Review Article
Internet of Things (IoT) of Smart Homes: Privacy and Security
Table 12
Proposed threat taxonomy.
| Threat | Description |
| Data privacy threats | (i) Unauthorized access | (ii) Data breaches | (iii) Data profiling |
| Device security threats | (i) Physical tampering | (ii) Firmware vulnerabilities | (iii) Default credentials |
| Network security threats | (i) Man-in-the-middle attacks | (ii) Denial-of-service (DoS) attacks | (iii) Network snooping |
| Supply chain threats | (i) Counterfeit devices | (ii) Supply chain attacks | (iii) Third-party risks |
| Interoperability and standards threats | (i) Protocol vulnerabilities | (ii) Standards compliance | (iii) Interoperability challenges |
| Data integrity threats | (i) Data manipulation | (ii) Replay attacks | (iii) Integrity verification |
| Physical security threats | (i) Location tracking | (ii) Unauthorized control | (iii) Physical destruction |
| Privacy violations | (i) Surveillance | (ii) Data collection | (iii) Profiling and discrimination |
|
|