Section 6 will be the analysis part, which discusses the conclusion and limitations.

Conceptual Model
A smart home environment and its major components are discussed in this section.These  Gateway: This is a home access point that usually helps owners or other individuals remotely track, operate, and handle home electrical appliances and even detectors.It serves as an integration node to transmit test value with an outside system, like the service providers.
Smart devices:-are networks made up of sensors and/or actuators.They are linked with the smart home web.Examples here involve automated devices like a smart speaker that reacts to the buzzer's sound and delivers access control based on real-time [13].

• Communication
Classic smart, wired home uses several protocol connectivity solutions.They range from wired to wireless communication protocols.Sensors typically connect using home security protocols, such as Zigbee, Z-Wave, and WPA2, and networking procedures that include Bluetooth, IEEE 802.15.4/.11ah,Wi-Fi, low-WPAN, also option of mobile technologies.GPS and RFID are also used for tracking purposes.

Smart Hub
Wiring (if applicable)

• Services
Services are mobile programs deployed in the cloud or in the home setting responsible for scheduling system services that are mobile programs deployed in the cloud or the home setting responsible for scheduling, system control, decision-making, etc. Usually, households run these applications over their smartphones or tablets to communicate with the computer locally or remotely [14].

Smart Apps
Web access

Objective
The core objective behind conducting research is to give an overview of the privacy and security issues in the IoT-based Smart home system.Due to vulnerabilities of the existing smart home systems and the multiple attacks on these systems, we have challenged security [15].Therefore, the security of these systems is an important issue that requires analysis.The major emphasis is on highlighting the security vulnerability and risks distributed among major portions, like human-related, network, hardware, software, and information.It is accompanied by finding out the most and least vulnerable components installed within the house setting based on types of attack, likelihood, and risk score [16].Also, keeping into consideration internal and external factors, The research would be useful for manufacturers of home automation devices, components, and reviewers and to develop a more secured smart system based on the risk assessment carried out.From the end-user and provider perspective, it will be useful as they know what factors affect smart home security and make them aware and, in turn, increase overall security posture [17].

Literature Review
Research attempts have been made to analyze vulnerabilities in IoT products in a smart home setting, where security issues are addressed and attack classifications are identified.Homes are the areas where secrecy is supposed to be preserved.IoT (Internet of things) has emerged as a reliable technology to enhance the lives in today's digital homes by offering a variety of automated, interactive, and convenient services.However, maintaining safety and adequate protection for these necessary IOT offered services are key problems within a smart home setting [18].A study by Bugeja et al. also speaks similarly that IoT services and devices are becoming widely attractive among smart homes, including many attempts to raise the standard of living of individuals.However, the stratified, complex, and web-related complexity for such space raises additional issues since personal information is obtainable, often without the knowledge of the householder.However, the privacy and protection need of vital technical infrastructure plus any important commercial activities turn out to be somewhat distinct from the demands of the domestic Smart Home community, observed Lin & Bergmann [19].Another study states that homes are especially vulnerable to malware and data breaches at the highest degree of smartness.So, paradoxically, the better digital a house becomes, the more defenseless you get to be.Recent technology professionals speak on how only basic appliances, e.g., coffee machines, can also be an intruder's gateway to the whole house, which provides vulnerable digital underbelly, which criminals might manipulate.IoT's core deployment area is a home, an integrated place, where many things connect through the Internet.Hence, according to a study, this fast-technical development of IoT poses ample threats [20].For example, in what way smart home users can get reliable utilities to maintain their account and privacy and a way to operate their houses effectively beneath managed conditions and quite enough confidentiality and prevent abuse of sensitive information.
The emergence of smart gadgets, which systematically gathers classified data, becomes evident mostly because of the expansion of everyday activities.In addition to that, a study says that insufficient protection protocols and specialized outlier analysis mechanisms systems are sometimes present [21].Such a diverse system renders it susceptible to various threats like information theft, unknown connection, service disturbance, power wastage, and unsafe portals.Another study states that with a wide range of electronic devices and sensors, smart homes can be installed, controlled from remote areas, making it impossible for the average person to uphold safety levels.Since smart devices are connected to the Internet, the vectors used by attackers are increasing significantly [22].It also makes it more difficult for forensic analysts to use the tool and appoint the person.The development and implementation of complex, linked operating domains, such as intelligent public transport, buildings, and cities, are on the rise [23].The complexity of the threat area of automated homes is increasingly growing.Many vulnerable bugs got added, setting a stage for a not so stable dangerous environment.
[24] In a study, the author has attempted to present the definition of smart home system, the term privacy and security in perspective of smart home, security, vulnerabilities area, and existing security initiatives to counter these security and privacy threats [25].The diversity of IoT devices has been the most critical problem to discuss on a high-priority basis.The product comes with various networking requirements, and different app update features often come from different manufacturers.
A study describes and addresses the threat that those might influence the organization classifying them into an external threat as well as internal in order to address the issue that since home automation is a section of everyday lives, many folks wish they can keep a check on his/her residence by just tapping on mobile but are afraid to risk anonymity or personal details that may lead to a lack of protection or even financial loss [26].
A further study says IOT is also perceived as a common issue area, accompanied by potential approaches to be implemented through applications of a broad variety.However, the online security requirements for essential technical systems and important business activities were somewhat distinct in the smart house of a traditional setting.The first time IoT was created, security was just an afterthought [27].However, this is no longer appropriate due to the high demand for IoT devices in consumer homes.Attacks on IoT systems may occur with or without human intervention, like the Mirai botnet.Ann effective IoT attack can also result in significant financial, reputational, and, worse, life-threatening losses to customers.A study states that security is crucial to the proper development and implementation of home automation systems.It also gives the inhabitants of a home a sense of security and puts their minds at ease.As it is now, much vulnerability exploits the smart home network, but no strong defensive mechanism has yet been developed [28].One more recent study states that multi-user smart homes face particular protection and privacy issues, such as supporting a wide variety of access control priorities and handling consumer pressures and disputes.Smart homes face particular problems in terms of protection, privacy, and accessibility, as they are multi-user, multi-device networks, which have an impact on all individuals in general experience living in the house, but unfortunately, modern smart homes are not yet intelligently built for connectivity with and use by several users [29].A similar study shows that risk quantification for smart homes is difficult because of its diverse environment with wired devices, appliances, and networks.Its design poses multiple safety concerns as well as vulnerabilities in a suburban neighborhood.It is, therefore, necessary to control the risks to smart homes.They also find out that many of the in-store apps had an extra benefit or rights because of their ability to behave as a complex system.Furthermore, after the application has been enabled, complete access to the device is given to the Smart App.It states that only partial access to the device is necessary [30].
A further study states that cybercrime and information security challenges are far closer to the reality of wired home environments than has ever been anticipated.Much of the work initiative focuses on the protection systems of collaboration and essential services.Failing to recognize a few out of several delicate ties within the system emerges because of smart equipment wired today and the future.A study depicts that because of the absence of a safety procedure for smart components, most of which are easy preys; however, it is not in the subject's experience about being compromised.
Considering the significance of protection among smart devices, a prevention methodology based on smart devices and wireless connections is necessary.Also, while safeguarding against hackers or network attacks, it is quite often advised that the device's original or out-of-box password should not be used and read the device's security specifications before using them for the first time.Another study states that even if the Internet of Things delivers enormous benefits, it is prone to various security threats in our everyday lives.The bulk of vulnerabilities were linked to the disclosure of data and disruption in businesses.Cyber-attacks in IoT devices directly affect the risk of general security.
Applying IOT technologies to smart homes creates both opportunities and security risks.Homes layers communicate with each other through signals to carry out operations.The conceptual model reference is taken from [12].

Figure 1 -
Figure 1 -Smart Home System Elemental Structure