Implementing secure smart home using existing infrastructure

Main Article Content

Amit Banerjee
Mohd Sameen Chishti
Sunjay Kumar


The emergence of Internet of Things [IoT] paves the path of the smart home.  A smart home learns the habits of residents to make intelligent decision, which requires knowledge to be communicated and stored. The communication of generated data creates loop-hole in security and privacy of the user of smart home. Another challenging issue while designing a smart home is that legacy home appliances lack the smart connectivity. This paper focuses on designing a secure architecture to access smart home appliances, while using the existing home appliances that lacks networking and processing power like a bulb or fan. To ensure secure communication using internet, we are using third party authentication tool deployed in cloud. We have installed a gateway as the entry point to our smart home and connected all the appliances to it. The user is authenticated by authentication server and gets access to the services. For implementation purpose, we used Kerberos as authentication tool and DragonBoard as gateway.

Article Details

Original Research
Author Biographies

Amit Banerjee, South Asian University, New Delhi

Assistant Professor at the Department of Computer Science of South Asian University (New Delhi, India) He received a Ph.D. in Computer Science from National Tsing-Hua University (Taiwan, 2009). He has a Masters' degree (MCA) in 2002 and B.Sc. Mathematics (Hons.) in 1998 from Visva Bharati University (India). He worked for two years as an engineer with SoC Technology Center, Industrial Technology Research Institute [ITRI] (Taiwan). His research interests include Wireless Adhoc and Sensor Networks, P2p networks.

Mohd Sameen Chishti, South Asian University, New Delhi

Ph.D., student and research scholar at the Faculty of Mathematics and Computer Science of South Asian University (New Delhi, India). He obtained his masters’ degree (MCA) in 2010 from Jamia Millia Islamia

Sunjay Kumar, South Asian University, New Delhi

Researcher in programming languages, software engineering and computer communications (networks) at the Faculty of Mathematics and Computer Science of South Asian University (New Delhi, India)


Agosta, G., Antonini, A., Barenghi, A., Galeri, D., & Pelosi, G. (2015). Cyber-security analysis and evaluation for smart home management solutions. In 2015 International Carnahan Conference on Security Technology (ICCST).

Bugeja, J., Jacobsson, A., & Davidsson, P. (2016). On privacy and security challenges in smart connected homes. In 2016 European Intelligence And Security Informatics Conference (EISIC).

Chen, S., Liu, T., Gao, F., Ji, J., Xu, Z., & Qian, B. et al. (2017). Butler, not servant: A human-centric smart home energy management system. IEEE Communications Magazine, 55(2), 27-33.

Chitnis, S., Deshpande, N., & Shaligram, A. (2016). An investigative study for smart home security: Issues, challenges and countermeasures. Wireless Sensor Network, 8(4), 61-68.

European Union Agency for Network and Information Security [ENISA]. (2015). Security and resilience of smart home environments good practices and recommendations. Heraklion, Greece: ENISA.

Fernandes, E., Jung, J., & Prakash, A. (2016). Security analysis of emerging smart home applications. In 2016 IEEE Symposium on Security And Privacy (SP).

Ho, G., Leung, D., Mishra, P., Hosseini, A., Song, D., & Wagner, D. (2016). Smart locks. In Proceedings Of The 11Th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16.

Holzleitner, M., & Reichl, J. (2017). European provisions for cyber security in the smart grid – an overview of the NIS-directive. E&I, Elektrotechnik und Informationstechnik, 134(1), 14-18.

Hosek, J., Masek, P., Kovac, D., Ries, M., & Kröpfl, F. (2014). IP home gateway as universal multi-purpose enabler for smart home services. E&I, Elektrotechnik und Informationstechnik, 131(4-5), 123-128.

hue: Your personal wireless lighting system. (2017). Retrieved 12 July 2017, from

IT Services: Stanford WebAuth. (2017). Retrieved 13 July 2017, from

Jacobsson, A., Boldt, M., & Carlsson, B. (2016). A risk analysis of a smart home automation system. Future Generation Computer Systems, 56, 719-733.

Kerberos: The network authentication protocol. (2017). Retrieved from

Kubitza, T., Voit, A., Weber, D., & Schmidt, A. (2016). An IoT infrastructure for ubiquitous notifications in intelligent living environments. In Proceedings of The 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing Adjunct - Ubicomp '16.

SAML Single Sign-On Solutions - SAML SSO Identity Provider, SAML Service Provider. (2017). Retrieved from

Saurugg, H. & Pichlmayr, J. (2013). “Smart“, vernetzung und komplexität – ein plädoyer für einen kritischeren umgang mit dem thema vernetzung. E&I, Elektrotechnik Und Informationstechnik, 130(4-5), 103-108.

Wendzel, S. (2016). How to increase the security of smart buildings? Communications of the ACM, 59(5), 47-49.

Your home may be smart, but is it intelligent? It can be with IBM Watson IoT and cognitive computing. (2017). Retrieved from

Zhang, X., Adhikari, R., Pipattanasomporn, M., Kuzlu, M., & Rahman, S. (2016). Deploying IoT devices to make buildings smart: Performance evaluation and deployment experience. In 2016 IEEE 3Rd World Forum on Internet of Things (WF-IoT).