• IEEE.org
  • IEEE CS Standards
  • Career Center
  • About Us
  • Subscribe to Newsletter

0

IEEE-CS_LogoTM-orange
  • MEMBERSHIP
  • CONFERENCES
  • PUBLICATIONS
  • EDUCATION & CAREER
  • VOLUNTEER
  • ABOUT
  • Join Us
IEEE-CS_LogoTM-orange

0

IEEE Computer Society Logo
Sign up for our newsletter
IEEE COMPUTER SOCIETY
About UsBoard of GovernorsNewslettersPress RoomIEEE Support CenterContact Us
COMPUTING RESOURCES
Career CenterCourses & CertificationsWebinarsPodcastsTech NewsMembership
BUSINESS SOLUTIONS
Corporate PartnershipsConference Sponsorships & ExhibitsAdvertisingRecruitingDigital Library Institutional Subscriptions
DIGITAL LIBRARY
MagazinesJournalsConference ProceedingsVideo LibraryLibrarian Resources
COMMUNITY RESOURCES
GovernanceConference OrganizersAuthorsChaptersCommunities
POLICIES
PrivacyAccessibility StatementIEEE Nondiscrimination PolicyIEEE Ethics ReportingXML Sitemap

Copyright 2026 IEEE - All rights reserved. A public charity, IEEE is the world’s largest technical professional organization dedicated to advancing technology for the benefit of humanity.

  • Home
  • /Publications
  • /Tech News
  • /Research
  • Home
  • / ...
  • /Tech News
  • /Research

Security Implications of Permission Models in Smart-Home Application Frameworks

By Lori Cameron

By Lori Cameron on
May 2, 2017

hand holding secure phone

Gone are the days of simple smart-home tech—alarms, controlled lights, and garage door openers. Today, for example, smart homes are capable of saving you money by monitoring and adjusting your use of water, electricity, and gas. Also, cameras, sensors, and door locks allow for greater security.

However, smart-home programming frameworks have a vulnerability: their third-party permission models. Unless the models are secure, hackers can manipulate smart devices, causing users great physical, financial, and psychological harm.

Researchers have studied and analyzed the permission models of four popular frameworks: IoTivity, HomeKit, AllJoyn, and SmartThings.

Read "Nothing Comes for Free: How Much Usability Can You Sacrifice for Security?" (Login may be required for full text.)


About Lori Cameron

Lori Cameron is a Senior Writer for the IEEE Computer Society and currently writes regular features for Computer magazine, Computing Edge, and the Computing Now and Magazine Roundup websites. Contact her at l.cameron@computer.org. Follow her on LinkedIn.

LATEST NEWS
From Clicks to Conversations: How HCI Is Evolving in an AI-First World
From Clicks to Conversations: How HCI Is Evolving in an AI-First World
The AI Adoption Gap: Why Enterprise AI Fails After Deployment
The AI Adoption Gap: Why Enterprise AI Fails After Deployment
Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026
Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026
Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot
Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot
Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces
Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces
Get the latest news and technology trends for computing professionals with ComputingEdge
Sign up for our newsletter
Read Next

From Clicks to Conversations: How HCI Is Evolving in an AI-First World

The AI Adoption Gap: Why Enterprise AI Fails After Deployment

Inspiring Tomorrow’s Innovators: IEEE CS Juniors TechXperience Kenya 2026

Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot

Top HCI Trends in 2026: The Rise of AI Agents and Invisible Interfaces

From CMDB to Dynamic Digital Twins: Lessons Learned in Building Enterprise Digital Brains

An Evaluation of Autoencoder Architectures for Fraud Detection in Credit Card Transactions

Parallel Systems, Leadership, and Research Strategy in Computing: an Interview with Jean-Luc Gaudiot