Academic literature on the topic 'Smart Home Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Smart Home Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Smart Home Security"

1

shek, Abhi, Anu rag, Reji Thomas, and Dr B. Shadaksharappa. "Smart Home Security through NFC." Bonfring International Journal of Software Engineering and Soft Computing 6, Special Issue (October 31, 2016): 15–17. http://dx.doi.org/10.9756/bijsesc.8235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tatarnikova, T., and B. Sovetov. "Smart home security management." Journal of Physics: Conference Series 1864, no. 1 (May 1, 2021): 012120. http://dx.doi.org/10.1088/1742-6596/1864/1/012120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

MOROZOVA, OLGA, ARTEM TETSKYI, ANDRII NICHEPORUK, DENUS KRUVAK, and VITALII TKACHOV. "SMART HOME SYSTEM SECURITY RISK ASSESSMENT." Computer systems and information technologies, no. 3 (April 14, 2022): 81–88. http://dx.doi.org/10.31891/csit-2021-5-11.

Full text
Abstract:
The concept of the Internet of Things became the basis of the fourth industrial revolution, which allowed to transfer the processes of automation to a new saber. As a result, automation systems, such as smart homes, healthcare systems and car control systems, have become widespread. The developers of such systems primarily focus their efforts on the functional component, leaving safety issues in the background. However, when designing and operating IoT systems, it is equally important to assess potential bottlenecks and develop complete and comprehensive strategies to mitigate and eliminate the negative effects of cyberattacks. The purpose of this study is to identify possible cyber threats and assess their impact on critical information objects in the smart home system. To achieve this goal, the three-level architecture of the smart home system is considered and a review of known cyber threats for each level is conducted. The critical information objects in the smart home system are the containers in which the information objects are stored, the risk assessment criteria and the cyber threat scenarios. The information security risks of the smart home system were assessed using the OCTAVE Allegro methodology for the information object that presents the information collected by the smart home sensors.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Junge, Yanhu Shan, and Kaiqi Huang. "ISEE Smart Home (ISH): Smart video analysis for home security." Neurocomputing 149 (February 2015): 752–66. http://dx.doi.org/10.1016/j.neucom.2014.08.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jose, Arun Cyril, and Reza Malekian. "Improving Smart Home Security: Integrating Logical Sensing Into Smart Home." IEEE Sensors Journal 17, no. 13 (July 1, 2017): 4269–86. http://dx.doi.org/10.1109/jsen.2017.2705045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jose, Arun Cyril, Reza Malekian, and Babedi B. Letswamotse. "Improving smart home security; integrating behaviour prediction into smart home." International Journal of Sensor Networks 28, no. 4 (2018): 253. http://dx.doi.org/10.1504/ijsnet.2018.096464.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Letswamotse, Babedi B., Arun Cyril Jose, and Reza Malekian. "Improving smart home security; integrating behaviour prediction into smart home." International Journal of Sensor Networks 28, no. 4 (2018): 253. http://dx.doi.org/10.1504/ijsnet.2018.10017822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

nifer, Jen D., Los M. higa, Sowndharya R. Lakshmi, and Vidhya M. lakshmi. "Reinforcing Smart Home Security System." International Journal of Engineering Trends and Technology 57, no. 1 (March 25, 2018): 28–30. http://dx.doi.org/10.14445/22315381/ijett-v57p206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Oh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (February 21, 2021): 1488. http://dx.doi.org/10.3390/s21041488.

Full text
Abstract:
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel. Therefore, a secure authentication protocol should be established between the user and smart devices. In 2020, Xiang and Zheng presented a situation-aware protocol for device authentication in smart grid-enabled smart home environments. However, we demonstrate that their protocol can suffer from stolen smart device, impersonation, and session key disclosure attacks and fails to provide secure mutual authentication. Therefore, we propose a secure and lightweight authentication protocol for IoT-based smart homes to resolve the security flaws of Xiang and Zheng’s protocol. We proved the security of the proposed protocol by performing informal and formal security analyses, using the real or random (ROR) model, Burrows–Abadi–Needham (BAN) logic, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, we provide a comparison of performance and security properties between the proposed protocol and related existing protocols. We demonstrate that the proposed protocol ensures better security and lower computational costs than related protocols, and is suitable for practical IoT-based smart home environments.
APA, Harvard, Vancouver, ISO, and other styles
10

Lad, Vishal. "Smart Home Technologies." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (August 31, 2021): 1421–34. http://dx.doi.org/10.22214/ijraset.2021.37498.

Full text
Abstract:
Abstract: This project describes about smart home concept which is made up using 2 microcontrollers. this project assures complete and proper utilisation of IOT with three application-camera surveillance(home security)-smart plant caring systemhome automation
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Smart Home Security"

1

Christiaens, Steven A. "Evaluating the Security of Smart Home Hubs." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/5631.

Full text
Abstract:
The goal of this research is to improve the security of smart home hubs by developing a standard against which hubs can be evaluated. This was done by first reviewing existing standards, guides, and collections of best practices. I determined that adapting or extending an existing standard was the best way to proceed. Potential candidates were selected, and after thorough comparison, I chose to extend the OWASP Application Security Verification Standard (ASVS). Extensions were composed of additional security requirements to address smart home hub functionality not covered by the existing requirements of the ASVS. These additional requirements were developed based upon existing best practices and are referred to as the Smart Home Extensions. Where a best practice or guidance did not yet exist for a particular hub functionality, guidance from related fields was adapted. The entire set of Smart Home Extensions were reviewed by industry experts, updated based on feedback, and then sent on for further peer review. Four smart home hubs – VeraLite, Wink, Connect, and SmartThings – were evaluated using the ASVS with the Smart Home Extensions. The evaluation uncovered security vulnerabilities in all four hubs, some previously disclosed by other researchers, and others new. Analysis of the evaluation data suggests that authentication is a common problem area, among others. Based on the performance of the hubs and the data collected, I suggest that the ASVS and Smart Home Extensions can be an effective tool to provide insight into the security posture of smart home hubs.
APA, Harvard, Vancouver, ISO, and other styles
2

Christensson, Daniel, and Emelie Eriksson. "The Smart Home From a Security Perspective." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40185.

Full text
Abstract:
Based on the fact that many electronic devices are digitalized in our world in order to facilitate our lives, there is a large potential for development in the home. Smart Home solutions are giving us the opportunity to control and manage for example alarms, electricity and surveillance but the technology's rapid improvement paves the way for issues related to security. The objectives for this work will bring up common communication technologies, security and vulnerabilities in the context of a Smart Home and what could be done for future work. In order to investigate the objectives, a literature study has been conducted together with an experiment. The experiment result exploits a weakness in a common Smart Home technology used in the network enable devices in the form of threats and vulnerabilities. In order to mitigate and minimize threats and vulnerabilities one conclusion is that a security policy could be produced. This security policy should provide the user with good practice of how to manage security in order to mitigate vulnerabilities and threats within the Smart Home.
APA, Harvard, Vancouver, ISO, and other styles
3

Hansson, Niclas, Alexander Lantz, and Ludvig Fischerström. "A Security Analysis of Wireless Smart Home Technologies." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-113256.

Full text
Abstract:
The use of electronics connected to local networks and the Internet is growingall the time. Nowadays you can control your electronics in your house even when away from home, which opens up for potential security threats. The purpose of this report is to point out the potential risks with connecting home electronics to the Internet and to shed light on what security mechanisms that are needed in these kinds of systems. This report contains a theoretical part in which relevant material has been summarized. This material includes the smart home solution Tellstick Net and the wireless technologies ZigBee and Z-Wave, which are commonly used in home automation. The Tellstick Net system was mapped out and a risk analysis with attack trees was performed. After the analysis of the system, the implementation of two potential security threats were attempted. The two attempted attacks were replay attack and cross-site request forgery. The replay attack was unsuccessful due to the way the system communicates and keeps connections alive. However, the cross-site request forgery was discovered to be successful in some cases. It depended on if the browser of the target supported cross-origin resource sharing, as that property protects against cross-site request forgery. Finally, the report discusses what impact the found security deficiencies have, what they entail and how they reflect on the need for security in smart technologies for the home.
APA, Harvard, Vancouver, ISO, and other styles
4

Musalam, Dina, and Paulina Nicodemus. "Security and Privacy methods in Smart Home: Case Study in Smart Meters." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20273.

Full text
Abstract:
Homes with integrated state of the art technology are considered Smart Homes. A smart home has special systems which enable remote control via remote computer or smart phones. These modern integrated services are supported by electrical power infrastructures called Smart Grids, which provides a stable electrical power environment to support all functionalities, with intelligent power systems that provide increased power quality. Inside a Smart home, a legacy metering system called Smart Meters are installed offering new functionalities such as remote readings of power consumption, and different time usage of tariffs.Preliminary research has already indicated vulnerability attacks on smart meters which affect the security and privacy in smart meters. Security issues in this system include vulnerabilities and privacy issues includes information leakage in real-time consumption data that is recorded by the smart meters.Enhancing both security and privacy in the smart meters are the main purpose of this thesis. The principle goal of this research is to provide more understanding about the smart meters from a security and privacy perspective. This thesis investigates issues and problems in smart meters and proposes a secure communication protocol in the application layer, in addition to a proof-of-concept of the final solution. In this research we introduce the solution by means of two scenarios, we highlight the effects of an attack on the smart meters on levels of simulation and theory. The first scenario is to "take control over the smart meter to access the data consumptions in the smart meters". The proposed solution of using the Smart Phone as a third part to protect the smart meters has been evaluated using a network simulation tool. The result shows that the data captured by attacking node is encrypted and can't be used for any useful operation. In the second scenario, "monitoring the data consumptions to harm the user's privacy", in other words, stealing the user's devices. The proposed solution is using the home electrical power routing to moderate the home's load signature in order to hide appliance usage information. Data clusters are implemented as a proof of concept to evaluate the data. The results show that there is only 99.5 % correct clustered data with good quality.
APA, Harvard, Vancouver, ISO, and other styles
5

Nalubowa, Vivian Gloria. "Smart Home Security Using Intrusion Detection and Prevention Systems." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40995.

Full text
Abstract:
As the connectivity of home devices elevates so does the volume and sophistication of cyber attacks consistently grow. Therefore, the need for network security and availability becomes more significant. Numerous sorts of countermeasures like firewalls and router-based packet filtering have been put in place, although these alone are not enough to brace the network from unauthorised access. One of the most efficient methods of stopping network adversaries is using Intrusion Detection and Prevention Systems (IDPS). The goal of an IDPS is to stop security attacks before they can be successfully carried out. In this paper, I looked at four network attacks namely; probing, denial of service, remote to user and user to root and improved their respective Snort rules to optimize processing time and capturing capacity using regular expressions and fast pattern. Snort with improved rules captured 100% of the attacks launched to the network while without the improved rules, Snort captured between 0% to 60% of the attacks launched to the network making an improvement of 40%.
APA, Harvard, Vancouver, ISO, and other styles
6

Ivancevic, Dean. "Privacy and security of IoT : A smart home perspective." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-99071.

Full text
Abstract:
In a world where technological progress is constant, understanding the views and experiences of users is essential. With the use of technology, there are many dangers. Issues with privacy and security are among them. This thesis deals with understanding the perception of privacy and security of smart home IoT devices. The literature review consists of understanding concepts of trust, possible ways of intrusion, and prevention and elaborating more about the Internet of Things technology and smart homes. The review also contains notes on previous findings of the user's perception. The review of the literature also connects possible ways of intrusion with the underlying IoT architecture as well as explains notions of privacy by design, compliance, and GDPR. To understand the phenomenon of privacy and security in the context of a smart home, a simple qualitative study was conducted. Sixteen participants who are part of the general public were interviewed. The collected information was analyzed using a general inductive approach, and answers were grouped into categories as suggested by Thematic Analysis. Interviews were done online and a transcript summary can be found in the last Appendix. The findings from the interviews suggest that privacy and convenience matter most to the users. Participants demonstrated a willingness to purchase if they perceived a device as something that will increase their quality of life and were willing to share data such as location but they were not willing to lose anonymity. What type of data and for what purpose was mentioned as most important. When it comes to security attacks, participants were less worried about how it might happen and more worried about what might happen to them and what are the consequences for them. In the conclusion of the study, I present advice for students and academia, device manufacturers, and service providers as well as the general public as the last main stakeholder. Since technology is not static, it would be of importance to revisit topics of privacy and security of IoT.
APA, Harvard, Vancouver, ISO, and other styles
7

Jonnalagadda, Hari Krishna. "Secure Communication Scheme in Smart Home Environment." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6270.

Full text
Abstract:
Internet of Things, has started to mark its existence from past few years. Right from its inception with a coke machine at Carnegie Mellon University, it has come a long way, connecting billions of devices to internet. This journey is well supported by the advancements in networking, hardware miniaturization and sensing capabilities. Diverse nature of applications of Internet of Things, has cut the communication barriers between the varieties of fields ranging from manufacturing industry to health-care industry. Smart Home is one such application of Internet of Things. Connectivity of home appliances, to achieve automation in living, defines Smart Home. Out of welter of applications that are derived from Internet of Things, this thesis concentrates on Smart Home. Smart Home, in practical is expected to conserve lot of energy, by achieving automation of home appliances, on par with best living experience. Existing technologies such as Z-wave, One-Net, ZigBee, Insteon, had already occupied the Smart Home communication. However, these technologies face the problem of identifying the smart devices uniquely and also exhibit security vulnerabilities. Proposed scheme exploits accelerometer fingerprinting to identify the smart devices uniquely. Security vulnerabilities of existing protocols are addressed by encrypting the data on move with CCM mode of AES encryption.
APA, Harvard, Vancouver, ISO, and other styles
8

Hashemi, Arshan. "Fingerprinting the Smart Home: Detection of Smart Assistants Based on Network Activity." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1958.

Full text
Abstract:
As the concept of the Smart Home is being embraced globally, IoT devices such as the Amazon Echo, Google Home, and Nest Thermostat are becoming a part of more and more households. In the data-driven world we live in today, internet service providers (ISPs) and companies are collecting large amounts of data and using it to learn about their customers. As a result, it is becoming increasingly important to understand what information ISPs are capable of collecting. IoT devices in particular exhibit distinct behavior patterns and specific functionality which make them especially likely to reveal sensitive information. Collection of this data provides valuable information and can have some serious privacy implications. In this work I present an approach to fingerprinting IoT devices behind private networks while only examining last-mile internet traffic . Not only does this attack only rely on traffic that would be available to an ISP, it does not require changes to existing infrastructure. Further, it does not rely on packet contents, and therefore works despite encryption. Using a database of 64 million packets logged over 15 weeks I was able to train machine learning models to classify the Amazon Echo Dot, Amazon Echo Show, Eufy Genie, and Google Home consistently. This approach combines unsupervised and supervised learning and achieves a precision of 99.95\%, equating to one false positive per 2,000 predictions. Finally, I discuss the implication of identifying devices within a home.
APA, Harvard, Vancouver, ISO, and other styles
9

Olegård, Johannes. "Security & Forensic Analysis of an Internet of Things Smart Home Ecosystem." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289579.

Full text
Abstract:
The Internet of Things (IoT) is an ongoing trend where a multitude of internet- connected devices become more common. Many of these devices have easily exploitable security vulnerabilities. This has led to large-scale cyberattacks such as the Mirai botnet Distributed Denial of Service (DDOS) attacks. More cybercrime can be expected in the future, especially as the number and types of IoT devices grow. In this work, the security of an IoT ecosystem was investigated from two perspectives: security testing and Digital Forensics (DF). Security testing was used to search the Application Programming Interfaces (APIs) of the IoT ecosystem for security vulnerabilities. Three Static Application Security Testing (SAST) Tools were used to search the source code of the cloud part of the system. A manual review was done to search the system as whole, with the guide of common vulnerability lists from the Open Web Application Security Project (OWASP). As a result, severe security vulnerabilities were found. A DF experiment was conducted where actions were taken in five Android smartphone apps to control six IoT devices (two are from aforementioned IoT ecosystem). The contents of the smartphone was then examined for forensic evidence of those actions. Additionally the contents one of the IoT devices was also examined for evidence. It was concluded that only limited evidence of the actions could be found. Additionally, various challenges were identified.
Det så kallade Sakernas Internet (eng. Internet of Things, IoT) området är en pågående och ökande trend. Trenden handler om att olika enklare enheter ansluts mot internet i stort antal. IoT-enheter har utsatts för, och utnyttjats i, cyber attacker som i exempelvis det så kallade “Mirai botnet”. Allt fler IoT-relaterade brott kan förväntas i framtiden, speciellt eftersom antalet IoT- enheter blir allt fler och mer diversifierade. I den här uppsatsen undersöks säkerheten i ett IoT ekosystem utifrån två aspekter: “security testing” (säkerhetstesting) och “digital forensics”. På svenska kalls digital forensics för “IT-forensik” (kriminalteknik inom informationsteknik) eller digital-forensik. Säkerhetstestning användes för att hitta sårbarheter i det undersökta IoT ekosystemets olika applikationsprogrammeringsgränssnitt. Tre olika verktyg av typen Static Application Security Testing (SAST) användes i undersökningen för att granska den kod som motsvarar moln-delen av systemet. Utöver de tre verktygen, undersöktes systemet också manuellt. Den manuella undersökning utgick från de listor av vanliga typer av sårbarheter som finns publicerade av organisationen Open Web Application Security Project (OWASP). Resultatmässigt hittades flera allvarliga sårbarheter i systemet. Digital forensics-delen av projektet bestod av ett experiment där en Android telefon, sex IoT-enheter (två från det ovannämnda IoT ekosystemet) och fem motsvarande Android-appar undersöktes. Experimentet bestod av att utföra olika handlingar i apparna (till exempel att skicka ett kommando till en IoT- enhet), och sedan av att leta bevis för de handlingarna. För att hitta bevis undersöktes innehållet på telefonen och innehållet på en av IoT-enheterna. Slutsatsen av experimentet är att bara få och begränsade bevis kunde hittas. Utmaningarna som påträffades i experimentet jämfördes med utmaningarna beskrivna i forskningslitteraturen inom digital forensics.
APA, Harvard, Vancouver, ISO, and other styles
10

Jose, Arun Cyril. "Intelligent home automation security system based on novel logical sensing and behaviour prediction." Thesis, University of Pretoria, 2017. http://hdl.handle.net/2263/65012.

Full text
Abstract:
The thesis, Intelligent Home Automation Security System Based on Novel Logical Sensing and Behavior Prediction, was designed to enhance authentication, authorization and security in smart home devices and services. The work proposes a three prong defensive strategy each of which are analyzed and evaluated separately to drastically improve security. The Device Fingerprinting techniques proposed, not only improves the existing approaches but also identifies the physical device accessing the home cybernetic and mechatronic systems using device specific and browser specific parameters. The Logical Sensing process analyses home inhabitant actions from a logical stand point and develops sophisticated and novel sensing techniques to identify intrusion attempts to a home’s physical and cyber space. Novel Behavior prediction methodology utilizes Bayesian networks to learn normal user behavior which is later compared to distinguish and identify suspicious user behaviors in the home in a timely manner. The logical sensing, behavior prediction and device fingerprinting techniques proposed were successfully tested, evaluated and verified in an actual home cyber physical system. The algorithms and techniques proposed in the thesis can be easily modified and adapted into many practical applications in Industrial Internet of Things, Industry 4.0 and cyber-physical systems.
Thesis (PhD)--University of Pretoria, 2017.
Electrical, Electronic and Computer Engineering
PhD
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Smart Home Security"

1

J, Velte Toby, ed. Build your own smart home. New York: McGraw-Hill/Osborne, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1942-, Hurley Patrick J., ed. Smart homes for dummies. 3rd ed. Hoboken, N.J: Wiley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Briere, Daniel D. Smart Homes For Dummies. New York: John Wiley & Sons, Ltd., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Briere, Daniel D. Smart homes for dummies. 3rd ed. Indianapolis, IN: Wiley Pub., Inc., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Briere, Daniel D. Smart homes for dummies. 3rd ed. Indianapolis, IN: Wiley Pub., Inc., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

1942-, Hurley Patrick J., ed. Smart homes for dummies. Foster City, CA: IDG Books Worldwide, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smart homes in easy steps: Master smart technology for your home. 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hurley, Pat, and Danny Briere. Smart Homes For Dummies (For Dummies (Home & Garden)). For Dummies, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Smart Homes for Dummies, Second Edition. 2nd ed. For Dummies, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pacifica, Technica, ed. Easy X10 projects for creating a smart home. Indianapolis, IN: Indy-Tech, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Smart Home Security"

1

Mundargi, Zarinabegam K., Isa Muslu, Susen Naik, Raju A. Nadaf, and Suvarna Kabadi. "Home Security Using Smart Photo Frame." In Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019), 758–68. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-43192-1_84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mahadewa, Kulani. "Security Analysis of Smart Home Implementations." In Formal Methods and Software Engineering, 450–54. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02450-5_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tatang, Dennis, Tim Suurland, and Thorsten Holz. "Study of DNS Rebinding Attacks on Smart Home Devices." In Computer Security, 391–401. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nagaraja, G. S., and Shreyas Srinath. "Security Architecture for IoT-Based Home Automation." In Smart Intelligent Computing and Applications, 57–65. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-9282-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Koehler, Marcus, and Felix Wortmann. "Making Effective Home Security Available to Everyone - Towards Smart Home Security Communities." In Internet of Things. IoT Infrastructures, 312–17. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19743-2_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Davidson, Chad, Tahsin Rezwana, and Mohammad A. Hoque. "Smart Home Security Application Enabled by IoT:." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 46–56. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05928-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liang, Chua Boon, Mujahid Tabassum, Saad Bin Abul Kashem, Zulfiqar Zama, P. Suresh, and U. Saravanakumar. "Smart Home Security System Based on Zigbee." In Advances in Intelligent Systems and Computing, 827–36. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5029-4_71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Van Vinh, Phan, Phan Xuan Dung, Pham Thuy Tien, Tran Thi Thuy Hang, Truong Hong Duc, and Tran Duy Nhat. "Smart Home Security System Using Biometric Recognition." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 405–20. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67514-1_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Barriga A, Jhonattan J., and Sang Guun Yoo. "Security over Smart Home Automation Systems: A Survey." In Smart Innovation, Systems and Technologies, 87–96. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-78605-6_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Khan, Ruqaiya, Vinod Kumar Shukla, Bhopendra Singh, and Sonali Vyas. "Mitigating Security Challenges in Smart Home Management Through Smart Lock." In Data Driven Approach Towards Disruptive Technologies, 61–71. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9873-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Smart Home Security"

1

Hussain, Abir Jaafar, Deimante Marcinonyte Marcinonyte, Farkhund Iqbal Iqbal, Hissam Tawfik, Thar Baker, and Dhiya Al-Jumeily. "Smart Home Systems Security." In 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS). IEEE, 2018. http://dx.doi.org/10.1109/hpcc/smartcity/dss.2018.00235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Aman, and Anjana Goen. "Smart Home Security System." In 2018 International Conference on Advanced Computation and Telecommunication (ICACAT). IEEE, 2018. http://dx.doi.org/10.1109/icacat.2018.8933780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Changmin, Luca Zappaterra, Kwanghee Choi, and Hyeong-Ah Choi. "Securing smart home: Technologies, security challenges, and security requirements." In 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hong, Xin, Chenhui Yang, and Chunming Rong. "Smart Home Security Monitor System." In 2016 15th International Symposium on Parallel and Distributed Computing (ISPDC). IEEE, 2016. http://dx.doi.org/10.1109/ispdc.2016.42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Anwar, Malik Nadeem, Mohammad Nazir, and Khurram Mustafa. "Security threats taxonomy: Smart-home perspective." In 2017 3rd International Conference on Advances in Computing,Communication & Automation (ICACCA) (Fall). IEEE, 2017. http://dx.doi.org/10.1109/icaccaf.2017.8344666.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Schiefer, Michael. "Smart Home Definition and Security Threats." In 2015 Ninth International Conference on IT Security Incident Management & IT Forensics (IMF). IEEE, 2015. http://dx.doi.org/10.1109/imf.2015.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chandra, M. L. Ravi, B. Varun Kumar, and B. SureshBabu. "IoT enabled home with smart security." In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). IEEE, 2017. http://dx.doi.org/10.1109/icecds.2017.8389630.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Teixeira, Diogo, Leonardo Assuncao, and Sara Paiva. "Security of Smart Home-Smartphones Systems." In 2020 15th Iberian Conference on Information Systems and Technologies (CISTI). IEEE, 2020. http://dx.doi.org/10.23919/cisti49556.2020.9141025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Razali, Muhammad Naim Mohd, Nurul Ashikin Abdul-Kadir, and Johari Kasim. "Smart Home Security with Dual Modes." In 2020 IEEE Student Conference on Research and Development (SCOReD). IEEE, 2020. http://dx.doi.org/10.1109/scored50371.2020.9383185.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ray, Abhay Kumar, and Ashish Bagwari. "IoT based Smart home: Security Aspects and security architecture." In 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2020. http://dx.doi.org/10.1109/csnt48778.2020.9115737.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Smart Home Security"

1

Haney, Julie M., Susanne M. Furman, and Yasemin Acar. Research Report: User Perceptions of Smart Home Privacy and Security. National Institute of Standards and Technology, November 2020. http://dx.doi.org/10.6028/nist.ir.8330.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography