27,432 Hits in 4.9 sec

Study on Remote Wireless Smart Pot System Based on ZIGBEE+MQTT

Jijun Xing
2016 International Journal of Future Generation Communication and Networking  
The home internal wireless network smart pot system is established based on the combination of ZigBee and ESP8266.  ...  By uploading the plant growth data collected from the system to cloud server of Internet via MQTT protocol, users are allowed to remotely monitor the growing states of plants in the pots by operating mobile  ...  As an element of smart home, smart pot has become more popular than ever among a growing number of young people.  ... 
doi:10.14257/ijfgcn.2016.9.5.01 fatcat:o7w7o3vtdzdidlbcljhfzvckmm

The UX of Things: Exploring UX Principles to Inform Security and Privacy Design in the Smart Home

George Chalhoub
2020 Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems  
Our results are further broadened by the development of a conceptual framework for UX design of security and privacy in the smart home.  ...  This research project addresses the problem of security and privacy in the smart home through the lens of User Experience (UX) Design.  ...  Problem Statement Although security and privacy are two of the most researched areas in the smart home, they are barely tackled from a UX point of view.  ... 
doi:10.1145/3334480.3381436 dblp:conf/chi/Chalhoub20 fatcat:hsysmcnkgbb6letjvmwhvvbazm

Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study

Tran Anh Khoa, Le Mai Bao Nhu, Hoang Hai Son, Nguyen Minh Trong, Cao Hoang Phuc, Nguyen Thi Hoang Phuong, Nguyen Van Dung, Nguyen Hoang Nam, Dong Si Thien Chau, Dang Ngoc Minh Duc, Hui Cheng
2020 Wireless Communications and Mobile Computing  
Digital information is the main component of signal control and flow in a smart home, while information security is another important aspect.  ...  Since smart homes are automatically controlled, the problem of mobile network security must be taken seriously.  ...  Acknowledgments This work is supported by the Faculty of Electrical and Electronics Engineering, Ton Duc Thang University.  ... 
doi:10.1155/2020/8896637 fatcat:s53zac6wobfmfahvcojww4uvwm

Security Analysis of Emerging Smart Home Applications

Earlence Fernandes, Jaeyeon Jung, Atul Prakash
2016 2016 IEEE Symposium on Security and Privacy (SP)  
We conclude the paper with security lessons for the design of emerging smart home programming frameworks.  ...  This paper presents the first in-depth empirical security analysis of one such emerging smart home programming platform.  ...  ACKNOWLEDGEMENTS We thank the anonymous reviewers and Stephen Checkoway for their insightful feedback on our work. We thank the user study participants. We also thank Kevin Borders, Kevin  ... 
doi:10.1109/sp.2016.44 dblp:conf/sp/FernandesJP16 fatcat:5k7hxs2rzje4dnopcklhhjrkdi

Security Implications of Permission Models in Smart-Home Application Frameworks

Earlence Fernandes, Amir Rahmati, Jaeyeon Jung, Atul Prakash
2017 IEEE Security and Privacy  
Analysis of a popular programming framework reveals that many smart-home apps are automatically overprivileged, leaving users at risk for remote attacks that can cause physical, fi nancial, and psychological  ...  will inform the early design stages of other programmable smart-home frameworks.  ...  We consider the security implications of a key component of such smart-home programming frameworks: their permission models. ese models limit the risk third-party apps pose to users and their devices.  ... 
doi:10.1109/msp.2017.43 fatcat:ar4qtuykljbmxmvyey5i4yek7i

A Solution Framework for Managing Internet of Things (IOT)

Sukant K. Mohapatra, Jay N. Bhuyan
2016 International Journal of Computer Networks & Communications  
A key challenge is: how to manage such a diverse set of devices of such massive scale in a secured and effective manner without breaching privacy.  ...  The key contribution of this paper is proposal of a reference management system architecture based on cloud technology in addressing various issues related to management of IoThaving billions of smart  ...  Security framework enables solution framework security. A rule based access control to the system can be enforced by well-defined rules and policy via policy management component.  ... 
doi:10.5121/ijcnc.2016.8606 fatcat:hah27wcajnau3k23bmadlqspma

Aegis: A Context-aware Security Framework for Smart Home Systems [article]

Amit Kumar Sikder, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac
2019 arXiv   pre-print
However, current security solutions consider smart home devices and apps individually to detect malicious actions rather than the context of the SHS as a whole.  ...  To address these issues, in this paper, we introduce Aegis, a novel context-aware security framework to detect malicious behavior in a SHS.  ...  These smart home devices and sensors are connected to each other via a smart hub.  ... 
arXiv:1910.03750v1 fatcat:rq63hjeyafhjnmtisjtubw4cyi

Wireless Home Security and Automation System Utilizing ZigBee based Multi-hop Communication

Mohd Adib B. Sarijari, Rozeha A. Rashid, Mohd Rozaini Abd Rahim, Nur Hija Mahalin
2008 2008 6th National Conference on Telecommunication Technologies and 2008 2nd Malaysia Conference on Photonics  
However, the existing wireless smart home system only can cover up to a certain range of area that is limited by the range of wireless module being used.  ...  Prototype systems of home security and automation are built utilizing Zigbee based sensor network to present an insight for its practical implementation in smart home concept.  ...  SYSTEM IMPLEMETATION AND DISCUSSION This project offers two importance features of a smart home; home security and home automation.  ... 
doi:10.1109/nctt.2008.4814280 fatcat:drhydnwrybeqjneewbptl7y5xq

SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration

Thomas Ulz, Thomas Pieber, Christian Steger, Christian Lesjak, Holger Bock, Rainer Matischek
2017 2017 IEEE International Conference on RFID (RFID)  
In smart factories and smart homes, devices such as smart sensors are connected to the Internet.  ...  Independent of the context in which such a smart sensor is deployed, the possibility to change its configuration parameters in a secure way is essential.  ...  ACKNOWLEDGMENT This project has received funding from the Electronic Component Systems for European Leadership Joint Undertaking under grant agreement No 692480.  ... 
doi:10.1109/rfid.2017.7945585 dblp:conf/rfid/UlzPSLBM17 fatcat:jhdjrpiwrvfbnfa5shktvk37v4

Framework of ubiquitous healthcare system based on cloud computing for elderly living

Yang-Yen Ou, Po-Yi Shih, Yu-Hao Chin, Ta-Wen Kuan, Jhing-Fa Wang, Shao-Hsien Shih
2013 2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference  
Since the increasing number of elderly people will live alone, yet requires more smart and automation home services, the proposed framework attempts to develop a smart living helper to improve their later  ...  This work discusses a integrating framework on health care, home safety, convenience and entertainment for elderly living.  ...  Security Monitor Service Security monitoring service provides the home security for elderly people.  ... 
doi:10.1109/apsipa.2013.6694298 dblp:conf/apsipa/OuSCKWS13 fatcat:lgbql4j57fepfjsds7aio2ap3y

Design of a Secure Wireless Home Automation System with an Open Home Automation Bus (OpenHAB 2) Framework

Robert A. Sowah, Dale E. Boahene, Dalton C. Owoh, Rexford Addo, Godfrey A. Mills, Wiafe Owusu-Banahene, Gifty Buah, Baffour Sarkodie-Mensah, Rafael Morales
2020 Journal of Sensors  
In designing a wireless controlled switch for home appliances, two security procedures were implemented, namely, the token-based JSON Web Token (JWT) interface and Advanced Encryption Standard (AES) procedures  ...  The results of the design and implementation of the additional layer for the security of the OpenHAB framework provide various theoretical and practical implications for home automation.  ...  Acknowledgments The authors would like to express their profound and earnest gratitude to the entire staff of the Computer Engineering Department, University of Ghana, for the invaluable knowledge and  ... 
doi:10.1155/2020/8868602 fatcat:yzgv5qyjqfgepnkbtzi7cspo7m

Multi-effectiveness Smart Home Monitoring System Based Artificial Intelligence through Arduino

Heba M. Fadhil, Abdullah Kadhum, Rafah Abdulkadhum
2017 Journal of Software  
Home automation refers to the control of the local home appliances and features across the local network or via remote control.  ...  interest in the pasture of home automation and smart environments.  ...  In this system, two operating modes are designed. The first one is a manually-automated mode in which the appliance (lights) is monitored and accessed by voice command.  ... 
doi:10.17706/jsw.12.7.546-558 fatcat:ctgx2ypxmfbqpn7ey3njfe7isa

Application of learning algorithms in smart home IoT system security

Jian Mao, Qixiao Lin, Jingdong Bian
2018 Mathematical Foundations of Computing  
Based on our proposed overall smart home system model, we investigate the application of learning algorithms in smart home IoT system security. Our study includes two angles.  ...  On the other side, attackers also treat learning algorithms as a tool, as well as a target, to exploit the security vulnerabilities in smart home systems.  ...  Based on our proposed overall smart home system model, we investigate the application of learning algorithms in smart home IoT system security. Our study consists of two aspects.  ... 
doi:10.3934/mfc.2018004 fatcat:ul4mbbpjrvgtdmkxqqv5sdwqum

Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership

Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi
2008 IPSJ Digital Courier  
Our prototype implementation employs a smart card to maintain the device's identity, the ownership information and the access control rules securely.  ...  We also show how to apply our smart card system for inter-device authentication to the existing standard security protocols.  ...  All API requests to the smart card are processed based on the ISO/IEC 7816-4 14) standard interface via a smart card reader.  ... 
doi:10.2197/ipsjdc.4.114 fatcat:3jv4js5erjfgbo463m3k2xau7u

Smart Home Automation—Use Cases of a Secure and Integrated Voice-Control System

Sitalakshmi Venkatraman, Anthony Overmars, Minh Thong
2021 Systems  
We demonstrate the model's application in a variety of practical use cases, by implementing a secure and smart voice-based system for an integrated control of several home devices seamlessly.  ...  To address these barriers, we propose a model integrating IoT services and wireless technologies for developing a secure smart home automation with a voice-controlled artificial intelligence system.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/systems9040077 fatcat:27xvn77mijdzzphqplozzwfyda
« Previous Showing results 1 — 15 out of 27,432 results