Smart Home Networks: Security Perspective and ML-based DDoS Detection
Internet of Things (IoT) allows households to have real-time access to various services such as IP cameras for monitoring home security, automatic climate controls, doors and window access for family members including pets, mood-based home lighting, or automatic refrigerators that tell what item is...
Saved in:
| Published in | Conference proceedings - Canadian Conference on Electrical and Computer Engineering pp. 1 - 8 |
|---|---|
| Main Authors | , , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
30.08.2020
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2576-7046 |
| DOI | 10.1109/CCECE47787.2020.9255756 |
Cover
| Abstract | Internet of Things (IoT) allows households to have real-time access to various services such as IP cameras for monitoring home security, automatic climate controls, doors and window access for family members including pets, mood-based home lighting, or automatic refrigerators that tell what item is going to expire at what time, etc. However, IoT has often been considered a single-domain facility that provides services to consumers, but security and privacy issues pertaining to households and residential infrastructure have not been studied thoroughly. The security of IoT -based systems requires a critical engineering infrastructure when dealing with home security. Any proposed home security framework should establish an automatic access monitoring and regular updates of the system software and firmware according to the ongoing threats. In this paper, we provide an insightful short review of security issues in smart home systems. We highlight several popular IoT protocols and provide critical analysis of their performance against various security threats. Mitigation strategies are also presented to reduce the impact of cyberattacks on smart home systems. Furthermore, our analysis shows that DDoS is one of the most common threats to smart home systems. Therefore, we developed an ML-based model to detect DDoS attacks. We employed unique characteristics of IoT traffic to engineer features that enable ML algorithms to accurately classify DDoS traffic from normal/benign traffic. |
|---|---|
| AbstractList | Internet of Things (IoT) allows households to have real-time access to various services such as IP cameras for monitoring home security, automatic climate controls, doors and window access for family members including pets, mood-based home lighting, or automatic refrigerators that tell what item is going to expire at what time, etc. However, IoT has often been considered a single-domain facility that provides services to consumers, but security and privacy issues pertaining to households and residential infrastructure have not been studied thoroughly. The security of IoT -based systems requires a critical engineering infrastructure when dealing with home security. Any proposed home security framework should establish an automatic access monitoring and regular updates of the system software and firmware according to the ongoing threats. In this paper, we provide an insightful short review of security issues in smart home systems. We highlight several popular IoT protocols and provide critical analysis of their performance against various security threats. Mitigation strategies are also presented to reduce the impact of cyberattacks on smart home systems. Furthermore, our analysis shows that DDoS is one of the most common threats to smart home systems. Therefore, we developed an ML-based model to detect DDoS attacks. We employed unique characteristics of IoT traffic to engineer features that enable ML algorithms to accurately classify DDoS traffic from normal/benign traffic. |
| Author | Singh, Harsimranjit Al Mtawa, Yaser Haque, Anwar Refaey, Ahmed |
| Author_xml | – sequence: 1 givenname: Yaser surname: Al Mtawa fullname: Al Mtawa, Yaser email: yalmtawa@uwo.ca organization: Western University,London,Ontario,Canada – sequence: 2 givenname: Harsimranjit surname: Singh fullname: Singh, Harsimranjit email: hsing222@uwo.ca organization: Western University,London,Ontario,Canada – sequence: 3 givenname: Anwar surname: Haque fullname: Haque, Anwar email: ahaque32@uwo.ca organization: Western University,London,Ontario,Canada – sequence: 4 givenname: Ahmed surname: Refaey fullname: Refaey, Ahmed email: ahusse7@uwo.ca organization: Western University,London,Ontario,Canada |
| BookMark | eNotj8tKw0AYRkdRsKk-gQvnBRL_uWfcSRKtEC-Q7stM8geiNimZUenbW7Grs_jg8J2EnI3TiITcMMgYA3tbFFVRSWNyk3HgkFmulFH6hCTM8JwpKTk7JQuujE4NSH1BkhDeAUDmWi5I1WzdHOlq2iJ9wfgzzR_hjjbYfs1D3NM3nMMO2zh8I3VjR5_r1LuAHS3LqaElxr9tGi_Jee8-A14duSTrh2pdrNL69fGpuK_TgYOIqW8VaIZWoOsZR3DS970W1lnWOw5wqOg8EzyHzmDLdKulkMwrqaxXAsWSXP9rB0Tc7Obh8H2_ORaLX0Z8TEc |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/CCECE47787.2020.9255756 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) - 2025 collection IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 1728154421 9781728154428 |
| EISSN | 2576-7046 |
| EndPage | 8 |
| ExternalDocumentID | 9255756 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IJVOP IPLJI M43 OCL RIE RIL RIO RNS |
| ID | FETCH-LOGICAL-i203t-bc5061e93eaf12e0a4bff639a91fa200778db13280d7ec16c64341b5459b53e3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 02:28:38 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i203t-bc5061e93eaf12e0a4bff639a91fa200778db13280d7ec16c64341b5459b53e3 |
| PageCount | 8 |
| ParticipantIDs | ieee_primary_9255756 |
| PublicationCentury | 2000 |
| PublicationDate | 2020-Aug.-30 |
| PublicationDateYYYYMMDD | 2020-08-30 |
| PublicationDate_xml | – month: 08 year: 2020 text: 2020-Aug.-30 day: 30 |
| PublicationDecade | 2020 |
| PublicationTitle | Conference proceedings - Canadian Conference on Electrical and Computer Engineering |
| PublicationTitleAbbrev | CCECE |
| PublicationYear | 2020 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0004864 |
| Score | 1.7953066 |
| Snippet | Internet of Things (IoT) allows households to have real-time access to various services such as IP cameras for monitoring home security, automatic climate... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Computer crime home security threat IEEE 802.15 Standard IoT ML-based algorithms network security Operating systems Protocols Radiofrequency identification Security security system smart home Smart homes |
| Title | Smart Home Networks: Security Perspective and ML-based DDoS Detection |
| URI | https://ieeexplore.ieee.org/document/9255756 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEB7anvTioxXf7MGjSTfJJpv1mqYUsaXQCr2VfUxAxFQ0ufjr3TxsVTx4Cwshm90N3zeT75sBuAm58qT9oB2BMrQBCsscFcTKYUIzY5hG0ah8Z9Hkkd2vwlUHbrdeGESsxWfoVpf1v3yz0WWVKhsKy395GHWhy-Oo8WrtPJBxxFr9lkfFMEnSJGXcHkcbA_rUbW_90UOlhpDxAUy_Ht4oR57dslCu_vhVl_G_szuEwc6sR-ZbGDqCDubHsP-tzmAf0sWLPSGkaolOZo3u-_2OLNrWdWS-M1wSmRsyfXAqcDNkNNosyAiLWq6VD2A5TpfJxGn7JzhPPg0KR-nQojWKAGXm-UglU1lmGYkUXiarHCWPjbLRaEwNR-1F2rIT5inLqYQKAwxOoJdvcjwFwjlmAaf2lblm2mRSaMtbEBXzaKC1fwb9aj3Wr02FjHW7FOd_D1_AXrUndWaWXkKveCvxykJ7oa7rPf0EiMWkAw |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3JTsMwEB2VcgAuLC1ixweOpM1ixzHXNKhAW1VqkXqrvEwkhEgRpBe-HmehBcSBW2QpimM7em8m780AXDGuPGk_aEegZDZAoamjgkg5VGhqDNUoKpXvKOw_0vsZmzXgeuWFQcRSfIad4rL8l28WelmkyrrC8l_Owg3YZJRSVrm11i7IKKS1gstzRTeOkzih3B5IGwX6bqe--UcXlRJEbndh-PX4Sjvy3FnmqqM_flVm_O_89qC9tuuR8QqI9qGB2QHsfKs02IJk8mLPCCmaopNRpfx-vyGTunkdGa8tl0RmhgwHTgFvhvR6iwnpYV4KtrI2TG-Tadx36g4KzpPvBrmjNLN4jSJAmXo-upKqNLWcRAovlUWWkkdG2Xg0cg1H7YXa8hPqKcuqhGIBBofQzBYZHgHhHNOAu_aVuabapFJoy1wQFfXcQGv_GFrFesxfqxoZ83opTv4evoSt_nQ4mA_uRg-nsF3sT5mndc-gmb8t8dwCfa4uyv39BFEvp1A |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=Conference+proceedings+-+Canadian+Conference+on+Electrical+and+Computer+Engineering&rft.atitle=Smart+Home+Networks%3A+Security+Perspective+and+ML-based+DDoS+Detection&rft.au=Al+Mtawa%2C+Yaser&rft.au=Singh%2C+Harsimranjit&rft.au=Haque%2C+Anwar&rft.au=Refaey%2C+Ahmed&rft.date=2020-08-30&rft.pub=IEEE&rft.eissn=2576-7046&rft.spage=1&rft.epage=8&rft_id=info:doi/10.1109%2FCCECE47787.2020.9255756&rft.externalDocID=9255756 |