Title | From Internet of Threats to Internet of Things: A Cyber Security Architecture for Smart Homes |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Augusto-Gonzalez, J., Collen, A., Evangelatos, S., Anagnostopoulos, M., Spathoulas, G., Giannoutakis, K. M., Votis, K., Tzovaras, D., Genge, B., Gelenbe, E., Nijdam, N. A. |
Conference Name | 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) |
Date Published | sep |
Keywords | architectural layers, Computer architecture, Computer crime, computer network security, Cyber Attacks, cyber security architecture, cyber security services, disruptive software-enabled network security solutions, GHOST security framework, H2020 European research project GHOST, home automation, Internet of Things, IoT security, IoT smart home residents, IoT-based smart homes, Logic gates, multilayered architecture, Network Security Architecture, Personalised Real-time Risk Control, privacy, Protocols, pubcrawl, re-configurable solutions, reference architecture, Resiliency, Safe-Guarding Home IoT Environments, security challenges, smart home, Smart homes, transparent cyber security environment, user-centric cyber security, user-comprehensible solution |
Abstract | The H2020 European research project GHOST - Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control - aims to deploy a highly effective security framework for IoT smart home residents through a novel reference architecture for user-centric cyber security in smart homes providing an unobtrusive and user-comprehensible solution. The aforementioned security framework leads to a transparent cyber security environment by increasing the effectiveness of the existing cyber security services and enhancing system's self-defence through disruptive software-enabled network security solutions. In this paper, GHOST security framework for IoT-based smart homes is presented. It is aiming to address the security challenges posed by several types of attacks, such as network, device and software. The effective design of the overall multi-layered architecture is analysed, with particular emphasis given to the integration aspects through dynamic and re-configurable solutions and the features provided by each one of the architectural layers. Additionally, real-life trials and the associated use cases are described showcasing the competences and potential of the proposed framework. |
DOI | 10.1109/CAMAD.2019.8858493 |
Citation Key | augusto-gonzalez_internet_2019 |