**2. Related works**

Security requirements for IoT application will be emphasized on the importance of formulated, implemented, and enforced security policies by their needs. Christof Paar et al. proposed described detailed analysis and method to be applicable for

#### *Analyses of Open Security Issues for Smart Home and Sensor Network Based on Internet… DOI: http://dx.doi.org/10.5772/intechopen.97851*

embedded security aspect concerning to IoT application. Regarding to traditional security solution, a lot of researcher and works have done and realized to provide embedded security system with small hardware resources such memory and low computation ability [5]. Jorge Granjal et al. surveyed and analyzed existing protocols and mechanisms for open research field. They analyzed that how existing approaches can be ensure fundamental security requirements and protect data in the field of IoT application. They also summarized the open challenges and strategies for the future work in this field [6]. Most security protocols which is used for network and internet security cannot be implemented with smart home systems related because they are low security complexity and vulnerable in smart home applications for the wireless sensor nodes. The major security issues for smart home systems are initial session key establishment between the wireless nodes and gateway or control box in smart home system. Yue Li proposed and analyzed a sort of lightweight key establishment protocol for home energy management systems. He presented an example of implementation and protocol in detail [7]. Kozlov et al. discussed about threats for privacy and security at a different architectural level of the smart home. They especially advertised to analyze privacy risk levels for privacy control mechanisms, methods, and energy aspects concerning to security, privacy, and trust. They are also evaluated an energy consumption in entire smart home infrastructure [8]. The security matters of information and network should be considered with representatives of properties such as identification, confidentiality, authentication, integrality and repudiation. In spite of a different requirement on Internet, IoT system will be applicable to the crucial and critical areas such as medical and health care, home, energy, intelligent transportation, smart factory and so on. Therefore, security needs in the IoT are more necessary and indispensable in availability and dependability. Generally speaking, the IoT can be divided into four layers [9]. The representative architecture and its configuration is described in **Figure 2** [10]. The structures of IoT are generally divided and classify into three layers. It consists of perception layer, application layer and network layer. Jeong Gi Lee et al. analyzed a current research and development trend. The main idea is that how integrated platform can be implemented with data security between different smart home nodes and devices. They implemented integration platform based on android to provide with simple development and scalability. It can be easy to access for authorized user. Smart home network based on related sensor products have a different ways of the data exchange. Its platform can be integrated easily and

**Figure 2.** *Basic architecture of IoT services.*

connected by heterogeneous network products and external transmission security processing for data communication. It can be supported to enable the integration of sensors [11]. Freddy K Santoso et al. proposed the implementation and design for IoT smart home system with embedded Wi-Fi system. It includes gateway to enable and activate secure communication between IoT sensor devices and control system. It allows user to control, access and configure related devices. It can be realized by smart phone and mobile devices to interface external communication and control devices [12]. Himanshu Gupta et al. presented a security framework for IoT applications using block chain technology and technique. It provided many unique characteristics such as better privacy, manageability, fault tolerance and scalability [13]. Musa G Samaila et al. proposed the IoT hardware platform security advisor. It provides three functionality features such as security requirement elicitation, security best practice guidelines. They also gave a guideline for lightweight cryptography design and implementation consideration. It includes a summary of the cryptographic algorithm [14]. Nikos Komninos et al. surveyed smart home security based on issues, challenges and countermeasures in smart grid application. They analyzed the most representative threats to smart grid environment and smart home system based on a lot of scenarios. They summarized a review of security countermeasures related to smart home as follows [15].


Abdullahi Arabo analyzed cyber security challenges with the connected home ecosystem. He presented related background, motivation, development and demand for inter-connecting of different devices. The smart phone or mobile agent is used to provide a variety of function and capability to users [16]. Md. Mahmud Hossain et al. analyzed a detailed analysis of IoT system. It includes threat models, security issues, challenges and many attack models [17]. They provided a sort of open problems and issues in IoT security and privacy problems. This makes researchers to guide and solve the most critical and open problems. Pranay P. Gaikwad et al. surveyed these applications based on smart homes systems using internet of things [18]. They presented the problems and challenges which is occurred in IoT and smart homes application based on IoT system. Some solutions they proposed overcome some problems and challenges. We summarized the recent and breakthrough works in the field of security problems and privacy issues related to smart home application. A more extensive and detailed of related works have been published [19]. Monammed Ali Al-Garadi et al. surveyed of machine and deep *Analyses of Open Security Issues for Smart Home and Sensor Network Based on Internet… DOI: http://dx.doi.org/10.5772/intechopen.97851*

learning (ML/DL) methods for IoT security. They also define thematic taxonomy of ML/DL for IoT security [20].
