Dissertations / Theses on the topic 'Smart Home Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Smart Home Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Christiaens, Steven A. "Evaluating the Security of Smart Home Hubs." BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/5631.
Full textChristensson, Daniel, and Emelie Eriksson. "The Smart Home From a Security Perspective." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40185.
Full textHansson, Niclas, Alexander Lantz, and Ludvig Fischerström. "A Security Analysis of Wireless Smart Home Technologies." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-113256.
Full textMusalam, Dina, and Paulina Nicodemus. "Security and Privacy methods in Smart Home: Case Study in Smart Meters." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20273.
Full textNalubowa, Vivian Gloria. "Smart Home Security Using Intrusion Detection and Prevention Systems." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40995.
Full textIvancevic, Dean. "Privacy and security of IoT : A smart home perspective." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-99071.
Full textJonnalagadda, Hari Krishna. "Secure Communication Scheme in Smart Home Environment." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6270.
Full textHashemi, Arshan. "Fingerprinting the Smart Home: Detection of Smart Assistants Based on Network Activity." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1958.
Full textOlegård, Johannes. "Security & Forensic Analysis of an Internet of Things Smart Home Ecosystem." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289579.
Full textDet så kallade Sakernas Internet (eng. Internet of Things, IoT) området är en pågående och ökande trend. Trenden handler om att olika enklare enheter ansluts mot internet i stort antal. IoT-enheter har utsatts för, och utnyttjats i, cyber attacker som i exempelvis det så kallade “Mirai botnet”. Allt fler IoT-relaterade brott kan förväntas i framtiden, speciellt eftersom antalet IoT- enheter blir allt fler och mer diversifierade. I den här uppsatsen undersöks säkerheten i ett IoT ekosystem utifrån två aspekter: “security testing” (säkerhetstesting) och “digital forensics”. På svenska kalls digital forensics för “IT-forensik” (kriminalteknik inom informationsteknik) eller digital-forensik. Säkerhetstestning användes för att hitta sårbarheter i det undersökta IoT ekosystemets olika applikationsprogrammeringsgränssnitt. Tre olika verktyg av typen Static Application Security Testing (SAST) användes i undersökningen för att granska den kod som motsvarar moln-delen av systemet. Utöver de tre verktygen, undersöktes systemet också manuellt. Den manuella undersökning utgick från de listor av vanliga typer av sårbarheter som finns publicerade av organisationen Open Web Application Security Project (OWASP). Resultatmässigt hittades flera allvarliga sårbarheter i systemet. Digital forensics-delen av projektet bestod av ett experiment där en Android telefon, sex IoT-enheter (två från det ovannämnda IoT ekosystemet) och fem motsvarande Android-appar undersöktes. Experimentet bestod av att utföra olika handlingar i apparna (till exempel att skicka ett kommando till en IoT- enhet), och sedan av att leta bevis för de handlingarna. För att hitta bevis undersöktes innehållet på telefonen och innehållet på en av IoT-enheterna. Slutsatsen av experimentet är att bara få och begränsade bevis kunde hittas. Utmaningarna som påträffades i experimentet jämfördes med utmaningarna beskrivna i forskningslitteraturen inom digital forensics.
Jose, Arun Cyril. "Intelligent home automation security system based on novel logical sensing and behaviour prediction." Thesis, University of Pretoria, 2017. http://hdl.handle.net/2263/65012.
Full textThesis (PhD)--University of Pretoria, 2017.
Electrical, Electronic and Computer Engineering
PhD
Unrestricted
Shakhshir, Saad Zafer. "IntuiSec : a framework for intuitive user interaction with security in the smart home." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/41668.
Full textIncludes bibliographical references (p. 99-104).
This thesis presents IntuiSec, a framework for intuitive user interaction with Smart Home security. The design approach of IntuiSec is to introduce a layer of indirection between user-level intent and the system-level security infrastructure. This layer is implemented by a collection of distributed middleware and user-level tools. It encapsulates system-level security events and exposes only concepts and real-world metaphors that are intuitive to non-expert users. It also translates user intent to the appropriate system-level security actions. The IntuiSec framework presents the user with intuitive steps for setting up a secure home network, establishing trusted relationships between devices, and granting temporal, selective access for both home occupants and visitors to devices within the home. The middleware exposes APIs that allow other applications to present the user with meaningful visualizations of security-related parameters and concepts. I present the IntuiSec system design and an example proof-of-concept implementation, which demonstrates the user experience and provides more insight into the framework.
by Saad Safer Shakhshir.
M.Eng.
Irengård, Gullstrand Simon, and Larsson Ivan Morales. "Evaluating privacy and security risks in smart home entertainment appliances, from a communication perspective." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20365.
Full textThe concept of smart home technology becomes more and more a part of our everydaylife. Because of the hasty evolution and considering that wireless communication has become the norm, the security and privacy problems have become more of a concern. The purpose of this work is to examine what kind of information can be extracted from anentertainment-based smart home involving an o -the-shelf game-console, Playstation 4,connected to the Internet. This scenario has been investigated with experiments focusingon the interception of networking tra c occurring when using such a device under everyday operations. The results of the study shows that sensitive data such as images is in fact possible to extract contrary to popular belief.
Tong, Jizhou. "Design and Implementation Security Testbed (HANSim) and Intrusion Detection System (IDS) for the Home Area Network in the Smart Grid." University of Toledo / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1501856291735261.
Full textBugeja, Joseph. "Smart connected homes : concepts, risks, and challenges." Licentiate thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-7793.
Full textHasl, Caroline. "Perceived and Identified Security Risks in Smart Home Technology : A case study of three Chinese companies." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-64903.
Full textCarohl, Qvist Amanda. "IOT inom hemautomation : Jämförande av open-source kontrollers." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18922.
Full textInternet of Things (IoT) and home automation means the opportunity to connect various devices in a home to the Internet, which has the goal of facilitating and making consumers’ everyday lives more comfortable. For example, home automation could be about locking doors and lighting lamps from a single device (the controller), which may make it easier for the consumer since the consumer does not have to go to each device to perform the desired activity. Controllers are the part of a home automation IoT-system that acts as an interface between the consumer and the devices.Open-source offers consumers a freer use of products, due to its open-source code. Many problems and issues that arise in connection with these products originate in the field of security, as well as what distinguishes the products in terms of security.This study has collected six open-source controllers and conducted a comparison to identify which controllers achieve security regarding confidentiality, integrity and availability. This has been done by identifying the values that appear in previous articles where security is evaluated for IoT and home automation, and controllers.This study links identified values with the CIA model, which stands for confidentiality, integrity, and availability. In accordance with the CIA model, a result is presented where the study’s current controllers show to what level they maintain the CIA model, based on the identifies values established. The controllers that appears in this study are Home Genie, OpenHAB, Home Assistant, Domoticz, Calaos, and Pimatic.This study’s results are obtained through a literary study of 25 studies, and 12 additional technical documentations and information through forums for all the associated controllers. All studies have been retrieved from the Google Scholar database, IEEE Xplore, and ACM Digital Library, and subsequently analyzed and thematically coded for further information. In total, the material of this study has been selected in five steps to ensure relevant material that meets this study’s criteria and objectives for content. This study’s results present an overview that provides knowledge about compared controllers, specifically in connection with the CIA model which highlights the products in the field of security, regarding confidentiality, integrity, and availability.
Eriksson, Anton, and Joel Tjernström. "Säkerhet i smarta hem: användares agerande : En fallstudie i användares möjligheter att agera och deras agerande för att hålla smarta hemprodukter säkra." Thesis, Tekniska Högskolan, Jönköping University, JTH, Datateknik och informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-50830.
Full textDenna studie undersöker hur användare av smarta hem kan agera för att hålla sina smarta produkter säkra.Urvalet identifierades i litteratur som early adopters. Dessa studerades genom en kvalitativ fallstudie med semistrukturerade intervjuer. Data analyserades sedan med en tematisk analys, vilket resulterade i fyra teman: Avsaknad av oro, I händerna på tillverkaren, Säkerhet utanför produkten och Säkerhetsåtgärder. Informanterna hade olika anledningar och motivationer till sin gemensamma avsaknad av oro, deras upplevelse av att kunna påverka produkters säkerhet, de åtgärder som de kunde frammana och de åtgärder som de faktiskt gjorde. Informanternas avsaknad av oro länkas till teori om oros påverkan på agerande och upplevd risk. Informanternas problematik att påverka säkerheten stöds av annan litteratur. Deras hypotetiska åtgärder ligger i huvudsak utanför produkten. Det agerande de faktiskt utför på sina produkter är begränsat till grundläggande säkerhetsåtgärder som lösenord etc. Användarna har svårt att påverka säkerheten hos sina produkter, osäkra produkter kan enkelt falla offer för illvilliga individer och påverka andra i sin omgivning.
Viding, Emmie. "Does Your TV Spy on You? : The security, privacy and safety issues with IoT." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17985.
Full textFältros, Jesper, Isak Alinger, and Bergen Axel von. "Safety risks with ZigBee smart devices : Identifying risks and countermeasures in ZigBee devices with an eavesdropping experiment." Thesis, Tekniska Högskolan, Jönköping University, JTH, Datateknik och informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-49630.
Full textEl, jaouhari Saad. "A secure design of WoT services for smart cities." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2018. http://www.theses.fr/2018IMTA0120/document.
Full textThe richness and the versatility of WebRTC, a new peer-to-peer, real-time and browser based communication technology, allowed the imagination of new and innovative services. In this thesis, we analyzed the capabilities required to allow a participant in a WebRTC session to access the smart Things belonging to his own environment as well as those of any other participant in the same session. The access to such environment, which we call “SmartSpace (SS)”, can be either passive, for example by monitoring the contextual information provided by the sensors, or active by requesting the execution of commands by the actuators, or a mixture of both. This approach deserves attention because it allows solving in an original way various issues such as allowing experts to remotely exercise and provide their expertise and/or knowing how. From a technical point of view the issue is not trivial because it requires a smooth and mastered articulation between two different technologies: WebRTC and the Internet of Things (IoT) /Web of Things (WoT). Hence, the first part of the problem studied in this thesis, consists in analyzing the possibilities of extending WebRTC capabilities with theWoT. So as to provide a secure and privacy-respectful access to the various smart objects located in the immediate environment of a participant to any otherend-user involved in the same ongoing WebRTC session. This approach is then illustrated in the ehealth domain and tested in a real smart home (a typical example of a smart space). Moreover,positioning our approach in the context of communication services operating in smart cities requires the ability to support a multiplicity of SSs,each with its own network and security policy. Hence,in order to allow a participant to access one of his own SSs or one of another participant (through a delegation of access process), it becomes necessary to dynamically identify, select, deploy, and enforce the SS’s specific routing and security rules, so as to have an effective, fast and secure access. Therefore, the second part of the problem studied in this Ph.D.consists in defining an efficient management of the routing and security issues regarding the possibility of having multiple SSs distributed over the entire network
Lindorin, Axel. "Säkerhet i smarta hem : En litteraturanalys på protokollsäkerhet för det smarta hemmet." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18940.
