Paper
14 June 2023 Vulnerability analysis and protection of smart home gateway
Chenglong Zhou
Author Affiliations +
Proceedings Volume 12708, 3rd International Conference on Internet of Things and Smart City (IoTSC 2023); 127080X (2023) https://doi.org/10.1117/12.2683913
Event: 3rd International Conference on Internet of Things and Smart City (IoTSC 2023), 2023, Chongqing, China
Abstract
Driven by the development of new generation information technologies such as the Internet of things, mobile Internet and big data, the development of smart home has also made unprecedented progress. Especially since the Ministry of industry and information put forward the action plan for the development of "double Gigabit" network collaborative plan, the smart home has attracted the attention of the industry and promoted the maturity of terminal equipment. As an indispensable role in the smart home networking, the home gateway is responsible for information interaction, management control, wireless routing and other functions. Therefore, increasing its security in all aspects is the premise of protecting users' privacy information, ensuring family safety and providing more comprehensive services to users,the security of the home gateway is particularly important. The home network is the closest network to people's lives, and ensuring the security of the home gateway is the last line of defense to protect everyone's privacy. It is urgent to attach importance to and strengthen the research on gateway security.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Chenglong Zhou "Vulnerability analysis and protection of smart home gateway", Proc. SPIE 12708, 3rd International Conference on Internet of Things and Smart City (IoTSC 2023), 127080X (14 June 2023); https://doi.org/10.1117/12.2683913
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Internet of things

Internet

Manufacturing

Operating systems

RELATED CONTENT

Competition in the domain of wireless networks security
Proceedings of SPIE (April 20 2017)
Protecting sensitive data: lessons learned
Proceedings of SPIE (March 12 1996)
Honeynets
Proceedings of SPIE (February 21 2001)
Object-oriented framework for adaptation in a DFS
Proceedings of SPIE (June 25 2002)
Using OpenSSH to secure mobile LAN network traffic
Proceedings of SPIE (August 06 2002)

Back to Top