Review Article

Internet of Things (IoT) of Smart Homes: Privacy and Security

Table 12

Proposed threat taxonomy.

ThreatDescription

Data privacy threats(i) Unauthorized access
(ii) Data breaches
(iii) Data profiling

Device security threats(i) Physical tampering
(ii) Firmware vulnerabilities
(iii) Default credentials

Network security threats(i) Man-in-the-middle attacks
(ii) Denial-of-service (DoS) attacks
(iii) Network snooping

Supply chain threats(i) Counterfeit devices
(ii) Supply chain attacks
(iii) Third-party risks

Interoperability and standards threats(i) Protocol vulnerabilities
(ii) Standards compliance
(iii) Interoperability challenges

Data integrity threats(i) Data manipulation
(ii) Replay attacks
(iii) Integrity verification

Physical security threats(i) Location tracking
(ii) Unauthorized control
(iii) Physical destruction

Privacy violations(i) Surveillance
(ii) Data collection
(iii) Profiling and discrimination