23,837 Hits in 4.4 sec

A Security Framework for A Sustainable Smart Ecosystem using Permissioned Blockchain: Performance Evaluation

Where services could be automated and operated in a secure manner. This paper proposes the performance results of a Security framework for a Sustainable Smart Ecosystem using permissioned Blockchain.  ...  Blockchain another disruptive technology is amalgamated to form a robust secure Smart Home Ecosystem. An Ecosystem is designed to incorporate IoT and Blockchain seamlessly.  ...  Dorri et al. proposes a private and secure model of the combination of blockchain and IoT for Smart Homes, in this proposal they adapt a miner which is a high-end device that acts as the central node for  ... 
doi:10.35940/ijitee.j9954.0881019 fatcat:mvrzznf67zbfdjsdc6p4wxgoye

What Influences the Perceived Trust of a Voice-Enabled Smart Home System: An Empirical Study

Yuqi Liu, Yan Gan, Yao Song, Jing Liu
2021 Sensors  
different variables, and establishes a perceived trust model through 475 valid samples.  ...  However, the market penetration rate of related smart home devices and equipment still stays extremely low and far from mass adoption.  ...  Ferraris et al. define a trust model and propose a solution based on data collection and invasion of user privacy in smart home devices [52] .  ... 
doi:10.3390/s21062037 pmid:33805702 fatcat:hdnoloyayffkhbivciu62nwdlm

Factors Influencing Intention of Greek Consumers to Use Smart Home Technology

Panayotis Pliatsikas, Anastasios A. Economides
2022 Applied System Innovation  
More and more devices are continuously connected to the internet allowing people to control them remotely. The smart home is such a technological development.  ...  The results of this study show that Greek consumers are beginning to have a positive attitude towards smart home technology.  ...  Various researchers investigated the degree of smart home technology adoption using popular frameworks and models such as the technology acceptance model (TAM) [15] and innovation diffusion theory (IDT  ... 
doi:10.3390/asi5010026 fatcat:d2je5krymvbhdjk4cyto5dn5wa

Towards Practical Integrity in the Smart Home with HomeEndorser [article]

Kaushal Kafle
2021 arXiv   pre-print
We present the HomeEndorser framework, which provides a policy model for specifying endorsement policies for AHOs as changes in device states, relative to their location, and a platform-based reference  ...  Home automation in modern smart home platforms is often facilitated using trigger-action routines.  ...  Results: We did not observe any crashes or device failures.  ... 
arXiv:2109.05139v1 fatcat:xrbzhrp2f5f63cbu62uyxlka5a

Trust in the smart home: Findings from a nationally representative survey in the UK

Sara Cannizzaro, Rob Procter, Sinong Ma, Carsten Maple, Stefano Triberti
2020 PLoS ONE  
Businesses in the smart home sector are actively promoting the benefits of smart home technologies for consumers, such as convenience, economy and home security.  ...  To better understand meanings of and trust in the smart home, we carried out a nationally representative survey of UK consumers designed to measure adoption and acceptability, focusing on awareness, ownership  ...  Acknowledgments We thank Kevin Ghirardello for providing crucial advice on multivariable regression analysis. Author Contributions Conceptualization: Sara Cannizzaro, Rob Procter, Carsten Maple.  ... 
doi:10.1371/journal.pone.0231615 pmid:32469883 fatcat:jwwyzukc4bfifk6au6y34b25rq

The Investigation of Adoption of Voice-User Interface (VUI) in Smart Home Systems among Chinese Older Adults

Yao Song, Yanpu Yang, Peiyao Cheng
2022 Sensors  
VUI has been integrated into various devices in the context of the smart home system. In comparison with traditional interaction methods, VUI provides multiple benefits.  ...  This study addresses this research gap by proposing a conceptual model.  ...  Conclusions VUI has gained popularity in this decade. It has been integrated with various smart home devices and developed for many usage scenarios.  ... 
doi:10.3390/s22041614 pmid:35214513 pmcid:PMC8879749 fatcat:kjcgaobegrhkfoqntn3x5z7rwy

Trust Based Security Model for IoT and Fog based Applications

Patil Abhijit J, Dr G. Syam Prasad
2018 International Journal of Engineering & Technology  
We are also proposing a Trust based Security model for implementing application layer level security in IoT and fog.  ...  WSN and Smart Devices are key enablers for the Internet of things (IoT) and Fog Computing based applications and it brings IoT applications with enhanced capabilities for sensing and actuation.  ...  We proposed a Trust based Model for providing the security at the application layer.  ... 
doi:10.14419/ijet.v7i2.7.10924 fatcat:lex2x2hmdrgoxbk2ud5glzzlhy

"What if?" Predicting Individual Users' Smart Home Privacy Preferences and Their Changes

Natã M. Barbosa, Joon S. Park, Yaxing Yao, Yang Wang
2019 Proceedings on Privacy Enhancing Technologies  
Smart home devices challenge a long-held notion that the home is a private and protected place.  ...  We show how developers can use our models to derive actionable steps toward privacy-preserving data practices in the smart home.  ...  We acknowledge Daniel Acuña for his invaluable guidance on the development of our machine learning models, and the people of the SALT Lab in the School of Information Studies at Syracuse University.  ... 
doi:10.2478/popets-2019-0066 dblp:journals/popets/BarbosaPYW19 fatcat:25akvjvb7facbpvwm4xos22f2m

Features and Potential Security Challenges for IoT Enabled Devices in Smart City Environment

Gasim Alandjani
2018 International Journal of Advanced Computer Science and Applications  
In this paper, we discuss various security issues that haunt the secure IoT deployments and propose a layered solution model that prevents breach of security during transmission of data.  ...  Since Internet of Things is primarily responsible for carrying data of smart objects which are mostly connected over wireless technologies, securing of information carried by these wireless links to safeguard  ...  In this model user can access to the IOT devices only if the security credentials are satisfied. A trust model by utilizing the location, identity and authentication history.  ... 
doi:10.14569/ijacsa.2018.090830 fatcat:k3g4dl22ojag5hhulhtkzjcjta

Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOps

Andreas Thompson, Gencer Erdogan
2020 Proceedings of the 6th International Conference on Information Systems Security and Privacy  
Moreover we conduct a case study where we apply both our method and tool in a real-life smart home case.  ...  With the rapid growth of the devices, the physical nature of these devices, and the amount of data collected, there will be a greater need for trustworthiness.  ...  And secondly, most homeowners trust and rely on professionals for installation of the devices. While smart homes are becoming popular, security and privacy is often an afterthought [70, 71] .  ... 
doi:10.5220/0009189307420753 dblp:conf/icissp/ThompsonE20 fatcat:llqe7tubzfcvpk7p66rs7crvn4

Revising Technology Adoption Factors for IoT-Based Smart Campuses: A Systematic Review

Radhwan Sneesl, Yusmadi Yah Jusoh, Marzanah A. Jabar, Salfarina Abdullah
2022 Sustainability  
This paper aims to present a solution to address the lack of a proper adoption model for smart campus initiatives.  ...  The technology adoption models and their corresponding variables help the authors identify and classify a suitable adoption framework for smart campuses.  ...  A further contribution was made by [128] , which presented trust computation models and provided recommendations for trust computation research.  ... 
doi:10.3390/su14084840 fatcat:4ozid4nwyzhmfo4gxcrcai7le4

MyMaster : A Multifactor Authentication Scheme for Smart Home Device

2021 Journal of IT in Asia  
For example, to address these issues and to develop a reciprocal tracking authentication system with a critical aspect of a deal, we recommend an Internet based Smart Home System (IFTTT) model.  ...  Smart homes are one of the Internet of Things (IoT) applications most significant to enable people to operate intelligent devices on the Internet in their homes.  ...  This work is carried out as a short-term research-based project.  ... 
doi:10.33736/jita.3856.2021 fatcat:erg452cupvbsrnr76bl7muek4y

A Trust-Based Framework and Deep Learning-Based Attack Detection for Smart Grid Home Area Network

2022 International Journal of Intelligent Engineering and Systems  
The method is [9] suggested a situation-aware method for further modeled to safeguard the integrities of the effective device verification in Smart Grid-HAN.  ...  The Home Area Network is a dedicated network connecting devices in the home, as well as electrical vehicles.  ... 
doi:10.22266/ijies2022.0228.11 fatcat:bjwkk7bhobbptcs3rcwaasxju4

Smart Home Automation—Use Cases of a Secure and Integrated Voice-Control System

Sitalakshmi Venkatraman, Anthony Overmars, Minh Thong
2021 Systems  
To address these barriers, we propose a model integrating IoT services and wireless technologies for developing a secure smart home automation with a voice-controlled artificial intelligence system.  ...  We demonstrate the model's application in a variety of practical use cases, by implementing a secure and smart voice-based system for an integrated control of several home devices seamlessly.  ...  For every device in a smart home, the proposed model is aimed at providing an integrated voice control system with a secure connection to the IoT network.  ... 
doi:10.3390/systems9040077 fatcat:27xvn77mijdzzphqplozzwfyda

AI based Computational Trust Model for Intelligent Virtual Assistant

Babu Kumar, Ajay Vikram Singh, Parul Agarwal
2021 Journal of Information Systems and Telecommunication  
We have used Naïve Byes Classifier to compute trust in IVA devices and further evaluate probability of using different trusted IVA devices.  ...  While research has analyzed the expected advantages and downsides of these gadgets for IVA clients, barely any investigations have exactly assessed the need of security and trust as a singular choice to  ...  Acknowledgments Authors of this research paper have expressed their sincere gratitude to the administration of Amity Institute of Information Technology (AIIT), Amity University Uttar Pradesh (AUUP), India for  ... 
doi:10.29252/jist.8.32.263 fatcat:hrt3m4c5unhhtltun4gydivnli
« Previous Showing results 1 — 15 out of 23,837 results