UUM Repository | Universiti Utara Malaysian Institutional Repository
FAQs | Feedback | Search Tips | Sitemap

Smart home and legal safeguard against cyber threat: A review

Basarudin, Noor Ashikin and Yeon, Asmah Laili and Mohamed Yusoff, Zuryati and Md Dahlan, Nuarrual Hilal and Mahdzir, Nazli (2017) Smart home and legal safeguard against cyber threat: A review. In: Sintok International Conference on Social Science and Management (SICONSEM 2017), 4-5 December 2017, Adya Hotel, Langkawi Island, Kedah, Malaysia..

[img] PDF
Restricted to Registered users only

Download (241kB) | Request a copy


Purpose - Smart home concept development is still in its infancy, however, its advantages in users’ life have widely discussed all over the nation. Despite its role in preserving energy and environment (Reinisch et al., 2010), making life convenient and easier (Robles et al., 2010), for the safety and security purpose(Ding et al., 2011), as well as providing healthcare (Chan et al.,2008) to the inhabitants, being a connected house which relies fully on the internet connection is opened up to various threat in cyber aspect.Thus, this paper conducted a review of past literature regarding the trend of cyber threats that occur in a smart home concept and the methods of prevention that have been taken either approach in computer technology or in legal method. Methodology - This paper conducts a review on the information related to the concept of smart home and the issues revolving its susceptibility to cyber threat. Preliminary search was conducted using the search engines, google scholars and online journal database.The key term searched relevant to the topic includes ‘smart home technology system’, ‘smart home and cyber threat’, ‘smart grid attacks’, and ‘Internet of Things’. Finding of the searches were segmented according to the sub topic to be discussed thoroughly. Findings - Although there is no definite answer to what is exactly smart home should be, for the purpose of this study, author stick to the concept of a home whereby it should comprise of the digitally connected and controlled devices (Alam et al., 2012) within a house, equipped with sensors, actuators and cloud services that support automation (Aldrich, 2003), as well as control hubs to connect sensors and actuators from multiple entry points like touch pads, computer screens, telephones, and other wireless mobile devices, such as smartphones and tablets (Rodden & Benford, 2003). Smart home environment consist of internet-enabled gadget embedded in a house to share information between each other to allow the devices functioning process dubbed with Internet of Things (Tzezana, 2017). The Internet of Things as a method of today’s communication links the internet with sensors and devices to enable the connection of physical and virtual object through the exploitation of data communication (Atzori et al., 2010). Smart technology is viewed as a system or account susceptible to hack due to its open system that may expose to eavesdropping, Distributed Denial of Service (DDoS) attack, attack against authentication (Li et al., 2016), hacking activity, data stolen and data manipulation. Attack on the system will bring greater problem that leads to data intrusion and privacy issues. Thus, the interconnecting of various devices in smart home demand control of data from being manipulated, hacked or misused by hackers through the introduction of policies and regulations (Cho et al.,2015). Apart from imposing rules and regulations to curb the issues, review also will look into approach taken in technical ways to protect the system to minimize the potential attacks in the smart home system.

Item Type: Conference or Workshop Item (Paper)
Additional Information: eISBN 978-967-2064-65-7 Organized by: UUM PRESS Universiti Utara Malaysia
Uncontrolled Keywords: Smart home, cyber threat, legal safeguard.
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: School of Law
Depositing User: Mrs. Norazmilah Yaakub
Date Deposited: 30 Jul 2018 02:35
Last Modified: 30 Jul 2018 02:35
URI: http://repo.uum.edu.my/id/eprint/24547

Actions (login required)

View Item View Item