• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE
CS Logo
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
CS Logo

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2025 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Research
  • Home
  • / ...
  • /Tech News
  • /Research

Security Implications of Permission Models in Smart-Home Application Frameworks

By Lori Cameron

By Lori Cameron on
May 2, 2017

hand holding secure phonehand holding secure phone

Gone are the days of simple smart-home tech—alarms, controlled lights, and garage door openers. Today, for example, smart homes are capable of saving you money by monitoring and adjusting your use of water, electricity, and gas. Also, cameras, sensors, and door locks allow for greater security.

However, smart-home programming frameworks have a vulnerability: their third-party permission models. Unless the models are secure, hackers can manipulate smart devices, causing users great physical, financial, and psychological harm.

Researchers have studied and analyzed the permission models of four popular frameworks: IoTivity, HomeKit, AllJoyn, and SmartThings.

Read "Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?" (Login may be required for full text.)


About Lori Cameron

Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. Contact her at l.cameron@computer.org. Follow her on LinkedIn.

LATEST NEWS
Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech
Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech
Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students
Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students
Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights
Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights
CS Juniors: ChiTech Discovery Days
CS Juniors: ChiTech Discovery Days
CV Template
CV Template
Read Next

Quantum Insider Session Series: Choosing the Right Time and Steps for Start Working with Quantum Tech

Igniting Young Minds: The Impact of IEEE CS Juniors STEMpire on Karnataka, Indian Students

Monitoring LLM Safety with BERTopic: Clustering Failure Modes for Actionable Insights

CS Juniors: ChiTech Discovery Days

CV Template

A History of Rendering the Future with Computer Graphics & Applications

AI Assisted Identity Threat Detection and Zero Trust Access Enforcement

Resume Template

FacebookTwitterLinkedInInstagramYoutube
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter