Khan, M. A., Abbas, S., Rehman, A., Saeed, Y., Zeb, A.,
Uddin, M. I., Nasser, N., and Ali, A. (2020). A ma-
chine learning approach for blockchain-based smart
home networks security. IEEE Network, 35(3):223–
229.
Khanpara, P., Lavingia, K., Trivedi, R., Tanwar, S., Verma,
A., and Sharma, R. (2023). A context-aware internet
of things-driven security scheme for smart homes. Se-
curity and Privacy, 6(1):e269.
Kreuter, F., Haas, G.-C., Keusch, F., B
¨
ahr, S., and Trapp-
mann, M. (2020). Collecting survey and smartphone
sensor data with an app: Opportunities and challenges
around privacy and informed consent. Social Science
Computer Review, 38(5):533–549.
Leit
˜
ao, R. (2019). Anticipating smart home security and pri-
vacy threats with survivors of intimate partner abuse.
In Proceedings of the 2019 on designing interactive
systems conference, pages 527–539.
Li, L., Li, T., Cai, H., Zhang, J., and Wang, J. (2023). I
will only know after using it: The repeat purchasers of
smart home appliances and the privacy paradox prob-
lem. Computers & Security, 128:103156.
Lin, C., He, D., Kumar, N., Huang, X., Vijayakumar, P., and
Choo, K.-K. R. (2019). Homechain: A blockchain-
based secure mutual authentication system for smart
homes. IEEE Internet of Things Journal, 7(2):818–
829.
Lin, H. and Bergmann, N. W. (2016). Iot privacy and secu-
rity challenges for smart home environments. Infor-
mation, 7(3):44.
Liu, D., Wu, C., Yang, L., Zhao, X., and Sun, Q. (2022).
The development of privacy protection standards for
smart home. Wireless Communications and Mobile
Computing, 2022.
Liu, Y., Gan, Y., Song, Y., and Liu, J. (2021). What
influences the perceived trust of a voice-enabled
smart home system: An empirical study. Sensors,
21(6):2037.
Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J., and Ni,
W. (2020). Privysharing: A blockchain-based frame-
work for privacy-preserving and secure data sharing
in smart cities. Computers & Security, 88:101653.
Mohanty, S., Cormican, K., and Dhanapathi, C. (2022).
Analysis of critical success factors to mitigate pri-
vacy risks in iot devices. Procedia Computer Science,
196:191–198.
Musale, P. and Lee, A. J. (2023). Trust tee?: Exploring
the impact of trusted execution environments on smart
home privacy norms. Proceedings on Privacy En-
hancing Technologies, 3:5–23.
Musto, C., Narducci, F., Polignano, M., De Gemmis, M.,
Lops, P., and Semeraro, G. (2021). Myrrorbot: A dig-
ital assistant based on holistic user models for person-
alized access to online services. ACM Transactions on
Information Systems (TOIS), 39(4):1–34.
Nassiri Abrishamchi, M. A., Zainal, A., Ghaleb, F. A.,
Qasem, S. N., and Albarrak, A. M. (2022). Smart
home privacy protection methods against a passive
wireless snooping side-channel attack. Sensors,
22(21):8564.
Nemec Zlatolas, L., Feher, N., and H
¨
olbl, M. (2022). Secu-
rity perception of iot devices in smart homes. Journal
of Cybersecurity and Privacy, 2(1):65–73.
Ozmen, M. O., Song, R., Farrukh, H., and Celik, Z. B.
(2023). Evasion attacks and defenses on smart home
physical event verification. In 30th Annual Network
and Distributed System Security Symposium, NDSS
2023, San Diego, California, USA, February 27 -
March 3, 2023, pages 1–18. The Internet Society.
Pierce, J., Weizenegger, C., Nandi, P., Agarwal, I., Gram,
G., Hurrle, J., Liao, H., Lo, B., Park, A., Phan, A.,
et al. (2022). Addressing adjacent actor privacy: De-
signing for bystanders, co-users, and surveilled sub-
jects of smart home cameras. In Designing Interactive
Systems Conference, pages 26–40.
Poh, G. S., Gope, P., and Ning, J. (2019). Privhome:
Privacy-preserving authenticated communication in
smart home environment. IEEE Transactions on De-
pendable and Secure Computing, 18(3):1095–1107.
Qashlan, A., Nanda, P., He, X., and Mohanty, M. (2021).
Privacy-preserving mechanism in smart home using
blockchain. IEEE Access, 9:103651–103669.
Ramapatruni, S., Narayanan, S. N., Mittal, S., Joshi, A.,
and Joshi, K. (2019). Anomaly detection models for
smart home security. In 2019 IEEE 5th Intl Confer-
ence on Big Data Security on Cloud (BigDataSecu-
rity), IEEE Intl Conference on High Performance and
Smart Computing,(HPSC) and IEEE Intl Conference
on Intelligent Data and Security (IDS), pages 19–24.
IEEE.
Rios, R., Onieva, J. A., Roman, R., and Lopez, J. (2021).
Personal iot privacy control at the edge. IEEE Security
& Privacy, 20(1):23–32.
Saxena, U., Sodhi, J., and Singh, Y. (2020). An analysis of
ddos attacks in a smart home networks. In 2020 10th
International Conference on Cloud Computing, Data
Science & Engineering (Confluence), pages 272–276.
Schomakers, E.-M., Biermann, H., and Ziefle, M. (2020).
Understanding privacy and trust in smart home en-
vironments. In HCI for Cybersecurity, Privacy
and Trust: Second International Conference, HCI-
CPT 2020, Held as Part of the 22nd HCI Interna-
tional Conference, HCII 2020, Copenhagen, Den-
mark, July 19–24, 2020, Proceedings 22, pages 513–
532. Springer.
Schomakers, E.-M., Biermann, H., and Ziefle, M. (2021).
Users’ preferences for smart home automation–
investigating aspects of privacy and trust. Telematics
and Informatics, 64:101689.
Setayeshfar, O., Subramani, K., Yuan, X., Dey, R., Hong,
D., Lee, K. H., and Kim, I. K. (2021). Chatter-
hub: Privacy invasion via smart home hub. In 2021
IEEE International Conference on Smart Computing
(SMARTCOMP), pages 181–188.
Seymour, W., Cote, M., and Such, J. (2023). Legal obli-
gation and ethical best practice: Towards meaningful
verbal consent for voice assistants. In Proceedings
of the Conference on Human Factors in Computing
Systems CHI ’23, pages 1–16, New York, NY, USA.
Association for Computing Machinery.
Smart Home Privacy: A Scoping Review
641