To see the other types of publications on this topic, follow the link: Smart Home Security.

Dissertations / Theses on the topic 'Smart Home Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Smart Home Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Christiaens, Steven A. "Evaluating the Security of Smart Home Hubs." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/5631.

Full text
Abstract:
The goal of this research is to improve the security of smart home hubs by developing a standard against which hubs can be evaluated. This was done by first reviewing existing standards, guides, and collections of best practices. I determined that adapting or extending an existing standard was the best way to proceed. Potential candidates were selected, and after thorough comparison, I chose to extend the OWASP Application Security Verification Standard (ASVS). Extensions were composed of additional security requirements to address smart home hub functionality not covered by the existing requirements of the ASVS. These additional requirements were developed based upon existing best practices and are referred to as the Smart Home Extensions. Where a best practice or guidance did not yet exist for a particular hub functionality, guidance from related fields was adapted. The entire set of Smart Home Extensions were reviewed by industry experts, updated based on feedback, and then sent on for further peer review. Four smart home hubs – VeraLite, Wink, Connect, and SmartThings – were evaluated using the ASVS with the Smart Home Extensions. The evaluation uncovered security vulnerabilities in all four hubs, some previously disclosed by other researchers, and others new. Analysis of the evaluation data suggests that authentication is a common problem area, among others. Based on the performance of the hubs and the data collected, I suggest that the ASVS and Smart Home Extensions can be an effective tool to provide insight into the security posture of smart home hubs.
APA, Harvard, Vancouver, ISO, and other styles
2

Christensson, Daniel, and Emelie Eriksson. "The Smart Home From a Security Perspective." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40185.

Full text
Abstract:
Based on the fact that many electronic devices are digitalized in our world in order to facilitate our lives, there is a large potential for development in the home. Smart Home solutions are giving us the opportunity to control and manage for example alarms, electricity and surveillance but the technology's rapid improvement paves the way for issues related to security. The objectives for this work will bring up common communication technologies, security and vulnerabilities in the context of a Smart Home and what could be done for future work. In order to investigate the objectives, a literature study has been conducted together with an experiment. The experiment result exploits a weakness in a common Smart Home technology used in the network enable devices in the form of threats and vulnerabilities. In order to mitigate and minimize threats and vulnerabilities one conclusion is that a security policy could be produced. This security policy should provide the user with good practice of how to manage security in order to mitigate vulnerabilities and threats within the Smart Home.
APA, Harvard, Vancouver, ISO, and other styles
3

Hansson, Niclas, Alexander Lantz, and Ludvig Fischerström. "A Security Analysis of Wireless Smart Home Technologies." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-113256.

Full text
Abstract:
The use of electronics connected to local networks and the Internet is growingall the time. Nowadays you can control your electronics in your house even when away from home, which opens up for potential security threats. The purpose of this report is to point out the potential risks with connecting home electronics to the Internet and to shed light on what security mechanisms that are needed in these kinds of systems. This report contains a theoretical part in which relevant material has been summarized. This material includes the smart home solution Tellstick Net and the wireless technologies ZigBee and Z-Wave, which are commonly used in home automation. The Tellstick Net system was mapped out and a risk analysis with attack trees was performed. After the analysis of the system, the implementation of two potential security threats were attempted. The two attempted attacks were replay attack and cross-site request forgery. The replay attack was unsuccessful due to the way the system communicates and keeps connections alive. However, the cross-site request forgery was discovered to be successful in some cases. It depended on if the browser of the target supported cross-origin resource sharing, as that property protects against cross-site request forgery. Finally, the report discusses what impact the found security deficiencies have, what they entail and how they reflect on the need for security in smart technologies for the home.
APA, Harvard, Vancouver, ISO, and other styles
4

Musalam, Dina, and Paulina Nicodemus. "Security and Privacy methods in Smart Home: Case Study in Smart Meters." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20273.

Full text
Abstract:
Homes with integrated state of the art technology are considered Smart Homes. A smart home has special systems which enable remote control via remote computer or smart phones. These modern integrated services are supported by electrical power infrastructures called Smart Grids, which provides a stable electrical power environment to support all functionalities, with intelligent power systems that provide increased power quality. Inside a Smart home, a legacy metering system called Smart Meters are installed offering new functionalities such as remote readings of power consumption, and different time usage of tariffs.Preliminary research has already indicated vulnerability attacks on smart meters which affect the security and privacy in smart meters. Security issues in this system include vulnerabilities and privacy issues includes information leakage in real-time consumption data that is recorded by the smart meters.Enhancing both security and privacy in the smart meters are the main purpose of this thesis. The principle goal of this research is to provide more understanding about the smart meters from a security and privacy perspective. This thesis investigates issues and problems in smart meters and proposes a secure communication protocol in the application layer, in addition to a proof-of-concept of the final solution. In this research we introduce the solution by means of two scenarios, we highlight the effects of an attack on the smart meters on levels of simulation and theory. The first scenario is to "take control over the smart meter to access the data consumptions in the smart meters". The proposed solution of using the Smart Phone as a third part to protect the smart meters has been evaluated using a network simulation tool. The result shows that the data captured by attacking node is encrypted and can't be used for any useful operation. In the second scenario, "monitoring the data consumptions to harm the user's privacy", in other words, stealing the user's devices. The proposed solution is using the home electrical power routing to moderate the home's load signature in order to hide appliance usage information. Data clusters are implemented as a proof of concept to evaluate the data. The results show that there is only 99.5 % correct clustered data with good quality.
APA, Harvard, Vancouver, ISO, and other styles
5

Nalubowa, Vivian Gloria. "Smart Home Security Using Intrusion Detection and Prevention Systems." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40995.

Full text
Abstract:
As the connectivity of home devices elevates so does the volume and sophistication of cyber attacks consistently grow. Therefore, the need for network security and availability becomes more significant. Numerous sorts of countermeasures like firewalls and router-based packet filtering have been put in place, although these alone are not enough to brace the network from unauthorised access. One of the most efficient methods of stopping network adversaries is using Intrusion Detection and Prevention Systems (IDPS). The goal of an IDPS is to stop security attacks before they can be successfully carried out. In this paper, I looked at four network attacks namely; probing, denial of service, remote to user and user to root and improved their respective Snort rules to optimize processing time and capturing capacity using regular expressions and fast pattern. Snort with improved rules captured 100% of the attacks launched to the network while without the improved rules, Snort captured between 0% to 60% of the attacks launched to the network making an improvement of 40%.
APA, Harvard, Vancouver, ISO, and other styles
6

Ivancevic, Dean. "Privacy and security of IoT : A smart home perspective." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-99071.

Full text
Abstract:
In a world where technological progress is constant, understanding the views and experiences of users is essential. With the use of technology, there are many dangers. Issues with privacy and security are among them. This thesis deals with understanding the perception of privacy and security of smart home IoT devices. The literature review consists of understanding concepts of trust, possible ways of intrusion, and prevention and elaborating more about the Internet of Things technology and smart homes. The review also contains notes on previous findings of the user's perception. The review of the literature also connects possible ways of intrusion with the underlying IoT architecture as well as explains notions of privacy by design, compliance, and GDPR. To understand the phenomenon of privacy and security in the context of a smart home, a simple qualitative study was conducted. Sixteen participants who are part of the general public were interviewed. The collected information was analyzed using a general inductive approach, and answers were grouped into categories as suggested by Thematic Analysis. Interviews were done online and a transcript summary can be found in the last Appendix. The findings from the interviews suggest that privacy and convenience matter most to the users. Participants demonstrated a willingness to purchase if they perceived a device as something that will increase their quality of life and were willing to share data such as location but they were not willing to lose anonymity. What type of data and for what purpose was mentioned as most important. When it comes to security attacks, participants were less worried about how it might happen and more worried about what might happen to them and what are the consequences for them. In the conclusion of the study, I present advice for students and academia, device manufacturers, and service providers as well as the general public as the last main stakeholder. Since technology is not static, it would be of importance to revisit topics of privacy and security of IoT.
APA, Harvard, Vancouver, ISO, and other styles
7

Jonnalagadda, Hari Krishna. "Secure Communication Scheme in Smart Home Environment." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6270.

Full text
Abstract:
Internet of Things, has started to mark its existence from past few years. Right from its inception with a coke machine at Carnegie Mellon University, it has come a long way, connecting billions of devices to internet. This journey is well supported by the advancements in networking, hardware miniaturization and sensing capabilities. Diverse nature of applications of Internet of Things, has cut the communication barriers between the varieties of fields ranging from manufacturing industry to health-care industry. Smart Home is one such application of Internet of Things. Connectivity of home appliances, to achieve automation in living, defines Smart Home. Out of welter of applications that are derived from Internet of Things, this thesis concentrates on Smart Home. Smart Home, in practical is expected to conserve lot of energy, by achieving automation of home appliances, on par with best living experience. Existing technologies such as Z-wave, One-Net, ZigBee, Insteon, had already occupied the Smart Home communication. However, these technologies face the problem of identifying the smart devices uniquely and also exhibit security vulnerabilities. Proposed scheme exploits accelerometer fingerprinting to identify the smart devices uniquely. Security vulnerabilities of existing protocols are addressed by encrypting the data on move with CCM mode of AES encryption.
APA, Harvard, Vancouver, ISO, and other styles
8

Hashemi, Arshan. "Fingerprinting the Smart Home: Detection of Smart Assistants Based on Network Activity." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1958.

Full text
Abstract:
As the concept of the Smart Home is being embraced globally, IoT devices such as the Amazon Echo, Google Home, and Nest Thermostat are becoming a part of more and more households. In the data-driven world we live in today, internet service providers (ISPs) and companies are collecting large amounts of data and using it to learn about their customers. As a result, it is becoming increasingly important to understand what information ISPs are capable of collecting. IoT devices in particular exhibit distinct behavior patterns and specific functionality which make them especially likely to reveal sensitive information. Collection of this data provides valuable information and can have some serious privacy implications. In this work I present an approach to fingerprinting IoT devices behind private networks while only examining last-mile internet traffic . Not only does this attack only rely on traffic that would be available to an ISP, it does not require changes to existing infrastructure. Further, it does not rely on packet contents, and therefore works despite encryption. Using a database of 64 million packets logged over 15 weeks I was able to train machine learning models to classify the Amazon Echo Dot, Amazon Echo Show, Eufy Genie, and Google Home consistently. This approach combines unsupervised and supervised learning and achieves a precision of 99.95\%, equating to one false positive per 2,000 predictions. Finally, I discuss the implication of identifying devices within a home.
APA, Harvard, Vancouver, ISO, and other styles
9

Olegård, Johannes. "Security & Forensic Analysis of an Internet of Things Smart Home Ecosystem." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289579.

Full text
Abstract:
The Internet of Things (IoT) is an ongoing trend where a multitude of internet- connected devices become more common. Many of these devices have easily exploitable security vulnerabilities. This has led to large-scale cyberattacks such as the Mirai botnet Distributed Denial of Service (DDOS) attacks. More cybercrime can be expected in the future, especially as the number and types of IoT devices grow. In this work, the security of an IoT ecosystem was investigated from two perspectives: security testing and Digital Forensics (DF). Security testing was used to search the Application Programming Interfaces (APIs) of the IoT ecosystem for security vulnerabilities. Three Static Application Security Testing (SAST) Tools were used to search the source code of the cloud part of the system. A manual review was done to search the system as whole, with the guide of common vulnerability lists from the Open Web Application Security Project (OWASP). As a result, severe security vulnerabilities were found. A DF experiment was conducted where actions were taken in five Android smartphone apps to control six IoT devices (two are from aforementioned IoT ecosystem). The contents of the smartphone was then examined for forensic evidence of those actions. Additionally the contents one of the IoT devices was also examined for evidence. It was concluded that only limited evidence of the actions could be found. Additionally, various challenges were identified.
Det så kallade Sakernas Internet (eng. Internet of Things, IoT) området är en pågående och ökande trend. Trenden handler om att olika enklare enheter ansluts mot internet i stort antal. IoT-enheter har utsatts för, och utnyttjats i, cyber attacker som i exempelvis det så kallade “Mirai botnet”. Allt fler IoT-relaterade brott kan förväntas i framtiden, speciellt eftersom antalet IoT- enheter blir allt fler och mer diversifierade. I den här uppsatsen undersöks säkerheten i ett IoT ekosystem utifrån två aspekter: “security testing” (säkerhetstesting) och “digital forensics”. På svenska kalls digital forensics för “IT-forensik” (kriminalteknik inom informationsteknik) eller digital-forensik. Säkerhetstestning användes för att hitta sårbarheter i det undersökta IoT ekosystemets olika applikationsprogrammeringsgränssnitt. Tre olika verktyg av typen Static Application Security Testing (SAST) användes i undersökningen för att granska den kod som motsvarar moln-delen av systemet. Utöver de tre verktygen, undersöktes systemet också manuellt. Den manuella undersökning utgick från de listor av vanliga typer av sårbarheter som finns publicerade av organisationen Open Web Application Security Project (OWASP). Resultatmässigt hittades flera allvarliga sårbarheter i systemet. Digital forensics-delen av projektet bestod av ett experiment där en Android telefon, sex IoT-enheter (två från det ovannämnda IoT ekosystemet) och fem motsvarande Android-appar undersöktes. Experimentet bestod av att utföra olika handlingar i apparna (till exempel att skicka ett kommando till en IoT- enhet), och sedan av att leta bevis för de handlingarna. För att hitta bevis undersöktes innehållet på telefonen och innehållet på en av IoT-enheterna. Slutsatsen av experimentet är att bara få och begränsade bevis kunde hittas. Utmaningarna som påträffades i experimentet jämfördes med utmaningarna beskrivna i forskningslitteraturen inom digital forensics.
APA, Harvard, Vancouver, ISO, and other styles
10

Jose, Arun Cyril. "Intelligent home automation security system based on novel logical sensing and behaviour prediction." Thesis, University of Pretoria, 2017. http://hdl.handle.net/2263/65012.

Full text
Abstract:
The thesis, Intelligent Home Automation Security System Based on Novel Logical Sensing and Behavior Prediction, was designed to enhance authentication, authorization and security in smart home devices and services. The work proposes a three prong defensive strategy each of which are analyzed and evaluated separately to drastically improve security. The Device Fingerprinting techniques proposed, not only improves the existing approaches but also identifies the physical device accessing the home cybernetic and mechatronic systems using device specific and browser specific parameters. The Logical Sensing process analyses home inhabitant actions from a logical stand point and develops sophisticated and novel sensing techniques to identify intrusion attempts to a home’s physical and cyber space. Novel Behavior prediction methodology utilizes Bayesian networks to learn normal user behavior which is later compared to distinguish and identify suspicious user behaviors in the home in a timely manner. The logical sensing, behavior prediction and device fingerprinting techniques proposed were successfully tested, evaluated and verified in an actual home cyber physical system. The algorithms and techniques proposed in the thesis can be easily modified and adapted into many practical applications in Industrial Internet of Things, Industry 4.0 and cyber-physical systems.
Thesis (PhD)--University of Pretoria, 2017.
Electrical, Electronic and Computer Engineering
PhD
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
11

Shakhshir, Saad Zafer. "IntuiSec : a framework for intuitive user interaction with security in the smart home." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41668.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.
Includes bibliographical references (p. 99-104).
This thesis presents IntuiSec, a framework for intuitive user interaction with Smart Home security. The design approach of IntuiSec is to introduce a layer of indirection between user-level intent and the system-level security infrastructure. This layer is implemented by a collection of distributed middleware and user-level tools. It encapsulates system-level security events and exposes only concepts and real-world metaphors that are intuitive to non-expert users. It also translates user intent to the appropriate system-level security actions. The IntuiSec framework presents the user with intuitive steps for setting up a secure home network, establishing trusted relationships between devices, and granting temporal, selective access for both home occupants and visitors to devices within the home. The middleware exposes APIs that allow other applications to present the user with meaningful visualizations of security-related parameters and concepts. I present the IntuiSec system design and an example proof-of-concept implementation, which demonstrates the user experience and provides more insight into the framework.
by Saad Safer Shakhshir.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
12

Irengård, Gullstrand Simon, and Larsson Ivan Morales. "Evaluating privacy and security risks in smart home entertainment appliances, from a communication perspective." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20365.

Full text
Abstract:
Konceptet "smarta hem" blir mer och mer en del av vår vardag. På grund av den hastigautvecklingen och med tanke på att trådlös kommunikation har blivit normen, har säkerhetoch integritet blivit mer av ett bekymmer. Syftet med detta arbete är att undersöka vilkentyp av information som kan utvinnas ur ett underhållning-baserat smart hem med inriktning på en off -the-shelf spel-konsol, Playstation 4, ansluten till Internet. Detta scenario har undersökts med ett experiment som fokuserar på avlyssning av nätverkstrafik som inträffar vid användning av en sådan enhet i det dagliga livet. Resultatet av studien visar att känslig data såsom bilder är i själva verket möjligt att utvinna från nätverkskommunikationen.
The concept of smart home technology becomes more and more a part of our everydaylife. Because of the hasty evolution and considering that wireless communication has become the norm, the security and privacy problems have become more of a concern. The purpose of this work is to examine what kind of information can be extracted from anentertainment-based smart home involving an o -the-shelf game-console, Playstation 4,connected to the Internet. This scenario has been investigated with experiments focusingon the interception of networking tra c occurring when using such a device under everyday operations. The results of the study shows that sensitive data such as images is in fact possible to extract contrary to popular belief.
APA, Harvard, Vancouver, ISO, and other styles
13

Tong, Jizhou. "Design and Implementation Security Testbed (HANSim) and Intrusion Detection System (IDS) for the Home Area Network in the Smart Grid." University of Toledo / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1501856291735261.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Bugeja, Joseph. "Smart connected homes : concepts, risks, and challenges." Licentiate thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-7793.

Full text
Abstract:
The growth and presence of heterogeneous connected devices inside the home have the potential to provide increased efficiency and quality of life to the residents. Simultaneously, these devices tend to be Internet-connected and continuously monitor, collect, and transmit data about the residents and their daily lifestyle activities. Such data can be of a sensitive nature, such as camera feeds, voice commands, physiological data, and more. This data allows for the implementation of services, personalization support, and benefits offered by smart home technologies. Alas, there has been a rift of security and privacy attacks on connected home devices that compromise the security, safety, and privacy of the occupants. In this thesis, we provide a comprehensive description of the smart connected home ecosystem in terms of its assets, architecture, functionality, and capabilities. Especially, we focus on the data being collected by smart home devices. Such description and organization are necessary as a precursor to perform a rigorous security and privacy analysis of the smart home. Additionally, we seek to identify threat agents, risks, challenges, and propose some mitigation approaches suitable for home environments. Identifying these is core to characterize what is at stake, and to gain insights into what is required to build more robust, resilient, secure, and privacy-preserving smart home systems. Overall, we propose new concepts, models, and methods serving as a foundation for conducting deeper research work in particular linked to smart connected homes. In particular, we propose a taxonomy of devices; classification of data collected by smart connected homes; threat agent model for the smart connected home; and identify challenges, risks, and propose some mitigation approaches.
APA, Harvard, Vancouver, ISO, and other styles
15

Hasl, Caroline. "Perceived and Identified Security Risks in Smart Home Technology : A case study of three Chinese companies." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64903.

Full text
Abstract:
The interest and demand for smart home technologies has increased rapidly during the past few years. Due to factors such as convenience, innovation, flexibility, and security, these products are becoming a bigger part of our everyday life. With the increased demand and need for this technology, companies are working quickly to try to meet this demand and need of their customers. The development is becoming faster and faster, and therefore the risk of security being overlooked has increased. Companies want to meet the demand, and by trying to get the products on the market faster, other aspects might be compromised. A country which is often looked to for development and production of products is China. China is believed to be one of the countries with the most promising future for smart technologies and Internet of Things due to the immense investment put into telecommunications, development of technologies, and supporting infrastructure. The research of this thesis sought to investigate what effects the increased interest and demand for smart technologies has had on companies who are working with smart home technology by conducting a multiple case study on three companies in China which are in the smart home technology industry. With this case study, the perspective from the three companies has been gathered and analyzed. The research resulted in finding out the perception which these three companies have on the rapid development of smart home technologies, and the firsthand effects it has had on their individual company.
APA, Harvard, Vancouver, ISO, and other styles
16

Carohl, Qvist Amanda. "IOT inom hemautomation : Jämförande av open-source kontrollers." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18922.

Full text
Abstract:
Internet Of Things (IoT) och hemautomation innebär möjligheten att koppla upp diverse enheter i ett hem gentemot internet, som därefter har som mål att underlätta och göra konsumenters vardag mer bekvämt. Hemautomation kan exempelvis handla om att låsa dörrar och tända lampor från en enda enhet (kontrollern), vilket underlättar då konsumenten inte behöver gå till vardera enhet för att utföra önskade aktiviteter. Kontrollers är den del av ett IoT-system inom hemautomation som agerar gränssnittet mellan konsumenten och enheterna.Open-source erbjuder konsumenter ett mer fritt nyttjande av produkter pga. dess öppna källkod. Många problem och frågor som uppstår i samband med dessa produkter härstammar inom området av säkerhet, samt vad som skiljer produkterna åt avseende säkerhet.Denna studie har samlat ihop sex open-source kontrollers och genomfört en jämförelse för att identifiera vilka kontrollers som uppnår säkerhet avseende konfidentialitet, integritet och tillgänglighet. Detta har utförts genom att identifiera vilka värden som förekommer i tidigare artiklar där säkerheten utvärderas för IoT och hemautomation, och för kontrollers.Studien kopplar ihop identifierade värden med CIA modellen, vilket står för confidentiality, integrity och availability (konfidentialitet, integritet och tillgänglighet). I samband med CIA modellen presenteras ett resultat där studiens aktuella kontrollers visar till vilken nivå de upprätthåller CIA modellen, baserat på det identifierade värden som fastställts. De kontrollers som förekommer i studien är Home Genie, OpenHAB, Home Assistant, Domoticz, Calaos och Pimatic.Studiens resultat erhålls via en litterär undersökning av 25 tidigare studier samt 12st tillkommande tekniska dokumentationer och forum för samtliga tillhörande kontrollers. Samtliga studier har blivit hämtade från databaserna Google Scholar, IEEE Xplore och ACM Digital Library och har därefter blivit analyserade och tematiskt kodade för vidare information. Totalt har studiens material genomgått urval i fem steg för att garantera relevant material som stämmer överens med studiens kriterier och mål för innehåll. Studiens resultat presenterar en ögonblicksbild som ger kunskap om jämförda kontrollers, specifikt i samband med CIA modellen, vilket belyser produkterna i samband för området av säkerhet avseende konfidentialitet, integritet och tillgänglighet.
Internet of Things (IoT) and home automation means the opportunity to connect various devices in a home to the Internet, which has the goal of facilitating and making consumers’ everyday lives more comfortable. For example, home automation could be about locking doors and lighting lamps from a single device (the controller), which may make it easier for the consumer since the consumer does not have to go to each device to perform the desired activity. Controllers are the part of a home automation IoT-system that acts as an interface between the consumer and the devices.Open-source offers consumers a freer use of products, due to its open-source code. Many problems and issues that arise in connection with these products originate in the field of security, as well as what distinguishes the products in terms of security.This study has collected six open-source controllers and conducted a comparison to identify which controllers achieve security regarding confidentiality, integrity and availability. This has been done by identifying the values that appear in previous articles where security is evaluated for IoT and home automation, and controllers.This study links identified values with the CIA model, which stands for confidentiality, integrity, and availability. In accordance with the CIA model, a result is presented where the study’s current controllers show to what level they maintain the CIA model, based on the identifies values established. The controllers that appears in this study are Home Genie, OpenHAB, Home Assistant, Domoticz, Calaos, and Pimatic.This study’s results are obtained through a literary study of 25 studies, and 12 additional technical documentations and information through forums for all the associated controllers. All studies have been retrieved from the Google Scholar database, IEEE Xplore, and ACM Digital Library, and subsequently analyzed and thematically coded for further information. In total, the material of this study has been selected in five steps to ensure relevant material that meets this study’s criteria and objectives for content. This study’s results present an overview that provides knowledge about compared controllers, specifically in connection with the CIA model which highlights the products in the field of security, regarding confidentiality, integrity, and availability.
APA, Harvard, Vancouver, ISO, and other styles
17

Eriksson, Anton, and Joel Tjernström. "Säkerhet i smarta hem: användares agerande : En fallstudie i användares möjligheter att agera och deras agerande för att hålla smarta hemprodukter säkra." Thesis, Tekniska Högskolan, Jönköping University, JTH, Datateknik och informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-50830.

Full text
Abstract:
This study explores how smart home users act to keep their smart products safe. The sample was identified in the literature as early adopters. These were studied through a qualitative case study with semi-structured interviews. Data were then analysed with a thematic analysis, which resulted in four themes: Lack of concern, In the hands of the manufacturer, Safety outside the product and Safety measures. The informants had different reasons and motivations for their common lack of concern, their experience of being able to influence product security the measures they could evoke and the measures they actually took. The informants' lack of concern is linked to the theory of the impact of worryon actionand risk perception. The informants' problems in influencing security are supported by other literature. Their hypothetical measures are mainly outside the product. The actions they actually perform on the product are limited to basic security measures such as passwords, etc. Users find it difficult to influence the security of their products, unsafe products can easily fall victim to malicious individuals and influence others in their environment.
Denna studie undersöker hur användare av smarta hem kan agera för att hålla sina smarta produkter säkra.Urvalet identifierades i litteratur som early adopters. Dessa studerades genom en kvalitativ fallstudie med semistrukturerade intervjuer. Data analyserades sedan med en tematisk analys, vilket resulterade i fyra teman: Avsaknad av oro, I händerna på tillverkaren, Säkerhet utanför produkten och Säkerhetsåtgärder. Informanterna hade olika anledningar och motivationer till sin gemensamma avsaknad av oro, deras upplevelse av att kunna påverka produkters säkerhet, de åtgärder som de kunde frammana och de åtgärder som de faktiskt gjorde. Informanternas avsaknad av oro länkas till teori om oros påverkan på agerande och upplevd risk. Informanternas problematik att påverka säkerheten stöds av annan litteratur. Deras hypotetiska åtgärder ligger i huvudsak utanför produkten. Det agerande de faktiskt utför på sina produkter är begränsat till grundläggande säkerhetsåtgärder som lösenord etc. Användarna har svårt att påverka säkerheten hos sina produkter, osäkra produkter kan enkelt falla offer för illvilliga individer och påverka andra i sin omgivning.
APA, Harvard, Vancouver, ISO, and other styles
18

Viding, Emmie. "Does Your TV Spy on You? : The security, privacy and safety issues with IoT." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17985.

Full text
Abstract:
The growth of Internet of Things is steadily increasing, both in Sweden and globally. This relative new technology improves the lives of many; but at the price of their security, privacy and safety. This thesis consists of a literature study and an online survey. It investigates what security, privacy and safety risks Internet of Things devices may bring, how aware people are about these risks, how the user can minimize the risk of being hacked or attacked and what manufacturers can do to make safer Internet of Thing devices. The survey was created based on the risks related to Internet of Things devices which was found during the literature study. It was possible to identify security, privacy and safety risks related to Internet of Things. It was also possible to find answers of how both users and manufacturers can protect their devices from being hacked. The survey showed that there was a correlation between how interested people are in technology and how aware they are of the risks with Internet of Things. Internet of Things can be used to do DDoS attacks, espionage and eavesdropping. People who are interested in technology tends to protect themselves more actively (by changing default password and updating the software) compared to those who are not interested.
APA, Harvard, Vancouver, ISO, and other styles
19

Fältros, Jesper, Isak Alinger, and Bergen Axel von. "Safety risks with ZigBee smart devices : Identifying risks and countermeasures in ZigBee devices with an eavesdropping experiment." Thesis, Tekniska Högskolan, Jönköping University, JTH, Datateknik och informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-49630.

Full text
Abstract:
With ZigBee being the world’s leading IoT protocol, users are vulnerable to attacks on the wireless communication between ZigBee devices and the information that can be gained from them. For users to protect themselves from potential attacks they need to be aware of what information can be extracted and how it can be countered. Through an eavesdropping experiment, done using three individual sensors from different vendors, various packets with potential for misuse have been identified within the area of building security. With the potential areas of misuse identified, there is also a need for countermeasures against these threats. Countermeasures were identified through a collection of literature that was summarized in order to provide a wide range of alternatives, suitable to different scenarios. The experiment was limited to the functions of the sensors used, as well as traffic using the ZigBee protocol. This study pinpoints a potential for misuse of the ZigBee traffic sent between devices and shows that the ZigBee protocol is fundamentally flawed from a security aspect. Whilst countermeasures exist, they are not applicable to every situation which is why the ZigBee protocol itself needs further development to be considered secure.
APA, Harvard, Vancouver, ISO, and other styles
20

El, jaouhari Saad. "A secure design of WoT services for smart cities." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0120/document.

Full text
Abstract:
WebRTC est une technologie récente de communication qui permet d’établir des échanges multimédia conversationnels directement entre navigateurs. Nous nous intéressons dans cette thèse à des locuteurs dans un Smart Space (SS) défini comme un environnement centré-utilisateur instrumenté par unensemble de capteurs et d’actionneurs connectés. Nous analysons les capacités nécessaires pour permettre à un participant d’une session WebRTC d’impliquer dans cette même session, les flux induits par les objets connectés appartenant au SS d’un utilisateur quelconque de la session. Cette approche recèle un gisement de nombreux nouveaux usages. Nous limitons notre analyse à ceux concernant l’exercice distant d’une expertise et d’un savoir-faire. Techniquement, il s’agit d’articuler de façon contrôlée WebRTC et IoT/WoT. Nous procédons à une extension de WebRTC par WoT pour fournir à tout utilisateur d’une session WebRTC, un accès aux objets connectés du SS de tout autre participant à la session, en mettant l’accent sur la sécurisation de cet accès ainsi que sur sa conformité aux exigences de respect de la vie privée (RGPD) de l’utilisateur concerné. Le positionnement de notre approche dans le contexte des services de communication opérant dans les villes connectées, impose la prise en compte de SSs multiples et variés induisant chacun ses propres politiques de routage et de sécurité. Pour répondre à nos objectifs, il devient nécessaire au cours d’une session WebRTC, d’identifier, sélectionner, déployer et appliquer les règles de routage et de sécurité de façon à garantir un accès rapide et sécurisé aux différents SSs concernés et distribués sur tout le réseau. Nous développons une architecture originale répondant à ces besoins et intégrant un contrôleur SDN du fait de l’étroite imbrication entre les problématiques de routage et de sécurité. Un prototype illustrant notre approche a été mis en oeuvre et testé afin d’évaluer la performance et la sécurité du système. Nous illustrons finalement notre approche dans le domaine de la santé en démontrant son apport pour gérer une infrastructure de grande taille telle qu’un hôpital
The richness and the versatility of WebRTC, a new peer-to-peer, real-time and browser based communication technology, allowed the imagination of new and innovative services. In this thesis, we analyzed the capabilities required to allow a participant in a WebRTC session to access the smart Things belonging to his own environment as well as those of any other participant in the same session. The access to such environment, which we call “SmartSpace (SS)”, can be either passive, for example by monitoring the contextual information provided by the sensors, or active by requesting the execution of commands by the actuators, or a mixture of both. This approach deserves attention because it allows solving in an original way various issues such as allowing experts to remotely exercise and provide their expertise and/or knowing how. From a technical point of view the issue is not trivial because it requires a smooth and mastered articulation between two different technologies: WebRTC and the Internet of Things (IoT) /Web of Things (WoT). Hence, the first part of the problem studied in this thesis, consists in analyzing the possibilities of extending WebRTC capabilities with theWoT. So as to provide a secure and privacy-respectful access to the various smart objects located in the immediate environment of a participant to any otherend-user involved in the same ongoing WebRTC session. This approach is then illustrated in the ehealth domain and tested in a real smart home (a typical example of a smart space). Moreover,positioning our approach in the context of communication services operating in smart cities requires the ability to support a multiplicity of SSs,each with its own network and security policy. Hence,in order to allow a participant to access one of his own SSs or one of another participant (through a delegation of access process), it becomes necessary to dynamically identify, select, deploy, and enforce the SS’s specific routing and security rules, so as to have an effective, fast and secure access. Therefore, the second part of the problem studied in this Ph.D.consists in defining an efficient management of the routing and security issues regarding the possibility of having multiple SSs distributed over the entire network
APA, Harvard, Vancouver, ISO, and other styles
21

Lindorin, Axel. "Säkerhet i smarta hem : En litteraturanalys på protokollsäkerhet för det smarta hemmet." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18940.

Full text
Abstract:
Denna undersökning har granskat det problem som uppstår i samband med den snabba utvecklingen utav Internet of Things där de lågenergienheter saknar kraft för att utföra avancerade säkerhetslösningar. På grund av den låga säkerheten och växande användningsområdet så har Internet of Things enheterna blivit ett lockande mål för eventuella attacker. Den systematiska litteraturanalysen har genomförts genom att granska tidigare mer detaljerade analyser av protokollen och dess säkerhet samt utvecklarnas specifikationer. Detta för att bland annat skapa en sammanfattning utav protokollens säkerhet men också för att sedan jämföra protokollen för att kunna ta fram det säkrare protokollet för hemanvändning. Alla protokoll som tas upp har någon form av säkerhet implementerad för att förse med autentisering i form av MAC (i vissa fall HMAC), nyckelhantering, integritet i form av MIC och kommunikationssäkerhet med kryptering. Alla protokoll har stöd för AES-128 kryptering samt användning av IEEE 802.15.4 säkerhetsserie som ytterligare skydd utöver protokollens egna lösningar. Flertalen av protokollen använder sig också av Elleptic Curve för att säkert transportera nycklar. Analysens slutsats visar att Thread och Z-Wave anses som de två säkraste protokollen för hemmaanvändning. Det baserat på hur protokollen hanterar de olika aspekterna med sin märkbara prioritering av säkerhet tillsammans med det få antalet brister som kan skada det smarta hemmet. Bluetooth Low Energy och EnOcean är de två mindre säkra gällande en IoT miljö. Undersökningen tar också med en diskussion kring olika områden som dykt upp under undersökningens gång. Slutligen tas några punkter som dök upp under granskningen som kan vara bra att tänka på vid utveckling av dessa protokoll men säkerhet i tanken.
This study has examined the problems that arise in connection with the rapid development of the Internet of Things, where the low-energy units lack the power to implement advanced security solutions. Due to the low security and growing area of use, the Internet of Things units have become an attractive target for any attacks. The systematic literature analysis has been carried out by reviewing previously more detailed analyzes of the protocols and their security as well as the developers' specifications. This is to create a wide summary of the security of the protocols and then to compare the protocols to select one or more as the safer protocol for home use. All protocols that are included have some form of security implemented to provide authentication in the form of MAC, key management, integrity in the form of MIC and communication security with encryption. All protocols support AES-128 encryption and the use of IEEE 802.15.4 security suit as additional protection in addition to the protocol's own solutions. The majority of protocols also use Elleptic Curve to safely transport keys. The analysis concludes that Thread and Z-Wave are considered the two most secure home use protocols. It is based on how the protocols handle the various aspects with their noticeable prioritization of security along with the few deficiencies that can damage the smart home. Bluetooth Low Energy and EnOcean are thetwo less secure regarding an IoT environment. The survey also includes a discussion of various areas that emerged during the course of the investigation. Finally, some points that emerged during the review that may be good to consider when developing these protocols with security as focus.
APA, Harvard, Vancouver, ISO, and other styles
22

Коротка, Г. М. "Система захисту розумного будинку на основі блокчейн технологій." Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/24852.

Full text
Abstract:
Коротка, Г. М. Система захисту розумного будинку на основі блокчейн технологій : випускна кваліфікаційна робота : 125 "Кібербезпека" / Г. М. Коротка ; керівник роботи М. Є. Шелест ; НУ "Чернігівська політехніка", кафедра кібербезпеки та математичного моделювання . – Чернігів, 2021. – 50 с.
Мета роботи: розробка системи захисту розумного будинку на основі блокчейн технологій. Об’єкт дослідження: процес забезпечення інформаційної безпеки в роботі розумних пристроїв. Предмет дослідження: система захисту розумного будинку на основі блокчейн технології. Методи дослідження: для вирішення поставлених індивідуальних завдань у роботі використовуються наступні методи дослідження: вивчення теоретичної науково-практичної літератури про IoT-пристроїв та блокчейн, метод аналізу та синтезу. Використання даних методів дозволило дослідити безпеку роботи розумного будинку та основні загрози мережі IoT, визначити переваги інтеграції блокчейн та IoT та розробити систему захисту розумного будинку на основі блокчейн технологій. Результати та новизна: результатом виконаної роботи є розроблена система захисту розумного будинку на основі блокчейн технологій, що може бути застосована при проектуванні мережі Інтернету речей і здатна забезпечити безперебійну та безпечну роботу практично всіх сфер життєдіяльності людини, в яких активно використовуються прилади Інтернету речей. Галузь застосування: реалізація системи захисту розумного будинку.
Purpose: development security system of a smart home based on blockchain technologies. Object of research: the process of providing information security of smart devices. Subject of research: security system of smart home based on blockchain technology. Research methods: The following research methods are used to solve the set individual tasks: study of theoretical scientific and practical literature on IoT-devices and blockchain, method of analysis and synthesis. The use of these methods allowed to study the security of a smart home and the main threats of the IoT network, to determine the benefits of blockchain and IoT integration and to develop a smart home security system based on blockchain technologies. Results and novelty: the result of the work is security system of a smart home based on blockchain technologies that can be used in the design of the Internet of Things and is able to ensure uninterrupted and safe operation of almost all spheres of human life in which the Internet of Things is actively used. Field of the application: implementation of smart home protection system.
APA, Harvard, Vancouver, ISO, and other styles
23

Valičková, Monika. "Řízení bezpečnosti inteligentní domácnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378362.

Full text
Abstract:
This diploma thesis is focused on increasing Smart Home Control System security in terms of information, network and physical security. It is based on a risk analysis of the current state of applied security management and the needs of the house owner. Both security countermeasure and cost analysis are thoroughly discussed, and the thesis also contains methodology, which describes the management of smart home security and improvement of end-user security awareness.
APA, Harvard, Vancouver, ISO, and other styles
24

Halaj, Jozef. "Detekce anomálií v IoT sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417286.

Full text
Abstract:
The goal of the thesis was an analysis of IoT communication protocols, their vulnerabilities and the creation of a suitable anomaly detector. It must be possible to run the detector on routers with the OpenWRT system. To create the final solution, it was necessary to analyze the communication protocols BLE and Z-Wave with a focus on their security and vulnerabilities. Furthermore, it was necessary to analyze the possibilities of anomaly detection, design and implement the detection system. The result is a modular detection system based on the NEMEA framework. The detection system is able to detect re-pairing of BLE devices representing a potential pairing attack. The system allows interception of Z-Wave communication using SDR, detection of Z-Wave network scanning and several attacks on network routing. The system extends the existing detector over IoT statistical data with more detailed statistics with a broader view of the network. The original solution had only Z-Wave statistics with a limited view of the network obtained from the Z-Wave controller. The modular solution of the system provides deployment flexibility and easy system scalability. The functionality of the solution was verified by experiments and a set of automated tests. The system was also successfully tested on a router with OpenWRT and in the real world enviroment. The results of the thesis were used within the SIoT project.
APA, Harvard, Vancouver, ISO, and other styles
25

Piškula, David. "Internet of Things." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399196.

Full text
Abstract:
This thesis focuses on the Internet of Things and some of the most important problems it faces today. Among these are the overdependence on the Cloud and lack of autonomy, poor security and privacy, complicated initialization and power consumption. The work aims to implement a complex IoT solution that solves the discussed problems. The project is part of a collaboration with NXP Semicondutors and will be used to showcase the company's technologies.
APA, Harvard, Vancouver, ISO, and other styles
26

Dupre, Rob. "Scene analysis and risk estimation for domestic robots, security and smart homes." Thesis, Kingston University, 2017. http://eprints.kingston.ac.uk/37781/.

Full text
Abstract:
The evaluation of risk within a scene is a new and emerging area of research. With the advent of smart enabled homes and the continued development and implementation of domestic robotics, the platform for automated risk assessment within the home is now a possibility. The aim of this thesis is to explore a subsection of the problems facing the detection and quantification of risk in a domestic setting. A Risk Estimation framework is introduced which provides a flexible and context aware platform from which measurable elements of risk can be combined to create a final risk score for a scene. To populate this framework, three elements of measurable risk are proposed and evaluated: Firstly, scene stability, assessing the location and stability of objects within an environment through the use of physics simulation techniques. Secondly, hazard feature analysis using two specifically designed novel feature descriptors (3D Voxel HOG and the Physics Behaviour Feature) which determine if the objects within a scene have dangerous or risky properties such as blades or points. Finally, environment interaction, which uses human behaviour simulation to predict human reactions to detected risks and highlight areas of a scene most likely to be visited. Additionally methodologies are introduced to support these concepts including: a simulation prediction framework which reduces the computational cost of physics simulation, a Robust Filter and Complex Adaboost which aim to improve the robustness and training times required for hazard feature classification models. The Human and Group Behaviour Evaluation framework is introduced to provide a platform from which simulation algorithms can be evaluated without the need for extensive ground truth data. Finally the 3D Risk Scenes (3DRS) dataset is introduced, creating a risk specific dataset for the evaluation of future domestic risk analysis methodologies.
APA, Harvard, Vancouver, ISO, and other styles
27

Johansson, Christer, and Viktor Andersson. "Sakernas internet - En säkerhetsrisk : En kvantitativ studie om privatpersoners kunskap gällande IoT-enheters säkerhet." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45549.

Full text
Abstract:
With the constant growth of units connected to the internet, it’s becoming more and more common for private persons to get these units into their homes. With easier accessibility to smart units that can be connected straight to your smart home, and at the same time can make your everyday life easier, may also be the greatest securityrisk of your life. The focus of this essay is about the internet of things-units (IoT-units) that’s considered a large securityrisk. This work is made as a quantitative study about security deficiencies among private persons regarding IoT-units. The data produced from this work can be used as an answer of what a private person needs to be more vigilant of when it comes to IoT-units, and also what actions the manufacturing industry need to take for the connected community to be secured. To delve into this, we have chosen to use the methods literature study and a questionnaire study that will be performed to obtain data to answer our questions. Analysis has been made about what can be seen as an IoT-unit, what security deficiencies there are and then account for how to counteract these risks with help of knowledge. The result of the answers from the surveys and the picture we have received after a search for a sustainable and a more secure solution is that some knowledge exists, although not to the extent needed. The conclusion that can be drawn after the analysis of surveys and in the previous research how it should proceed in the current situation is that significantly more resources need to be spent on the right information for the right purpose, when it comes to this important IT-related issue.
APA, Harvard, Vancouver, ISO, and other styles
28

Eliasson, Frida, Gabriella Karlsson, and Agnes Svanling. "Smarta enheter i hemmet : nytta eller risk för individen?" Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-12608.

Full text
Abstract:
Teknikutvecklingen och digitaliseringen går fort framåt och har idag sträckt sig till det privatahemmet. Det smarta hemmet är en del av ett större fenomen som kallas Internet of Things(IoT). Enheterna inom IoT består av sensorer och datorer som kan kommunicera medvarandra och skapa ett situationsanpassat beteende. Idén med smarta hem handlar om attanvända sig av olika smarta enheter inom hemmet, som är uppkopplade till ett gemensamtnätverk. Smarta hem bidrar med många bra funktioner där individen kan skapa en bekväm,säker och hållbar vardag. Förutom att underlätta i vardagen för individer kommer dessasmarta enheter med ett antal risker. Ju fler enheter som kopplas upp på ett nätverk destoenklare är det för en obehörig person att komma åt en annan individs privata information. Det samlas in mycket data från de smarta enheterna vilket kan möjliggöra detaljeradkartläggning av användaren. Det är svårt att veta vem som får tillgång till den privatainformationen om användaren vilket bidrar till att det blir svårt för individen att vara anonymoch skydda sig. Syftet med studien är att utveckla kunskap om vilken medvetenhet som finnshos individen kring riskerna vid användning av smarta enheter i hemmet, då det finnsförhållandevis lite forskning inom ämnet. En effekt av att individen blir mer medveten kanleda till att hen tar mer ansvar och därmed skyddar sig mer mot eventuella IT-brott. Utgångspunkten för studien har varit att samla in tidigare forskning och litteratur samt attutföra en kvantitativ enkätundersökning. Litteraturstudien ligger till grund till både tidigareforskning och det teoretiska ramverket. Med hjälp av litteraturstudien har enkätfrågorutformats för att kunna besvara studiens frågeställning. Enkätundersökningen gjordes via eninternetenkät som riktades till användarna av smarta enheter i hemmet. Utifrån insamlatmaterial och empiri kunde ett resultat presenteras och en analys utföras. Med hjälp av fyraolika teman har en slutsats dragits om vilken medvetenhet som finns hos individen kringriskerna vid användningen av smarta enheter i hemmet.
The development of technology and digitization are moving fast forward and have nowextended to the private homes. The smart home is part of a larger phenomenon called Internetof Things (IoT). The IoT devices consist of sensors and computers that can communicate witheach other and create a situational behavior. The idea of smart homes is about using differentsmart devices within the home, which are connected to a shared network. Smart homesprovides with many great functions where the individuals can create a comfortable, safe andsustainable everyday life. In addition to facilitating everyday life for individuals, these smartdevices come with a number of risks. The more devices connected to the Internet, the easier itgets for an unauthorized person to access another person's private information. The smartdevices collect a lot of data, which enables for detailed mapping of the user. It's hard to knowwho gets access to the private data about the user, which makes it difficult for the individualto be anonymous and protect himself. The purpose of the study is to develop knowledge aboutthe awareness of the individual about the risks associated with the use of smart devices athome, as there is relatively little research on the subject. An effect of becoming more aware ofthe risks, can lead to more responsibility taken by the individual to protect itself againstpossible IT crimes. The starting point of the study has been to collect prior research and literature and to conducta quantitative survey. The literature study forms the basis for the previous research and thetheoretical framework. With help from the literature, survey questions have been formulatedto answer the research question. The survey was conducted through an internet survey aimedto users of smart devices at home. Based on collected material and empirical data, a resultcould be presented and an analysis performed. With the help of four different themes, aconclusion has been drawn about the awareness of the individual about the risks associatedwith the use of smart devices in the home.Keywords:
APA, Harvard, Vancouver, ISO, and other styles
29

Shiang, Chang Ming, and 張銘祥. "Smart Home Security System." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/595y36.

Full text
Abstract:
碩士
國立臺北科技大學
自動化科技研究所
103
This thesis implemented a smart home security system, the system includes five parts: 1.Smart HomeBox, 2. wireless docking hardware device, 3. Face Recognition, 4. Cloud Server, 5.Android App. This smart home security system can let you easily get the informtion of temperature, humidity, switch status of doors and windows, the concentration of the suspended particles etc. in your home. The related information will be uploaded to the cloud server and the abnormal conditions will be further stored in the SQLite database. Therefore, the smart phone can get relevant information using 4G or Wifi to connect the cloud server. The human face recognition is another contribution in this thesis. Here, the OpenCV library associated with relevant algorithms are applied to implement the human face recognition. In the experiment, the 40 individuals of AT&;T Laboratories Cambridgeare used to test the performance of implemented human face recognition, where each person have 10 photos. In first experiment, the training time, recognition time, amount of features, the identification rate are measured by using normal photos. In second experiment, the same performance indexes are measured by adding the noise, bright variation, twirling, mask into the original photos. The optimal recognition method will be obtained by the aforementioned analysis and then it will be further implemeted in the Android platform.
APA, Harvard, Vancouver, ISO, and other styles
30

WU, CHENG-LIN, and 吳政霖. "Security Notification System in Smart Home." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/695tjh.

Full text
Abstract:
碩士
國立高雄科技大學
電機工程系
107
In recent years, due to the rapid development of the Internet and the popularity of mobile devices, the Internet of Things (IoT) has rapidly developed in various fields and has driven the rise of related markets. Taiwan has gradually been affected by the increase in the elderly population and the declining birthrate. The smart home life has also received more and more attention. In the past, traditional methods used passive protection for fences, window railing, and security box. However, these devices can only provide passive protection after the invasion of the gangsters, and cannot effectively notify the owners and the police immediately. When the house was invaded, it was found that some items were discarded, and the police would be negatively alerted. Therefore, favorable information was immediately sent to the police to bring the criminals to justice. Furthermore, with the development of technology, the security system has provided complete security services, including access control systems, sensor applications, and video recording and storage, to prevent abnormal environmental conditions. But the application of IoT brought can never be aimed at home security. Smart home has gradually become a goal of human beings, mainly because families are closest to people's lives, how to combine people's daily and IoT concepts, and to present the connection between people and technology in family life. By integrating various devices and systems in the home to promote automated home facilities, thereby improving human living standards and quality, such as home entertainment, smart home appliances, energy management, security monitoring and home care are all considerations for smart home and home security. This paper proposes a system combining smart home and home security. The cloud server monitors the status of all devices. The data collector collects the signals of the sensors and transmits the data to the cloud server via the optical network by Ethernet. After the data is processed by the cloud server, the instant information can be displayed on the TV or screen. In response to the security problem, the data will be encrypted and uploaded to the cloud server before being transmitted to the cloud server. The data will not be leaked even if it is intercepted. At the same time, it can monitor the home environment status through mobile devices, and remote to remote control appliances, not only maintain the original residential functions, but also have the advantages of architecture, network communication, equipment automation, integration system, service and management. And an environmentally friendly living environment, providing convenient functions to help families communicate with the outside world, optimize people's living standards, help people arrange time more efficiently, and increase the safety of living.
APA, Harvard, Vancouver, ISO, and other styles
31

Lin, Wei-Yu, and 林威宇. "Smart Home Security and Surveillance System." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/h76676.

Full text
Abstract:
碩士
國立虎尾科技大學
飛機工程系航空與電子科技碩士班
104
As the proportion of the elderly population increases, Taiwan''s aging population problem is getting more and more serious situation. Whether elders live alone at home or children work outside the home without parents, in order to improve the risk of the elderly alone at home, which poses potential danger to the elders, especially in delaying to the hospital and being missing. Therefore, having a “Smart Home Security and Surveillance System” that can be used to around the home, is capable of requesting help and position surveillance, can increase the safety of the elders. The Smart Home Security and Surveillance System contain Multi-band wireless transmission system , that is based on Internet of Things(IOT). The system consists of ZigBee-based wireless communication、Bluetooth and 3rd G(Third Generation) .Through ZigBee, and the system will be able to transmit the locations of the sensors to the surveillance station. at the same time the surveillance station send a message or e-mail notification surveillance personnel. As a result, when a person with the system is in need of help, he or she can then send out a distress signal with a push of a button. The system provides complete surveillance of personnel home security surveillance system
APA, Harvard, Vancouver, ISO, and other styles
32

HSU, CHIH-CHIANG, and 許志強. "IOT Smart Home Security and Home Care for The Elderly." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/39pk4d.

Full text
Abstract:
碩士
國立高雄科技大學
資訊工程系
107
In 2019, smart families will become the mainstream, mainly the family is closest to peoples lives, combining the concepts of daily life and the Internet of Things. The IoT can improve the energy efficiency of buildings, such as optimizing air conditioning, ventilation, lighting control, smart sockets, curtain controllers, leak detection, remote public space monitoring, Internet intercom, special status notification, Through a dedicated APP, smart home phones, tablet devices for home door intercom, or extended application of home automation, and many other smart home applications. Through the IoT , we can solve the major problem that the burden of young people is becoming more and more important. Children often need to face assistance. Many inconveniences in daily life cause emotional distress. However, the children are not assured that the elderly live alone or to the security agencies. Therefore, safe "aging at home" is the best choice.
APA, Harvard, Vancouver, ISO, and other styles
33

Huang, Ya-Ling, and 黃雅綾. "Interface Design for Security System of Smart Home." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/49051651952630962685.

Full text
Abstract:
碩士
國立臺北科技大學
創新設計研究所
91
World Health Organization (WHO) proposes that security, health, connivance and comfort are four important indicators of quality of human life. Security, however, is the most important issue among them. Since Internet and intranet of the communication system have been rapidly developing, so house designer, today, has adapted more and more housing security technique. We may also call this technology integration as intelligent home. Intelligent home conceptualizes secure living in the human life. Integration with sensor technology and Internet and GPS communication system, many intelligent products has been developed. The concept of intelligent home is an important issue to a designer in facing challenge of near future. Therefore, the objective of this study was to investigate the know-how of the intelligent house. Specific aims of this study were (1) to developing a framework of home security systems; (2) to design an interface of home security systems; and (3) to set up a mode of home security systems.
APA, Harvard, Vancouver, ISO, and other styles
34

Chung, Chiu-Ju, and 鐘秋如. "The Market Demand of Smart Home Security Surveillance." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/04018828437809429052.

Full text
Abstract:
碩士
實踐大學
企業管理學系碩士在職專班
100
Family has always been the center of life for all mankind. Due to the rapid scientific and technological civilization, the basic resource of the observing needs for family life in the field of "digital home" has progressively developed into "smart home". This is no longer confined to the “home networking”, coupled with the rise of cloud computing. New industries for promoting global smart home have been occurred and also continuing to expand in emerging markets. Worldwide manufacturers, including mainland China and Taiwan, working on the smart home can be summarized in seven industrial businesses, such as electronic communications, information services, televisions, electrical appliances, security monitoring, medical care and system integration. In addition, the smart home markets, with new technologies or new business opportunities, have also been developed into four application areas which are home entertainment, wisdom home appliances, security monitoring, and health care. Therefore, this study is using the Kano model that includes questionnaire survey design and statistical analysis. The purpose is to explore if there is significant difference among business markets from consumers demand on security monitoring of smart home. Finally, this study displayed a quadrant figure indicating satisfaction/dissatisfaction so as to help businesses understand the needs of consumer to enhance the Customer Satisfaction and to reduce the Extent of Dissatisfaction for their system integration of safety monitoring equipments and services. It will also enhance the creation of Attractive Quality Elements and reduce the One-Dimensional Quality Element in order to put forward a consumer need products and active marketing strategies.
APA, Harvard, Vancouver, ISO, and other styles
35

Joy_Joa and 饒哲儒. "Sensor Information Analysis for Smart Home Security System." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/nrrd23.

Full text
Abstract:
碩士
中原大學
資訊管理研究所
104
The main thesis of this study is in accordance with SHM (Structural Health Monitoring) feature structural health monitoring applications, sensors to monitor and analyze the captured data, aimed at effective monitoring data anomalies offset value, and set five quadrant control as the basis for subsequent exception handling events, achieve effective information delivery of data, further analysis of the precise events, and smart home system architecture and application as the main analysis. In the analysis operation can be divided into two blocks SPC(statistical process control) and EPL(Effective Privilege Level) approach, to filter and analyze large data sensor original information, and the use of SHM architecture CM (cluster members) as well as the main core group CH ( cluster heads) as the sensor on the processing and delivery system according to class, thus achieving accurate determination.
APA, Harvard, Vancouver, ISO, and other styles
36

SHIH-SIN, CHEN, and 陳世昕. "IOT Smart Home APP and Bluetooth Security Implement." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/49790844520884883368.

Full text
Abstract:
碩士
僑光科技大學
資訊科技研究所
103
Abstract Information Technology (IT) is central to modern life which remodeling the era as the era of internet to things (IOT) and mature smart life has been gradually forming. The most obvious indicators within are demand and popularity of smart phones and tablet PCs and other handheld devices. While we look forward to the future , we’ll find out smart home will be an important milestone of the way people fullfill their desire of smart life . Hence there shoule be basically insist three core essential performance of smart home, they are : remote control 、automatic adjustment and situation notice . In this research, we try to implement the connection between smart handheld devices and smart home by CmoreArduino, and tune all the scenario reaction between real lightness at home and the automatic adjustment of light sensing devices associated with the remot control capability by Appsduino UNO, and we expact to build a remote control and automatically adjust system to save energy , and enclosed light- sensing detectors to provide an additional smart home - Otherwis, this study we used Bluetooth as the the connecting, that we also raise it’s relative security concern and its solutions.
APA, Harvard, Vancouver, ISO, and other styles
37

Wu, Ching Yi, and 吳靜怡. "Design of Security Mechanisms for Smart Home Systems." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/98752982274843455935.

Full text
Abstract:
碩士
長庚大學
資訊管理學系
100
Recently, smart home systems and techniques are developed increasingly. However, there are many potential information security threats to them. For this reason, many scholars and ITU standardization organizations discussed and explored the related information security threats, and develop some solutions and standards to improve protection of smart home systems. In this thesis, we discussed some practical security issues about authentication of the user, authorization of the user, trust level of the delegated users, device to device authentication, and command authentication. We further applied concepts of cryptographic threshold signature mechanisms and Modbus authentication protocols to develop two solutions to solve above issues, a threshold signature scheme and a device authentication protocol. The former allows a smart home user to delegate his privilege and rights to proxy users according to their trust level. User authentication, message integrity, non-repudiation, and user delegation can be achieved in a smart home system. The latter allows a smart home system to authenticate the authenticity of smart home devices, and integrity, and authentication of system commands for withstanding potential fraud device attacks. Number of smart home commanding is also limited and updated by the system. Hence, security of a smart home system can be improved based on our proposed solutions.
APA, Harvard, Vancouver, ISO, and other styles
38

Lin, Jui-Chia, and 林瑞佳. "Smart Home Security Control on OSGi-Based Platform." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/61212462200210411744.

Full text
Abstract:
碩士
醒吾科技大學
資訊科技系所
101
Nowadays there are lots of different devices available to the householders for them to monitor and maintain their home security. The management over a complicated system of several devices could sometimes be very difficult. There is a need to design a smart home system which allows the user to control sensors, cameras, remote access equipment, and other devices altogether in a simple and easy way, meanwhile provides the user the capability to get the event messages and images anytime and anywhere. Micro controller systems are widely used as the center of home security system, because they are simple, stable, and cost-effective. However, micro controller systems might not be suitable for some applications due to the fact that they’re lack of sufficient integratability and support to special interfaces. This Research instead to use Embedded Linux as the platform, OSGi as the control gateway integrating SLP, SIP and other communication protocols, and hopefully the flexibility of open systems can help us achieve the goal which is to provide a more convenient control system for the home security applications.
APA, Harvard, Vancouver, ISO, and other styles
39

Chou, Wei-Hao, and 周暐浩. "The Development of Security Monitoring System for Smart Home." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/96849856834550214814.

Full text
Abstract:
碩士
明新科技大學
電子工程系碩士班
103
Smart home is part of Internet of Thing (IoT). Statistics show that the total benefit of IoT will reach 3.7 billion in 2020, Thus various manufacturers are all actively involved in the development of related IC (such as Ameba of Realtek) and system applications (such as SmartHome of ASUS). Referring to SmartHome of ASUS, a smart home should at least include the automation of controlling home appliances, multimedia player, and security surveillance, which have been focused and targeted by our lab. This thesis aims at continuing the development of the structure of smart home, which was firstly proposed by senior graduates. The control system of home appliances and multimedia player can operate on digital TV (monitors can also be mobile if needed by using mobile robot with Kinect), and the construction of webpage and cloud server (database included) was also upgraded. As for security surveillance, the development of this thesis focused on the monitoring system for gas leakage. The monitoring system which includes sensors and monitoring devices for gas leakage is the core of this thesis. The sensors are composed of stove temperature sensing devices (using Thermal Pile and Camera), controllers, Bluetooth transmission system, and stove shut-off switch. The sensors transmit the data to the cloud server such as the temperature, current status of the stove, and concentration of carbon monoxide, and also receive the command to shut off the stove. Bluetooth data transmission system using BLE (Bluetooth Low Energy) mode can retain in longer battery life due to low power consumption. Monitoring devices include Bluetooth Gateway, WiFi AP, digital TV box, and cellular phone. Bluetooth Gateway communicates with digital TV box, cellular phone, and cloud server via WiFi, that is controlled by built-in APP. The user can monitor the stove status and shut off the gas if needed. The monitoring devices for smoke and fire detection system can be integrated with other smart home control systems to achieve more comprehensive performance.
APA, Harvard, Vancouver, ISO, and other styles
40

Liu, Jyh Han, and 劉智漢. "Ontology-Based Modeling of Security Control for Smart Home Applications." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/99856388497155608743.

Full text
Abstract:
碩士
國立政治大學
資訊科學學系
97
As ontology becomes more common and more popular, we are expecting to see an increase in its usage among heterogeneous applications with a need of information exchange. If current distributed monitoring system can utilize ontology as an external communication platform, it will be much easier for different monitoring systems to share and exchange information. In addition, if the systems are able to use ontology as its external communication language, it will be more flexible and faster for the system to make necessary logical changes. The purpose of the research is to differentiate application logic and description logic out of a monitoring system, replace them with ontology, and eventually make it the core of the monitoring system. This could overcome the drawbacks of the current monitoring systems such as lack of flexibility. In order to justify the objective, we designed a system called webpanel . Manufacturers can use languages that are compatible to ontology to describe the equipment’s specification. System integrators can also use ontology to design system application logic. With these two types of information, we can allow the webpanel to conduct process monitoring. Through our research we found that using ontology to monitor application logic is a good way to construct a flexible surveillance system. During the construction period, system integrators can finish the monitoring description promptly based on the system description. When an equipment failure is encountered, though the search capability of ontology, the system can automatically look for replacement equipment within the area. From a system integrator’s perspective, rebuilding a brand new monitoring system only depends on some factors in the new environment. With a few minor changes in the system description file, we can deploy a monitoring system shortly. It is highly flexible compared to the traditional way where a new environment will need a new set of programs with customized application logic. Ontology allows us to preserve reusable design experience. Companies that are facing huge turn-over rates can really benefit from it by reducing the cost of training and system development. We are not the first one to use ontology but we hope that through the design of webpanel, we can acquire experiences to help simplify design in traditional monitoring system and maintenance time. We hope by introducing ontology into the conservative monitoring industry, it can help connect with other industries and bring greater convenience to people’s life.
APA, Harvard, Vancouver, ISO, and other styles
41

HAN, CHIA-CHANG, and 韓佳璋. "The Factors Influencing Intentions to Use Smart Home Security Systems." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/d643je.

Full text
Abstract:
碩士
國立中正大學
資訊管理學系碩士在職專班
105
With the rapid development of the internet, it has brought about the age of the “Internet of Things.” Under the internet of things, there are various types of applications, which are generated by its business opportunities, causing great influences on the public. One of the examples that belongs to this group is smart home security system. No matter where and when a person is, it is possible for him/ her to monitor what happens at home, which enables the public to get the information immediately; thus, changes people’s behavior patterns. Besides, the widely-applied smart home system makes it easier for the masses to know the security condition at home beyond the limit of time and location. Therefore, through analyzing the references, the research model was proposed in order to examine the reasons why people intend to use the smart home security system. The data samples in this research were collected through investigating the online questionnaires, the online forums, social networking sites, and PTT that were related to the home security system. In total, there were 234 valid questionnaires. As for the data analysis method, this research was developed by the structural equation model. In order to analyze the statistics, SPSS 22.0 and SmartPLS 3.0 were used as the main accesses to verifying the cause and effect relationship between each variable in the research model. The result indicated that personal habits, the sunk costs, and the transition costs were the reasons why the inertia was generated. Furthermore, the perceived ease of use was partially mediated by the current deviation attributed from the inertia. On the other hand, the inertia had little influence on intending to use the system and adjusting the subjective norm. On the contrary, the perceived safety threat, the perceived financial threat, the perceived ease of use, the relative advantage, the subjective norm, and the information quality trust significantly influenced the intention to use the system positively. All in all, with the results and suggestions, it is anticipated that this research serves as a valid reference for the smart home security system, making great contributions to the industry-government-university field.
APA, Harvard, Vancouver, ISO, and other styles
42

LEE, HUNG-TE, and 李鴻德. "Combining Voice and Image Recognition for Smart Home Security System." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/7368gc.

Full text
Abstract:
碩士
朝陽科技大學
資訊管理系
106
Through technique and hardware improvements, the human can handle more significant data than before. Machine learning is a way to achieve artificial intelligence, using difference algorithm to process difference type data, let the system analyzing, learning, processing data like the way of a human. The Artificial neural network has many types, such as the Recurrent Neural Network that good at handling continuity data, the situation like speech recognition, since speech is continuity, different letters combination with the various meaning, so continuity data is essential to speech recognition. Raspberry Pi is an excellent Internet of Things device because it is a kind of micro-computer, you can install the operating system in it. The function is as a base; you can expand different modules. For example, if we want to collect image information, we can install the lens module, if we're going to obtain sound data, we need to install the microphone module. The current raspberry pi already has WIFI and Bluetooth, so the raspberry pie is currently one of the favorite choices for IoT devices. In this paper, we want to apply the technique of face recognition and speech recognition in life, using a raspberry pi to build a home security system. We proposed an architecture that combines face recognition and voice recognition to develop a home security system. Through face and voice recognition, we double-checking the identity is correct or not to improve convenience and security of the smart home environment. Raspberry Pi is the home security system's kernel and uses lens module to collect face information and microphone module to collect voice information. Raspberry Pi upload the data to the face API and speaker recognition system. Using fuzzy logic to combine face API and speech API, improve the performance of the system. When completing the verification requirement; the system will continue next step to control devices, like an electronic lock or other devices that supported remote control.
APA, Harvard, Vancouver, ISO, and other styles
43

HUANG, YANG-CHENG, and 黃揚程. "A Study of ZigBee Network Security in Smart Home Environments." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/qgq7sr.

Full text
Abstract:
碩士
國立高雄科技大學
電腦與通訊工程系
107
The concept of smart home has become achievable with the development of technology and the Internet of Things, and its related devices are becoming more popular in the market. The corresponding security issues are being disclosed, and the new attack patterns are increasing. Therefore, we believe that security issues in smart home environment will be one of the important topics. In this thesis, we analyze the attack methods of the existing security vulnerability in the ZigBee network, and we propose four attack methods based on the smart home devices currently on the market. One of these attack methods can cause the effect of tampering with messages, and the other three can cause denial of service attack. We also conduct demonstrations of such attacks to prove that the security vulnerability exist and how effectively to affect these smart home devices. Finally, we propose corresponding mitigation methods to reduce the security risks of the ZigBee network in the smart home environments.
APA, Harvard, Vancouver, ISO, and other styles
44

Rao, Jhan-Hao, and 饒展豪. "An Approach to Make Smart Home Devices Become Security-Aware." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/39923987356494972910.

Full text
Abstract:
碩士
國立成功大學
工程科學系碩博士班
97
Home gateways are being deployed into smart homes to provide services and to control smart digital devices. The security mechanism most commonly used in such platforms is user authentication and authorization, which implies the potential risk: if the user identity is cracked, the entire home network security is collapsed, and the intruder can control the devices and services, even to reveal users’ private information. We propose to have the “security-aware” devices in homes. A security-aware device requires an authentication mechanism and service management between itself, the home gateway, and the service provider. In our design, a home gateway is embedded with an Authorized Center to control the authentication process of all home devices and services. Smart devices are required to embed a security module which implements authentication and security functions to protect confidential information. When a user wants to access a security-aware device, the embedded security module starts authentication process. The key advantage is that a security-aware device can check whether it is in a safe environment or not. If not, it will not work. In addition, if the device is stolen or moved to any other unauthorized smart home network, it will not work, either. Hence the proposed approach could correctly and effectively improve the security of home devices and may even help to reduce the theft rate. Performance measures show that the authentication process takes about 0.4 seconds under a 2.8GHz TPM embedded platform. This implies that it will not cause too much overhead on performance.
APA, Harvard, Vancouver, ISO, and other styles
45

Chen, Sheng-Wen, and 陳聖文. "The design of a smart home health-care and security system." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/20323040767235214854.

Full text
Abstract:
碩士
樹德科技大學
電腦與通訊系碩士班
102
In recent years, human intelligence has widely used and changes our lifestyle. Many people have higher requirements for living environments. Consequently, people do their best to establish the more smart living space. In this thesis, the proposed system of intelligent home care space mainly includes two subsystems, namely security monitoring and health care systems. First, chaos suppression and synchronization control are investigated and through the circuit design, a high-security lock is proposed. Then combining with real-time video monitoring system, the security monitoring system is constructed. Followed by Kinect-based applications, an intelligent care robot is implemented via integrating some techniques. This smart care robot can link and manage the functions of all subsystems. Furthermore, it emphasizes humane design and is able to provide a simple gesture control mode to release the constraint of information ability. Through this integrated intelligent home care system, when a user access abnormal security signal or there is a demand, the system can reach the corresponding warning and service purposes. Finally, by the implementation and testing of the proposed system, the feasibility of such intelligent home care space is verified.
APA, Harvard, Vancouver, ISO, and other styles
46

Yen, Sheng-Ting, and 顏聖庭. "Smart Home Security System Integrated with the Design of Microwave Components." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/53674415347622108073.

Full text
Abstract:
碩士
正修科技大學
電子工程研究所
101
Abstract This paper is the integration of the antenna and intelligent security module. In the security module design: a mobile slide, rotary device with a camera lens, returned images of the robot location, distant users smart phone remote control. Video transmission with multi-lens integrated with a variety of control mode, you can manipulate and monitor real-time information. Cameras and security devices sync up and down 90 degrees and 360 degrees horizontal rotation features include lighting and a number of non-lethal security systems devices, active warning to stop. Moreover, we present antenna design: in the security system with separate monitoring system, security machine used omnidirectional radiation Broadband operating antenna design, security module uses the MIMO( Multi-input Multi-output) antenna. Antenna design as an analog value to assist the theoretical analysis to verify the correctness of the integrated design and conception of the appearance of existing modules, and then to the experimental measurement of the impedance bandwidth, input impedance matching, radiation patterns and antenna gain value as the adjustment is based on. The MIMO antenna experimental measurement think microwave reverberation chamber including diversity gain, isolation, channel capacity, contact number and other parameters measured. Keyword:security; remote control ; MIMO ; diversity gain ; channel capacity
APA, Harvard, Vancouver, ISO, and other styles
47

Wen-ChungHuang and 黃文忠. "Study on the Technology acceptance theory to consumer-Smart Home Security Services." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/kfbcnn.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

HUNG, WAN-CHI, and 洪婉淇. "A Design of Internet of Things Security Monitoring System for Smart Home." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/15552655323531277163.

Full text
Abstract:
碩士
高苑科技大學
資訊科技應用研究所
104
Home, making a house full of the meaning of life, you can relax yourself and feel the warmth in your home. However, a home not only can be a shelter, but also makes you feel secured mentally and physically. Yet, home can sometomes be a dangerous place. For example, fire, and carbon monoxide poisoning, and gas leaking and so on, nowadays we still can not prevent. Although nowadays each development teams are based on the convenience to build houses, none of them has been focusing on reducing the incident of disasters rate by improving the functions of protection and monitor. Therefore , this system which is combined with hardware and software is going to create an enivironment which is safe to stay This system has carbon monoxide sensor, gas leaking sensor , temperature and humidity sensors , intellisense light . It combined with the APP which is most popular now to make this home security system. Besides, you can realize the situation of your home immediately by it. It still can prevent the children and the elderly at home from being positioned in a dangerous place.We cannot prevent those tragedies caused by nature, but those Man-made disasters can be avoided beforehand by using this system. With using this system, preventing and reducing the percentage of the occurence of disasters to preserve lives and poverty can be less costly.
APA, Harvard, Vancouver, ISO, and other styles
49

Craveiro, António Augusto Margalho. "A Framework for Improved Home Network Security." Master's thesis, 2020. http://hdl.handle.net/10316/92594.

Full text
Abstract:
Dissertação de Mestrado em Segurança Informática apresentada à Faculdade de Ciências e Tecnologia
In this thesis we propose a framework for improving the security of home networks. Home networks have seen, in the last years, an amazing increase in size, variety, and complexity. All these changes raise new concerns about their security, among other reasons because the myriad of new devices placed in the networks (e.g. IoT devices, smart TVs, smart appliances, surveillance cameras) generate a lot of network traffic which is not directly controlled by the network owner and is still poorly known. Several situations of malicious traffic being generated by such devices have been recently identified. The probable reasons are either due to malicious intentions of device manufacturers or simply because they have been compromised due to poor security. These threats are not being fully addressed probably because of the absence of detailed information about behavior and network traffic generated by each of these devices.To address this problem, the first step should be to perform a thoughtfully analysis of traffic flow, followed by finding the means to monitor that flow and, finally, to control it. This is not an easy task, because is not possible to get the inner details of the network packets, since most of then are encrypted. So, we are left with statistical analysis of packet flows, looking for aspects such as size, burst rate, packet frequency, and packet size percentage. It may not look much, but it is fundamental to get a clear picture of network traffic of a typical home network, a first step if we want to protect our home networks.The main goal of this thesis is to explore the possibility of analyzing the home network and profiling the traffic between home appliances and the internet. Then, to define the rules to monitor and control the flow using a properly shaped device. And finally, to integrate all this in a network of home control devices communicating with each other. By moving beyond the last mile and into the customers’ doorsteps, the proposed solution intends to provide comprehensive and contextual security monitoring on a per-user basis, embedded at the residential gateway or, eventually, resorting to a specialized appliance deployed in the home \acrshort{lan}.
Nesta tese propomo-nos a implementar uma infraestrutura que vise melhorar a segurança de redes domésticas. As redes domésticas têm sofrido, nos últimos anos, um surpreendente aumento em dimensão, variedade e complexidade. Todas estas mudanças levantam novas questões acerca da sua segurança, entre outras razões, pela miríade de novos dispositivos colocados na rede (p. ex. dispositivos IoT, televisões inteligentes, dispositivos inteligentes, câmaras de vigilância) que geram uma enorme quantidade de tráfego, que não é diretamente controlado pelo proprietário da rede, e é ainda pouco conhecido. Diversas situações de tráfego malicioso, gerado por estes dispositivos, têm sido recentemente identificadas. As causas prováveis deverão ser intenções maliciosas do fabricante do dispositivo, ou porque foram comprometidos face a uma fraca segurança. Estas ameaças ainda não foram devidamente abordadas provavelmente devido à ausência de informação detalhada sobre o comportamento do tráfego de rede gerado por cada um desses dispositivos.Para resolver este problema, o primeiro passo deverá ser efetuar uma extensa análise do fluxo de tráfego, seguido pela definição de formas de vigiar esse fluxo e, finalmente, controlá-lo. Esta não é uma tarefa fácil, porque não é possível obter os detalhes do interior dos pacotes de rede, uma vez que na sua maioria estão encriptados. Como tal, ficamos reduzidos à análise estatística dos fluxos de pacotes, procurando detalhes como o tamanho, taxa de transmissão, frequência de pacotes, e percentagem de pacotes em função do tamanho. Pode não parecer muito, mas é fundamental para conseguir uma imagem clara do tráfego de rede numa rede doméstica típica, um primeiro passo se queremos proteger a nossa rede doméstica.O principal objetivo desta tese é explorar a possibilidade de analisar a rede doméstica, e identificar o tráfego entre as aplicações da rede local e a internet. De seguida, definir as regras para monitorizar e controlar o fluxo utilizando um dispositivo apropriado. E, finalmente, integrar tudo numa rede de dispositivos locais controlados, comunicando entre si. Ao progredir para além do limite atual, entrando à porta do cliente, a solução proposta pretende fornecer monitorização de segurança compreensiva e contextualizada, com base no utilizador, e embutido no gateway residencial ou, eventualmente, delegando num equipamento especializado colocado na rede local.
APA, Harvard, Vancouver, ISO, and other styles
50

"A Systematic Approach to Generate the Security Requirements For the Smart Home System." Master's thesis, 2013. http://hdl.handle.net/2286/R.I.18123.

Full text
Abstract:
abstract: Smart home system (SHS) is a kind of information system aiming at realizing home automation. The SHS can connect with almost any kind of electronic/electric device used in a home so that they can be controlled and monitored centrally. Today's technology also allows the home owners to control and monitor the SHS installed in their homes remotely. This is typically realized by giving the SHS network access ability. Although the SHS's network access ability brings a lot of conveniences to the home owners, it also makes the SHS facing more security threats than ever before. As a result, when designing a SHS, the security threats it might face should be given careful considerations. System security threats can be solved properly by understanding them and knowing the parts in the system that should be protected against them first. This leads to the idea of solving the security threats a SHS might face from the requirements engineering level. Following this idea, this paper proposes a systematic approach to generate the security requirements specifications for the SHS. It can be viewed as the first step toward the complete SHS security requirements engineering process.
Dissertation/Thesis
M.C.St. Computing Studies 2013
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography