Проблеми безпеки в системах розумного дому

dc.citation.epage81
dc.citation.issue1
dc.citation.journalTitleКомп’ютерні системи проектування. Теорія і практика.
dc.citation.spage71
dc.citation.volume5
dc.contributor.affiliationНаціональний університет “Львівська політехніка”
dc.contributor.affiliationLviv Polytechnic National University
dc.contributor.authorГасюк, Юрій
dc.contributor.authorЙовбак, Андріанна
dc.contributor.authorМельник, Михайло
dc.contributor.authorВинарович, Роман
dc.contributor.authorПопович, Іван
dc.contributor.authorHasiuk, Yurii
dc.contributor.authorYovbak, Andrianna
dc.contributor.authorMelnyk, Mykhaylo
dc.contributor.authorVynarovych, Roman
dc.contributor.authorPopovych, Ivan
dc.coverage.placenameЛьвів
dc.coverage.placenameLviv
dc.date.accessioned2025-07-23T06:35:33Z
dc.date.created2023-02-28
dc.date.issued2023-02-28
dc.description.abstractУ статті здійснено дослідження вразливості протоколів передачі даних, які використовуються у системах керування "розумного будинку", з особливим акцентом на аналізі комунікаційних протоколів, що використовуються в цих системах. Поширення взаємопов'язаних пристроїв та Інтернету речей (IoT) призвело до зростання занепокоєння щодо конфіденційності даних, несанкціонованого доступу та потенційних кібератак. Проведений поглиблений аналіз різних комунікаційних протоколів, що використовуються в середовищі "розумного будинку", що дало змогу виявити їхні переваги та недоліків з точки зору безпеки. На основі проведеного аналізу надані рекомендації щодо вибору протоколів зв'язку, які відповідають принципам безпеки і конфіденційності в середовищі "розумного будинку".
dc.description.abstractThis paper investigates the vulnerability of data transmission protocols used in smart home control systems, focusing on analyzing the communication protocols used in these systems. The spread of interconnected devices and the Internet of Things (IoT) has led to growing concerns about data privacy, unauthorized access, and potential cyberattacks. An in-depth analysis of various communication protocols used in the smart home environment was conducted, which allowed us to identify their advantages and disadvantages from a security perspective. Based on the analysis, recommendations are made for selecting communication protocols that meet the principles of security and confidentiality in the “Smart Home” environment.
dc.format.extent71-81
dc.format.pages11
dc.identifier.citationПроблеми безпеки в системах розумного дому / Юрій Гасюк, Андріанна Йовбак, Михайло Мельник, Роман Винарович, Іван Попович // Комп’ютерні системи проектування. Теорія і практика. — Львів : Видавництво Львівської політехніки, 2023. — Том 5. — № 1. — С. 71–81.
dc.identifier.citationenSecurity problems in smart home systems / Yurii Hasiuk, Andrianna Yovbak, Mykhaylo Melnyk, Roman Vynarovych, Ivan Popovych // Computer Design Systems. Theory and Practice. — Lviv : Lviv Politechnic Publishing House, 2023. — Vol 5. — No 1. — P. 71–81.
dc.identifier.doidoi.org/10.23939/cds2023.01.071
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/111496
dc.language.isouk
dc.publisherВидавництво Львівської політехніки
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofКомп’ютерні системи проектування. Теорія і практика., 1 (5), 2023
dc.relation.ispartofComputer Design Systems. Theory and Practice, 1 (5), 2023
dc.relation.references1. S. Türkyılmaz and E. Altindag, “Analysis of Smart Home Systems in the Context of the Internet of Things in Terms of Consumer Experience,” EconJournals, vol. 12, no. 1, 2022. https://doi.org/10.32479/irmm.12709
dc.relation.references2. M. H. Kabir, and M. T. Ahmed, "IoT-based low-cost smart home automation and security system using wireless technology," Aust. J. Eng. Innov. Technol., vol. 5, no. 3, pp. 101–112, 2023. https://doi.org/10.34104/ajeit.023.01010112
dc.relation.references3.A. M. Yang, C. Zhang, Y. Chen, Y. Zhuansun, and H. Liu, "Security and Privacy of Smart Home Systems Based on the Internet of Things and Stereo Matching Algorithms," IEEE Internet Things J., vol. 7, no. 4, pp. 2521– 2530, 2020. https://doi.org/10.1109/JIOT.2019.2946214
dc.relation.references4. A. T. Kouanou, C. T. Tchapga, M. S. Ekonde, V. Monthe, B. A. Mezatio, J. Manga, G. R. Simo, and Y. Muhozam, "Securing Data in an Internet of Things Network Using Blockchain Technology: Smart Home Case," SN Comput. Sci., vol. 3, no. 2, p. 167, 2022. https://doi.org/10.1007/s42979-022-01065-5
dc.relation.references5. G. Goyal, P. Liu, and S. Sural, "Securing Smart Home IoT Systems with Attribute-Based Access Control," SAT-CPS@CODASPY, pp. 37–46, 2022. https://doi.org/10.1145/3510547.3517920
dc.relation.references6. K. Taghizad-Tavana, M. Ghanbari-Ghalehjoughi, N. Razzaghi-Asl, S. Nojavan, and A. Alizadeh, «An Overview of the Architecture of Home Energy Management System as Microgrids, Automation Systems, Communication Protocols, Security, and Cyber Challenges,» Sustainability, vol. 14, p. 15938, 2022. https://doi.org/10.3390/su142315938
dc.relation.references7. M. A. N. Abrishamchi, A. H. Abdullah, A. D. Cheok, and K. S. Bielawski, "Side channel attacks on smart home systems: A short overview," IECON, pp. 8144–8149, 2017. https://doi.org/10.1109/IECON.2017.8217429
dc.relation.references8. G. Kaur and K. S. Saini, "Securing Network Communication Between Motes Using Hierarchical Group Key Management Scheme Using Threshold Cryptography in Smart Home Using Internet of Things," in Computing and Network Sustainability, H. Vishwakarma and S. Akashe, Eds., vol. 12, Springer, Singapore, 2017. https://doi.org/10.1007/978-981-10-3935-5_21
dc.relation.references9. M. Mamdouh, A. I. Awad, H. F. A. Hamed, and A. A. M. Khalaf, "Outlook on Security and Privacy in IoHT: Key Challenges and Future Vision," AICV, pp. 721–730, 2020. https://doi.org/10.1007/978-3-030-44289-7_67
dc.relation.references10. Y. Wan, K. Xu, G. Xue, and F. Wang, «IoTArgos: A Multi-Layer Security Monitoring System for Internetof-Things in Smart Homes,» INFOCOM, pp. 874–883, 2020. https://doi.org/10.1109/INFOCOM41043.2020.9155424
dc.relation.references11. F. Hussain and M. Qi, "Integrated Privacy-Preserving Framework for Smart Home," ICNC-FSKD, pp. 1246– 1253, 2018. https://doi.org/10.1109/FSKD.2018.8687201
dc.relation.references12. S. J. Danbatta and A. Varol, «Comparison of Zigbee, Z-Wave, Wi-Fi, and Bluetooth Wireless Technologies Used in Home Automation,» ISDFS, pp. 1–5, 2019. https://doi.org/10.1109/ISDFS.2019.8757472
dc.relation.references13. M. Tahir, et al., "Wi-Fi Aided Home Energy Management System and AC Prediction through Temperature and Humidity Sensors," in Proc. 2022 Int. Conf. on Cyber Resilience (ICCR), Dubai, UAE, 2022, pp. 1-9, doi: 10.1109/ICCR56254.2022.9995822.
dc.relation.references14. S. Rohini and K. Venkatasubramanian, «Z-Wave based Zoning Sensor for Smart Thermostats,» Indian J. Sci. Technol., vol. 8, no. 20, Aug. 2015, doi: 10.17485/ijst/2015/v8i20/79081.
dc.relation.references15. Z. Zhao, K. Agbossou, and A. Cardenas, «Connectivity for Home Energy Management applications,» in Proc. 2016 IEEE PES Asia-Pacific Power and Energy Eng. Conf. (APPEEC), Xi’an, 2016, pp. 2175-2180, doi: 10.1109/APPEEC.2016.7779872.
dc.relation.references16. B. Mbarek, B. Buhnova, and T. Pitner, «SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems,» IWCMC, pp. 1373–1378, 2019.
dc.relation.references17. S. N. Khan, F. Loukil, C. Ghedira-Guegan, E. Benkhelifa, and A. Bani-Hani, «Blockchain smart contracts: Applications, challenges, and future trends,» Peer-to-Peer Networking and Applications, vol. 14, pp. 2901–2925, 2021. https://doi.org/10.1007/s12083-021-01127-0
dc.relation.references18. J. Xue, C. Xu, and Y. Zhang, «Private Blockchain-Based Secure Access Control for Smart Home Systems,» KSII Trans. Internet Inf. Syst., vol. 12, pp. 6057–6078, 2018, doi: 10.3837/tiis.2018.12.024.
dc.relation.references19. D. Mourtzis, J. Angelopoulos, and N. Panopoulos, "Smart Manufacturing and Tactile Internet Based on 5G in Industry 4.0: Challenges, Applications, and New Trends," Electronics, vol. 10, 2021, doi: 10.3390/electronics10243175.
dc.relation.references20. D. Shin, K. Yun, J. Kim, P. V. Astillo, J.-N. Kim, and I. You, "A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks," in IEEE Access, vol. 7, pp. 142531-142550, 2019, doi: 10.1109/ACCESS.2019.2943929
dc.relation.referencesen1. S. Türkyılmaz and E. Altindag, "Analysis of Smart Home Systems in the Context of the Internet of Things in Terms of Consumer Experience," EconJournals, vol. 12, no. 1, 2022. https://doi.org/10.32479/irmm.12709
dc.relation.referencesen2. M. H. Kabir, and M. T. Ahmed, "IoT-based low-cost smart home automation and security system using wireless technology," Aust. J. Eng. Innov. Technol., vol. 5, no. 3, pp. 101–112, 2023. https://doi.org/10.34104/ajeit.023.01010112
dc.relation.referencesen3.A. M. Yang, C. Zhang, Y. Chen, Y. Zhuansun, and H. Liu, "Security and Privacy of Smart Home Systems Based on the Internet of Things and Stereo Matching Algorithms," IEEE Internet Things J., vol. 7, no. 4, pp. 2521– 2530, 2020. https://doi.org/10.1109/JIOT.2019.2946214
dc.relation.referencesen4. A. T. Kouanou, C. T. Tchapga, M. S. Ekonde, V. Monthe, B. A. Mezatio, J. Manga, G. R. Simo, and Y. Muhozam, "Securing Data in an Internet of Things Network Using Blockchain Technology: Smart Home Case," SN Comput. Sci., vol. 3, no. 2, p. 167, 2022. https://doi.org/10.1007/s42979-022-01065-5
dc.relation.referencesen5. G. Goyal, P. Liu, and S. Sural, "Securing Smart Home IoT Systems with Attribute-Based Access Control," SAT-CPS@CODASPY, pp. 37–46, 2022. https://doi.org/10.1145/3510547.3517920
dc.relation.referencesen6. K. Taghizad-Tavana, M. Ghanbari-Ghalehjoughi, N. Razzaghi-Asl, S. Nojavan, and A. Alizadeh, "An Overview of the Architecture of Home Energy Management System as Microgrids, Automation Systems, Communication Protocols, Security, and Cyber Challenges," Sustainability, vol. 14, p. 15938, 2022. https://doi.org/10.3390/su142315938
dc.relation.referencesen7. M. A. N. Abrishamchi, A. H. Abdullah, A. D. Cheok, and K. S. Bielawski, "Side channel attacks on smart home systems: A short overview," IECON, pp. 8144–8149, 2017. https://doi.org/10.1109/IECON.2017.8217429
dc.relation.referencesen8. G. Kaur and K. S. Saini, "Securing Network Communication Between Motes Using Hierarchical Group Key Management Scheme Using Threshold Cryptography in Smart Home Using Internet of Things," in Computing and Network Sustainability, H. Vishwakarma and S. Akashe, Eds., vol. 12, Springer, Singapore, 2017. https://doi.org/10.1007/978-981-10-3935-5_21
dc.relation.referencesen9. M. Mamdouh, A. I. Awad, H. F. A. Hamed, and A. A. M. Khalaf, "Outlook on Security and Privacy in IoHT: Key Challenges and Future Vision," AICV, pp. 721–730, 2020. https://doi.org/10.1007/978-3-030-44289-7_67
dc.relation.referencesen10. Y. Wan, K. Xu, G. Xue, and F. Wang, "IoTArgos: A Multi-Layer Security Monitoring System for Internetof-Things in Smart Homes," INFOCOM, pp. 874–883, 2020. https://doi.org/10.1109/INFOCOM41043.2020.9155424
dc.relation.referencesen11. F. Hussain and M. Qi, "Integrated Privacy-Preserving Framework for Smart Home," ICNC-FSKD, pp. 1246– 1253, 2018. https://doi.org/10.1109/FSKD.2018.8687201
dc.relation.referencesen12. S. J. Danbatta and A. Varol, "Comparison of Zigbee, Z-Wave, Wi-Fi, and Bluetooth Wireless Technologies Used in Home Automation," ISDFS, pp. 1–5, 2019. https://doi.org/10.1109/ISDFS.2019.8757472
dc.relation.referencesen13. M. Tahir, et al., "Wi-Fi Aided Home Energy Management System and AC Prediction through Temperature and Humidity Sensors," in Proc. 2022 Int. Conf. on Cyber Resilience (ICCR), Dubai, UAE, 2022, pp. 1-9, doi: 10.1109/ICCR56254.2022.9995822.
dc.relation.referencesen14. S. Rohini and K. Venkatasubramanian, "Z-Wave based Zoning Sensor for Smart Thermostats," Indian J. Sci. Technol., vol. 8, no. 20, Aug. 2015, doi: 10.17485/ijst/2015/v8i20/79081.
dc.relation.referencesen15. Z. Zhao, K. Agbossou, and A. Cardenas, "Connectivity for Home Energy Management applications," in Proc. 2016 IEEE PES Asia-Pacific Power and Energy Eng. Conf. (APPEEC), Xi’an, 2016, pp. 2175-2180, doi: 10.1109/APPEEC.2016.7779872.
dc.relation.referencesen16. B. Mbarek, B. Buhnova, and T. Pitner, "SeMLAS: An Efficient Secure Multi-Level Authentication Scheme for IoT-Based Smart Home Systems," IWCMC, pp. 1373–1378, 2019.
dc.relation.referencesen17. S. N. Khan, F. Loukil, C. Ghedira-Guegan, E. Benkhelifa, and A. Bani-Hani, "Blockchain smart contracts: Applications, challenges, and future trends," Peer-to-Peer Networking and Applications, vol. 14, pp. 2901–2925, 2021. https://doi.org/10.1007/s12083-021-01127-0
dc.relation.referencesen18. J. Xue, C. Xu, and Y. Zhang, "Private Blockchain-Based Secure Access Control for Smart Home Systems," KSII Trans. Internet Inf. Syst., vol. 12, pp. 6057–6078, 2018, doi: 10.3837/tiis.2018.12.024.
dc.relation.referencesen19. D. Mourtzis, J. Angelopoulos, and N. Panopoulos, "Smart Manufacturing and Tactile Internet Based on 5G in Industry 4.0: Challenges, Applications, and New Trends," Electronics, vol. 10, 2021, doi: 10.3390/electronics10243175.
dc.relation.referencesen20. D. Shin, K. Yun, J. Kim, P. V. Astillo, J.-N. Kim, and I. You, "A Security Protocol for Route Optimization in DMM-Based Smart Home IoT Networks," in IEEE Access, vol. 7, pp. 142531-142550, 2019, doi: 10.1109/ACCESS.2019.2943929
dc.relation.urihttps://doi.org/10.32479/irmm.12709
dc.relation.urihttps://doi.org/10.34104/ajeit.023.01010112
dc.relation.urihttps://doi.org/10.1109/JIOT.2019.2946214
dc.relation.urihttps://doi.org/10.1007/s42979-022-01065-5
dc.relation.urihttps://doi.org/10.1145/3510547.3517920
dc.relation.urihttps://doi.org/10.3390/su142315938
dc.relation.urihttps://doi.org/10.1109/IECON.2017.8217429
dc.relation.urihttps://doi.org/10.1007/978-981-10-3935-5_21
dc.relation.urihttps://doi.org/10.1007/978-3-030-44289-7_67
dc.relation.urihttps://doi.org/10.1109/INFOCOM41043.2020.9155424
dc.relation.urihttps://doi.org/10.1109/FSKD.2018.8687201
dc.relation.urihttps://doi.org/10.1109/ISDFS.2019.8757472
dc.relation.urihttps://doi.org/10.1007/s12083-021-01127-0
dc.rights.holder© Національний університет “Львівська політехніка”, 2023
dc.rights.holder© Гасюк Ю., Йовбак А., Мельник М., Винарович Р., Попович І., 2023
dc.subjectсистеми “розумного будинку”
dc.subjectбезпека
dc.subjectуразливості
dc.subjectавтентифікація
dc.subjectшифрування
dc.subjectсегментація мережі
dc.subjectsmart home systems
dc.subjectsecurity
dc.subjectvulnerabilities
dc.subjectauthentication
dc.subjectencryption
dc.subjectnetwork
dc.titleПроблеми безпеки в системах розумного дому
dc.title.alternativeSecurity problems in smart home systems
dc.typeArticle

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
2023v5n1_Hasiuk_Y-Security_problems_in_smart_71-81.pdf
Size:
7.74 MB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
2023v5n1_Hasiuk_Y-Security_problems_in_smart_71-81__COVER.png
Size:
455.75 KB
Format:
Portable Network Graphics

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.94 KB
Format:
Plain Text
Description: