University of Washington, IoT Internet of Things, smart home, smart devices, ethical issues, cybersecurity, cybercrime, vulnerabilities, security gaps, cyberattacks
This paper covers four areas: introduction, literature review, results and recommendations, and conclusion. In the introduction, the paper delineates its research objective: to identify cyber threats of IoT-based home appliances and to propose actions for their reduction. The literature review will bring all the researches together and elucidate how IoT is quickly becoming a multi-purpose technology. It enumerates the existence of IoT devices in houses and emphasizes that their privacy gets compromised with the weak security of their network services and a lack of proper safeguards. The other IoT-based home appliances attacks types will now be discussed which include unauthorized access, data breaches, and privacy violation. It brings to the fore the security challenges, such as the use of outdated components and the absence of privacy safeguards which in turn require security procedures to be stringently reinforced. The article about smart home security dangers caused by cybercrimes mentions that they lead to financial, identity theft and physical risks. Therefore, it is clear that precautionary measures should be determined as soon as possible. Apart from this, this paper explores the subject of regulation and policy recommendations to make the security of IoT devices stricter and protect the privacy of people. The report calls for proactive actions, like making industry standards enforceable by law and setting up strict data protection systems to eliminate cyberattacks. Basically, this article encapsulates the value of users education and information programs which are purposed to aid people to defend their devices and also to make wise decision about their gadgets use. The systematic treatment of these fields explains the way the article presents the most essential contributions to the socio-technical IoT security and privacy system, therefore, supporting the overall approaches to the issues related to its emergence.
[...] (2018) conducted a research of participants' views related to smart appliances at home. In their research, the scholars looked at the perception of privacy of various smart homeowners aged between 23 and 45 years. By means of such survey, it became clear that the majority of smart homeowners were aware of the risks of privacy invasion as a trade-off for the connectedness and convenience of their homes. Yet, the point at which the two parties disagree is the nature of the data collection and dissemination process that involves smart device producers, advertisers, manufacturers, governments and internet service providers. [...]
[...] Security perception of IoT devices in intelligent homes. Journal of Cybersecurity and Privacy, 65-73. https://www.mdpi.com/2624-800X/2/1/5 Neshenko, N., Bou-Harb, E., Crichigno, J., Kaddoum, G., & Ghani, N. (2019). Demystifying IoT security: A full-fledged study on IoT vulnerabilities and an initial probe on large-scale IoT hacking. IEEE Communication Surveys & Tutorials, 2702-2733. https://ieeexplore.ieee.org/abstract/document/8688434/ Piasecki, S., Urquhart, L., & McAuley, D. (2021). Defence against the dark artefacts: Smart home cyber attacks and cyber security standards. Computer Law & Security Review 42, p https://www.sciencedirect.com/science/article/pii/S0267364921000157 Rani, S., Kataria, A., Sharma, V., Ghosh, S., Karar, V., Lee, K., and Choi, C. [...]
[...] The third ethical factor is also who will own and control the data produced by the IoT devices. Buil-Gil et al. (2023) note that many IoT devices use centralized cloud services and several third-party applications whereby data is stored and processed, creating concerns regarding data ownership, rights to access, and consent. Users may not exactly be informed about or fully consent to how their data gets, stored, and shared by the IoT devices and service providers, which may lead to privacy problems and lose of trust. [...]
[...] This, in turn, simplifies the task for homeowners to prevent problematic actors from perpetrating improperly the weaknesses in the smart home devices. In addition, it executes all authentication and encryption-related standards (Piasecki et al., 2021). By using encryption and authentication protocols, all the information that IoT gadgets transmit to the Databox are protected, which secure it from being tampered or interfered by hackers. Moreover, Databox architecture makes communication between IoT devices in the smart home system more secure. The architecture utilizes the protected tunnels of information transfer of IoT devices within the system that aimed to prevent man-in-the-middle threats and eavesdropping. [...]
[...] Next, the person as well as the society become the victim of cybercrime on smart home safety. Rani et al. (2021) state that botnets consisting of compromised IoT devices can launch large scale cyberattacks on the critical infrastructures or corporate networks. These exploit types are able to disrupt vital services, breach confidential information, as well as cause financial damage to companies and organizations. Thus, cybercrimes on smart home security cuts across all facets of cybersecurity, hence the need for robust cybersecurity measures to mitigate against the threats and protect both individuals and the entire digital ecosystem. [...]
APA Style reference
For your bibliographyOnline reading
with our online readerContent validated
by our reading committee