Review Article

Internet of Things (IoT) of Smart Homes: Privacy and Security

Table 13

Proposed IoT layers with privacy and security challenges.

IoT layerPrivacy challengesSecurity challenge

Perception layer(i) Unauthorized access(i) Data collection
(ii) Sensor spoofing(ii) User identification

Network layer(i) Data leakage(i) Man-in-the-middle attacks
(ii) Traffic analysis(ii) Denial-of-service (DoS) attacks

Middleware layer(i) Data aggregation(i) Middleware vulnerabilities
(ii) Data retention(ii) Insider threats

Application layer(i) User profiling(i) Insecure interfaces
(ii) Third-party data sharing(ii) Application vulnerabilities

Business layer(i) Data monetization(i) Supply chain risks
(ii) Regulatory compliance(ii) Insider threats