Securing the Future: A Survey on Smart Home Security in IoT-Integrated Smart Cities
Advances in Networks,
Journal Year:
2025,
Volume and Issue:
12(1), P. 1 - 18
Published: March 21, 2025
The
rapid
growth
of
urbanization
and
technological
advancements
have
led
to
the
rise
smart
cities
homes,
where
Internet
Things
(IoT)
plays
a
pivotal
role.
Smart
homes
enhance
energy
efficiency,
security,
convenience
through
automated
systems
interconnected
devices.
This
survey
provides
comprehensive
review
home
architectures,
communication
technologies,
applications,
emphasizing
their
integration
within
city
infrastructures.
It
explores
key
components
such
as
sensors,
controllers,
cloud-based
platforms
that
enable
seamless
automation.
Additionally,
this
paper
discusses
major
challenges
in
including
privacy
risks,
cyber
threats,
interoperability
issues
among
IoT
Security
concerns
unauthorized
access,
data
breaches,
denial-of-service
attacks
are
analyzed,
alongside
strategies
mitigate
these
risks.
study
also
highlights
importance
secure
protocols,
authentication
mechanisms,
encryption
techniques
ensure
resilience
systems.
Furthermore,
examines
emerging
research
directions
technology,
AI-driven
automation,
energy-efficient
systems,
blockchain-based
security
solutions.
As
continue
evolve,
addressing
will
be
crucial
for
widespread
adoption.
aims
serve
valuable
resource
researchers,
developers,
policymakers
seeking
functionality
broader
framework
cities.
Language: Английский
A novel Primary Key infrastructure IoT enabled secure Access Control Framework Based smart home applications
VFAST Transactions on Software Engineering,
Journal Year:
2025,
Volume and Issue:
13(1), P. 37 - 48
Published: Jan. 30, 2025
This
paper
presents
a
comprehensive
security
framework
for
smart
home
environments,
integrating
advanced
authentication,
access
control
mechanisms,
and
machine
learning
robust
IoT
protection.
A
typical
ecosystem
is
illustrated
with
interconnected
devices—air
conditioning
systems,
robotic
assistants,
surveillance
cameras,
thermostats—linked
through
centralised
wireless
network
that
facilitates
seamless
communication
remote
via
the
internet.
The
emphasises
secure
authentication
authorisation
processes,
using
public
key
infrastructure
(PKI)
to
validate
devices
users
while
issuing,
renewing,
revoking
certificates
encrypted
communication.
mathematical
model
outlines
device
user
validation
functions,
mechanisms
ensure
operations.
Fine-grained
implemented
grant
permissions
based
on
specific
conditions,
ensuring
flexible
yet
resource
allocation.
Communication
maintained
encryption
decryption,
safeguarding
data
transmitted
across
networks.
To
mitigate
risks,
convolutional
neural
employed
anomaly
detection,
identifying
threats
by
recognising
deviations
in
regular
patterns.
Additionally,
addresses
interoperability
adhering
standard-compliance
protocols,
facilitating
integration
diverse
devices.
Resource
optimisation
techniques
are
introduced
maximise
efficiency
number
capabilities
of
network.
User
interaction
streamlined
an
intuitive
interface
supports
user-friendly
system
access.
proposed
SAC-PKI
algorithm
serves
as
foundation
framework,
detailing
sequential
steps
certificate
management,
control,
detection.
By
leveraging
adaptive
features
threat
this
provides
solution
enhancing
cybersecurity
deployments,
addressing
vulnerabilities,
efficient
utilisation
environments.
Language: Английский
Comprehensive Investigation of Security and Quality Metrics for Lightweight Double Arbiter PUF on FPGAs: Design and Analysis
Electronics,
Journal Year:
2025,
Volume and Issue:
14(8), P. 1510 - 1510
Published: April 9, 2025
Protecting
IoT
(Internet
of
Things)
devices
against
attacks
is
essential
due
to
the
rapid
increase
in
connected
devices.
This
particularly
challenging
for
lightweight
with
limited
hardware
capacity,
making
computationally
intensive
encryption
inefficient.
To
address
this
issue,
PUF-based
security
applications
can
enhance
while
reducing
resource
requirements.
The
PUF
must
meet
key
criteria
such
as
unclonability,
unpredictability,
and
uniqueness
throughout
its
operational
lifetime.
achieve
this,
it
important
minimize
unwanted
offsets
signal
propagation
delays
caused
by
unbalanced
design
strategies
ensure
that
responds
robustly
physical
influences.
paper
presents
development
an
extensive
investigation
a
novel
56-bit
2-4
Double
Arbiter
PUF.
Its
performance
evaluated
on
110
FPGAs
dataset
3
million
challenge–response
pairs
(CRPs)
under
temperature
variations
range
from
0
50
°C.
study
also
examines
identification
bit
positions
high
order
detect
eliminate
potential
weaknesses.
Furthermore,
we
extend
DAPUF
XOR
layer
create
XOR-DAPUF
improve
performance.
Our
results
demonstrate
robust
efficient
architecture.
optimized
delivers
outstanding
95.85%
reliability,
48.09%
randomness,
48.79%
uniqueness.
Language: Английский
Cybersecurity in Remote Work
Advances in computational intelligence and robotics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 227 - 240
Published: April 18, 2025
Through
remote
work,
business
operations
have
become
widespread,
providing
companies
with
the
capability
of
accessing
a
global
talent
base
and
flexibility
within
operations.
However,
this
shift
has
made
corporate
networks
vulnerable
as
employees
access
from
their
personal
devices,
unsecured
home
networks,
cloud
based
collaboration
tools.
Due
to
increase
attack
surface,
work
environments
are
becoming
more
susceptible
various
types
cyber
attacks,
such
phishing
ransomware,
insider
risks,
zero-day
exploits.
The
evolving
risks
no
longer
allow
traditional
security
models
designed
for
office
centralized
be
effective,
requiring
move
proactive
adaptive
cybersecurity
strategy.
This
chapter
explores
key
threatening
presented
by
specific
technological,
human,
regulatory
challenges
between
distributing
organizations
secures
workforces.
Language: Английский
AIoT-Enabled Smart Homes Solution to Security, Comfort, and Energy Efficiency
Anubha Anubha,
No information about this author
Daviender Narang,
No information about this author
Ankit Raj
No information about this author
et al.
Advances in computational intelligence and robotics book series,
Journal Year:
2025,
Volume and Issue:
unknown, P. 239 - 268
Published: May 8, 2025
Thanks
to
developments
in
Artificial
Intelligence
(AI)
and
the
Internet
of
Things
(IoT),
once-futuristic
idea
smart
houses
is
now
a
reality.
These
cutting-edge
technologies
are
transforming
regular
into
intelligent,
networked
spaces
that
improve
security,
comfort,
energy
efficiency.
including
AI
IoT,
automate
such
homes
control
various
systems
devices.
At
core
home
lie
their
capabilities
routine
tasks
like
adjusting
lighting
temperature
locking
doors
managing
security
cameras.
This
creates
an
ecosystem
adaptable
suit
requirements
preferences
its
occupants.
In
era
characterized
by
artificial
intelligence
almost
everything
automated
smart.
The
market
valued
at
$
79.16
billion
2022
expected
grow
CAGR
(Compound
Annual
Growth
Rate)
27.07%
from
2023
2030
(Grandview
Research
Report,
2024).
Accordingly,
present
chapter
aims
explore
potential
AIoT
automation.
Language: Английский
Seamless Security Optimizing Cybersecurity and Design in Smart Home Interiors
Mohammad Hasan Ansari
No information about this author
IGI Global eBooks,
Journal Year:
2025,
Volume and Issue:
unknown, P. 47 - 72
Published: April 11, 2025
This
section
investigates
the
security
protection
methods
which
interior
design
offers
against
IoT
device
threats
that
exist
in
smart
homes.
The
research
improvement
approaches
by
studying
literature
data
concentrates
on
position
alongside
material
selection
and
integration
processes.
chapter
suggests
designers
must
work
with
IT
engineers
cybersecurity
experts
collaborations
for
resolving
both
system
human
factor
risks.
rose
utilizes
home
technology
combination
principles
to
create
guidelines
securing
user-friendly
living
spaces
while
maintaining
aesthetic
value
adds
relevant
concepts
discussions.
Language: Английский
Event Prediction Using Spatial–Temporal Data for a Predictive Traffic Accident Approach Through Categorical Logic
Eleftheria Koutsaki,
No information about this author
G. E. Vardakis,
No information about this author
Nikos Papadakis
No information about this author
et al.
Data,
Journal Year:
2025,
Volume and Issue:
10(6), P. 85 - 85
Published: June 3, 2025
An
event
is
an
occurrence
that
takes
place
at
a
specific
time
and
location
can
be
either
weather-related
(snowfall),
social
(crime),
natural
(earthquake),
political
(political
unrest),
or
medical
(pandemic)
in
nature.
These
events
do
not
belong
to
the
“normal”
“usual”
spectrum
result
change
given
situation;
thus,
their
prediction
would
very
beneficial,
both
terms
of
timely
response
them
for
prevention,
example,
prevention
traffic
accidents.
However,
this
currently
challenging
researchers,
who
are
called
upon
manage
analyze
huge
volume
data
order
design
applications
predicting
using
artificial
intelligence
high
computing
power.
Although
significant
progress
has
been
made
area,
heterogeneity
input
forecasting
application
needs
process—in
nature
(spatial,
temporal,
semantic)—and
corresponding
complex
dependencies
between
constitute
greatest
challenge
researchers.
For
reason,
initial
process
situations,
number
characteristics,
while,
same
time,
having
possibility
respond
different
e.g.,
predicts
pandemic
also
predict
central
phenomenon,
simply
by
types.
In
work,
we
present
have
designed
date.
We
model
accidents
categorical
logic,
creating
Knowledge
Base
Resolution
algorithm
as
proof
concept.
study
all
possible
scenarios
arise
under
conditions.
Finally,
implement
accident
Prolog
language
with
Queries
JPL.
Language: Английский
Embedded IoT Design for Bioreactor Sensor Integration
Laurențiu Baicu,
No information about this author
Mihaela Andrei,
No information about this author
George Ifrim
No information about this author
et al.
Sensors,
Journal Year:
2024,
Volume and Issue:
24(20), P. 6587 - 6587
Published: Oct. 12, 2024
This
paper
proposes
an
embedded
Internet
of
Things
(IoT)
system
for
bioreactor
sensor
integration,
aimed
at
optimizing
temperature
and
turbidity
control
during
cell
cultivation.
Utilizing
ESP32
development
board,
the
makes
advances
on
previous
iterations
by
incorporating
superior
analog-to-digital
conversion
capabilities,
dual-core
processing,
integrated
Wi-Fi
Bluetooth
connectivity.
The
key
components
include
a
DS18B20
digital
sensor,
TS-300B
Peltier
module
regulation.
Through
real-time
monitoring
data
transmission
to
cloud
platforms,
facilitates
advanced
process
optimization.
experimental
results
yeast
cultures
demonstrate
system's
effectiveness
maintaining
optimal
growth,
highlighting
its
potential
enhance
bioprocessing
techniques.
proposed
solution
underscores
practical
applications
IoT
in
environments,
offering
insights
into
improved
efficiency
reliability
culture
cultivation
processes.
Language: Английский
A Comprehensive Approach to Protocols and Security in Internet of Things Technology
Journal of Computing Theories and Applications,
Journal Year:
2024,
Volume and Issue:
2(3), P. 324 - 341
Published: Dec. 24, 2024
The
exponential
growth
of
the
Internet
Things
(IoT)
introduces
a
multitude
security
challenges,
as
vast
number
connected
devices
often
operate
with
inadequate
protection
measures.
This
vulnerability
heightens
risk
cyberattacks,
data
breaches,
and
hacking,
exposing
systems
sensitive
information
to
increased
threats.
Ensuring
in
IoT
ecosystem
while
considering
this
rapidly
expanding
technology's
physical
limitations
specific
requirements
is
complex
task.
article
comprehensively
analyzes
primary
vulnerabilities
risks
associated
IoT,
exploring
innovative
strategies
effective
solutions
strengthen
its
framework.
highlights
critical
role
secure
device
authentication,
encryption,
regular
updates,
continuous
monitoring
by
addressing
intricacies
communication
protocols
emphasizing
need
for
standardization.
Ultimately,
work
advocates
holistic
approach
security,
where
robust,
adaptable
are
developed
safeguard
against
evolving
landscape
cyber
Language: Английский