To see the other types of publications on this topic, follow the link: Smart Home Security.

Journal articles on the topic 'Smart Home Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Smart Home Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

shek, Abhi, Anu rag, Reji Thomas, and Dr B. Shadaksharappa. "Smart Home Security through NFC." Bonfring International Journal of Software Engineering and Soft Computing 6, Special Issue (October 31, 2016): 15–17. http://dx.doi.org/10.9756/bijsesc.8235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tatarnikova, T., and B. Sovetov. "Smart home security management." Journal of Physics: Conference Series 1864, no. 1 (May 1, 2021): 012120. http://dx.doi.org/10.1088/1742-6596/1864/1/012120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

MOROZOVA, OLGA, ARTEM TETSKYI, ANDRII NICHEPORUK, DENUS KRUVAK, and VITALII TKACHOV. "SMART HOME SYSTEM SECURITY RISK ASSESSMENT." Computer systems and information technologies, no. 3 (April 14, 2022): 81–88. http://dx.doi.org/10.31891/csit-2021-5-11.

Full text
Abstract:
The concept of the Internet of Things became the basis of the fourth industrial revolution, which allowed to transfer the processes of automation to a new saber. As a result, automation systems, such as smart homes, healthcare systems and car control systems, have become widespread. The developers of such systems primarily focus their efforts on the functional component, leaving safety issues in the background. However, when designing and operating IoT systems, it is equally important to assess potential bottlenecks and develop complete and comprehensive strategies to mitigate and eliminate the negative effects of cyberattacks. The purpose of this study is to identify possible cyber threats and assess their impact on critical information objects in the smart home system. To achieve this goal, the three-level architecture of the smart home system is considered and a review of known cyber threats for each level is conducted. The critical information objects in the smart home system are the containers in which the information objects are stored, the risk assessment criteria and the cyber threat scenarios. The information security risks of the smart home system were assessed using the OCTAVE Allegro methodology for the information object that presents the information collected by the smart home sensors.
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Junge, Yanhu Shan, and Kaiqi Huang. "ISEE Smart Home (ISH): Smart video analysis for home security." Neurocomputing 149 (February 2015): 752–66. http://dx.doi.org/10.1016/j.neucom.2014.08.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jose, Arun Cyril, and Reza Malekian. "Improving Smart Home Security: Integrating Logical Sensing Into Smart Home." IEEE Sensors Journal 17, no. 13 (July 1, 2017): 4269–86. http://dx.doi.org/10.1109/jsen.2017.2705045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jose, Arun Cyril, Reza Malekian, and Babedi B. Letswamotse. "Improving smart home security; integrating behaviour prediction into smart home." International Journal of Sensor Networks 28, no. 4 (2018): 253. http://dx.doi.org/10.1504/ijsnet.2018.096464.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Letswamotse, Babedi B., Arun Cyril Jose, and Reza Malekian. "Improving smart home security; integrating behaviour prediction into smart home." International Journal of Sensor Networks 28, no. 4 (2018): 253. http://dx.doi.org/10.1504/ijsnet.2018.10017822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

nifer, Jen D., Los M. higa, Sowndharya R. Lakshmi, and Vidhya M. lakshmi. "Reinforcing Smart Home Security System." International Journal of Engineering Trends and Technology 57, no. 1 (March 25, 2018): 28–30. http://dx.doi.org/10.14445/22315381/ijett-v57p206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Oh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (February 21, 2021): 1488. http://dx.doi.org/10.3390/s21041488.

Full text
Abstract:
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel. Therefore, a secure authentication protocol should be established between the user and smart devices. In 2020, Xiang and Zheng presented a situation-aware protocol for device authentication in smart grid-enabled smart home environments. However, we demonstrate that their protocol can suffer from stolen smart device, impersonation, and session key disclosure attacks and fails to provide secure mutual authentication. Therefore, we propose a secure and lightweight authentication protocol for IoT-based smart homes to resolve the security flaws of Xiang and Zheng’s protocol. We proved the security of the proposed protocol by performing informal and formal security analyses, using the real or random (ROR) model, Burrows–Abadi–Needham (BAN) logic, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, we provide a comparison of performance and security properties between the proposed protocol and related existing protocols. We demonstrate that the proposed protocol ensures better security and lower computational costs than related protocols, and is suitable for practical IoT-based smart home environments.
APA, Harvard, Vancouver, ISO, and other styles
10

Lad, Vishal. "Smart Home Technologies." International Journal for Research in Applied Science and Engineering Technology 9, no. 8 (August 31, 2021): 1421–34. http://dx.doi.org/10.22214/ijraset.2021.37498.

Full text
Abstract:
Abstract: This project describes about smart home concept which is made up using 2 microcontrollers. this project assures complete and proper utilisation of IOT with three application-camera surveillance(home security)-smart plant caring systemhome automation
APA, Harvard, Vancouver, ISO, and other styles
11

Ul Rehman, Shafiq, and Selvakumar Manickam. "A Study of Smart Home Environment and its Security Threats." International Journal of Reliability, Quality and Safety Engineering 23, no. 03 (June 2016): 1640005. http://dx.doi.org/10.1142/s0218539316400052.

Full text
Abstract:
As the world is moving towards Internet of Things, smart home is now rapidly becoming a reality. Home appliances and devices are interconnected, i.e., home area network, via proprietary or standard TCP/IP protocols allowing for better management and monitoring. Nevertheless, as with any form of network, smart home is also prone to security threats and vulnerabilities. This paper aims at presenting the importance of security in smart home environment. Herein, we will discuss (a) the concepts of smart home environment, (b) various smart home communication mechanisms, (c) security challenges and concerns in smart home environment, (d) security threats in smart home environment, (e) current security measures to encounter such security attacks and finally, conclusion and future work.
APA, Harvard, Vancouver, ISO, and other styles
12

Chandra, Gummadi Rohith Madhu. "A Survey on Security Issues in IOT Enabled Smart Homes." International Journal for Research in Applied Science and Engineering Technology 9, no. 9 (September 30, 2021): 612–17. http://dx.doi.org/10.22214/ijraset.2021.38026.

Full text
Abstract:
Abstract: Smart home systems are having in great popularity and demand for the past few decades as they increase the comfort and quality of life. Smartphones and microcontrollers are used to control most of these devices.A smartphone application is used to monitor home functions and perform various tasks with wireless communication technologies. IoT has changed organizations by incorporating dexterity and effectiveness. However, one of the biggest concerns associated with this field is Security. In 2016, a hacker had discovered a weakness in video cameras that came about in very nearly 300,000 IoT gadgets assaulting other online media stages, which even cut down Twitter. This is only one of the numerous instances of how Security has frequently got compromised in 'things.' In this survey paper, our objective is to know the details of smart home ,its’s archictecture and it’s security issues in this contemporary world. We will survey the security concerns of IoT in Smart Homes. Towards the second part of the paper, we will also discuss some of the developments that have been made to overcome these challenges and used for security in smart homes. Keywords: Sensors, Internet of things, Security, Smart Homes, Home appliances.
APA, Harvard, Vancouver, ISO, and other styles
13

Wardoyo, Jalu, Noor Hudallah, and Aryo Baskoro Utomo. "SMART HOME SECURITY SYSTEM BERBASIS MIKROKONTROLER." Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 10, no. 1 (April 29, 2019): 367–74. http://dx.doi.org/10.24176/simet.v10i1.2684.

Full text
Abstract:
Tingginya tindak kejahatan pencurian di rumah tangga perlu diantisipasi dengan penggunaan sistem keamanan rumah yang modern, salah satunya yaitu smart home. Salah satu penerapan smart home berupa safety system. Studi ini mengajukan perancangan sistem keamanan smart home berbasis mikrokontroler. Sistem keamanan smart home ini menggunakan kombinasi metode pengaman biometric fingerprint dan password. Metode perancangan sistem dengan metode Research and Development (RnD). Proses RnD dibagi menjadi tiga tahap yaitu tahap studi, research, dan pengembangan. Tahap studi meliputi studi pustaka dan studi lapangan terkait sistem keamanan rumah, tahap research berupa pembuatan dan pengujian prototype sistem keamanan, dan tahap pengembangan berupa pengujian dan perbaikan terhadap kekurangan sistem keamanan. Penelitian ini menghasilkan prototype sistem keamanan smart home yang memiliki kemampuan memberikan akses terhadap pintu dengan metode autentifikasi biometric fingerprint dan password serta fitur tambahan emergency backup supply dan emergency entry. Akses pintu diberikan ketika autentifikasi berhasil dilakukan dan mikrokontroler akan memberikan perintah untuk menghidupkan solenoid door lock sebagai mekanisme penguncian pintu. Sistem ini bekerja menggunakan beberapa perangkat diantaranya: Arduino Mega, modul fingerprint, keypad, LCD, power supply unit (PSU), magnetic switch, solenoid door lock, dan buzzer.
APA, Harvard, Vancouver, ISO, and other styles
14

Goyal, Akshat, and Mugdha S. Kulkarni. "Assessment of Smart Home: Security and Privacy." Revista Gestão Inovação e Tecnologias 11, no. 4 (August 24, 2021): 4913–30. http://dx.doi.org/10.47059/revistageintec.v11i4.2513.

Full text
Abstract:
Home automation is now extremely common in Internet of things services and devices with a range of assurances to improve health, lifestyle, and customer wellbeing. In terms of its success and apparent utility for humans, intelligent homes possess various safety concerns resulting from the diversified, vast-range, and nuanced nature of IoT. Previous studies have talked about security and privacy issues. However, we observe that they have not addressed the risk assessment of each smart home component and corresponding security objective along with additional factors that affect a smart home security posture. In this study, we have proposed a framework defining a standard level of security and then analyzing each component concerning it. There are so many vulnerabilities, but all cannot be assessed due to the heterogeneity of devices and their connection in a small network. IoT can support a wide range of technologies and programs in various domains, including smart cities and smart houses. For monitoring, data exchange, and other operations in the given service, IoT smart objects communicate with other elements such as proxies, mobile devices, and data collectors. While such components help solve various social issues and provide consumers with modern advanced services, their restricted computing capacities render them vulnerable to well-known protection and privacy risks.
APA, Harvard, Vancouver, ISO, and other styles
15

Sathesh and Yasir Babiker Hamdan. "Smart Home Environment Future Challenges and Issues - A Survey." March 2021 3, no. 1 (February 17, 2021): 1–14. http://dx.doi.org/10.36548/jei.2021.1.001.

Full text
Abstract:
The smart home automation is that the exploitation internet enabled devices remotely and mechanically management appliances such as lighting, heating system and security measures in and around your home. This papers talks about relative emission effects in Home Energy Management. Also the result outcome is that consumption of the electricity will be reduced towards green environment. Moreover, the research paper is considering the analysis of calculate the negative effects in environment due to full home automation system. While calculating these negative effects, the Life Cycle Assessment (LCA) should be in sum total. This study uses to analysis the electricity consumption for environment impact of Home Energy Management system (HEMs). The research article discusses home automation system consumes the energy for different devices connected for smart home. The maximum energy consumption in smart home network is smart plugs due to an uninterrupted supply. Therefore this research article comprises about home automation energy management that shows the balance energy consumption between the devices in a regular interval. Also this research article provides a future challenge tasks in security issues in smart home environment. Also the perception for smart home environment focuses the Interoperability, Reliability, Integration of smart homes and term privacy in context, term security and privacy vulnerabilities to smart home.
APA, Harvard, Vancouver, ISO, and other styles
16

Volvach, A. V., and N. S. Poddubnaya. "Vulnerabilities in Smart Home system." Вестник Пермского университета. Математика. Механика. Информатика, no. 1(52) (2021): 49–52. http://dx.doi.org/10.17072/1993-0550-2021-1-49-52.

Full text
Abstract:
The article considers the existing vulnerabilities in the Smart Home system. The characteristic vulnerabilities in information security of some devices included in the Smart Home system are determined. The methods to improve information security of Smart Home systems are proposed.
APA, Harvard, Vancouver, ISO, and other styles
17

Ren, Lanfang, Huachun Zhou, Xiaoyong Hang, Bo Yang, and Li Su. "Research on Performance Optimization and Application in Smart Home for Hyperledger Fabric." Sensors 22, no. 9 (April 22, 2022): 3222. http://dx.doi.org/10.3390/s22093222.

Full text
Abstract:
With the popularity of smart home services, smart home devices are also increasing significantly. At the same time, security problems of smart home services are becoming more and more important. With the characteristics of non-tampering and multi-party consensus mechanism, Blockchain technology provides powerful capabilities in security protection. In this paper, we introduce the widely used permission Blockchain Fabric for smart home services. As the high requirements of performance, we firstly study the methods of performance optimization for Fabric. Then, a Fabric-based smart home security control system is designed. Based on this system, the smart home system is able to provide access control and security control for smart home devices. The experimental results show that the system works best when the number of concurrent registrations of smart home device is under 6000.
APA, Harvard, Vancouver, ISO, and other styles
18

Shin, Sooyeon, and Taekyoung Kwon. "A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes." Sensors 19, no. 9 (April 29, 2019): 2012. http://dx.doi.org/10.3390/s19092012.

Full text
Abstract:
A wireless sensor network (WSN) is used for a smart home system’s backbone that monitors home environment and controls smart home devices to manage lighting, heating, security and surveillance. However, despite its convenience and potential benefits, there are concerns about various security threats that may infringe on privacy and threaten our home life. For protecting WSNs for smart homes from those threats, authentication and key agreement are basic security requirements. There have been a large number of proposed authentication and key agreement scheme for WSNs. In 2017, Jung et al. proposed an efficient and security enhanced anonymous authentication with key agreement scheme by employing biometrics information as the third authentication factor. They claimed that their scheme resists on various security attacks and satisfies basic security requirements. However, we have discovered that Jung et al.’s scheme possesses some security weaknesses. Their scheme cannot guarantee security of the secret key of gateway node and security of session key and protection against user tracking attack, information leakage attack, and user impersonation attack. In this paper, we describe how those security weaknesses occur and propose a lightweight three-factor authentication and key agreement scheme in WSNs for smart homes, as an improved version of Jung et al.’s scheme. We then present a detailed analysis of the security and performance of the proposed scheme and compare the analysis results with other related schemes.
APA, Harvard, Vancouver, ISO, and other styles
19

Janita, Bhuvana, and Jagadeesh Kannan. "Smart Monitor for Enhancing Security in Smart Home Systems." IOP Conference Series: Materials Science and Engineering 925 (October 14, 2020): 012036. http://dx.doi.org/10.1088/1757-899x/925/1/012036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Hakim, Arif Rahman, Megatro Thathit Wahyunan Widhi, and Setyo Admoko. "Sistem Pengaman Berbasis Microcontroler Internet Of Things (IoT) Sebagai Pengaman Rumah Interaktif." Jurnal Pendidikan Fisika dan Teknologi 7, no. 1 (June 30, 2021): 43. http://dx.doi.org/10.29303/jpft.v7i1.2707.

Full text
Abstract:
The development of technology is currently happening very quickly and has become a part of human life. One technology that has become an important part of human life is the application technology of an interactive smart home security system (smart house). This can overcome various problems that often occur in home security which were previously only controlled by manual systems and were prone to theft crimes. The purpose of this research is to develop an Arduino-based interactive smart home technology that works automatically by relying on sensors and without a wireless remote-control device such as a remote control based on an Android application. The research method used by the research team is the development of a prototype which includes smart home technology, home security devices, and automation of smart home devices which are realized by two-dimensional and three-dimensional engineering methods for house models in the form of electronic circuits, as well as home electrical and security plans. The development of this technology provides significant benefits, including making it easier for users of the interactive smart house feature, so that its use becomes more practical and efficient as well as disability friendly and all ages. Indonesia needs to keep moving forward in terms of technological development and innovation, especially in terms of home security and the manufacture of smart homes by utilizing the Internet of Things (IoT) and applications on Android. Until later Indonesia can match up to the stage of surpassing the technological capabilities that have been applied in various developed countries and products can be patented into an Internet of Things (IoT) based security system.
APA, Harvard, Vancouver, ISO, and other styles
21

Amadi, Dwi Nor. "SMART HOME DEVELOPMENT FOR HOME SECURITY WITH ANDROID BASED." International Journal of Advanced Research in Computer Science 8, no. 9 (September 30, 2017): 320–23. http://dx.doi.org/10.26483/ijarcs.v8i9.4875.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Golvilkar, Brahmendra. "NOVEL SECURITY OF HOME USING SMART HOME MANAGEMENT SYSTEM." International Journal of Advanced Research in Computer Science 9, no. 2 (April 20, 2018): 337–39. http://dx.doi.org/10.26483/ijarcs.v9i2.5641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

LIJAU, EMILLI. "MyMaster : A Multifactor Authentication Scheme for Smart Home Device." Journal of IT in Asia 9, no. 1 (November 30, 2021): 89–96. http://dx.doi.org/10.33736/jita.3856.2021.

Full text
Abstract:
Smart homes are one of the Internet of Things (IoT) applications most significant to enable people to operate intelligent devices on the Internet in their homes. However, when users can access an intelligent home system remotely, they have major privacy and confidentiality difficulties to overcome. Nothing has been done to improve the safety characteristics of an intelligent home with current research on authentication approaches. For example, to address these issues and to develop a reciprocal tracking authentication system with a critical aspect of a deal, we recommend an Internet based Smart Home System (IFTTT) model. As a controller and a safety guard, an IFTTT-Home Gateway provides a user with remote access to a Smart Home System within their company. The system is designed for mutual authentication with security features such as anonymity and full advance security by using Elliptical Curve Encryption, Nonces, XOR or cryptographic Hash functions. We also incorporate multi factor authentication (MFA) into the model to ensure more security and preventing privacy leakage.
APA, Harvard, Vancouver, ISO, and other styles
24

Anagnostopoulos, Marios, Georgios Spathoulas, Brais Viaño, and Javier Augusto-Gonzalez. "Tracing Your Smart-Home Devices Conversations: A Real World IoT Traffic Data-Set." Sensors 20, no. 22 (November 18, 2020): 6600. http://dx.doi.org/10.3390/s20226600.

Full text
Abstract:
Smart-home installations exponential growth has raised major security concerns. To this direction, the GHOST project, a European Union Horizon 2020 Research and Innovation funded project, aims to develop a reference architecture for securing smart-homes IoT ecosystem. It is required to have automated and user friendly security mechanisms embedded into smart-home environments, to protect the users’ digital well being. GHOST project aims to fulfill this requirement and one of its main functionalities is the traffic monitoring for all IoT related network protocols. In this paper, the traffic capturing and monitoring mechanism of the GHOST system, called NDFA, is presented, as the first mechanism that is able to monitor smart-home activity in a holistic way. With the help of the NDFA, we compile the GHOST-IoT-data-set, an IoT network traffic data-set, captured in a real world smart-home installation. This data-set contains traffic from multiple network interfaces with both normal real life activity and simulated abnormal functioning of the devices. The GHOST-IoT-data-set is offered to the research community as a proof of concept to demonstrate the ability of the NDFA module to process the raw network traffic from a real world smart-home installation with multiple network interfaces and IoT devices.
APA, Harvard, Vancouver, ISO, and other styles
25

Kavallieratos, Georgios, Nabin Chowdhury, Sokratis Katsikas, Vasileios Gkioulos, and Stephen Wolthusen. "Threat Analysis for Smart Homes." Future Internet 11, no. 10 (September 25, 2019): 207. http://dx.doi.org/10.3390/fi11100207.

Full text
Abstract:
The development and deployment of highly dynamic, cyber+connected operational environments, such as smart homes, smart cities, and smart transportation systems, is increasing. The security analysis of such dynamic environments necessitates the use of dynamic risk assessment methodologies and the modeling of dynamically changing states. In this paper, we focus on the smart home environment, where the deployment of IoT devices increase the attack surface. We examine existing dynamic risk assessment methodologies, and by leveraging a smart home reference architecture we identify the security risks of a smart home’s physical and communication viewpoints, taking into consideration also dynamic operational aspects. Further, we develop a smart home network topology generator and a graph-based attack model to study dependencies among dynamically changing states and the propagation of a malware infection.
APA, Harvard, Vancouver, ISO, and other styles
26

Tok, Yen Xin, Norliza Katuk, and Ahmad Suki Che Mohamed Arif. "Smart Home Multi-Factor Authentication Using Face Recognition and One-Time Password on Smartphone." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 24 (December 21, 2021): 32–48. http://dx.doi.org/10.3991/ijim.v15i24.25393.

Full text
Abstract:
Recently, the adoption of smart home technology has been on the rise and becoming a trend for home residents. The development of Internet-of-Things (IoT) technology drives the smart home authentication system with biometric systems such as facial recognition, fingerprint, and voice control techniques. In the context of homeowners, security is always the primary concern. However, conventional home security and the existing smart home security system have some limitations. These techniques use single-factor authentication, which provides limited protection for home security. Therefore, this project proposed a design for smart home multi-factor authentication using facial recognition and a one-time password sent to smartphones for a home security system. Rapid application development was the methodology for conducting this study. A usability evaluation suggested that the proposed smart home multi-factor authentication is acceptable, but some usability issues can be improved in the future.
APA, Harvard, Vancouver, ISO, and other styles
27

Reva, Ivan, Anastasiya Arkhipova, and Roman Samoylenko. "Analysis of threats to information security and data protection in the “Smart house systems”." Digital technology security, no. 4 (December 27, 2021): 20–36. http://dx.doi.org/10.17212/2782-2230-2021-4-20-36.

Full text
Abstract:
The idea of smart homes has been around for several decades and has been described by different authors many times since then. However, there are almost always three aspects in the definitions of the last 20 years. First, home devices must be connected, not only to each other, but also to the Internet. Second, an intelligent way to manage the system is needed, such as a central gateway or smart smartphone apps. Finally, there must be some degree of home automation in the system. A hardware and software complex that meets these requirements can be called a “smart home” system. The system of ensuring the security of the "smart home" is now of great practical importance, which should include measures to protect the IT infrastructure, ensuring the personal safety of residents, ensuring their health, the sanitary condition of the premises, as well as the safety of material assets. It follows from this that the problem of the lack of a thorough study of information security threats and the elaboration of protection of the entire software and hardware complex of the "smart home" system is quite urgent. When solving this problem, an analysis of the main types and characteristics of smart home systems was carried out, and their key vulnerabilities were identified. Also, a study of vulnerabilities in the hardware of smart home systems was carried out; A qualitative assessment of the information security risks of a "smart home" has been carried out and protective measures have been developed to reduce them; A prototype of a fragment of the “smart home” security system has been developed and studied. In an experimental study of threats and vulnerabilities of the developed prototype of a fragment of the "smart home" system, the threat of interception of critical information of the system was studied in detail. Based on the results of the development and research of the Security Inspector, conclusions were drawn about the effectiveness of the use of the intrusion detection module.
APA, Harvard, Vancouver, ISO, and other styles
28

Zhang, Yong Hong, and Rui Huang. "Design and Implementation of the Smart Home Security Control System Based on the Android Platform." Advanced Materials Research 753-755 (August 2013): 3120–24. http://dx.doi.org/10.4028/www.scientific.net/amr.753-755.3120.

Full text
Abstract:
The paper introduces the development status of smart home platform based-on Android system and advantages of Smart home security system first.As to the families internal application environment,a low-cost,easy to expand,smart home security system for home applications based on the Android platform is designed through the analysis and research of smart home security system.It Shows the basic module structures of the software according to the design scheme,and each module performs the specific implementation.
APA, Harvard, Vancouver, ISO, and other styles
29

Marrapu, Satvika, Satyanarayana Sanakkayala, Arun kumar Vempalli, and Sai Krishna Jayavarapu. "Smart home based security system for door access control using smart phone." International Journal of Engineering & Technology 7, no. 1.8 (March 3, 2018): 249. http://dx.doi.org/10.14419/ijet.v7i1.9247.

Full text
Abstract:
The system is regarding the remotely overseen Door availability and voice alarming with the help of Smart Phone. It captures the guest picture at the Door as Email caution. Use of Smart home security control framework became essential in our day to day life. This paper describes the outline of an advanced home security framework. In this method the door availability has been controlled based on guest character by considering the human movement location and remotely checking innovation. This paper describes the remote control framework execution and organization and allows the validated individuals in to a home as it were. This Security Framework can be implemented by using switch/calling bell and a Camera module. The camera module captures the pictures of the guest separately and ideally to make the home security framework alive on demand. In this method we used an Electromagnetic entryway bolt module which created the entryway availability. This proposed framework deploys a controller interface framework and LPC 2148. If a guest press calling bell at the door then the web Camera module is interfaced with switch to capture pictures and send these pictures as Email caution with the help of TCP/IP protocol. Now, we can control this home security system by seeing camera module video stream with the help of Smart cell Phone. Like this, the proposed home security framework allows us for sending an order as a reply of voice ready whenever the gatecrasher recognized using smart phone. By using android stage and improved JavaScript, the Clients can see the guest on the screen and able to control the entryway by locking or unlocking the door. This software can be used in a wide range of application where the physical nearness can't be possible forever i. e in territories. The entire control framework is implemented with LPC 2148 now a days usage of smart lock system is increasing day by day in wide range of applications. This efficient effort less low power calling bell based home lock system is essential for security purpose in every home and offices. So many nations are worked on home based locking frame work to implement advanced technologies in it. Most of smart houses and business offices are associated with a chip for security purpose. Though numerous advancements take place, the clients face troubles i. e interface problems in utilizing this smart lock system. To avoid such type of issues i proposed microcontroller. This advanced home security system is useful for real time home environment.
APA, Harvard, Vancouver, ISO, and other styles
30

Nayab, Saddam Hussain, Amerah Alabrah, Syed Sajid Ullah, Hizbullah Khattak, Taha M. Alfakih, and Insaf Ullah. "An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home." Wireless Communications and Mobile Computing 2022 (April 29, 2022): 1–11. http://dx.doi.org/10.1155/2022/4215441.

Full text
Abstract:
The delivery of unified intelligent services is accomplished through a networked environment comprised of a wide array of electronic devices. Through the use of Internet of Things (IoT) technology, smart homes collect data from their surroundings and use it to improve their tenants’ lives. Remote control, real-time monitoring, and a fire alarm are all characteristics of smart home security. Since smart homes hold personally identifying information about their residents, security is critical to ensure their reliability and prevent data breaches. In this paper, a certificateless online/offline signcryption (COOS) technique for IoT-enabled smart homes is proposed. The proposed solution takes advantage of a resource-constrained smart home device–friendly algorithm known as the Hyperelliptic Curve Cryptosystem (HCC). The suggested approach satisfies the security requirements of unforgeability, confidentiality, resistance to replay attacks, and non-repudiation. The complexity analysis in terms of communicational and computational costs demonstrates the efficiency of the proposed scheme. Finally, we validate the security against Man-In-The-Middle-Attack (MITM) and anti-reply attacks using Automated Validation of Internet Security Protocols and Applications (AVISPA). The data imply that the recommended course of action is safe.
APA, Harvard, Vancouver, ISO, and other styles
31

Zhang, De Min. "Elevator Smart Security System." Advanced Materials Research 403-408 (November 2011): 2247–50. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.2247.

Full text
Abstract:
The elevator smart security system provides a good method to access the elevator car buttons. It uses contactless smart card to active the car buttons. Only after brushing the authorized card, the car buttons can be selected, so the passenger can take the elevator to his home floor. Visitor can take the elevator via a visitor automatic controller not using card.
APA, Harvard, Vancouver, ISO, and other styles
32

Dewani, Amirita, Pirah Memon, Veena Kumari, Anum Arain, Ayaz Jiskani, and Sania Bhatti. "Keyless Smart Home: An application of Home Security and Automation." Oriental journal of computer science and technology 11, no. 2 (May 7, 2018): 107–14. http://dx.doi.org/10.13005/ojcst11.02.06.

Full text
Abstract:
The rapid and revolutionary advancement in technology has increased the demand for advanced ubiquitous mobile applications in our daily lives. Home automation system uses collective smart technology to elevate sphere of security and human living standards. Wireless Smart home systems have been prototyped by researchers to realize different applications in vast contexts. In this paper we propose a keyless smart home security system which uses Bluetooth as a communication protocol to automate door locks based on a security code and predefined user credentials. The system combines Android phone as a signal sender to dispatch the input signal from an end users side, Bluetooth communication module as signal receiver, ARDUINO microcontroller as CPU and servo motor and light emitting diodes as an output. The system integrates two modules: one of which is Arduino microcontroller which is responsible for authentication and verification of security code and allows servo motor to process the output according to the received input. The second is android Application which provides an interface to the user to set credentials and security code which is then transmitted to the Arduino microcontroller via Bluetooth technology. Since Arduino and Android are open source, hence implementation rate of the proposed system is inexpensive and feasible.
APA, Harvard, Vancouver, ISO, and other styles
33

Zimmermann, Verena, Paul Gerber, Karola Marky, Leon Böck, and Florian Kirchbuchner. "Assessing Users’ Privacy and Security Concerns of Smart Home Technologies." i-com 18, no. 3 (November 18, 2019): 197–216. http://dx.doi.org/10.1515/icom-2019-0015.

Full text
Abstract:
AbstractSmart Home technologies have the potential to increase the quality of life, home security and facilitate elderly care. Therefore, they require access to a plethora of data about the users’ homes and private lives. Resulting security and privacy concerns form a relevant barrier to adopting this promising technology. Aiming to support end users’ informed decision-making through addressing the concerns we first conducted semi-structured interviews with 42 potential and little-experienced Smart Home users. Their diverse concerns were clustered into four themes that center around attacks on Smart Home data and devices, the perceived loss of control, the trade-off between functionality and security, and user-centric concerns as compared to concerns on a societal level. Second, we discuss measures to address the four themes from an interdisciplinary perspective. The paper concludes with recommendations for addressing user concerns and for supporting developers in designing user-centered Smart Home technologies.
APA, Harvard, Vancouver, ISO, and other styles
34

Humphry, Justine, and Chris Chesher. "Visibility and security in the smart home." Convergence: The International Journal of Research into New Media Technologies 27, no. 5 (October 2021): 1170–88. http://dx.doi.org/10.1177/13548565211030073.

Full text
Abstract:
Smart home, media and security systems intervene in the territory and boundaries of the home in a variety of ways. Among these are the capacity to watch the home from afar, and to record these observations over time, as well as using the home as a site of performance for those on the outside. In this paper, we map the meanings of the smart home and explore the tensions between security and visibility, adopting a cultural history and cultural analysis methodological approach. We make a contribution to the literature on the smart home, highlighting its connection to longer trajectories of media and cultural change, and to understanding the contemporary formations of technologised surveillance, with attention to practices that emerged in response to COVID-19. We focus on two aspects of our model of domestic smartification: Ludics (devices and systems for play or entertainment) and exteriorities (security and communication interfaces that remotely monitor and expose the home). We focus on these aspects relating them to ideas of haunting and the uncanny to explore the implications of making what was previously hidden visible and manipulable to others.
APA, Harvard, Vancouver, ISO, and other styles
35

Shahbazi, Zeinab, Yung-Cheol Byun, and Ho-Young Kwak. "Smart Home Gateway Based on Integration of Deep Reinforcement Learning and Blockchain Framework." Processes 9, no. 9 (September 5, 2021): 1593. http://dx.doi.org/10.3390/pr9091593.

Full text
Abstract:
The development of information and communication technology in terms of sensor technologies cause the Internet of Things (IoT) step toward smart homes for prevalent sensing and management of resources. The gateway connections contain various IoT devices in smart homes representing the security based on the centralized structure. To address the security purposes in this system, the blockchain framework is considered a smart home gateway to overcome the possible attacks and apply Deep Reinforcement Learning (DRL). The proposed blockchain-based smart home approach carefully evaluated the reliability and security in terms of accessibility, privacy, and integrity. To overcome traditional centralized architecture, blockchain is employed in the data store and exchange blocks. The data integrity inside and outside of the smart home cause the ability of network members to authenticate. The presented network implemented in the Ethereum blockchain, and the measurements are in terms of security, response time, and accuracy. The experimental results show that the proposed solution contains a better outperform than recent existing works. DRL is a learning-based algorithm which has the most effective aspects of the proposed approach to improve the performance of system based on the right values and combining with blockchain in terms of security of smart home based on the smart devices to overcome sharing and hacking the privacy. We have compared our proposed system with the other state-of-the-art and test this system in two types of datasets as NSL-KDD and KDD-CUP-99. DRL with an accuracy of 96.9% performs higher and has a stronger output compared with Artificial Neural Networks with an accuracy of 80.05% in the second stage, which contains 16% differences in terms of improving the accuracy of smart homes.
APA, Harvard, Vancouver, ISO, and other styles
36

Rajarajeswari, S., Shola Usha Rani, Alpanshu Kataria, and Soumitro Dutta. "Home Automation through Smart Lighting, Smart Security and other Appliances." ITM Web of Conferences 37 (2021): 01024. http://dx.doi.org/10.1051/itmconf/20213701024.

Full text
Abstract:
The smart home automation system is designed to conveniently manage and monitor household appliances and lighting fixtures remotely, to save time and to use resources effectively. It is a control system for allowing access to home automation devices. The automation devices include lights, fan, camera and doors. It even enhances the main features of the project to control the home appliances from anywhere as remotely. With the camera module, continuous surveillance and protection of the home is accomplished. A significant improvement is achieved in utility costs by an optimal use of energy. Using inexpensive electronic and interactive tools, this initiative can be applied, making it economically, physically and operationally feasible. Basically it involves controlling everything remotely via a visual interface and mobile application. The automation system employs the use of MQTT protocol in order to secure the transmitted device based information to and from in the network. The defense against Man in the Middle attack (MITM) is the main focus of our automation system. The routed messages are checked at the intermediate hub to check for the occurrence of MITM based DoS attacks through manual reset points. .
APA, Harvard, Vancouver, ISO, and other styles
37

sotoudeh, Shahrouz, Sattar Hashemi, and Hossein Gharaee garakani. "Security Framework of IoT-Based Smart Home." International Journal of Information & Communication Technology Research 12, no. 1 (January 1, 2020): 11–19. http://dx.doi.org/10.52547/ijict.12.1.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Saranya, G., C. Senthamilarasi, and B. Vidhya. "Integrated Security System for Residential Home." Journal of Computational and Theoretical Nanoscience 16, no. 2 (February 1, 2019): 585–87. http://dx.doi.org/10.1166/jctn.2019.7774.

Full text
Abstract:
In today's growing concern for home security, we have developed an advanced security system using integrated digital signature and DNA cryptography. The digital signature is formed using multifeature biometric traits which include both fingerprints as well as iris image. We further increase the security by using DNA cryptography which is embedded on a smart card. In order to prevent unauthorized access manually or digitally, we use geo-detection which compares the unregistered devices location with the user's location using any of their personal devices such as smart phone or tab.
APA, Harvard, Vancouver, ISO, and other styles
39

Pavan Kumar, T., R. Hemanth krishna, M. Sai krishna, and Jhanavi Meghana. "Smart home system based on IoT." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 500. http://dx.doi.org/10.14419/ijet.v7i2.8.10493.

Full text
Abstract:
In this era, IoT (Internet of Things) is the most emerging technology which is improving day-by-day. According to a survey the IoT growth will be from USD 170.57 Billion in 2017 to USD 561.04 Billion by 2022, at Compound Annual Growth Rate (CAR) of 26.9%. IoT is the smart technology which used to control the devices from anywhere we are. In this project we are going to discuss on how to control and provide security to our home appliances. There are many others ways to get control and othere security to our home appliances but we are trying to implement that by using our method. So, to provide security to our home appliance we are using a micro-controller, sensors, buzzer and a GSM module. The micro-controller is used to get control over the home appliances we are connected with and the sensors will give the information about what is happening over there, and if there is any threat the buzzer connected there will make the noise and makes alert and through the GSM module the information will be sent the registered mobile number. By, seeing this message will can get alert and provide security to our home appliances.
APA, Harvard, Vancouver, ISO, and other styles
40

Mahardi, Kristi, Joni Welman Simatupang, and Evi Rismauli. "Security Home Door Automation Using Multi Sensors." Journal of Electrical And Electronics Engineering 3, no. 1 (January 21, 2021): 88. http://dx.doi.org/10.33021/jeee.v3i1.1407.

Full text
Abstract:
The System is using Smart Relay as main control that is commonly used industrially and commercially as a control system. Using the smart relay can reduce the use of control relay and writing of the system significantly. The smart relay has a GSM-SMS for messaging and controlling the system. Only the listed number at the system that can message and control the system. By using smart relay, we can costumized our design as our requirements. Automatic door is commonly used in commercial and industrial. The relay output will be connected to door motor (for opening and closing), buzzer for alarm and pilot lamps for indication. Finaly the system is expected to have several functions as follow : Automatic opening door using fingerprint detection, automatic opening door using GSM command, automatic opening door using push button for inside command, automatic opening door using passcode, automatic closing door after door is fully opened with no movement and send the notification by GSM. By Implementing this system, it will be easier to lock the door and activate the alarm from a considerable distance.
APA, Harvard, Vancouver, ISO, and other styles
41

Jose, Arun Cyril, Reza Malekian, and Ning Ye. "Improving Home Automation Security; Integrating Device Fingerprinting Into Smart Home." IEEE Access 4 (2016): 5776–87. http://dx.doi.org/10.1109/access.2016.2606478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Karim, Bakhtiar Ali, and Halgurd Nawzad Awl. "Smart Home System Based on GSM Network." Kurdistan Journal of Applied Research 3, no. 1 (April 25, 2018): 17–21. http://dx.doi.org/10.24017/science.2018.1.4.

Full text
Abstract:
Due to increasing robbery and intrusion, establishing home-security system has become a correlated part of the modern houses, buildings, and offices. As the family members are not at home all the time, the traditional home security system, which makes alarm sound only, may not be efficient enough. Alternatively, Global System for Mobile communications (GSM) based security system can provide higher level of security and convenience compared to the traditionally used systems. The main objective of the current paper is to design and implement cost-efficient and reliable security, safety and home automation system for protection and occupants’ convenience. If any undesired events, such as intrusion, gas leakage and fire occurs in the house, our system warns the homeowner in real-time using Short Message Service (SMS). With the proposed system home appliances can also be controlled in three ways, namely sending SMS from the authorized numbers to the system through GSM network, smartphone app using Bluetooth module and infrared (IR) control using IR module
APA, Harvard, Vancouver, ISO, and other styles
43

Pilgermann, Michael, Thomas Bocklisch, and Reiner Creutzburg. "Conception and implementation of a course for professional training and education in the field of IoT and smart home security." Electronic Imaging 2020, no. 3 (January 26, 2020): 277–1. http://dx.doi.org/10.2352/issn.2470-1173.2020.3.mobmu-276.

Full text
Abstract:
The aim of this paper is to describe the new concept of a Master level university course for computer science students to address the issues of IoT and Smart Home Security. This concept is well suited for professional training for interested customers and allows the creation of practical exercises. The modular structure of the course contains lectures and exercises on the following topics: 1. Introduction - IoT and Smart Home Technology and Impact 2. Homematic Technology and Smart Home Applications 3. Loxone Technology and Smart Home Applications 4. Raspberry Pi and Smart Home Applications 5. Security of IoT and Smart Home Systems and contains laboratory exercises of diverse complexities.
APA, Harvard, Vancouver, ISO, and other styles
44

Xu, Meijia, Qiying Dong, Mai Zhou, Chenyu Wang, and Yangyang Liu. "Security Analysis on “Anonymous Authentication Scheme for Smart Home Environment with Provable Security”." Wireless Communications and Mobile Computing 2020 (November 14, 2020): 1–4. http://dx.doi.org/10.1155/2020/8838363.

Full text
Abstract:
As an important application of the Internet of Things, smart home has greatly facilitated our life. Since the communication channels of smart home are insecure and the transmitted data are usually sensitive, a secure and anonymous user authentication scheme is required. Numerous attempts have been taken to design such authentication schemes. Recently, Shuai et al. (Computer & Security 86(2019):132146) designed an anonymous authentication scheme for smart home using elliptic curve cryptography. They claimed that the proposed scheme is secure against various attacks and provides ideal attributes. However, we show that their scheme cannot resist inside attack and offline dictionary attack and also fails to achieve forward secrecy. Furthermore, we give some suggestions to enhance the security of the scheme. These suggestions also apply to other user authentication schemes with similar flaws.
APA, Harvard, Vancouver, ISO, and other styles
45

Andhini, Agni, Ibrahim Ibrahim, and Yuliarman Saragih. "Implementasi Aplikasi Styins Home pada Smart Home Security Menggunakan Real-Time Database Firebase." Jurnal Ecotipe (Electronic, Control, Telecommunication, Information, and Power Engineering) 7, no. 2 (October 31, 2020): 117–26. http://dx.doi.org/10.33019/jurnalecotipe.v7i2.1892.

Full text
Abstract:
Telah dilakukan implementasi sistem aplikasi Styins Home (Security System Interface Smart Home) berbasis IoT. Penelitian ini bertujuan membangun sistem kontrol dan monitoring kondisi keamanan perangkat rumah jarak jauh secara real-time sehingga mencegah kerugian akibat kelalaian dalam penjagaan kondisi keamanan rumah. Fitur aplikasi meliputi streaming kamera, smart light, smart fan dan detection gas dilengkapi peringatan notifikasi. Aplikasi ini memanfaatkan real-time database firebase sebagai layanan pengelola database dan software android studio. Metode penelitian dalam perancangan sistem aplikasi menggunakan model waterfall. Data hasil pengujian nilai delay menurut standarisasi TIPHON termasuk kualitas delay kategori sangat bagus yaitu 7,1 ms pada streaming kamera 240 kbps dan kualitas delay kategori sedang yaitu 425,08 ms pada smart light, smart fan dan detection gas di firebase 32 kbps sedangkan data hasil pengujian nilai persentasi throughput tertinggi dengan kualitas jaringan sedang yaitu 40,80% pada streaming kamera 240 kbps sedangkan nilai persentasi throughput lainnya memiliki kualitas jaringan yang buruk.
APA, Harvard, Vancouver, ISO, and other styles
46

Khoa, Tran Anh, Le Mai Bao Nhu, Hoang Hai Son, Nguyen Minh Trong, Cao Hoang Phuc, Nguyen Thi Hoang Phuong, Nguyen Van Dung, Nguyen Hoang Nam, Dong Si Thien Chau, and Dang Ngoc Minh Duc. "Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–18. http://dx.doi.org/10.1155/2020/8896637.

Full text
Abstract:
Smart homes are an element of developing smart cities. In recent years, countries around the world have spared no effort in promoting smart cities. Smart homes are an interesting technological advancement that can make people’s lives much more convenient. The development of smart homes involves multiple technological aspects, which include big data, mobile networks, cloud computing, Internet of Things, and even artificial intelligence. Digital information is the main component of signal control and flow in a smart home, while information security is another important aspect. In the event of equipment failure, the task of safeguarding the system’s information is of the utmost importance. Since smart homes are automatically controlled, the problem of mobile network security must be taken seriously. To address these issues, this paper focuses on information security, big data, mobile networks, cloud computing, and the Internet of Things. Security efficiency can be enhanced by using a Secure Hash Algorithm 256 (SHA-256), which is an authentication mechanism that, with the help of the user, can authenticate each interaction of a given device with a WebServer by using an encrypted username, password, and token. This framework could be used for an automated burglar alarm system, guest attendance monitoring, and light switches, all of which are easily integrated with any smart city base. In this way, IoT solutions can allow real-time monitoring and connection with central systems for automated burglar alarms. The monitoring framework is developed on the strength of the web application to obtain real-time display, storage, and warning functions for local or remote monitoring control. The monitoring system is stable and reliable when applying SHA-256.
APA, Harvard, Vancouver, ISO, and other styles
47

Chien, Ting-Li, Kuo-Lan Su, and Jr-Hung Guo. "Intelligent Home-Automation Security System." International Journal of Automation Technology 3, no. 2 (March 5, 2009): 121–29. http://dx.doi.org/10.20965/ijat.2009.p0123.

Full text
Abstract:
The objective of the home security detection and appliance control system is to protect occupants against events -- many of which are attributable to human error. We have developed a module based security system for home automation. The structure of the security system is divided into many modules. Each module in the home -- automation security system we develop has a wireless RF and a speech interface. They contain fire detection module, intruder detection module, environment detection module, gas detection module, (AC) power detection and diagnosis module, appliance control module and team robots. In the security detection module, we use multisensor fusion algorithms to decide an exact output. In the application control module, we use two-wire communication via wireless RF interface. These modules have event-condition voice alarms, and send the real-time status to the master controller. In the smart team robot system, we have designed many smart robots for the security system. We have designed a general user interface (GUI) for the intelligent security system. The user interface can supervise these modules and team robots via wireless RF interface, and use wireless Internet and mobile phone for remote supervision.
APA, Harvard, Vancouver, ISO, and other styles
48

Kumar, P. C. Prabhu, P. Penchala Prasanth, P. Hemalatha, and Karthik J. Kulakarni. "A Framework for Fully Automated Home using IoT Reliable Protocol Stack and Smart Gateway." International Journal of Robotics and Automation Technology 7 (November 29, 2021): 56–62. http://dx.doi.org/10.31875/2409-9694.2020.07.7.

Full text
Abstract:
A fully automated house must ensure all the appliances must be connection and provide a smart way of working for the human. The insight of Internet of Things (IoT) network provision the necessary platform to implement the automated home. The proposed system emphasizes, how all the appliances would be connected to IoT to ensure fully automated home. In this framework the smart home has been divided into various areas like smart kitchen, smart gardening, home safety and security system, and smart lightning system. The reliable protocol stack has been utilized to provide efficient communication along with proper security measures. The reliable protocol suite works on top of MQTT and TCP to ensure reliable communication. The smart gateway utilized for this framework and provides firewall security as with a two-phase filtering mechanism as well as scalability. among all the appliances in the home.
APA, Harvard, Vancouver, ISO, and other styles
49

Lashkari, Chen, and Musilek. "Energy Management for Smart Homes—State of the Art." Applied Sciences 9, no. 17 (August 21, 2019): 3459. http://dx.doi.org/10.3390/app9173459.

Full text
Abstract:
Smart home is a concept that aims to enhance the comfort of residents and facilitate household activities. The smart home is an application of ubiquitous computing which can provide the user with context-aware automated or assistive services in the form of ambient intelligence, remote control of home appliances, or automation. Smart homes attempt to integrate smartness into homes to guarantee the residents’ convenience, safety, and security, while conserving the energy. The capabilities of a smart home in the context of different applications, have been scrutinized for this investigation. Different proposed architectures, protocols, and infrastructures have been taken into consideration. As the data management process is a vital part of a smart home system, many procedures of data collection, storage, and analysis have been surveyed. Methods of data acquisition has also been discussed. Existing challenges, pros, and cons of proposed schemes along with future perspectives of smart homes are identified in this report, which is intended to promote future research directions.
APA, Harvard, Vancouver, ISO, and other styles
50

Et. al., Priyajot,. "ENHANCED SECURITY FRAMEWORK FOR THE SMART HOME AUTOMATION SYSTEM." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 2 (March 27, 2021): 567–75. http://dx.doi.org/10.17762/itii.v9i2.387.

Full text
Abstract:
Elderly care as well as enhance the quality of life for seniors, the users must be supplied with a lot of personal information about their homes and personal lives. This promising technology is being blocked by results in security and privacy. With the intent to empower end users, we did semi-struct interviews with 42 potential new and novice Smart Home customers. The issues they were concerned with focused on were connected around attacks on Smart Home data and devices, as well as the effect on users in general, to the importance of keeping their functionality balanced with the expectations of the people in their surroundings. In addition, we use measures from an interdisciplinary point of view to deal with the four topics The paper concludes with a few ideas for dealing with users' concerns, along with ideas for supporting application developers in crafting effective user-oriented digital assistants.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography