001_2022_IoT Security Review A Case Study of IIoT, IoV, and Smart Home
001_2022_IoT Security Review A Case Study of IIoT, IoV, and Smart Home
Review Article
IoT Security Review: A Case Study of IIoT, IoV, and Smart Home
Received 18 May 2022; Revised 17 July 2022; Accepted 25 July 2022; Published 21 August 2022
Copyright © 2022 Jinnan Ma et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
The Internet of Things (IoT) acts as a tremendous network that is constructed by fusing diverse sensors. IoT can achieve the
interconnection of individuals, things, and machines at any place and time and improve the function performance of network
applications. However, the security of IoT has always been a major problem that may limit the application perspective of IoT
technologies. Nowadays, industrial IOT (IIoT), Internet of vehicles (IoV), and smart home have become the three primary
emerging perspectives of the current IoT studies, and it is necessary to systematically highlight the security analysis of these
three types of scenarios. Hence, in this paper, guided by the three major IoT application scenarios, i.e., IIoT, IoV, and smart
home, we sum up the development status of IoT security technologies, analyzed corresponding technical difficulties, and
discussed several future outlook of challenges and development trends for the IoT technology.
direction of IIoT, IoV, and smart home. Therefore, this 2. The Security of IIoT
paper will systematically sort out the security issues in these
three fields, respectively. We briefly sum up the three aspects With the deep integration of industrialization and informa-
below. tization, the interconnection of production control systems
and production management systems within various enter-
1.1. The Security of IIoT. IIoT refers to the use of automated, prises is increasing nowadays, and the need to improve
interconnected sensors, devices, and machinery to drive product qualities and operational efficiencies by accessing
operational efficiencies at an industrial scale. Many IIoT- networks is stronger as well. As a result, IIoT was born that
related security issues can be traced back to a lack of basic acts as a relevant degree of integration of the Internet and
security protections, such as exposed ports, outdated soft- industrial systems, as well as advanced computing, analysis,
ware applications, and shallow authentication. These vulner- and sensing technologies. IIoT integrates industrial monitor-
abilities directly connect to the network and provide a ing systems, material transportation systems, industrial pro-
breach for a saboteur to gain easy access to the entire system. duction systems, consumer feedback information systems,
IIoT systems usually combine information technology with industrial management systems, etc. and guides industrial
operational technology which adds another layer of potential production and improves efficiency by means of the intelli-
threats [12, 13]. gent processing results of diverse data centers [13].
The continuous deepening of IIoT in manufacturing
1.2. The Security of IoV. IoV means the dynamic mobile applications means that the networked devices at the factory
communication system in which vehicles and roads, vehicles equipment layer will realize automatic communication and
and vehicles, vehicles and individuals, and vehicles and sens- will be closely connected with the market layer and factory
ing devices interact to achieve the communication between management. However, increasingly networked industrial
vehicles and public networks. At present, IoV has become a environments make industrial control systems, networked
significant application scenario of IoT and 5G networks devices, and industrial clouds more vulnerable to attackers,
[11]. For IoV, how to prevent vehicle information from being leading to threats such as plant downtime and operational
modified and ensure the security and IoV data sharing is a disruption. Therefore, modern smart factories urgently need
major topic in the development of intelligent driving technol- to take measures from the system, software, hardware, and
ogies. In light of the above analysis, ensuring the availability, other levels to handle increasingly complex industrial net-
reliability, real time, and comprehensiveness of data informa- work security threats [15]. In recent years, based on the fre-
tion has become a key study topic in this field [14]. quent occurrence of industrial IoT security incidents,
information and network security issues have become a
1.3. The Security of Smart Home. Smart home means the major obstacle to the promotion and application of IIoT [16].
comprehensive application of wireless network communica-
tion technologies and sensing technologies to furniture The architecture of IIoT is primarily separated into the
household appliances, and it is an important part of IoT perception layer, network layer, and application layer [16].
and smart home. Security issues act as a key factor hindering For the protection of perception layers, related information
the growth of the smart home industry as well [10]. Since can be prevented from being obtained at the source, which
smart home products collect a large amount of private data makes the IoT system secure at the source. At this stage,
from family members, many homeowners are worried about the security risks faced by IIoT mainly include network data
network security loopholes in connected smart home security threats, hardware equipment security risks, software
devices. Therefore, a safe, stable, and reliable smart home system vulnerability risks, and IoT’s own security risks
information security technology is the focus of existing [17–19]. This means to fundamentally break through the
researches. security bottleneck of IIoT is the primary challenge to the
In light of the above analysis, there are many types of adoption of IIoT. Moreover, the framework of this section
security researches in the IoT field, relevant problems are is shown in Figure 2.
complex, and there are relatively few systematic summaries
in this field [12]. Therefore, this paper focuses on the three 2.1. IIoT Hardware Security. The growing number of IoT
fields of IIoT, IoV, and smart home and focuses on IoT in devices has increased the area of system attacks, and these
various scenarios and security issues. devices often own vulnerabilities which are opaque to the
The arrangement of the paper is listed below: Section 2 user yet may be exploited. The hardware devices of IIoT
analyzes the security of IIoT, mainly including the applica- require multifaceted protection of the system back-end and
tion of hardware securities, data securities, and blockchain the device itself [20]. Enterprises often organize a hardware
technologies. Section 3 introduces the application of data device department and a back-end department to jointly
securities, blockchain technologies, and trust management solve the security problems of IIoT.
technologies in the security of IoV. Section 4 illustrates the The security risk of IIoT hardware equipment is the big-
application of network securities, system securities, and gest problem facing the device layer for the basic operation
blockchain technologies in the field of smart home. Conclu- of IIoT. This includes not only the growing number of new
sions and future research directions are summed up for equipment, but also the need to support older industrial
these three areas in the last section. Moreover, the overall control systems [21]. The continuous growth of devices has
framework of this paper is listed in Figure 1. greatly increased the risk of system intrusion. Some older
Wireless Communications and Mobile Computing 3
devices that have weak computing and storage capabilities 2.3. Blockchain Technology-Based IIoT Security. It is noticed
are easy to be attacked [22]. Moreover, some of the relevant that classical security technologies are not suitable for IoT
literature is summarized as follows; please see Table 1. since topology and resource constraints of IoT. Blockchain
owns the feature of data traceability, decentralization, pro-
2.2. IIoT Data Security. From the beginning, IIoT owns the grammability, security, and trustworthiness and can provide
characteristics of high interconnectivity, huge network new ideas for IoT security issues. The blockchain likes a
scales, and higher risks than IoT. One of the biggest issues database ledger, which can depict all transaction records,
of IoT is to ensure the security of network, data, and devices. and the characteristics of completely saving all transaction
Protecting IIoT is a multifaceted work, and its security needs records make it impossible for anyone to cheat. Simply
to be considered in all aspects [24]. put, the blockchain is a machine that creates trust, a safe
A complete IIoT system has tens of thousands of “data and credible machine [28], which allows people who do
nodes.” Once a node is breached and infiltrated, the damage not trust each other to exchange information safely without
will spread through the node network at a high speed, which the coordination of an authoritative intermediate institution.
will have a big influence on the entire system. As of today, The blockchain system network is a classical P2P net-
the IIoT field is full of risks from the perspective of informa- work with distributed heterogeneous features, whereas IIoT
tion securities. Hackers often attack IIoT applications also has distributed characteristics. IIoT realizes information
through system vulnerabilities to destroy the system or steal exchange by applying technologies such as intelligent per-
data [25]. Therefore, from the perspective of IIoT and indus- ception and identification technology [26] and also meets
trial big data security issues, it is crucial to protect the net- operation requirements and the deployment of blockchain
work from the device layer where the data is generated. systems. The network features of the two ones determine
Data protection is a concern of the entire organization, and that the IIoT can take the merits of the advantages of block-
the more complex the network, the greater the need for data chain techniques to solve the pain points of IIoT.
protection [26]. All in all, IIoT data security requires Due to the integration of multiple systems, multiple plat-
changes big and small to ensure that networks, systems, data, forms, and multiple devices, IIoT determines that it must
and devices are protected. Moreover, some of the relevant coordinate the use of a variety of different data transmission
literature is summarized as follows, as shown in Table 2. methods and transmission protocols and open-related ports.
4 Wireless Communications and Mobile Computing
At the same time, these factors make data vulnerable to Realize the network connection of people and vehicles and roads,
threats during transmission [29]. Blockchain technology and further realize the all-round network connection between
can provide a trusted, transparent, and secure communica- vehicles and vehicles and vehicles and service platforms. The
tion channel for IIoT, enabling secure communication information transmission network structure of IoV can be
between devices. Through the decentralized verification sys- divided into three layers from low to high, i.e., the perception
tem and consensus scheme of the blockchain, the interven- layer, the transmission layer, and the application layer.
tion of illegal nodes can be avoided, and the transmitted In recent years, the development of driverless cars and 5G
data is processed by rigorous cryptography. Thus, the data technologies has enriched new fields, and IoV has gradually
security is guaranteed. Moreover, some of the relevant liter- become the development trend of the automobile industry.
ature is summarized as follows; please see Table 3. Environmental feedback redefines people’s understanding of
traditional car travels. However, with the rapid development
2.4. Future Research Directions for IIoT. Nowadays, there are of smart cars, it also raises serious challenges to the security
still serious roadblocks from an IIoT security perspective. of the existing IoV [30]. Among them, network security and
With the massive development of IIoT devices, the volume data security have become important scenarios for the sustain-
of generated data will also continue to increase, and whether able growth of the IoV industry. With the continuous expan-
the data is in edge computing, data centers, or cloud plat- sion of the commercial scale of IoV, if the transmission,
forms, all data needs to be kept safe. Therefore, in the con- collection, and use of relevant data are not effectively super-
text of the IIoT, there will need to be a greater focus on vised and regulated, and the data is allowed to flow in an
how to protect equipment, data, communication, and pro- orderly manner, a great data security risk will be formed,
cessing power far beyond the traditional confines of IT [28, and the personal information of vehicle users will be affected.
29]. With the in-depth research of blockchain technology, Therefore, the privacy protection constitutes a clear threat. At
the blockchain can be fully applied to IIoT in the future. the same time, the traditional centralized vehicle networking
model and its reliance on third-party trust authority led to
some security problems in the vehicle networking. If the cen-
3. The Security of IoV tralized authority fails, the whole system may not work prop-
IoV technology acts as an exploration of IoT. The concept of erly, reducing the availability of the system. Moreover, the
IoV originated from the combination of VANET and IoT to framework of this section is shown in Figure 3.
improve the safety of road users and reduce the number of
accidents. IoV integrates a brand-new generation of infor- 3.1. IoV Data Security. IoV is an important field of deep inte-
mation with communication technologies and takes the gration of informatization and industrialization. With the
moving vehicle as the information perception object [14]. growth of intelligent IoT technologies, the risks of IoV and
Wireless Communications and Mobile Computing 5
data security have also become increasingly prominent. data security of IoV are of great significance to enhance
Whereas rapidly developing IoV technology, the United the security of IoV. However, the blockchain-based IoV
States and Europe attach great importance to the network security technology still faces many challenges when
security management, protection system construction, data showing its vitality. The inefficient block generation mech-
security, and privacy protection of the IoV life cycle [30]. anism leads to high transaction data processing latency,
In the process of using smart cars, from data collection the massive IoV data puts pressure on the storage space
to transmission, to processing and use, there are network of blockchain nodes and the security risks of blockchain
security and data security risks in the entire life cycle. Sup- itself, the underlying technology of different blockchains
pliers provide customized services to customers by collecting restricts the interconnection between multiple chains, the
information about vehicles and personnel. For instance, anonymity of user identity of blockchain hinders the
more and more manufacturers use the biometric technology tracking and tracing of network security events, and the
to collect data such as user’s driving habits and usage prefer- antitampering feature of blockchain increases the security
ences and use this data to mine and provide value-added ser- of IoV and the difficulty of content management, etc.,
vices. Therefore, the data security and network security of all urgently need to be addressed [35, 36]. Moreover,
IoV are also facing severe challenges. Once the database or some of the relevant literature is summarized as follows;
control system is hacked through the network connection, please see Table 5.
it may lead to serious consequences such as personal finger-
prints, iris, and other biometric information being stolen 3.3. Trust Management-Based IoV Security. Trust is a key
and driving routes and parameters being tampered with topic in IoV. Since the construction of IoV needs to simulta-
[31, 32]. Moreover, some of the relevant literature is summa- neously meet the large scale of data and the information sen-
rized as follows, as shown in Table 4. sitivity required by many services, it is a challenge to build a
reliable IoV system. Trust is multifaceted and may include
trust between users when automatically disseminating infor-
3.2. Blockchain-Based IoV Security. IoV technology requires mation and the trustworthiness of the IoT concept itself, etc.
secure and transparent systems. The blockchain owns the [37, 38] As IoT is decentralized, assessing its trustworthiness
feature of nontampering, decentralization, and traceability, is very challenging. Therefore, minimizing the ambiguity of
which can enhance the data privacy and security transpar- the service mode of IoV systems, clarifying the intention of
ency of entire systems. Thus, the development of blockchain information use, legally binding suppliers, and adopting
technologies can become an important boost to the data the concept of privacy by design can improve the privacy
security of IoV [33]. The nontamperable modification of security of users and promote establishment of the trust in
data by distributed storage of blockchain can permanently IoV [39].
store each group of vehicles with location and time data, In existing privacy researches based on IoV, most of them
data related to the vehicle itself, and the corresponding have adopted the ideas of blockchain technologies, federated
owner information data and the owner’s consumption learning, hybrid trust management, node credibility evalua-
habits, hobbies, and other information forever. Recorded in tion and differential privacy [40], virtual travel itineraries,
the blockchain, it can achieve the stabilization of automobile credibility and private information retrieval, etc. Moreover,
big data, solve the problems of vehicle data security and some of the relevant literature is summarized as follows, as
integrity [34], and improve the efficiency of collaborative shown in Table 6.
management between government regulatory authorities
and enterprises in the automotive industry. 3.4. The Future Research Direction of IoV. As there are enor-
The advantages of blockchain technologies and their mous personal information exchanges and information
applications to access control, communication security, and recipients in IoV, it is extremely difficult to whole network
6 Wireless Communications and Mobile Computing
security, data security, and privacy security in the IoV indus- nience, and use and improves the precision and digital intel-
try. Future research on blockchain-based IoV security technol- ligence of life technology services [41]. Bill Gates once said:
ogy should also focus on client-oriented fine-grainedness [36], “In the near future, a house without a smart home system
dynamic access control mechanisms, or cryptography-based will be like a house without Internet access today, which is
communication protocols, from blockchain-based secure data not in line with the trend.” Therefore, under the general
transmission. Conduct in-depth research on distributed key trend of IoT, the family era has come.
distribution of communication protocols, lightweight consen- However, high-level smart home security assistance is also
sus mechanism design, and blockchain-based car networking a decisive factor for the rapid development of the smart home
security architecture design. industry. Security issues in smart homes are usually not due to
external intrusions (such as hacking) leading to malfunctions
4. The Security of Smart Home or device damage (such as malicious activation of the heating
mode of the air conditioner in hot summer) [42]. From the
With the enhancement of people’s living standards, the con- application point of view, privacy leakage is the biggest secu-
cept of smart home has received more and more attention, rity risk of the smart home. Current researches mainly focus
and smart homes have gradually entered individuals’ lives. on improving privacy security from the perspectives of net-
The application of IoT in smart homes makes smart homes work, system, and data processing. Moreover, the framework
more convenient in terms of installation, operation, conve- of this section is shown in Figure 4.
Wireless Communications and Mobile Computing 7
The security of
smart home
4.1. Smart Home Network Security. Cybersecurity has software or hardware vulnerabilities to achieve. To solve this
become a realistic issue in the growth of smart services. problem, the smart home domain monitoring system uses
The smart home network system consists of three parts: ter- defensive programming, which monitors and checks whether
minal controller, IoT devices, and network [41]. The user the behavior of smart devices is safe and reasonable. In addi-
sends commands to IoT devices, such as smart home appli- tion, many experts and scholars study the development of
ances, through the network by downloading the correspond- smart access control systems, smart door and window secu-
ing client via using software and the Internet to achieve rity systems, gas leak detection, personnel location, remote
automatic control, remote control, and other functions [42]. video surveillance, and database systems [46]. Such systems
As long as the home system is connected to the Internet, have the merits of low power consumption, low cost, distrib-
hackers will be able to invade the smart home system, so as uted, and self-organization of wireless sensor networks,
to ensure the security of the smart home system first need to which can effectively improve the flexibility and reliability
ensure network security, and the network entrance to the of security systems. Moreover, some of the relevant literature
smart home is the home gateway. In reality, people often is summarized as follows; please see Table 8.
pay more attention to the stability of the gateway to access
the network, ignoring the security of the gateway, and the
4.3. Blockchain-Based Smart Home Security. Security issues
only device with gateway commonly used in the home at
are a key factor hindering the growth of the smart home
present is only the router. Therefore, in the process of smart
industry. As smart home products collect a large amount
home applications, the privacy protection of family and
of privacy data of family members, many users are worried
individuals should be the primary issue [43]. Due to the fact
about the situation of network security vulnerability of the
that before the emergence of smart homes, both furniture
connected smart home devices. Blockchain technology can
and home appliances are silent and unconnected, the privacy
provide a solution to the smart home security problem,
of residential families and individuals would not have condi-
which can make device identification and identity verifica-
tions and ways to be able to be accessed by third parties [41].
tion more effective and reduce the possibility of malicious
However with network connectivity, the smart home, a new
data tampering by others. The distributed network structure
type of system that can sense, network, store, compute, and
feature of blockchain can largely ensure that even if one or
execute, does make this possibility a reality.
more nodes are breached, the data of the overall network
In the application phase of smart home, the devices first
system is still safe and secure [48–50]. Meanwhile, the inte-
have to access the cloud server by accessing the Internet and
gration of blockchain distributed technology with the under-
protocols. The most important of them are wireless IoT pro-
lying hardware makes it easier to design a secure consensus
tocols, and the main ones are currently WiFi, Bluetooth, Zig-
algorithm protocol, which makes the overall blockchain net-
bee, Z-Wave, and NB-IoT. The design flaws and security
work operation more stable.
vulnerabilities of access protocols are also an important
Applying blockchain technology in the data transmis-
source of security threats to smart devices [42–44]. More
sion of smart home devices can make the user’s data and pri-
seriously, because time-to-market is one of the key factors
vacy more secure [49] and solve the security problem of
for a vendor’s profitability, the security design and testing
smart home to some extent. Moreover, some of the relevant
of devices by vendors is often far from adequate in order
literature is summarized as follows, as shown in Table 9.
to be able to get to market as soon as possible. Moreover,
some of the relevant literature is summarized as follows;
please see Table 7. 4.4. Future Directions of Smart Home. According to the secu-
rity analysis from the perspectives of network protocols, data
4.2. Smart Home Systems Security. Smart home security information, and platform systems in the smart home indus-
requires a series of cybersecurity protocols or bills at the try, the establishment of a unified standard system is the first
legal level but also needs measures at the technical level task if the smart home industry wants to get a good and sus-
[45]. Smart homes are installed and deployed to indoor tainable development [50]. At present, the security perfor-
spaces as projects/systems, so the core remains the security mance of smart home devices is still low, and the access
of the system. It is ideal to design a smart home system with data is still easy to be stolen or even tempered with. There-
a reliable security policy and a well-defined system security fore, device access control and protection of personal privacy
and authentication process. data should also be considered in the future. Meanwhile, the
The connection of the network may expose the device capacity and processing speed of blockchain also need to be
to attackers inside or outside the network who can exploit gradually improved so as to realize the extensive application
8 Wireless Communications and Mobile Computing
of blockchain technology in the area of smart home securi- the future. Finally, as IoT security research is the frontier
ties [51]. of research direction in the field of IoT, more researchers
are needed to conduct in-depth research in order to better
exploit the value of IoT and in turn serve society [53, 54].
5. Conclusions and Future Works
The promotion of IoT technologies needs to address plenty Data Availability
of related security issues and the large number of scenarios
of IoT applications as well as the low generalization ability The data used to support the findings of this study are
of security issues among scenarios which leads to the diffi- included within the article.
culty in the wide application of IoT technologies [50, 51].
Based on the security of IoT applications, researchers have Conflicts of Interest
actively started to explore this area and promote the rapid
development of this field. In this work, we explore the secu- The authors declare no conflicts of interest.
rity technologies for a total of three popular areas of IoT, i.e.,
IIoT, IoV, and smart home, and analyze them in the direc- Acknowledgments
tion of device security, data security, network security, and
system security. First, it is found that the application of This research was funded in part by the Shanxi Province Sci-
blockchain technology has become an effective way to entific and Technological Achievements Transformation
improve the security of IoT. Second, at the domain level, and Intellectual Property Transaction Service Platform
future research can also be done on coal, medical, and Operation Services; the Shanxi Province Digital Economy
defense industries [52]. At the technical level, machine Development Research Department; and the Information
learning, deep learning, cloud computing, and big data tech- Technology Application Innovation Provincial Technology
niques can be employed to further improve IoT security in Innovation Center.
Wireless Communications and Mobile Computing 9
[34] W. Hu, Y. Hu, W. Yao, and H. Li, “A blockchain-based byzan- [50] S. Arif, M. A. Khan, S. U. Rehman, M. A. Kabir, and M. Imran,
tine consensus algorithm for information authentication of the “Investigating smart home security: is blockchain the
Internet of vehicles,” IEEE Access, vol. 7, pp. 139703–139711, answer?,” IEEE Access, vol. 8, pp. 117802–117816, 2020.
2019. [51] C. Chang, S. N. Srirama, and R. Buyya, “Mobile cloud business
[35] Q. Zhang, Y. Li, R. Wang et al., “Blockchain-based asymmetric process management system for the internet of things: a sur-
group key agreement protocol for internet of vehicles,” Com- vey,” ACM Computing Surveys, vol. 49, no. 4, pp. 1–42, 2017.
puters and Electrical Engineering, vol. 86, article 106713, 2020. [52] Y. Zhao, M. Prabhu, and R. R. Ahmed, “Research trends and
[36] H. Wang, J. Gan, Y. Feng, Y. Li, and X. Fu, “A privacy performance of IIoT communication network-architectural
enhancement scheme based on blockchain and blind signature layers of petrochemical industry 4.0 for coping with circular
for Internet of vehicles,” International Conference on Block- economy,” Wireless Communications and Mobile Computing,
chain and Trustworthy Systems, vol. 1490, pp. 368–387, 2021. vol. 2021, Article ID 8822786, 32 pages, 2021.
[37] M. Cinque, C. Esposito, S. Russo, and O. Tamburis, “Block- [53] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi,
chain-empowered decentralised trust management for the “Internet of things for smart cities,” IEEE Internet of Things
Internet of Vehicles security,” Computers and Electrical Engi- Journal, vol. 1, no. 1, pp. 22–32, 2014.
neering, vol. 86, no. 12, article 106722, 2020. [54] D. Flores-Martin, J. Rojo, E. Moguel, J. Berrocal, and J. M.
[38] A. Haddaji, S. Ayed, and L. Chaari, “Federated learning with Murillo, “Smart nursing homes: self-management architecture
blockchain approach for trust management in IoV,” AINA based on IoT and machine learning for rural areas,” Wireless
2022: Advanced Information Networking and Applications, Communications and Mobile Computing, vol. 2021, Article
vol. 449, pp. 411–423, 2022. ID 8874988, 15 pages, 2021.
[39] M. Sohail, R. Ali, M. Kashif et al., “TrustWalker: an efficient
trust assessment in vehicular Internet of things (VIoT) with
security consideration,” Sensors, vol. 20, no. 14, p. 3945, 2020.
[40] A. Theodouli, K. Moschou, K. Votis, D. Tzovaras, J. Lauinger,
and S. Steinhorst, “Towards a blockchain-based identity and
trust management framework for the IoV ecosystem,” in
2020 Global Internet of Things Summit (GIoTS), pp. 1–6, Dub-
lin, Ireland, 2020.
[41] S. Marksteiner, V. J. Exposito Jimenez, H. Valiant, and
H. Zeiner, “An overview of wireless IoT protocol security in
the smart home domain,” in 2017 Internet of Things Business
Models, Users, and Networks, Copenhagen, Denmark, 2017.
[42] J. Bangali and A. Shaligram, “Design and implementation of
security systems for smart home based on GSM technology,”
International Journal of Smart Home, vol. 7, no. 6, pp. 201–
208, 2013.
[43] R. J. Robles and T. H. Kim, “A review on security in smart
home development,” International Journal of Advanced Sci-
ence and Technology, vol. 15, pp. 13–22, 2010.
[44] D. Kim and J. Lee, “Efficient and secure device clustering for
networked home domains,” IEEE Transactions on Consumer
Electronics, vol. 65, no. 2, pp. 224–232, 2019.
[45] N. Komninos, E. Philippou, and A. Pitsillides, “Survey in smart
grid and smart home security: issues, challenges and counter-
measures,” IEEE Communications Surveys and Tutorials,
vol. 16, no. 4, pp. 1933–1954, 2014.
[46] Y. Hu and T. Zhou, “The smart home security system based on
wireless sensor network,” Advanced Materials Research,
vol. 204-210, pp. 1490–1493, 2011.
[47] D. N. Kalofonos and S. Shakhshir, “Intuisec: a framework for
intuitive user interaction with smart home security using
mobile devices,” Massachusetts Institute of Technology,
vol. 555, no. 4, pp. 659–708, 2008.
[48] M. A. Khan, S. Abbas, A. Rehman et al., “A machine learning
approach for blockchain-based smart home networks secu-
rity,” IEEE Network, vol. 35, no. 3, pp. 223–229, 2021.
[49] M. Ammi, S. Alarabi, and E. Benkhelifa, “Customized
blockchain-based architecture for secure smart home for light-
weight IoT,” Information Processing and Management, vol. 58,
no. 3, article 102482, 2021.