Skip to main content
. 2018 Mar 8;18(3):817. doi: 10.3390/s18030817

Table 4.

Proposed security threat and risk countermeasures to be applied in IoT-based smart home environments.

Threat ID Possible Mitigation Approaches
Control access to the system using efficient biometric identifiers [49]
1 Implement a user awareness program to make users aware of social engineering
Implement multi-factor authentication
Avoid using insecure Wi-Fi, which gives hackers access to personal data
2 Set up a secure network before using a home automation application
Be aware of stolen or lost devices
Use a secure communication channel by utilizing a secure virtual private network (VPN)
3 Limit network traffic such that it is accessible only to authorized users
Develop a security awareness training program for smart home inhabitants
Use an intrusion detection system (IDS) / intrusion prevention system (IPS)
4 Use encryption mechanisms for security data transmission [50]
Perform frequent data backups to keep copies of sensitive data
Secure the physical locations of installed devices
5 Provide secure access to device configuration interfaces
Replace the default usability configuration of installed devices
Use commodity hardware and software to collect and examine network traffic [33,34]
6 Create backups of the working system’s configurations
Always monitor system’s performance, looking for misbehavior incidents
Apply a strong authentication mechanism such as fingerprint authentication [51]
7 Offer awareness and training programs regarding system security
Ensure that system configurations are secure and performed by authentic people
Restrict physical access to devices to only authentic people
8 Avoid infrastructure outsourcing to a third-party service provider
Modify default device configurations to achieve a better security level
Disable unnecessary location tracking services on mobile devices
9 Develop a good understanding of user privacy concerns
Track system behavior to identify any suspicious privacy leakage
Use only trusted and authentic networks (wired or wireless)
10 Share information carefully and in a restricted manner
Use only trusted providers to receive technical support for hardware failures in smart home