Review Article
Internet of Things (IoT) of Smart Homes: Privacy and Security
Table 13
Proposed IoT layers with privacy and security challenges.
| IoT layer | Privacy challenges | Security challenge |
| Perception layer | (i) Unauthorized access | (i) Data collection | (ii) Sensor spoofing | (ii) User identification |
| Network layer | (i) Data leakage | (i) Man-in-the-middle attacks | (ii) Traffic analysis | (ii) Denial-of-service (DoS) attacks |
| Middleware layer | (i) Data aggregation | (i) Middleware vulnerabilities | (ii) Data retention | (ii) Insider threats |
| Application layer | (i) User profiling | (i) Insecure interfaces | (ii) Third-party data sharing | (ii) Application vulnerabilities |
| Business layer | (i) Data monetization | (i) Supply chain risks | (ii) Regulatory compliance | (ii) Insider threats |
|
|