Review Article
Internet of Things (IoT) of Smart Homes: Privacy and Security
Table 12
Proposed threat taxonomy.
| | Threat | Description |
| | Data privacy threats | (i) Unauthorized access | | (ii) Data breaches | | (iii) Data profiling |
| | Device security threats | (i) Physical tampering | | (ii) Firmware vulnerabilities | | (iii) Default credentials |
| | Network security threats | (i) Man-in-the-middle attacks | | (ii) Denial-of-service (DoS) attacks | | (iii) Network snooping |
| | Supply chain threats | (i) Counterfeit devices | | (ii) Supply chain attacks | | (iii) Third-party risks |
| | Interoperability and standards threats | (i) Protocol vulnerabilities | | (ii) Standards compliance | | (iii) Interoperability challenges |
| | Data integrity threats | (i) Data manipulation | | (ii) Replay attacks | | (iii) Integrity verification |
| | Physical security threats | (i) Location tracking | | (ii) Unauthorized control | | (iii) Physical destruction |
| | Privacy violations | (i) Surveillance | | (ii) Data collection | | (iii) Profiling and discrimination |
|
|