Both people and organization are widely accepting and adopting the functionalities offered by the smart home or smart building applications. This is due to the many advantages, in easing users’ every-day life and work, provided by the emerging Internet of Things (IoT) technologies and devices, equipped with sensors, cameras, or actuators, and able either to acquire information from the environment or to perform proper tasks. The main features of smart homes/buildings include real-time monitoring, remote control, safety from intruders, gas/fire alarm, and so on. Since within smart homes/buildings sensitive and private information are managed, security and privacy solutions must be put in place, in order to protect users/businesses’ data against violation attempts as well as to guarantee the provision of reliable services. To this end, rules, in the form of policies, associated to the smart home/building resources, must be defined and correctly enforced, by means of a robust framework for handling the huge amount of IoT data managed. In this paper, the effectiveness and potentialities of a strategy based on sticky policies, integrated into a security and privacy-aware IoT middleware, are demonstrated within a smart home scenario. A test-bed is developed using real data-sets in order to conduct analysis on the execution times, response times to detected attacks, and memory occupancy of the proposed approach.
Securing the Smart Home: a real case study
Sabrina Sicari
;Alessandra Rizzardi;Alberto Coen-Porisini
2018-01-01
Abstract
Both people and organization are widely accepting and adopting the functionalities offered by the smart home or smart building applications. This is due to the many advantages, in easing users’ every-day life and work, provided by the emerging Internet of Things (IoT) technologies and devices, equipped with sensors, cameras, or actuators, and able either to acquire information from the environment or to perform proper tasks. The main features of smart homes/buildings include real-time monitoring, remote control, safety from intruders, gas/fire alarm, and so on. Since within smart homes/buildings sensitive and private information are managed, security and privacy solutions must be put in place, in order to protect users/businesses’ data against violation attempts as well as to guarantee the provision of reliable services. To this end, rules, in the form of policies, associated to the smart home/building resources, must be defined and correctly enforced, by means of a robust framework for handling the huge amount of IoT data managed. In this paper, the effectiveness and potentialities of a strategy based on sticky policies, integrated into a security and privacy-aware IoT middleware, are demonstrated within a smart home scenario. A test-bed is developed using real data-sets in order to conduct analysis on the execution times, response times to detected attacks, and memory occupancy of the proposed approach.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.