About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Broadband Communications, Networks, and Systems. 14th EAI International Conference, BROADNETS 2024, Hyderabad, India, February 16–17, 2024, Proceedings, Part I

Research Article

Attack Detection in Smart Home IoT Networks: A Survey on Challenges, Methods and Analysis

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-81168-5_29,
        author={M. Vinay Kuma Rreddy and Amit Lathigara and Muthangi Kantha Reddy},
        title={Attack Detection in Smart Home IoT Networks: A Survey on Challenges, Methods and Analysis},
        proceedings={Broadband Communications, Networks, and Systems. 14th EAI International Conference, BROADNETS 2024, Hyderabad, India, February 16--17, 2024, Proceedings, Part I},
        proceedings_a={BROADNETS},
        year={2025},
        month={2},
        keywords={Smart Home IoT (Internet of Things) Attack Detection Machine Learning Anomaly Detection Cybersecurity Cyber attacks},
        doi={10.1007/978-3-031-81168-5_29}
    }
    
  • M. Vinay Kuma Rreddy
    Amit Lathigara
    Muthangi Kantha Reddy
    Year: 2025
    Attack Detection in Smart Home IoT Networks: A Survey on Challenges, Methods and Analysis
    BROADNETS
    Springer
    DOI: 10.1007/978-3-031-81168-5_29
M. Vinay Kuma Rreddy,*, Amit Lathigara1, Muthangi Kantha Reddy
  • 1: Computer Engineering
*Contact email: muthyalavinayreddy@gmail.com

Abstract

The ubiquity of Internet of Things (IoT) gadgets in smart homes has transformed our interactions with our living environments by providing never-before-seen levels of automation and convenience. However, because IoT devices are becoming possible targets for malicious attacks, this broad connectivity also poses serious security risks. Ensuring the privacy, safety, and integrity of smart home ecosystems requires prompt detection and mitigation of these threats. Data from IoT devices is gathered, pre-processed, feature engineered, labelled, and divided into training, validation, and testing sets as part of a machine learning method to threat detection in smart home IoT networks. The process of choosing and training appropriate machine learning models—which can include everything from classification techniques to anomaly detection algorithms—is crucial. Methods are surveyed to review different types of cyber-attacks, such as denial-of-service (DoS), distributed denial-of-service (DDoS), probing, user-to-root (U2R), remote-to-local (R2L), botnet attack, spoofing, and man-in-the-middle (MITM) attacks. To protect user information, data anonymization and encryption techniques are used with privacy considerations. Another strategy that has been put forth aims to improve the security of IoT networks in smart homes by providing a strong defence against new threats and equipping users with the information and resources they need to keep their connected world safe. To provide a full overview of the numerous advancements in this field, a list of all works published in the literature to date is incorporated. Lastly, the study also includes suggestions for future research directions.

Keywords
Smart Home IoT (Internet of Things) Attack Detection Machine Learning Anomaly Detection Cybersecurity Cyber attacks
Published
2025-02-07
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-81168-5_29
Copyright © 2024–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL