A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Security Framework for A Sustainable Smart Ecosystem using Permissioned Blockchain: Performance Evaluation
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Where services could be automated and operated in a secure manner. This paper proposes the performance results of a Security framework for a Sustainable Smart Ecosystem using permissioned Blockchain. ...
Blockchain another disruptive technology is amalgamated to form a robust secure Smart Home Ecosystem. An Ecosystem is designed to incorporate IoT and Blockchain seamlessly. ...
Dorri et al. proposes a private and secure model of the combination of blockchain and IoT for Smart Homes, in this proposal they adapt a miner which is a high-end device that acts as the central node for ...
doi:10.35940/ijitee.j9954.0881019
fatcat:mvrzznf67zbfdjsdc6p4wxgoye
What Influences the Perceived Trust of a Voice-Enabled Smart Home System: An Empirical Study
2021
Sensors
different variables, and establishes a perceived trust model through 475 valid samples. ...
However, the market penetration rate of related smart home devices and equipment still stays extremely low and far from mass adoption. ...
Ferraris et al. define a trust model and propose a solution based on data collection and invasion of user privacy in smart home devices [52] . ...
doi:10.3390/s21062037
pmid:33805702
fatcat:hdnoloyayffkhbivciu62nwdlm
Factors Influencing Intention of Greek Consumers to Use Smart Home Technology
2022
Applied System Innovation
More and more devices are continuously connected to the internet allowing people to control them remotely. The smart home is such a technological development. ...
The results of this study show that Greek consumers are beginning to have a positive attitude towards smart home technology. ...
Various researchers investigated the degree of smart home technology adoption using popular frameworks and models such as the technology acceptance model (TAM) [15] and innovation diffusion theory (IDT ...
doi:10.3390/asi5010026
fatcat:d2je5krymvbhdjk4cyto5dn5wa
Towards Practical Integrity in the Smart Home with HomeEndorser
[article]
2021
arXiv
pre-print
We present the HomeEndorser framework, which provides a policy model for specifying endorsement policies for AHOs as changes in device states, relative to their location, and a platform-based reference ...
Home automation in modern smart home platforms is often facilitated using trigger-action routines. ...
Results: We did not observe any crashes or device failures. ...
arXiv:2109.05139v1
fatcat:xrbzhrp2f5f63cbu62uyxlka5a
Trust in the smart home: Findings from a nationally representative survey in the UK
2020
PLoS ONE
Businesses in the smart home sector are actively promoting the benefits of smart home technologies for consumers, such as convenience, economy and home security. ...
To better understand meanings of and trust in the smart home, we carried out a nationally representative survey of UK consumers designed to measure adoption and acceptability, focusing on awareness, ownership ...
Acknowledgments We thank Kevin Ghirardello for providing crucial advice on multivariable regression analysis.
Author Contributions Conceptualization: Sara Cannizzaro, Rob Procter, Carsten Maple. ...
doi:10.1371/journal.pone.0231615
pmid:32469883
fatcat:jwwyzukc4bfifk6au6y34b25rq
The Investigation of Adoption of Voice-User Interface (VUI) in Smart Home Systems among Chinese Older Adults
2022
Sensors
VUI has been integrated into various devices in the context of the smart home system. In comparison with traditional interaction methods, VUI provides multiple benefits. ...
This study addresses this research gap by proposing a conceptual model. ...
Conclusions VUI has gained popularity in this decade. It has been integrated with various smart home devices and developed for many usage scenarios. ...
doi:10.3390/s22041614
pmid:35214513
pmcid:PMC8879749
fatcat:kjcgaobegrhkfoqntn3x5z7rwy
Trust Based Security Model for IoT and Fog based Applications
2018
International Journal of Engineering & Technology
We are also proposing a Trust based Security model for implementing application layer level security in IoT and fog. ...
WSN and Smart Devices are key enablers for the Internet of things (IoT) and Fog Computing based applications and it brings IoT applications with enhanced capabilities for sensing and actuation. ...
We proposed a Trust based Model for providing the security at the application layer. ...
doi:10.14419/ijet.v7i2.7.10924
fatcat:lex2x2hmdrgoxbk2ud5glzzlhy
"What if?" Predicting Individual Users' Smart Home Privacy Preferences and Their Changes
2019
Proceedings on Privacy Enhancing Technologies
Smart home devices challenge a long-held notion that the home is a private and protected place. ...
We show how developers can use our models to derive actionable steps toward privacy-preserving data practices in the smart home. ...
We acknowledge Daniel Acuña for his invaluable guidance on the development of our machine learning models, and the people of the SALT Lab in the School of Information Studies at Syracuse University. ...
doi:10.2478/popets-2019-0066
dblp:journals/popets/BarbosaPYW19
fatcat:25akvjvb7facbpvwm4xos22f2m
Features and Potential Security Challenges for IoT Enabled Devices in Smart City Environment
2018
International Journal of Advanced Computer Science and Applications
In this paper, we discuss various security issues that haunt the secure IoT deployments and propose a layered solution model that prevents breach of security during transmission of data. ...
Since Internet of Things is primarily responsible for carrying data of smart objects which are mostly connected over wireless technologies, securing of information carried by these wireless links to safeguard ...
In this model user can access to the IOT devices only if the security credentials are satisfied. A trust model by utilizing the location, identity and authentication history. ...
doi:10.14569/ijacsa.2018.090830
fatcat:k3g4dl22ojag5hhulhtkzjcjta
Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOps
2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy
Moreover we conduct a case study where we apply both our method and tool in a real-life smart home case. ...
With the rapid growth of the devices, the physical nature of these devices, and the amount of data collected, there will be a greater need for trustworthiness. ...
And secondly, most homeowners trust and rely on professionals for installation of the devices. While smart homes are becoming popular, security and privacy is often an afterthought [70, 71] . ...
doi:10.5220/0009189307420753
dblp:conf/icissp/ThompsonE20
fatcat:llqe7tubzfcvpk7p66rs7crvn4
Revising Technology Adoption Factors for IoT-Based Smart Campuses: A Systematic Review
2022
Sustainability
This paper aims to present a solution to address the lack of a proper adoption model for smart campus initiatives. ...
The technology adoption models and their corresponding variables help the authors identify and classify a suitable adoption framework for smart campuses. ...
A further contribution was made by [128] , which presented trust computation models and provided recommendations for trust computation research. ...
doi:10.3390/su14084840
fatcat:4ozid4nwyzhmfo4gxcrcai7le4
MyMaster : A Multifactor Authentication Scheme for Smart Home Device
2021
Journal of IT in Asia
For example, to address these issues and to develop a reciprocal tracking authentication system with a critical aspect of a deal, we recommend an Internet based Smart Home System (IFTTT) model. ...
Smart homes are one of the Internet of Things (IoT) applications most significant to enable people to operate intelligent devices on the Internet in their homes. ...
This work is carried out as a short-term research-based project. ...
doi:10.33736/jita.3856.2021
fatcat:erg452cupvbsrnr76bl7muek4y
A Trust-Based Framework and Deep Learning-Based Attack Detection for Smart Grid Home Area Network
2022
International Journal of Intelligent Engineering and Systems
The method is
[9] suggested a situation-aware method for further modeled to safeguard the integrities of the
effective device verification in Smart Grid-HAN. ...
The Home Area Network is a dedicated
network connecting devices in the home, as well as electrical vehicles. ...
doi:10.22266/ijies2022.0228.11
fatcat:bjwkk7bhobbptcs3rcwaasxju4
Smart Home Automation—Use Cases of a Secure and Integrated Voice-Control System
2021
Systems
To address these barriers, we propose a model integrating IoT services and wireless technologies for developing a secure smart home automation with a voice-controlled artificial intelligence system. ...
We demonstrate the model's application in a variety of practical use cases, by implementing a secure and smart voice-based system for an integrated control of several home devices seamlessly. ...
For every device in a smart home, the proposed model is aimed at providing an integrated voice control system with a secure connection to the IoT network. ...
doi:10.3390/systems9040077
fatcat:27xvn77mijdzzphqplozzwfyda
AI based Computational Trust Model for Intelligent Virtual Assistant
2021
Journal of Information Systems and Telecommunication
We have used Naïve Byes Classifier to compute trust in IVA devices and further evaluate probability of using different trusted IVA devices. ...
While research has analyzed the expected advantages and downsides of these gadgets for IVA clients, barely any investigations have exactly assessed the need of security and trust as a singular choice to ...
Acknowledgments Authors of this research paper have expressed their sincere gratitude to the administration of Amity Institute of Information Technology (AIIT), Amity University Uttar Pradesh (AUUP), India for ...
doi:10.29252/jist.8.32.263
fatcat:hrt3m4c5unhhtltun4gydivnli
« Previous
Showing results 1 — 15 out of 23,837 results