Review Article
Internet of Things (IoT) of Smart Homes: Privacy and Security
Table 13
Proposed IoT layers with privacy and security challenges.
| | IoT layer | Privacy challenges | Security challenge |
| | Perception layer | (i) Unauthorized access | (i) Data collection | | (ii) Sensor spoofing | (ii) User identification |
| | Network layer | (i) Data leakage | (i) Man-in-the-middle attacks | | (ii) Traffic analysis | (ii) Denial-of-service (DoS) attacks |
| | Middleware layer | (i) Data aggregation | (i) Middleware vulnerabilities | | (ii) Data retention | (ii) Insider threats |
| | Application layer | (i) User profiling | (i) Insecure interfaces | | (ii) Third-party data sharing | (ii) Application vulnerabilities |
| | Business layer | (i) Data monetization | (i) Supply chain risks | | (ii) Regulatory compliance | (ii) Insider threats |
|
|