Repository logo
 

Automated Vulnerability Scanning and Prioritisation for Domestic IoT Devices/Smart Homes: A Theoretical Framework

aut.relation.endpage466
aut.relation.issue2
aut.relation.journalElectronics
aut.relation.startpage466
aut.relation.volume15
dc.contributor.authorRivas Bustos, Diego Fernando
dc.contributor.authorGutierrez, Jairo A
dc.contributor.authorRueda, Sandra J
dc.date.accessioned2026-02-01T23:22:08Z
dc.date.available2026-02-01T23:22:08Z
dc.date.issued2026-01-21
dc.description.abstract<jats:p>The expansion of Internet of Things (IoT) devices in domestic smart homes has created new conveniences but also significant security risks. Insecure firmware, weak authentication and weak encryption leave households exposed to privacy breaches, data leakage and systemic attacks. Although research has addressed several challenges, contributions remain fragmented and difficult for non-technical users to apply. This work addresses the following research question: How can a theoretical framework be developed to enable automated vulnerability scanning and prioritisation for non-technical users in domestic IoT environments? A Systematic Literature Review of 40 peer-reviewed studies, conducted under PRISMA 2020 guidelines, identified four structural gaps: dispersed vulnerability knowledge, fragmented scanning approaches, over-reliance on technical severity in prioritisation and weak protocol standardisation. The paper introduces a four-module framework: a Vulnerability Knowledge Base, an Automated Scanning Engine, a Context-Aware Prioritisation Module and a Standardisation and Interoperability Layer. The framework advances knowledge by integrating previously siloed approaches into a layered and iterative artefact tailored to households. While limited to conceptual evaluation, the framework establishes a foundation for future work in prototype development, household usability studies and empirical validation. By addressing fragmented evidence with a coherent and adaptive design, the study contributes to both academic understanding and practical resilience, offering a pathway toward more secure and trustworthy domestic IoT ecosystems.</jats:p>
dc.identifier.citationElectronics, ISSN: 1450-5843 (Print); 2079-9292 (Online), MDPI AG, 15(2), 466-466. doi: 10.3390/electronics15020466
dc.identifier.doi10.3390/electronics15020466
dc.identifier.issn1450-5843
dc.identifier.issn2079-9292
dc.identifier.urihttp://hdl.handle.net/10292/20569
dc.languageen
dc.publisherMDPI AG
dc.relation.urihttps://www.mdpi.com/2079-9292/15/2/466
dc.rights© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
dc.rights.accessrightsOpenAccess
dc.subject40 Engineering
dc.subject4009 Electronics, Sensors and Digital Hardware
dc.subjectClinical Research
dc.subject0906 Electrical and Electronic Engineering
dc.subject4009 Electronics, sensors and digital hardware
dc.subjectdomestic Internet of Things (IoT)
dc.subjectsmart home security
dc.subjectautomated vulnerability scanning
dc.subjectvulnerability prioritisation
dc.titleAutomated Vulnerability Scanning and Prioritisation for Domestic IoT Devices/Smart Homes: A Theoretical Framework
dc.typeJournal Article
pubs.elements-id752780

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
electronics-15-00466.pdf
Size:
2.78 MB
Format:
Adobe Portable Document Format
Description:
Journal article

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.37 KB
Format:
Plain Text
Description: