Cyber Security Challenges and Attacks and Countermeasures for IoT-Based Smart Home

Altaf Hussain, Amir Hussain, Shah Marjan, Mehmood Baryalai, Zubair Zaland, Abdul Wahid, Shumaila Hussain


The Internet of Things is a distributed network of things connected by sensors and RFID tags that exchange information. The internet of things can work without human assistance, which increases security challenges. The IoT infrastructure allows people to live in smart homes, and their businesses are growing thanks to smart cities, smart industries, and smart healthcare. The prevalence of sensitive data and infrastructure increases security concerns. IoT devices face a number of challenges in terms of security and privacy, including improper device updates. Additionally, there is a lack of robust security protocols, a lack of awareness among users, and an absence of monitoring. This paper focuses on IoT security and privacy measures identified as security and privacy issues in IoT networks. This research work also discusses the approaches used, security solutions implemented, as well as appropriate privacy models for all types of layers of IoT, Architecture, Cyber Security challenges, Security Policies, Privacy, and countermeasures.

Full Text:



Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT privacy and security: Challenges and solutions. Applied Sciences (Basel, Switzerland), 10(12), 4102.

A., M., & T., S. (2015). Internet of things: Architecture, security issues and countermeasures. International Journal of Computer Applications, 125(14), 1–4.

H. Ahmad, “Utilizing blockchain technology to enhance smart home security and privacy,” in International Conference on Information Technology

(Basel, Switzerland), 12(3), 1598

Mohamad Noor, M. B., & Hassan, W. H. (2019). Current research on Internet of Things (IoT) security: A survey. Computer Networks, 148, 283–294.

Alhalafi, N., & Veeraraghavan, P. (2019). Privacy and Security Challenges and Solutions in IOT: A review. IOP Conference Series. Earth and Environmental Science, 322(1), 012013.

Lin, H., & Bergmann, N. (2016). IoT privacy and security challenges for smart home environments. Information (Basel), 7(3), 44.

IoT security challenges and counters measures. (2019). International Journal of Recent Technology and Engineering, 8(3), 1519–1528.

Litoussi, M., Kannouf, N., El Makkaoui, K., Ezzati, A., & Fartitchou, M. (2020). IoT security: challenges and countermeasures. Procedia Computer Science, 177, 503–508.

Yousuf, T., Mahmoud, R., Aloul, F., & Zualkernan, I. (2015). Internet of things (IoT) security: Current status, challenges and countermeasures. International Journal for Information Security Research, 5(4), 608–616.

Siby, S., Maiti, R. R., & Tippenhauer, N. O. (2017). IoTScanner: Detecting privacy threats in IoT neighborhoods. Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security.

Leloglu, E. (2017). A review of security concerns in internet of things. Journal of Computer and Communications, 05(01), 121–136.

Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J. Netw. Comput. Appl. 2017, 88, 10–28.

Burhan, M., Rehman, R. A., Khan, B., & Kim, B.-S. (2018). IoT elements, layered architectures and security issues: A comprehensive survey. Sensors (Basel, Switzerland), 18(9).

Shapsough, S., Qatan, F., Aburukba, R., Aloul, F., & Al Ali, A. R. (2015). Smart grid cyber security: Challenges and solutions. 2015 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE).

Ahmad, W., Rasool, A., Javed, A. R., Baker, T., & Jalil, Z. (2021). Cyber security in IoT-based cloud computing: A comprehensive survey. Electronics, 11(1), 16.

Tan, S. F., & Samsudin, A. (2021). Recent technologies, security countermeasure and ongoing challenges of Industrial Internet of Things (IIoT): A survey. Sensors (Basel, Switzerland), 21(19), 6647.

[Millar, S. (2021). IoT Security Challenges and Mitigations: An Introduction. In arXiv [cs.CR].

Khanam, S., Ahmedy, I. B., Idna Idris, M. Y., Jaward, M. H., & Bin Md Sabri, A. Q. (2020). A survey of security challenges, attacks taxonomy and advanced countermeasures in the internet of things. IEEE Access: Practical Innovations, Open Solutions, 8, 219709–219743.

Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017). Cyber security threats to IoT applications and service domains. Wireless Personal Communications, 95(1), 169–185.

Hasan, N., Chamoli, A., & Alam, M. (2020). Privacy Challenges and Their Solutions in IoT. In Internet of Things (IoT) (pp. 219–231). Springer International Publishing.

Tabassum, I., Bazai, S. U., Zaland, Z., Marjan, S., Khan, M. Z., & Ghafoor, M. I. (2022). Cyber Security’s Silver Bullet-A Systematic Literature Review of AI-Powered Security. 2022 3rd International Informatics and Software Engineering Conference (IISEC), 1–7. IEEE.

Bazai, S. U., & Jang-Jaccard, J. (2019). SparkDA: RDD-based high-performance data anonymization technique for Spark platform. International Conference on Network and System Security, 646–662. Springer, Cham.

Bazai, S. U., Jang-Jaccard, J., & Zhang, X. (2017). A privacy preserving platform for MapReduce. International Conference on Applications and Techniques in Information Security, 88–99. Springer, Singapore.

Bazai, S. U., Jang-Jaccard, J., & Alavizadeh, H. (2021a). A novel hybrid approach for multi-dimensional data anonymization for apache spark. ACM Transactions on Privacy and Security, 25(1), 1–25.

Tareen, S., Bazai, S. U., Ullah, S., Ullah, R., Marjan, S., & Ghafoor, M. I. (2022). Phishing and Intrusion Attacks: An Overview of Classification Mechanisms. 2022 3rd International Informatics and Software Engineering Conference (IISEC), 1–5. IEEE.

Zaland, Z., Bazai, S. U., Marjan, S., & Ashraf, M. (2021). Three-Tier Password Security Algorithm for Online Databases. 2021 2nd International Informatics and Software Engineering Conference (IISEC), 1–6. IEEE.


Creative Commons License
Journal of Applied and Emerging Sciences by BUITEMS is licensed under a Creative Commons Attribution 4.0 International License.
Based on a work at
Permissions beyond the scope of this license may be available at

Contacts | Feedback
© 2002-2014 BUITEMS