Full textThis study has examined the problems that arise in connection with the rapid development of the Internet of Things, where the low-energy units lack the power to implement advanced security solutions. Due to the low security and growing area of use, the Internet of Things units have become an attractive target for any attacks. The systematic literature analysis has been carried out by reviewing previously more detailed analyzes of the protocols and their security as well as the developers' specifications. This is to create a wide summary of the security of the protocols and then to compare the protocols to select one or more as the safer protocol for home use. All protocols that are included have some form of security implemented to provide authentication in the form of MAC, key management, integrity in the form of MIC and communication security with encryption. All protocols support AES-128 encryption and the use of IEEE 802.15.4 security suit as additional protection in addition to the protocol's own solutions. The majority of protocols also use Elleptic Curve to safely transport keys. The analysis concludes that Thread and Z-Wave are considered the two most secure home use protocols. It is based on how the protocols handle the various aspects with their noticeable prioritization of security along with the few deficiencies that can damage the smart home. Bluetooth Low Energy and EnOcean are thetwo less secure regarding an IoT environment. The survey also includes a discussion of various areas that emerged during the course of the investigation. Finally, some points that emerged during the review that may be good to consider when developing these protocols with security as focus.
Коротка, Г. М. "Система захисту розумного будинку на основі блокчейн технологій." Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/24852.
Full textМета роботи: розробка системи захисту розумного будинку на основі блокчейн технологій. Об’єкт дослідження: процес забезпечення інформаційної безпеки в роботі розумних пристроїв. Предмет дослідження: система захисту розумного будинку на основі блокчейн технології. Методи дослідження: для вирішення поставлених індивідуальних завдань у роботі використовуються наступні методи дослідження: вивчення теоретичної науково-практичної літератури про IoT-пристроїв та блокчейн, метод аналізу та синтезу. Використання даних методів дозволило дослідити безпеку роботи розумного будинку та основні загрози мережі IoT, визначити переваги інтеграції блокчейн та IoT та розробити систему захисту розумного будинку на основі блокчейн технологій. Результати та новизна: результатом виконаної роботи є розроблена система захисту розумного будинку на основі блокчейн технологій, що може бути застосована при проектуванні мережі Інтернету речей і здатна забезпечити безперебійну та безпечну роботу практично всіх сфер життєдіяльності людини, в яких активно використовуються прилади Інтернету речей. Галузь застосування: реалізація системи захисту розумного будинку.
Purpose: development security system of a smart home based on blockchain technologies. Object of research: the process of providing information security of smart devices. Subject of research: security system of smart home based on blockchain technology. Research methods: The following research methods are used to solve the set individual tasks: study of theoretical scientific and practical literature on IoT-devices and blockchain, method of analysis and synthesis. The use of these methods allowed to study the security of a smart home and the main threats of the IoT network, to determine the benefits of blockchain and IoT integration and to develop a smart home security system based on blockchain technologies. Results and novelty: the result of the work is security system of a smart home based on blockchain technologies that can be used in the design of the Internet of Things and is able to ensure uninterrupted and safe operation of almost all spheres of human life in which the Internet of Things is actively used. Field of the application: implementation of smart home protection system.
Valičková, Monika. "Řízení bezpečnosti inteligentní domácnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378362.
Full textHalaj, Jozef. "Detekce anomálií v IoT sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417286.
Full textPiškula, David. "Internet of Things." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399196.
Full textDupre, Rob. "Scene analysis and risk estimation for domestic robots, security and smart homes." Thesis, Kingston University, 2017. http://eprints.kingston.ac.uk/37781/.
Full textJohansson, Christer, and Viktor Andersson. "Sakernas internet - En säkerhetsrisk : En kvantitativ studie om privatpersoners kunskap gällande IoT-enheters säkerhet." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45549.
Full textEliasson, Frida, Gabriella Karlsson, and Agnes Svanling. "Smarta enheter i hemmet : nytta eller risk för individen?" Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-12608.
Full textThe development of technology and digitization are moving fast forward and have nowextended to the private homes. The smart home is part of a larger phenomenon called Internetof Things (IoT). The IoT devices consist of sensors and computers that can communicate witheach other and create a situational behavior. The idea of smart homes is about using differentsmart devices within the home, which are connected to a shared network. Smart homesprovides with many great functions where the individuals can create a comfortable, safe andsustainable everyday life. In addition to facilitating everyday life for individuals, these smartdevices come with a number of risks. The more devices connected to the Internet, the easier itgets for an unauthorized person to access another person's private information. The smartdevices collect a lot of data, which enables for detailed mapping of the user. It's hard to knowwho gets access to the private data about the user, which makes it difficult for the individualto be anonymous and protect himself. The purpose of the study is to develop knowledge aboutthe awareness of the individual about the risks associated with the use of smart devices athome, as there is relatively little research on the subject. An effect of becoming more aware ofthe risks, can lead to more responsibility taken by the individual to protect itself againstpossible IT crimes. The starting point of the study has been to collect prior research and literature and to conducta quantitative survey. The literature study forms the basis for the previous research and thetheoretical framework. With help from the literature, survey questions have been formulatedto answer the research question. The survey was conducted through an internet survey aimedto users of smart devices at home. Based on collected material and empirical data, a resultcould be presented and an analysis performed. With the help of four different themes, aconclusion has been drawn about the awareness of the individual about the risks associatedwith the use of smart devices in the home.Keywords:
Shiang, Chang Ming, and 張銘祥. "Smart Home Security System." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/595y36.
Full text國立臺北科技大學
自動化科技研究所
103
This thesis implemented a smart home security system, the system includes five parts: 1.Smart HomeBox, 2. wireless docking hardware device, 3. Face Recognition, 4. Cloud Server, 5.Android App. This smart home security system can let you easily get the informtion of temperature, humidity, switch status of doors and windows, the concentration of the suspended particles etc. in your home. The related information will be uploaded to the cloud server and the abnormal conditions will be further stored in the SQLite database. Therefore, the smart phone can get relevant information using 4G or Wifi to connect the cloud server. The human face recognition is another contribution in this thesis. Here, the OpenCV library associated with relevant algorithms are applied to implement the human face recognition. In the experiment, the 40 individuals of AT&;T Laboratories Cambridgeare used to test the performance of implemented human face recognition, where each person have 10 photos. In first experiment, the training time, recognition time, amount of features, the identification rate are measured by using normal photos. In second experiment, the same performance indexes are measured by adding the noise, bright variation, twirling, mask into the original photos. The optimal recognition method will be obtained by the aforementioned analysis and then it will be further implemeted in the Android platform.
WU, CHENG-LIN, and 吳政霖. "Security Notification System in Smart Home." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/695tjh.
Full text國立高雄科技大學
電機工程系
107
In recent years, due to the rapid development of the Internet and the popularity of mobile devices, the Internet of Things (IoT) has rapidly developed in various fields and has driven the rise of related markets. Taiwan has gradually been affected by the increase in the elderly population and the declining birthrate. The smart home life has also received more and more attention. In the past, traditional methods used passive protection for fences, window railing, and security box. However, these devices can only provide passive protection after the invasion of the gangsters, and cannot effectively notify the owners and the police immediately. When the house was invaded, it was found that some items were discarded, and the police would be negatively alerted. Therefore, favorable information was immediately sent to the police to bring the criminals to justice. Furthermore, with the development of technology, the security system has provided complete security services, including access control systems, sensor applications, and video recording and storage, to prevent abnormal environmental conditions. But the application of IoT brought can never be aimed at home security. Smart home has gradually become a goal of human beings, mainly because families are closest to people's lives, how to combine people's daily and IoT concepts, and to present the connection between people and technology in family life. By integrating various devices and systems in the home to promote automated home facilities, thereby improving human living standards and quality, such as home entertainment, smart home appliances, energy management, security monitoring and home care are all considerations for smart home and home security. This paper proposes a system combining smart home and home security. The cloud server monitors the status of all devices. The data collector collects the signals of the sensors and transmits the data to the cloud server via the optical network by Ethernet. After the data is processed by the cloud server, the instant information can be displayed on the TV or screen. In response to the security problem, the data will be encrypted and uploaded to the cloud server before being transmitted to the cloud server. The data will not be leaked even if it is intercepted. At the same time, it can monitor the home environment status through mobile devices, and remote to remote control appliances, not only maintain the original residential functions, but also have the advantages of architecture, network communication, equipment automation, integration system, service and management. And an environmentally friendly living environment, providing convenient functions to help families communicate with the outside world, optimize people's living standards, help people arrange time more efficiently, and increase the safety of living.
Lin, Wei-Yu, and 林威宇. "Smart Home Security and Surveillance System." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/h76676.
Full text國立虎尾科技大學
飛機工程系航空與電子科技碩士班
104
As the proportion of the elderly population increases, Taiwan''s aging population problem is getting more and more serious situation. Whether elders live alone at home or children work outside the home without parents, in order to improve the risk of the elderly alone at home, which poses potential danger to the elders, especially in delaying to the hospital and being missing. Therefore, having a “Smart Home Security and Surveillance System” that can be used to around the home, is capable of requesting help and position surveillance, can increase the safety of the elders. The Smart Home Security and Surveillance System contain Multi-band wireless transmission system , that is based on Internet of Things(IOT). The system consists of ZigBee-based wireless communication、Bluetooth and 3rd G(Third Generation) .Through ZigBee, and the system will be able to transmit the locations of the sensors to the surveillance station. at the same time the surveillance station send a message or e-mail notification surveillance personnel. As a result, when a person with the system is in need of help, he or she can then send out a distress signal with a push of a button. The system provides complete surveillance of personnel home security surveillance system
HSU, CHIH-CHIANG, and 許志強. "IOT Smart Home Security and Home Care for The Elderly." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/39pk4d.
Full text國立高雄科技大學
資訊工程系
107
In 2019, smart families will become the mainstream, mainly the family is closest to peoples lives, combining the concepts of daily life and the Internet of Things. The IoT can improve the energy efficiency of buildings, such as optimizing air conditioning, ventilation, lighting control, smart sockets, curtain controllers, leak detection, remote public space monitoring, Internet intercom, special status notification, Through a dedicated APP, smart home phones, tablet devices for home door intercom, or extended application of home automation, and many other smart home applications. Through the IoT , we can solve the major problem that the burden of young people is becoming more and more important. Children often need to face assistance. Many inconveniences in daily life cause emotional distress. However, the children are not assured that the elderly live alone or to the security agencies. Therefore, safe "aging at home" is the best choice.
Huang, Ya-Ling, and 黃雅綾. "Interface Design for Security System of Smart Home." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/49051651952630962685.
Full text國立臺北科技大學
創新設計研究所
91
World Health Organization (WHO) proposes that security, health, connivance and comfort are four important indicators of quality of human life. Security, however, is the most important issue among them. Since Internet and intranet of the communication system have been rapidly developing, so house designer, today, has adapted more and more housing security technique. We may also call this technology integration as intelligent home. Intelligent home conceptualizes secure living in the human life. Integration with sensor technology and Internet and GPS communication system, many intelligent products has been developed. The concept of intelligent home is an important issue to a designer in facing challenge of near future. Therefore, the objective of this study was to investigate the know-how of the intelligent house. Specific aims of this study were (1) to developing a framework of home security systems; (2) to design an interface of home security systems; and (3) to set up a mode of home security systems.
Chung, Chiu-Ju, and 鐘秋如. "The Market Demand of Smart Home Security Surveillance." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/04018828437809429052.
Full text實踐大學
企業管理學系碩士在職專班
100
Family has always been the center of life for all mankind. Due to the rapid scientific and technological civilization, the basic resource of the observing needs for family life in the field of "digital home" has progressively developed into "smart home". This is no longer confined to the “home networking”, coupled with the rise of cloud computing. New industries for promoting global smart home have been occurred and also continuing to expand in emerging markets. Worldwide manufacturers, including mainland China and Taiwan, working on the smart home can be summarized in seven industrial businesses, such as electronic communications, information services, televisions, electrical appliances, security monitoring, medical care and system integration. In addition, the smart home markets, with new technologies or new business opportunities, have also been developed into four application areas which are home entertainment, wisdom home appliances, security monitoring, and health care. Therefore, this study is using the Kano model that includes questionnaire survey design and statistical analysis. The purpose is to explore if there is significant difference among business markets from consumers demand on security monitoring of smart home. Finally, this study displayed a quadrant figure indicating satisfaction/dissatisfaction so as to help businesses understand the needs of consumer to enhance the Customer Satisfaction and to reduce the Extent of Dissatisfaction for their system integration of safety monitoring equipments and services. It will also enhance the creation of Attractive Quality Elements and reduce the One-Dimensional Quality Element in order to put forward a consumer need products and active marketing strategies.
Joy_Joa and 饒哲儒. "Sensor Information Analysis for Smart Home Security System." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/nrrd23.
Full text中原大學
資訊管理研究所
104
The main thesis of this study is in accordance with SHM (Structural Health Monitoring) feature structural health monitoring applications, sensors to monitor and analyze the captured data, aimed at effective monitoring data anomalies offset value, and set five quadrant control as the basis for subsequent exception handling events, achieve effective information delivery of data, further analysis of the precise events, and smart home system architecture and application as the main analysis. In the analysis operation can be divided into two blocks SPC(statistical process control) and EPL(Effective Privilege Level) approach, to filter and analyze large data sensor original information, and the use of SHM architecture CM (cluster members) as well as the main core group CH ( cluster heads) as the sensor on the processing and delivery system according to class, thus achieving accurate determination.
SHIH-SIN, CHEN, and 陳世昕. "IOT Smart Home APP and Bluetooth Security Implement." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/49790844520884883368.
Full text僑光科技大學
資訊科技研究所
103
Abstract Information Technology (IT) is central to modern life which remodeling the era as the era of internet to things (IOT) and mature smart life has been gradually forming. The most obvious indicators within are demand and popularity of smart phones and tablet PCs and other handheld devices. While we look forward to the future , we’ll find out smart home will be an important milestone of the way people fullfill their desire of smart life . Hence there shoule be basically insist three core essential performance of smart home, they are : remote control 、automatic adjustment and situation notice . In this research, we try to implement the connection between smart handheld devices and smart home by CmoreArduino, and tune all the scenario reaction between real lightness at home and the automatic adjustment of light sensing devices associated with the remot control capability by Appsduino UNO, and we expact to build a remote control and automatically adjust system to save energy , and enclosed light- sensing detectors to provide an additional smart home - Otherwis, this study we used Bluetooth as the the connecting, that we also raise it’s relative security concern and its solutions.
Wu, Ching Yi, and 吳靜怡. "Design of Security Mechanisms for Smart Home Systems." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/98752982274843455935.
Full text長庚大學
資訊管理學系
100
Recently, smart home systems and techniques are developed increasingly. However, there are many potential information security threats to them. For this reason, many scholars and ITU standardization organizations discussed and explored the related information security threats, and develop some solutions and standards to improve protection of smart home systems. In this thesis, we discussed some practical security issues about authentication of the user, authorization of the user, trust level of the delegated users, device to device authentication, and command authentication. We further applied concepts of cryptographic threshold signature mechanisms and Modbus authentication protocols to develop two solutions to solve above issues, a threshold signature scheme and a device authentication protocol. The former allows a smart home user to delegate his privilege and rights to proxy users according to their trust level. User authentication, message integrity, non-repudiation, and user delegation can be achieved in a smart home system. The latter allows a smart home system to authenticate the authenticity of smart home devices, and integrity, and authentication of system commands for withstanding potential fraud device attacks. Number of smart home commanding is also limited and updated by the system. Hence, security of a smart home system can be improved based on our proposed solutions.
Lin, Jui-Chia, and 林瑞佳. "Smart Home Security Control on OSGi-Based Platform." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/61212462200210411744.
Full text醒吾科技大學
資訊科技系所
101
Nowadays there are lots of different devices available to the householders for them to monitor and maintain their home security. The management over a complicated system of several devices could sometimes be very difficult. There is a need to design a smart home system which allows the user to control sensors, cameras, remote access equipment, and other devices altogether in a simple and easy way, meanwhile provides the user the capability to get the event messages and images anytime and anywhere. Micro controller systems are widely used as the center of home security system, because they are simple, stable, and cost-effective. However, micro controller systems might not be suitable for some applications due to the fact that they’re lack of sufficient integratability and support to special interfaces. This Research instead to use Embedded Linux as the platform, OSGi as the control gateway integrating SLP, SIP and other communication protocols, and hopefully the flexibility of open systems can help us achieve the goal which is to provide a more convenient control system for the home security applications.
Chou, Wei-Hao, and 周暐浩. "The Development of Security Monitoring System for Smart Home." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/96849856834550214814.
Full text明新科技大學
電子工程系碩士班
103
Smart home is part of Internet of Thing (IoT). Statistics show that the total benefit of IoT will reach 3.7 billion in 2020, Thus various manufacturers are all actively involved in the development of related IC (such as Ameba of Realtek) and system applications (such as SmartHome of ASUS). Referring to SmartHome of ASUS, a smart home should at least include the automation of controlling home appliances, multimedia player, and security surveillance, which have been focused and targeted by our lab. This thesis aims at continuing the development of the structure of smart home, which was firstly proposed by senior graduates. The control system of home appliances and multimedia player can operate on digital TV (monitors can also be mobile if needed by using mobile robot with Kinect), and the construction of webpage and cloud server (database included) was also upgraded. As for security surveillance, the development of this thesis focused on the monitoring system for gas leakage. The monitoring system which includes sensors and monitoring devices for gas leakage is the core of this thesis. The sensors are composed of stove temperature sensing devices (using Thermal Pile and Camera), controllers, Bluetooth transmission system, and stove shut-off switch. The sensors transmit the data to the cloud server such as the temperature, current status of the stove, and concentration of carbon monoxide, and also receive the command to shut off the stove. Bluetooth data transmission system using BLE (Bluetooth Low Energy) mode can retain in longer battery life due to low power consumption. Monitoring devices include Bluetooth Gateway, WiFi AP, digital TV box, and cellular phone. Bluetooth Gateway communicates with digital TV box, cellular phone, and cloud server via WiFi, that is controlled by built-in APP. The user can monitor the stove status and shut off the gas if needed. The monitoring devices for smoke and fire detection system can be integrated with other smart home control systems to achieve more comprehensive performance.
Liu, Jyh Han, and 劉智漢. "Ontology-Based Modeling of Security Control for Smart Home Applications." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/99856388497155608743.
Full text國立政治大學
資訊科學學系
97
As ontology becomes more common and more popular, we are expecting to see an increase in its usage among heterogeneous applications with a need of information exchange. If current distributed monitoring system can utilize ontology as an external communication platform, it will be much easier for different monitoring systems to share and exchange information. In addition, if the systems are able to use ontology as its external communication language, it will be more flexible and faster for the system to make necessary logical changes. The purpose of the research is to differentiate application logic and description logic out of a monitoring system, replace them with ontology, and eventually make it the core of the monitoring system. This could overcome the drawbacks of the current monitoring systems such as lack of flexibility. In order to justify the objective, we designed a system called webpanel . Manufacturers can use languages that are compatible to ontology to describe the equipment’s specification. System integrators can also use ontology to design system application logic. With these two types of information, we can allow the webpanel to conduct process monitoring. Through our research we found that using ontology to monitor application logic is a good way to construct a flexible surveillance system. During the construction period, system integrators can finish the monitoring description promptly based on the system description. When an equipment failure is encountered, though the search capability of ontology, the system can automatically look for replacement equipment within the area. From a system integrator’s perspective, rebuilding a brand new monitoring system only depends on some factors in the new environment. With a few minor changes in the system description file, we can deploy a monitoring system shortly. It is highly flexible compared to the traditional way where a new environment will need a new set of programs with customized application logic. Ontology allows us to preserve reusable design experience. Companies that are facing huge turn-over rates can really benefit from it by reducing the cost of training and system development. We are not the first one to use ontology but we hope that through the design of webpanel, we can acquire experiences to help simplify design in traditional monitoring system and maintenance time. We hope by introducing ontology into the conservative monitoring industry, it can help connect with other industries and bring greater convenience to people’s life.
HAN, CHIA-CHANG, and 韓佳璋. "The Factors Influencing Intentions to Use Smart Home Security Systems." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/d643je.
Full text國立中正大學
資訊管理學系碩士在職專班
105
With the rapid development of the internet, it has brought about the age of the “Internet of Things.” Under the internet of things, there are various types of applications, which are generated by its business opportunities, causing great influences on the public. One of the examples that belongs to this group is smart home security system. No matter where and when a person is, it is possible for him/ her to monitor what happens at home, which enables the public to get the information immediately; thus, changes people’s behavior patterns. Besides, the widely-applied smart home system makes it easier for the masses to know the security condition at home beyond the limit of time and location. Therefore, through analyzing the references, the research model was proposed in order to examine the reasons why people intend to use the smart home security system. The data samples in this research were collected through investigating the online questionnaires, the online forums, social networking sites, and PTT that were related to the home security system. In total, there were 234 valid questionnaires. As for the data analysis method, this research was developed by the structural equation model. In order to analyze the statistics, SPSS 22.0 and SmartPLS 3.0 were used as the main accesses to verifying the cause and effect relationship between each variable in the research model. The result indicated that personal habits, the sunk costs, and the transition costs were the reasons why the inertia was generated. Furthermore, the perceived ease of use was partially mediated by the current deviation attributed from the inertia. On the other hand, the inertia had little influence on intending to use the system and adjusting the subjective norm. On the contrary, the perceived safety threat, the perceived financial threat, the perceived ease of use, the relative advantage, the subjective norm, and the information quality trust significantly influenced the intention to use the system positively. All in all, with the results and suggestions, it is anticipated that this research serves as a valid reference for the smart home security system, making great contributions to the industry-government-university field.
LEE, HUNG-TE, and 李鴻德. "Combining Voice and Image Recognition for Smart Home Security System." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/7368gc.
Full text朝陽科技大學
資訊管理系
106
Through technique and hardware improvements, the human can handle more significant data than before. Machine learning is a way to achieve artificial intelligence, using difference algorithm to process difference type data, let the system analyzing, learning, processing data like the way of a human. The Artificial neural network has many types, such as the Recurrent Neural Network that good at handling continuity data, the situation like speech recognition, since speech is continuity, different letters combination with the various meaning, so continuity data is essential to speech recognition. Raspberry Pi is an excellent Internet of Things device because it is a kind of micro-computer, you can install the operating system in it. The function is as a base; you can expand different modules. For example, if we want to collect image information, we can install the lens module, if we're going to obtain sound data, we need to install the microphone module. The current raspberry pi already has WIFI and Bluetooth, so the raspberry pie is currently one of the favorite choices for IoT devices. In this paper, we want to apply the technique of face recognition and speech recognition in life, using a raspberry pi to build a home security system. We proposed an architecture that combines face recognition and voice recognition to develop a home security system. Through face and voice recognition, we double-checking the identity is correct or not to improve convenience and security of the smart home environment. Raspberry Pi is the home security system's kernel and uses lens module to collect face information and microphone module to collect voice information. Raspberry Pi upload the data to the face API and speaker recognition system. Using fuzzy logic to combine face API and speech API, improve the performance of the system. When completing the verification requirement; the system will continue next step to control devices, like an electronic lock or other devices that supported remote control.
HUANG, YANG-CHENG, and 黃揚程. "A Study of ZigBee Network Security in Smart Home Environments." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/qgq7sr.
Full text國立高雄科技大學
電腦與通訊工程系
107
The concept of smart home has become achievable with the development of technology and the Internet of Things, and its related devices are becoming more popular in the market. The corresponding security issues are being disclosed, and the new attack patterns are increasing. Therefore, we believe that security issues in smart home environment will be one of the important topics. In this thesis, we analyze the attack methods of the existing security vulnerability in the ZigBee network, and we propose four attack methods based on the smart home devices currently on the market. One of these attack methods can cause the effect of tampering with messages, and the other three can cause denial of service attack. We also conduct demonstrations of such attacks to prove that the security vulnerability exist and how effectively to affect these smart home devices. Finally, we propose corresponding mitigation methods to reduce the security risks of the ZigBee network in the smart home environments.
Rao, Jhan-Hao, and 饒展豪. "An Approach to Make Smart Home Devices Become Security-Aware." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/39923987356494972910.
Full text國立成功大學
工程科學系碩博士班
97
Home gateways are being deployed into smart homes to provide services and to control smart digital devices. The security mechanism most commonly used in such platforms is user authentication and authorization, which implies the potential risk: if the user identity is cracked, the entire home network security is collapsed, and the intruder can control the devices and services, even to reveal users’ private information. We propose to have the “security-aware” devices in homes. A security-aware device requires an authentication mechanism and service management between itself, the home gateway, and the service provider. In our design, a home gateway is embedded with an Authorized Center to control the authentication process of all home devices and services. Smart devices are required to embed a security module which implements authentication and security functions to protect confidential information. When a user wants to access a security-aware device, the embedded security module starts authentication process. The key advantage is that a security-aware device can check whether it is in a safe environment or not. If not, it will not work. In addition, if the device is stolen or moved to any other unauthorized smart home network, it will not work, either. Hence the proposed approach could correctly and effectively improve the security of home devices and may even help to reduce the theft rate. Performance measures show that the authentication process takes about 0.4 seconds under a 2.8GHz TPM embedded platform. This implies that it will not cause too much overhead on performance.
Chen, Sheng-Wen, and 陳聖文. "The design of a smart home health-care and security system." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/20323040767235214854.
Full text樹德科技大學
電腦與通訊系碩士班
102
In recent years, human intelligence has widely used and changes our lifestyle. Many people have higher requirements for living environments. Consequently, people do their best to establish the more smart living space. In this thesis, the proposed system of intelligent home care space mainly includes two subsystems, namely security monitoring and health care systems. First, chaos suppression and synchronization control are investigated and through the circuit design, a high-security lock is proposed. Then combining with real-time video monitoring system, the security monitoring system is constructed. Followed by Kinect-based applications, an intelligent care robot is implemented via integrating some techniques. This smart care robot can link and manage the functions of all subsystems. Furthermore, it emphasizes humane design and is able to provide a simple gesture control mode to release the constraint of information ability. Through this integrated intelligent home care system, when a user access abnormal security signal or there is a demand, the system can reach the corresponding warning and service purposes. Finally, by the implementation and testing of the proposed system, the feasibility of such intelligent home care space is verified.
Yen, Sheng-Ting, and 顏聖庭. "Smart Home Security System Integrated with the Design of Microwave Components." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/53674415347622108073.
Full text正修科技大學
電子工程研究所
101
Abstract This paper is the integration of the antenna and intelligent security module. In the security module design: a mobile slide, rotary device with a camera lens, returned images of the robot location, distant users smart phone remote control. Video transmission with multi-lens integrated with a variety of control mode, you can manipulate and monitor real-time information. Cameras and security devices sync up and down 90 degrees and 360 degrees horizontal rotation features include lighting and a number of non-lethal security systems devices, active warning to stop. Moreover, we present antenna design: in the security system with separate monitoring system, security machine used omnidirectional radiation Broadband operating antenna design, security module uses the MIMO( Multi-input Multi-output) antenna. Antenna design as an analog value to assist the theoretical analysis to verify the correctness of the integrated design and conception of the appearance of existing modules, and then to the experimental measurement of the impedance bandwidth, input impedance matching, radiation patterns and antenna gain value as the adjustment is based on. The MIMO antenna experimental measurement think microwave reverberation chamber including diversity gain, isolation, channel capacity, contact number and other parameters measured. Keyword:security; remote control ; MIMO ; diversity gain ; channel capacity
Wen-ChungHuang and 黃文忠. "Study on the Technology acceptance theory to consumer-Smart Home Security Services." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/kfbcnn.
Full textHUNG, WAN-CHI, and 洪婉淇. "A Design of Internet of Things Security Monitoring System for Smart Home." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/15552655323531277163.
Full text高苑科技大學
資訊科技應用研究所
104
Home, making a house full of the meaning of life, you can relax yourself and feel the warmth in your home. However, a home not only can be a shelter, but also makes you feel secured mentally and physically. Yet, home can sometomes be a dangerous place. For example, fire, and carbon monoxide poisoning, and gas leaking and so on, nowadays we still can not prevent. Although nowadays each development teams are based on the convenience to build houses, none of them has been focusing on reducing the incident of disasters rate by improving the functions of protection and monitor. Therefore , this system which is combined with hardware and software is going to create an enivironment which is safe to stay This system has carbon monoxide sensor, gas leaking sensor , temperature and humidity sensors , intellisense light . It combined with the APP which is most popular now to make this home security system. Besides, you can realize the situation of your home immediately by it. It still can prevent the children and the elderly at home from being positioned in a dangerous place.We cannot prevent those tragedies caused by nature, but those Man-made disasters can be avoided beforehand by using this system. With using this system, preventing and reducing the percentage of the occurence of disasters to preserve lives and poverty can be less costly.
Craveiro, António Augusto Margalho. "A Framework for Improved Home Network Security." Master's thesis, 2020. http://hdl.handle.net/10316/92594.
Full textIn this thesis we propose a framework for improving the security of home networks. Home networks have seen, in the last years, an amazing increase in size, variety, and complexity. All these changes raise new concerns about their security, among other reasons because the myriad of new devices placed in the networks (e.g. IoT devices, smart TVs, smart appliances, surveillance cameras) generate a lot of network traffic which is not directly controlled by the network owner and is still poorly known. Several situations of malicious traffic being generated by such devices have been recently identified. The probable reasons are either due to malicious intentions of device manufacturers or simply because they have been compromised due to poor security. These threats are not being fully addressed probably because of the absence of detailed information about behavior and network traffic generated by each of these devices.To address this problem, the first step should be to perform a thoughtfully analysis of traffic flow, followed by finding the means to monitor that flow and, finally, to control it. This is not an easy task, because is not possible to get the inner details of the network packets, since most of then are encrypted. So, we are left with statistical analysis of packet flows, looking for aspects such as size, burst rate, packet frequency, and packet size percentage. It may not look much, but it is fundamental to get a clear picture of network traffic of a typical home network, a first step if we want to protect our home networks.The main goal of this thesis is to explore the possibility of analyzing the home network and profiling the traffic between home appliances and the internet. Then, to define the rules to monitor and control the flow using a properly shaped device. And finally, to integrate all this in a network of home control devices communicating with each other. By moving beyond the last mile and into the customers’ doorsteps, the proposed solution intends to provide comprehensive and contextual security monitoring on a per-user basis, embedded at the residential gateway or, eventually, resorting to a specialized appliance deployed in the home \acrshort{lan}.
Nesta tese propomo-nos a implementar uma infraestrutura que vise melhorar a segurança de redes domésticas. As redes domésticas têm sofrido, nos últimos anos, um surpreendente aumento em dimensão, variedade e complexidade. Todas estas mudanças levantam novas questões acerca da sua segurança, entre outras razões, pela miríade de novos dispositivos colocados na rede (p. ex. dispositivos IoT, televisões inteligentes, dispositivos inteligentes, câmaras de vigilância) que geram uma enorme quantidade de tráfego, que não é diretamente controlado pelo proprietário da rede, e é ainda pouco conhecido. Diversas situações de tráfego malicioso, gerado por estes dispositivos, têm sido recentemente identificadas. As causas prováveis deverão ser intenções maliciosas do fabricante do dispositivo, ou porque foram comprometidos face a uma fraca segurança. Estas ameaças ainda não foram devidamente abordadas provavelmente devido à ausência de informação detalhada sobre o comportamento do tráfego de rede gerado por cada um desses dispositivos.Para resolver este problema, o primeiro passo deverá ser efetuar uma extensa análise do fluxo de tráfego, seguido pela definição de formas de vigiar esse fluxo e, finalmente, controlá-lo. Esta não é uma tarefa fácil, porque não é possível obter os detalhes do interior dos pacotes de rede, uma vez que na sua maioria estão encriptados. Como tal, ficamos reduzidos à análise estatística dos fluxos de pacotes, procurando detalhes como o tamanho, taxa de transmissão, frequência de pacotes, e percentagem de pacotes em função do tamanho. Pode não parecer muito, mas é fundamental para conseguir uma imagem clara do tráfego de rede numa rede doméstica típica, um primeiro passo se queremos proteger a nossa rede doméstica.O principal objetivo desta tese é explorar a possibilidade de analisar a rede doméstica, e identificar o tráfego entre as aplicações da rede local e a internet. De seguida, definir as regras para monitorizar e controlar o fluxo utilizando um dispositivo apropriado. E, finalmente, integrar tudo numa rede de dispositivos locais controlados, comunicando entre si. Ao progredir para além do limite atual, entrando à porta do cliente, a solução proposta pretende fornecer monitorização de segurança compreensiva e contextualizada, com base no utilizador, e embutido no gateway residencial ou, eventualmente, delegando num equipamento especializado colocado na rede local.
"A Systematic Approach to Generate the Security Requirements For the Smart Home System." Master's thesis, 2013. http://hdl.handle.net/2286/R.I.18123.
Full textDissertation/Thesis
M.C.St. Computing Studies 2013