My topic is vulnerability of smart homes and smart cars.
I searched vulnerability smart homes and cars in the IEEE Xplore database, and filtered between 2016 and 2021. It came up with 8 results. The results did proved helpful results as they are all related to smart cars and homes. I would say that it is spot on, and its ether creating smart homes with ways of protecting the home or what are already in effect to protect them.
I would say i would need another search as there is only 8.
Dabran, I., Elmakias, O., Shmelkin, R., & Zusman, Y. (2018). An intelligent sound alam recognition system for smart cars and smart homes. NOMS 2018 – 2018 IEEE/IFIP Network Operations and Management Symposium. doi: 10.1109/NOMS.2018.8406181
With the alarm system for the car it will recognize the different alarms so it knows where to send the alert. So if someone is breaking into you car it can call the police. But there is ways that this can be trick if the person is able to hack into it they can bypass the alarm in all.
Goyal, D. & Tyagi, A. K. (2020). A Survey of Privacy Leakage and Security Vulnerabilities in the Internet of Things. 2020 5th International Conference on Communication and Electronics Systems (ICCES). doi: 10.1109/ICCES48766.2020.9137886
With all of the technology that is being produced now, it raises questions such as is personal information safe with these devices. With these devices how do we know if they are truly secure or is our information just being sold or stolen.
Hu, H., Lin, S., Wang, G., & Yang, L. (2020) A Case Study of the Security Vetting Process of Smart-home Assistant Applications. 2020 IEEE Security and Privacy Workshops (SPW). doi: 10.1109/SPW50608.2020.00029
There are now over 70,000 applications between Google and Amazon Alexa. There are 219 real-world Alexa endpoints that carry the vulnerability. With current security vetting it is not sufficient enough to detect and notify the developers. Many of the applications are for smart home and smart car.
Agrawal, S., Shakdher, A., & Yang, B. (2019). Security Vulnerabilities in Consumer IoT Applications. IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity). doi: 10.1109/BigDataSecurity-HPSC-IDS.2019.00012
The most vulnerable security flaws get defined by the Open Web Application Security Project, this also discovers a wide range of IoT apps that are in homes and could be susceptible to attacks.
Awwad, F., Garlin, I., Hasan, S.R., Mohammed, H., Odetola, T. A., & Stissi, S. (2019).(HIADIoT): Hardware Intrinsic Attack Detection in Internet of Things; Leveraging Power Profiling. IEEE 62nd International Midwest Symposium on Circuits and Systems (MWSCAS). doi: 10.1109/MWSCAS.2019.8885183
Most of everyone has an Internet of things with them or at there house. There are fridges that now are IoT. This means that there is even more devices that are vulnerable to someone. Then data points that are then provided to Random Forest Algorithm which correctly classifies 95.5% of the data point