Automated Vulnerability Scanning and Prioritisation for Domestic IoT Devices/Smart Homes: A Theoretical Framework
| aut.relation.endpage | 466 | |
| aut.relation.issue | 2 | |
| aut.relation.journal | Electronics | |
| aut.relation.startpage | 466 | |
| aut.relation.volume | 15 | |
| dc.contributor.author | Rivas Bustos, Diego Fernando | |
| dc.contributor.author | Gutierrez, Jairo A | |
| dc.contributor.author | Rueda, Sandra J | |
| dc.date.accessioned | 2026-02-01T23:22:08Z | |
| dc.date.available | 2026-02-01T23:22:08Z | |
| dc.date.issued | 2026-01-21 | |
| dc.description.abstract | <jats:p>The expansion of Internet of Things (IoT) devices in domestic smart homes has created new conveniences but also significant security risks. Insecure firmware, weak authentication and weak encryption leave households exposed to privacy breaches, data leakage and systemic attacks. Although research has addressed several challenges, contributions remain fragmented and difficult for non-technical users to apply. This work addresses the following research question: How can a theoretical framework be developed to enable automated vulnerability scanning and prioritisation for non-technical users in domestic IoT environments? A Systematic Literature Review of 40 peer-reviewed studies, conducted under PRISMA 2020 guidelines, identified four structural gaps: dispersed vulnerability knowledge, fragmented scanning approaches, over-reliance on technical severity in prioritisation and weak protocol standardisation. The paper introduces a four-module framework: a Vulnerability Knowledge Base, an Automated Scanning Engine, a Context-Aware Prioritisation Module and a Standardisation and Interoperability Layer. The framework advances knowledge by integrating previously siloed approaches into a layered and iterative artefact tailored to households. While limited to conceptual evaluation, the framework establishes a foundation for future work in prototype development, household usability studies and empirical validation. By addressing fragmented evidence with a coherent and adaptive design, the study contributes to both academic understanding and practical resilience, offering a pathway toward more secure and trustworthy domestic IoT ecosystems.</jats:p> | |
| dc.identifier.citation | Electronics, ISSN: 1450-5843 (Print); 2079-9292 (Online), MDPI AG, 15(2), 466-466. doi: 10.3390/electronics15020466 | |
| dc.identifier.doi | 10.3390/electronics15020466 | |
| dc.identifier.issn | 1450-5843 | |
| dc.identifier.issn | 2079-9292 | |
| dc.identifier.uri | http://hdl.handle.net/10292/20569 | |
| dc.language | en | |
| dc.publisher | MDPI AG | |
| dc.relation.uri | https://www.mdpi.com/2079-9292/15/2/466 | |
| dc.rights | © 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. | |
| dc.rights.accessrights | OpenAccess | |
| dc.subject | 40 Engineering | |
| dc.subject | 4009 Electronics, Sensors and Digital Hardware | |
| dc.subject | Clinical Research | |
| dc.subject | 0906 Electrical and Electronic Engineering | |
| dc.subject | 4009 Electronics, sensors and digital hardware | |
| dc.subject | domestic Internet of Things (IoT) | |
| dc.subject | smart home security | |
| dc.subject | automated vulnerability scanning | |
| dc.subject | vulnerability prioritisation | |
| dc.title | Automated Vulnerability Scanning and Prioritisation for Domestic IoT Devices/Smart Homes: A Theoretical Framework | |
| dc.type | Journal Article | |
| pubs.elements-id | 752780 |
