To see the other types of publications on this topic, follow the link: Home computer security.

Journal articles on the topic 'Home computer security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Home computer security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Schmalz, Edward A. "Computer Security." Californian Journal of Health Promotion 3, no. 3 (September 1, 2005): 8–12. http://dx.doi.org/10.32398/cjhp.v3i3.643.

Full text
Abstract:
Security has become a matter of utmost importance since the aftermath of September 11th, especially in the area of computer systems. There are many options that a health educator can do as an individual to help secure the computer system at their worksite and in their home. This article is a brief overview of some of the precautions that should be taken on a daily basis to protect your computer systems, files, data, and other pertinent information.
APA, Harvard, Vancouver, ISO, and other styles
2

Denning, Tamara, Tadayoshi Kohno, and Henry M. Levy. "Computer security and the modern home." Communications of the ACM 56, no. 1 (January 2013): 94–103. http://dx.doi.org/10.1145/2398356.2398377.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thompson, Nik, Tanya Jane McGill, and Xuequn Wang. "“Security begins at home”: Determinants of home computer and mobile device security behavior." Computers & Security 70 (September 2017): 376–91. http://dx.doi.org/10.1016/j.cose.2017.07.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bethke, Barney. "Home Page Security Risks." EDPACS 24, no. 1 (July 1996): 14–17. http://dx.doi.org/10.1080/07366989609451723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rose, D. "Revolution in home security." Communications Engineer 1, no. 1 (February 1, 2003): 36–39. http://dx.doi.org/10.1049/ce:20030109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Meijia, Qiying Dong, Mai Zhou, Chenyu Wang, and Yangyang Liu. "Security Analysis on “Anonymous Authentication Scheme for Smart Home Environment with Provable Security”." Wireless Communications and Mobile Computing 2020 (November 14, 2020): 1–4. http://dx.doi.org/10.1155/2020/8838363.

Full text
Abstract:
As an important application of the Internet of Things, smart home has greatly facilitated our life. Since the communication channels of smart home are insecure and the transmitted data are usually sensitive, a secure and anonymous user authentication scheme is required. Numerous attempts have been taken to design such authentication schemes. Recently, Shuai et al. (Computer & Security 86(2019):132146) designed an anonymous authentication scheme for smart home using elliptic curve cryptography. They claimed that the proposed scheme is secure against various attacks and provides ideal attributes. However, we show that their scheme cannot resist inside attack and offline dictionary attack and also fails to achieve forward secrecy. Furthermore, we give some suggestions to enhance the security of the scheme. These suggestions also apply to other user authentication schemes with similar flaws.
APA, Harvard, Vancouver, ISO, and other styles
7

Letswamotse, Babedi B., Arun Cyril Jose, and Reza Malekian. "Improving smart home security; integrating behaviour prediction into smart home." International Journal of Sensor Networks 28, no. 4 (2018): 253. http://dx.doi.org/10.1504/ijsnet.2018.10017822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Junge, Yanhu Shan, and Kaiqi Huang. "ISEE Smart Home (ISH): Smart video analysis for home security." Neurocomputing 149 (February 2015): 752–66. http://dx.doi.org/10.1016/j.neucom.2014.08.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Geon Woo, Deok Gyu Lee, Jong Wook Han, and Sang Wook Kim. "Security policy specification for home network." International Journal of Ad Hoc and Ubiquitous Computing 4, no. 6 (2009): 372. http://dx.doi.org/10.1504/ijahuc.2009.028665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang Xinxin, and Zhao Jianlin. "Design of Wireless Intelligent Home Security System." International Journal of Digital Content Technology and its Applications 7, no. 6 (March 31, 2013): 282–89. http://dx.doi.org/10.4156/jdcta.vol7.issue6.32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Taiwo, Olutosin, and Absalom E. Ezugwu. "Internet of Things-Based Intelligent Smart Home Control System." Security and Communication Networks 2021 (September 23, 2021): 1–17. http://dx.doi.org/10.1155/2021/9928254.

Full text
Abstract:
The smart home is now an established area of interest and research that contributes to comfort in modern homes. With the Internet being an essential part of broad communication in modern life, IoT has allowed homes to go beyond building to interactive abodes. In many spheres of human life, the IoT has grown exponentially, including monitoring ecological factors, controlling the home and its appliances, and storing data generated by devices in the house in the cloud. Smart home includes multiple components, technologies, and devices that generate valuable data for predicting home and environment activities. This work presents the design and development of a ubiquitous, cloud-based intelligent home automation system. The system controls, monitors, and oversees the security of a home and its environment via an Android mobile application. One module controls and monitors electrical appliances and environmental factors, while another module oversees the home’s security by detecting motion and capturing images. Our work uses a camera to capture images of objects triggered by their motion being detected. To avoid false alarms, we used the concept of machine learning to differentiate between images of regular home occupants and those of an intruder. The support vector machine algorithm is proposed in this study to classify the features of the image captured and determine if it is that of a regular home occupant or an intruder before sending an alarm to the user. The design of the mobile application allows a graphical display of the activities in the house. Our work proves that machine learning algorithms can improve home automation system functionality and enhance home security. The work’s prototype was implemented using an ESP8266 board, an ESP32-CAM board, a 5 V four-channel relay module, and sensors.
APA, Harvard, Vancouver, ISO, and other styles
12

Mansfield-Devine, Steve. "Close to home: building in-house security expertise." Computer Fraud & Security 2019, no. 9 (September 2019): 16–19. http://dx.doi.org/10.1016/s1361-3723(19)30098-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Tak, Sungwoo, Sudhir Dixit, and E. K. Park. "An end-to-end home network security framework." Computer Communications 27, no. 5 (March 2004): 412–22. http://dx.doi.org/10.1016/j.comcom.2003.10.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Parwate, Abhijeet K. "IOT Home Automation over the Cloud." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 25, 2021): 2683–86. http://dx.doi.org/10.22214/ijraset.2021.35443.

Full text
Abstract:
Home automations give full management and versatile watching of home appliances for exaggerated comfort, economical energy use, prices saving, improved safety and security, and have driven the event of assorted sensible homes technologies. This paper presents the implementation of a home automation system utilizing the web of Things (iot) technology. This work tackles the issues of quality and incompatible standards inherent within the existing home automation solutions employing a strong distributed computing approach. During this project mobile phones, computer & web as device application for the appliances. Still as GAS outflow monitor on web. That is employed in any general automation via web. Todays in Republic of India ninety four population used smartphone, computer and web. Therefore here used web OF THINGS idea that physical hardware devices connected to the web and obtaining knowledge on web additionally management appliances from internet. This method will use any application for dominant and watching from or to web.
APA, Harvard, Vancouver, ISO, and other styles
15

Malarvizhi, C., V. Kalaipoonguzhali, and J. Anitha. "Microcontroller ATmega 328Pand GSM Based Advanced Home Security System." International Journal of Smart Home 11, no. 6 (June 30, 2017): 11–20. http://dx.doi.org/10.14257/ijsh.2017.11.6.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Pilgermann, Michael, Thomas Bocklisch, and Reiner Creutzburg. "Conception and implementation of a course for professional training and education in the field of IoT and smart home security." Electronic Imaging 2020, no. 3 (January 26, 2020): 277–1. http://dx.doi.org/10.2352/issn.2470-1173.2020.3.mobmu-276.

Full text
Abstract:
The aim of this paper is to describe the new concept of a Master level university course for computer science students to address the issues of IoT and Smart Home Security. This concept is well suited for professional training for interested customers and allows the creation of practical exercises. The modular structure of the course contains lectures and exercises on the following topics: 1. Introduction - IoT and Smart Home Technology and Impact 2. Homematic Technology and Smart Home Applications 3. Loxone Technology and Smart Home Applications 4. Raspberry Pi and Smart Home Applications 5. Security of IoT and Smart Home Systems and contains laboratory exercises of diverse complexities.
APA, Harvard, Vancouver, ISO, and other styles
17

Furnell, Steven, and Jayesh Navin Shah. "Home working and cyber security – an outbreak of unpreparedness?" Computer Fraud & Security 2020, no. 8 (August 2020): 6–12. http://dx.doi.org/10.1016/s1361-3723(20)30084-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Z. "Development of Security System for Smart Home Applications." Journal of Computer Science 8, no. 10 (October 1, 2012): 1627–34. http://dx.doi.org/10.3844/jcssp.2012.1627.1634.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Desnanjaya, I. Gusti Made Ngurah, and I. Nyoman Alit Arsana. "Home security monitoring system with IoT-based Raspberry Pi." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 3 (June 1, 2021): 1295. http://dx.doi.org/10.11591/ijeecs.v22.i3.pp1295-1302.

Full text
Abstract:
Home security monitoring system is a system that is able to monitor the house from unwanted events such as theft. Home monitoring systems can monitor and send users notices about the condition of their homes at the same time. Notifications sent in the form of pictures of the state of the room in the house, temperature conditions and gas density conditions. The home security monitoring system was created using Raspberry Pi as the control center of the system. It was connected with several sensors namely PIR sensor is used to detect objects that enter the room, raspicam is used to take pictures when the PIR sensor detects objects, temperature sensors and gas sensors are used to detect the state of temperature and gas concentration, and telegram is used as a liaison application to send notifications from Raspberry Pi to tool users. The final result of this research is to build a home security monitoring system with Raspberry Pi based on telegraph messenger. This system is able to monitor the security of the house from burglars or intruders, notify the temperature of the house and detect smoke or gas.
APA, Harvard, Vancouver, ISO, and other styles
20

Hu, Yu, and Tao Zhou. "The Smart Home Security System Based on Wireless Sensor Network." Advanced Materials Research 204-210 (February 2011): 1490–93. http://dx.doi.org/10.4028/www.scientific.net/amr.204-210.1490.

Full text
Abstract:
In the new trend of informatization and networking in development of household equipments, this paper designs a smart home security system based on Zigbee wireless sensor network technology and Internet technology. The smart home security system contains smart access control system, smart door and window burglarproof system, gas leakage detection, people positioning, remote video monitoring and database system development. The system takes the advantages of low power, low cost, distributed and self-organized owned by the wireless sensor network to improve flexibility and reliability of the security system. In addition, this paper also designs complete graphic user interfaces for upper computer server and client which are more user-friendly to do local and remote monitoring.
APA, Harvard, Vancouver, ISO, and other styles
21

Arif, Samrah, M. Arif Khan, Sabih Ur Rehman, Muhammad Ashad Kabir, and Muhammad Imran. "Investigating Smart Home Security: Is Blockchain the Answer?" IEEE Access 8 (2020): 117802–16. http://dx.doi.org/10.1109/access.2020.3004662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Hegde, Arpita Prakash. "Smart Security System Using Image Recognition." International Journal for Research in Applied Science and Engineering Technology 9, no. VII (July 20, 2021): 1936–39. http://dx.doi.org/10.22214/ijraset.2021.36758.

Full text
Abstract:
The Smart Security System using Image Recognition uses Deep Learning and Computer Vision approach.In real time it would help the home based security system to track the persons coming into the house and unlocking the door, hereby the system would be accessed by using the image recognition service in which the images are trained in different classes labeled with the names of the family members and not only them they can train the images of their relatives which provides the access to unlock their door. By using this model one can secure the home premises from the invaders and also capture the suspected people who are not authorized to move inside the house. By using “dlib one short learning”, all the faces for permission would be trained and the model is given to the security system where it can secure the premises with good accuracy through trained images.
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Jinxin, and Meng Wu. "Blockchain Use in IoT for Privacy-Preserving Anti-Pandemic Home Quarantine." Electronics 9, no. 10 (October 21, 2020): 1746. http://dx.doi.org/10.3390/electronics9101746.

Full text
Abstract:
The outbreak of the respiratory disease caused by the new coronavirus (COVID-19) has caused the world to face an existential health crisis. To contain the infectious disease, many countries have quarantined their citizens for several weeks to months and even suspended most economic activities. To track the movements of residents, the governments of many states have adopted various novel technologies. Connecting billions of sensors and devices over the Internet, the so-called Internet of Things (IoT), has been used for outbreak control. However, these technologies also pose serious privacy risks and security concerns with regards to data transmission and storage. In this paper, we propose a blockchain-based system to provide the secure management of home quarantine. The privacy and security attributes for various events are based on advanced cryptographic primitives. To demonstrate the application of the system, we provide a case study in an IoT system with a desktop computer, laptop, Raspberry Pi single-board computer, and the Ethereum smart contract platform. The obtained results prove its ability to satisfy security, efficiency, and low-cost requirements.
APA, Harvard, Vancouver, ISO, and other styles
24

Saxena, Utkarsh, J. S. Sodhi, and Rajneesh Tanwar. "Augmenting smart home network security using blockchain technology." International Journal of Electronic Security and Digital Forensics 12, no. 1 (2020): 99. http://dx.doi.org/10.1504/ijesdf.2020.10025326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Saxena, Utkarsh, J. S. Sodhi, and Rajneesh Tanwar. "Augmenting smart home network security using blockchain technology." International Journal of Electronic Security and Digital Forensics 12, no. 1 (2020): 99. http://dx.doi.org/10.1504/ijesdf.2020.103881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Alhasnawi, Bilal, and Basil Jasim. "Wireless Controlled Smart Home System." Iraqi Journal for Electrical and Electronic Engineering 13, no. 1 (June 1, 2017): 123–37. http://dx.doi.org/10.37917/ijeee.13.1.14.

Full text
Abstract:
In recent years popularity of smart Home has been increasing due to low price and simplicity through tablet and Smartphone connectivity. It is an automation of house or home activity. Raspberry Pi3 is a small computer with digital input output capability and it was introduced in 2016; input/output ability besides the availability of all computer features make this system very suitable to be central unit can for smart home. Smart Home may contain centralize controller which control heating, lightning, ventilation in the home, HAVC( Heating, Ventilation and air conditioning), Safety locks of gates, doors and other system to provide improve comfort, better energy efficiency and security. The aim of this Paper is to develop a smart home application using RPi3, wemose-d1 and GSM. Programming has been developed in C++ in wemose-d1 and Python environment for RPi3 operation. The MQTT (Message Queuing Telemetry Transport protocol) technologic used to connect between raspberry pi3 and nodes.
APA, Harvard, Vancouver, ISO, and other styles
27

Shuai, Mengxia, Nenghai Yu, Hongxia Wang, and Ling Xiong. "Anonymous authentication scheme for smart home environment with provable security." Computers & Security 86 (September 2019): 132–46. http://dx.doi.org/10.1016/j.cose.2019.06.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Sanjeev. "A Review of Security System for Smart Home Applications." Journal of Computer Science 8, no. 7 (July 1, 2012): 1165–70. http://dx.doi.org/10.3844/jcssp.2012.1165.1170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Barnett, Arnold, Robert Shumsky, Mark Hansen, Amedeo Odoni, and Geoffrey Gosling. "Safe At Home? An Experiment in Domestic Airline Security." Operations Research 49, no. 2 (April 2001): 181–95. http://dx.doi.org/10.1287/opre.49.2.181.13529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Anderson and Agarwal. "Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions." MIS Quarterly 34, no. 3 (2010): 613. http://dx.doi.org/10.2307/25750694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Chen, Dong Hong, Shuang Ke, Ji Quan Chen, and Xiai Chen. "Design of Intelligent Home Control System Based on a Variety of Network." Applied Mechanics and Materials 397-400 (September 2013): 1291–95. http://dx.doi.org/10.4028/www.scientific.net/amm.397-400.1291.

Full text
Abstract:
An intelligent home system controlled via GSM, GPRS and the Internet was developed to investigate the control system of intelligent home. The home environment including concentration of carbon dioxide, UV intensity, light intensity, smoke concentration, temperature and humidity were real-time transmitted to the host computer monitoring platform. The intelligent home system supports four different control methods with the remote control functions of household appliances, security locks of doors, lighting system and smart curtains realized through a variety of network.
APA, Harvard, Vancouver, ISO, and other styles
32

Sheela, D., and G. Mahadevan. "Mobile Agent Based Enhanced Security for Wireless Sensor Networks." International Journal of Business Data Communications and Networking 10, no. 2 (April 2014): 15–29. http://dx.doi.org/10.4018/ijbdcn.2014040102.

Full text
Abstract:
Wireless sensor networks (WSNs) have attracted a lot of researchers due to their high potential in critical applications. WSNs are currently being employed in a variety of applications ranging from medical to military, and from home to industry. WSNs have unique constraints as compared to traditional networks making the implementation of existing security measures not practicable. These constraints are the result of limitations regarding the sensor nodes' memory, energy and transmission and processing power. So, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Thus, design and implementation of secure WSNs is challenging task. Recently mobile agents have been proved as an enabled technology for programming WSN. This research work fundamentally focuses on producing a combined security solution which uses mobile agents. The proposed security solution using mobile agents is to provide basic security services and to defend against seven attacks such as Denial of Service attack, Hello flooding attack, Traffic analysis, Cloning attack, Sink hole attack, Black hole attack and Selective forwarding attack with the energy overhead of addressing a single attack.
APA, Harvard, Vancouver, ISO, and other styles
33

Mishra, Amitabh, Thomas Reichherzer, Ezhil Kalaimannan, Norman Wilde, and Ruben Ramirez. "Trade-offs involved in the choice of cloud service configurations when building secure, scalable, and efficient Internet-of-Things networks." International Journal of Distributed Sensor Networks 16, no. 2 (February 2020): 155014772090819. http://dx.doi.org/10.1177/1550147720908199.

Full text
Abstract:
This article focuses on results obtained from two cloud-based models that examine trade-offs between security, scalability, and efficiency of data collection for Internet-of-Things sensor networks. This work can provide insight for Internet-of-Things systems designers in choosing security controls and scalability features when working with cloud services. The results were obtained from a smart home Internet-of-Things prototype system in which data records from in-home sensors are transmitted wirelessly to an in-home hub, which forwards them to a cloud web service for storage and analysis. We consider different configurations and security controls on the wireless (in-home) and on the wired (home-to-web) sides. The configuration on the wireless side includes encrypted or plain-text transmission from the wireless sensors to the in-home hub for probing if software encryption of sensor data adds appreciable delay to the transmission time. The configuration on the wired side includes encryption or plain-text transmission, with or without authentication, with or without scalable cloud services. For each configuration, we measure end-to-end latency, transmission latency, and processing latency at the web service. Results of the experiments on the wired side showed much greater latencies and variability of latencies when using scalable cloud services.
APA, Harvard, Vancouver, ISO, and other styles
34

Tung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "A Web-Based Android Supervisory Control System." Applied Mechanics and Materials 284-287 (January 2013): 3211–15. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3211.

Full text
Abstract:
This paper designs a web-based Android supervisory control system. Android controller is used as a local controller to fit into a supervisory control framework. The framework includes a central server, a SMS device attached to the server, multiple local controllers, a remote control program and a ladder logic computer-aided design program. The Android controller contains an Android mobile phone, a Wi-Fi wireless access point, a switch hut (or NAT) and multiple data acquisition modules. The Android mobile phone enters TCP/IP LAN through the Wi-Fi access point. The data acquisition modules with TCP/IP interface are plugged into the LAN, and read/written by the Android mobile phone with Modbus TCP. The Android controller communicates with supervisory server with a specific m2m protocol which is based on http protocol. Once an Android controller is connected to the supervisory control framework, it can be monitored and controlled remotely with any browser. A web-based home security system is constructed to demonstrate the usage of the web-based Android supervisory control system. The control laws for the home security system are partially implemented with ladder logics designed with a computer-aided program in the framework. With a supervisory server serving multiple Android controllers, Cloud home security service is formed.
APA, Harvard, Vancouver, ISO, and other styles
35

Naoui, Sarra, Mohamed Elhoucine Elhdhili, and Leila Azouz Saidane. "Novel Enhanced LoRaWAN Framework for Smart Home Remote Control Security." Wireless Personal Communications 110, no. 4 (November 16, 2019): 2109–30. http://dx.doi.org/10.1007/s11277-019-06832-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Zhou, Yousheng, and Longan Wang. "A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity." Security and Communication Networks 2020 (June 28, 2020): 1–19. http://dx.doi.org/10.1155/2020/2637916.

Full text
Abstract:
In the ubiquitous networks, mobile nodes can obtain roaming service that enables them to get access to the services extended by their home networks in the field of foreign network. To provide secure and anonymous communication for legal mobile users in roaming services, there should be a mutual authentication between mobile user and foreign agent with the help of home agent. There are many roaming authentication schemes which have been proposed; however, with the progress of quantum computation, quantum attack poses security threats to many traditional public key cryptography-based authentication schemes; thus, antiquantum attack roaming authentication schemes need to be investigated. On account of the limitation of computational resources for mobile nodes, a lightweight anonymous and antiquantum authentication schemes need to be developed to enable mobile nodes to roam across multiple service domains securely and seamlessly. In consideration of the advantages of lattice in antiquantum, an NTRU-based authentication scheme with provable security and conditional privacy preservation is proposed to remedy these security weaknesses. Compared with the existing scheme, the proposed scheme not only improves efficiency but also can resist the quantum attack.
APA, Harvard, Vancouver, ISO, and other styles
37

Yang, Ye Fen, Jun Zhang, and Dong Hai Zeng. "The Design and Realization of Remote Voice Control System Based on the Intelligent Home." Applied Mechanics and Materials 530-531 (February 2014): 1112–18. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.1112.

Full text
Abstract:
A design program of remote voice control system is presented based on the intelligent home on Android mobile phone platform. Via the voice recognition of Android mobile phone, the intelligent home can have a remote voice control function by this program, which greatly improves the security requirements of the intelligent home. This system is tested and proved its real-time, effectiveness and stability. Meanwhile, it can also provide a practical reference solution for human-computer interaction, having a wide range of application.
APA, Harvard, Vancouver, ISO, and other styles
38

Ahmed, Mohammed Imtyaz, and G. Kannan. "Cloud-Based Remote RFID Authentication for Security of Smart Internet of Things Applications." Journal of Information & Knowledge Management 20, Supp01 (January 30, 2021): 2140004. http://dx.doi.org/10.1142/s0219649221400049.

Full text
Abstract:
Radio frequency is the technology which enables smart labels to things. Thus, even physical things can participate in computing process. It is becoming popular due to its technological innovation and ability to overcome line of sight problem. With Internet of Things (IoT) technology, RFID usage became ubiquitous in smart applications or IoT use the cases like smart education, smart homes, smart healthcare and smart cities to mention a few. Integration of digital and physical worlds is made possible with IoT, RFID and host of other technologies and standards. When connected devices and things are uniquely identified using RFID technology, it is essential to know its utility in authentication process and security challenges thrown as well. RFID tag and RFID reader are involved in wireless communication and identification. RFID tags may carry sensitive information and its vulnerabilities if any are exploited by adversaries. Moreover, heavy computation is involved in RFID-based authentication. To overcome issues like privacy, security and overhead improvements have been proposed as found in the literature. Researchers used cryptographic tools, hash functions and symmetric key encryption for secure RFID communications. However, the level of security is still inadequate. In this paper, we proposed a cloud-based remote RFID authentication scheme with smart home as the case study. The proposed scheme has features like forward secrecy, anonymity and untraceability besides being light weight. It can withstand various security attacks. Our simulation study revealed that the proposed system model and the cloud-based remote RFID authentication scheme are effective in providing privacy and security as part of access control system in smart home IoT use case.
APA, Harvard, Vancouver, ISO, and other styles
39

Çepik, Hilal, Ömer Aydın, and Gökhan Dalkılıç. "Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device." Proceedings 74, no. 1 (March 2, 2021): 1. http://dx.doi.org/10.3390/proceedings2021074001.

Full text
Abstract:
With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.
APA, Harvard, Vancouver, ISO, and other styles
40

McGill, Tanya, and Nik Thompson. "Old risks, new challenges: exploring differences in security between home computer and mobile device use." Behaviour & Information Technology 36, no. 11 (July 18, 2017): 1111–24. http://dx.doi.org/10.1080/0144929x.2017.1352028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Khoa, Tran Anh, Le Mai Bao Nhu, Hoang Hai Son, Nguyen Minh Trong, Cao Hoang Phuc, Nguyen Thi Hoang Phuong, Nguyen Van Dung, Nguyen Hoang Nam, Dong Si Thien Chau, and Dang Ngoc Minh Duc. "Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–18. http://dx.doi.org/10.1155/2020/8896637.

Full text
Abstract:
Smart homes are an element of developing smart cities. In recent years, countries around the world have spared no effort in promoting smart cities. Smart homes are an interesting technological advancement that can make people’s lives much more convenient. The development of smart homes involves multiple technological aspects, which include big data, mobile networks, cloud computing, Internet of Things, and even artificial intelligence. Digital information is the main component of signal control and flow in a smart home, while information security is another important aspect. In the event of equipment failure, the task of safeguarding the system’s information is of the utmost importance. Since smart homes are automatically controlled, the problem of mobile network security must be taken seriously. To address these issues, this paper focuses on information security, big data, mobile networks, cloud computing, and the Internet of Things. Security efficiency can be enhanced by using a Secure Hash Algorithm 256 (SHA-256), which is an authentication mechanism that, with the help of the user, can authenticate each interaction of a given device with a WebServer by using an encrypted username, password, and token. This framework could be used for an automated burglar alarm system, guest attendance monitoring, and light switches, all of which are easily integrated with any smart city base. In this way, IoT solutions can allow real-time monitoring and connection with central systems for automated burglar alarms. The monitoring framework is developed on the strength of the web application to obtain real-time display, storage, and warning functions for local or remote monitoring control. The monitoring system is stable and reliable when applying SHA-256.
APA, Harvard, Vancouver, ISO, and other styles
42

Xiao, Yinhao, Yizhen Jia, Xiuzhen Cheng, Jiguo Yu, Zhenkai Liang, and Zhi Tian. "I Can See Your Brain: Investigating Home-Use Electroencephalography System Security." IEEE Internet of Things Journal 6, no. 4 (August 2019): 6681–91. http://dx.doi.org/10.1109/jiot.2019.2910115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Saputro, Andik, Nanang Saputro, and Hendro Wijayanto. "DEMILITARIZED ZONE AND PORT KNOCKING METHODS FOR COMPUTER NETWORK SECURITY." Cyber Security dan Forensik Digital 3, no. 2 (December 11, 2020): 22–27. http://dx.doi.org/10.14421/csecurity.2020.3.2.2150.

Full text
Abstract:
Currently, the way of network communication has changed a lot. All aspects become very dependent on online services. Employees can work from home, and students of all ages take online classes. The more the public depends on staying connected to the network, the greater potential network attacks to occur. In a computer network, if it is not protected, it will data or file loss, damage to the server system, not being optimal in serving users or even losing valuable institutional assets. The attacks most often used in networks are Port Scanning and DDoS (Distributed Denial Of Service). In this study, the DeMilitarized Zone and Port Knocking methods are combined to secure computer networks. DeMilitarized Zone technique implementation is used to access local servers, so that they can be accessed from outside with Port Knocking technique. To open the access port that is filtered in the router configuration on the server network security system. DeMilitarized Zone and Port Knocking can be implemented on local and long distance networks where if an attacker wants to exploit or attack the main server, the first to be attacked is the firewall server (router). Port Knocking can also be implemented on local and long distance networks with a combined ping request time limit which makes it safer, so that if an attacker wants to access the router, and doesn't know the rules from the remote, what happens is a rejection of port access.
APA, Harvard, Vancouver, ISO, and other styles
44

Baek, Jinsuk, Munene W. Kanampiu, and Cheonshik Kim. "A Secure Internet of Things Smart Home Network: Design and Configuration." Applied Sciences 11, no. 14 (July 7, 2021): 6280. http://dx.doi.org/10.3390/app11146280.

Full text
Abstract:
Many home IoT devices are joining IoT networks by gaining access to some home gateway that configures smart, multimedia, and home networks. To enable secure IoT-based home networking services, (1) an IoT network should be effectively designed and configured with a IoT server, (2) a messaging protocol is required to exchange information between the IoT server and IoT devices, and (3) the home gateway should monitor all safety aspects in both inbound and outbound traffic of the home network. However, not all home network users put in consideration the need for an adequate security posture. Instead, many users still rely on the minimum home network security by setting an easiest-to-guess password to restrict unauthorized access to their home gateway. In this paper, we propose a network design and configuration that enables secure IoT services with MQTT messaging protocol for home networks. With the proposed network design, a home network is interconnected to external networks through a home gateway. To separate the IoT-subnet from other parts of home network, the home gateway subdivides a home network into an inside-subnet and an IoT-subnet with a private IP address using subnet masking. The IoT server, located in the IoT-subnet can be implemented with either a general HTTP server or a security server that acts as an MQTT broker. The secure communications among network entities are governed by a home gateway operating a well-configured extended access control. The effectiveness of the proposed design and configuration is verified through a simulation by showing that it does not impose any significant performance degradation for reinforced security. We expect the proposed configuration to help facilitate interconnection among heterogeneous network entities.
APA, Harvard, Vancouver, ISO, and other styles
45

Mavropoulos, Orestis, Haralambos Mouratidis, Andrew Fish, Emmanouil Panaousis, and Christos Kalloniatis. "A conceptual model to support security analysis in the internet of things." Computer Science and Information Systems 14, no. 2 (2017): 557–78. http://dx.doi.org/10.2298/csis160110016m.

Full text
Abstract:
This paper proposes a conceptual model to support decision makers during security analysis of Internet of Things (IoT) systems. The world is entering an era of ubiquitous computing with IoT being the main driver. Taking into account the scale of IoT, the number of security issues that are arising are unprecedented. Both academia and industry require methodologies that will enable reasoning about security in IoT system in a concise and holistic manner. The proposed conceptual model addresses a number of challenges in modeling IoT to support security analysis. The model is based on an architecture-oriented approach that incorporates sociotechnical concepts into the security analysis of an IoT system. To demonstrate the usage of the proposed conceptual model, we perform a security analysis on a small scale smart home example.
APA, Harvard, Vancouver, ISO, and other styles
46

Yüksel, Benjamin, Klaus Schwarz, and Reiner Creutzburg. "AI-based anomaly detection for cyberattacks on Windows systems - Creation of a prototype for automated monitoring of the process environment." Electronic Imaging 2020, no. 3 (January 26, 2020): 331–1. http://dx.doi.org/10.2352/issn.2470-1173.2020.3.mobmu-304.

Full text
Abstract:
Cyber security has become an increasingly important topic in recent years. The increasing popularity of systems and devices such as computers, servers, smartphones, tablets and smart home devices is causing a rapidly increasing attack surface. In addition, there are a variety of security vulnerabilities in software and hardware that make the security situation more complex and unclear. Many of these systems and devices also process personal or secret data and control critical processes in the industry. The need for security is tremendously high. The owners and administrators of modern computer systems are often overwhelmed with the task of securing their systems as the systems become more complex and the attack methods increasingly intelligent. In these days a there are a lot of encryption and hiding techniques available. They are used to make the detection of malicious software with signature based scanning methods very difficult. Therefore, novel methods for the detection of such threats are necessary. This paper examines whether cyber threats can be detected using modern artificial intelligence methods. We develop, describe and test a prototype for windows systems based on neural networks. In particular, an anomaly detection based on autoencoders is used. As this approach has shown, it is possible to detect a wide range of threats using artificial intelligence. Based on the approach in this work, this research topic should be continued to be investigated. Especially cloud-based solutions based on this principle seem to be very promising to protect against modern threats in the world of cyber security.
APA, Harvard, Vancouver, ISO, and other styles
47

Radzi, Syafeeza Ahmad, M. K. Mohd Fitri Alif, Y. Nursyifaa Athirah, A. S. Jaafar, A. H. Norihan, and M. S. Saleha. "IoT based facial recognition door access control home security system using raspberry pi." International Journal of Power Electronics and Drive Systems (IJPEDS) 11, no. 1 (March 1, 2020): 417. http://dx.doi.org/10.11591/ijpeds.v11.i1.pp417-424.

Full text
Abstract:
The home security system has become vital for every house. Previously, most doors can be open by using traditional ways, such as keys, security cards, password or pattern. However, incidents such as a key loss has led to much worrying cases such as robbery and identity fraud. This has become a significant issue. To overcome this problem, face recognition using deep learning technique was introduced and Internet of Thing (IoT) also been used to perform efficient door access control system. Raspberry Pi is a programmable small computer board and used as the main controller for face recognition, youth system and locking system. The camera is used to capture images of the person in front of the door. IoT system enables the user to control the door access.
APA, Harvard, Vancouver, ISO, and other styles
48

Brouwer, Natasa, André Heck, and Guusje Smit. "Proctoring to improve teaching practice." MSOR Connections 15, no. 2 (January 26, 2017): 25. http://dx.doi.org/10.21100/msor.v15i2.414.

Full text
Abstract:
Universities organise digital summative assessments in special assessment computer rooms and they conduct strong restrictions on the resources. This policy assures safety and security of assessments but obstructs authentic problem solving where open resources are needed. A digital assessment room is also not a proper solution when students for some reason cannot attend the assessment on campus. We present three scenarios from the science and mathematics teaching practice at the University of Amsterdam in which we have used proctoring to create the flexibility of online exams that was needed. Online remote proctoring of computer screens on the campus and/or students at home enabled (1) more authentic exams by allowing open resources, (2) use of own laptops (BYOD) in a regular lecture room, (3) off campus online exams as a part of an online programme, for example, at home anywhere in the world. We have shown that proctoring is not just a different way to control students using computers, but that it enabled improvement of the quality of learning processes in which summative assessments are an integral part.
APA, Harvard, Vancouver, ISO, and other styles
49

Braeken, An, Pawani Porambage, Milos Stojmenovic, and Lambros Lambrinos. "eDAAAS: Efficient distributed anonymous authentication and access in smart homes." International Journal of Distributed Sensor Networks 12, no. 12 (December 2016): 155014771668203. http://dx.doi.org/10.1177/1550147716682037.

Full text
Abstract:
The smart home field has witnessed rapid developments in recent years. Internet of Things applications for the smart home are very heterogeneous and continuously increasing in number, making user management from a security perspective very challenging. Moreover, the resource-constrained nature of most of the devices implies that any security mechanisms deployed should be lightweight and highly efficient. In this article, we propose an authentication scheme based on symmetric key cryptography, combined with a capability-based access control system, to provide the different stakeholders (residents, recurring guests, or temporary guests) end-to-end secure access to the Internet of Things devices in a smart home, managed by the home owner in an anonymous way. The operations in our scheme only include a small number of communication phases and protect the identities of the entities involved (i.e. stakeholders and end-nodes) from any outside entity. The proposed scheme ensures that even if the stakeholder’s device or the Internet of Things device is attacked, the system remains secure.
APA, Harvard, Vancouver, ISO, and other styles
50

Chifor, Bogdan-Cosmin, Ion Bica, Victor-Valeriu Patriciu, and Florin Pop. "A security authorization scheme for smart home Internet of Things devices." Future Generation Computer Systems 86 (September 2018): 740–49. http://dx.doi.org/10.1016/j.future.2017.05.048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography