A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Study on Remote Wireless Smart Pot System Based on ZIGBEE+MQTT
2016
International Journal of Future Generation Communication and Networking
The home internal wireless network smart pot system is established based on the combination of ZigBee and ESP8266. ...
By uploading the plant growth data collected from the system to cloud server of Internet via MQTT protocol, users are allowed to remotely monitor the growing states of plants in the pots by operating mobile ...
As an element of smart home, smart pot has become more popular than ever among a growing number of young people. ...
doi:10.14257/ijfgcn.2016.9.5.01
fatcat:o7w7o3vtdzdidlbcljhfzvckmm
The UX of Things: Exploring UX Principles to Inform Security and Privacy Design in the Smart Home
2020
Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing Systems
Our results are further broadened by the development of a conceptual framework for UX design of security and privacy in the smart home. ...
This research project addresses the problem of security and privacy in the smart home through the lens of User Experience (UX) Design. ...
Problem Statement Although security and privacy are two of the most researched areas in the smart home, they are barely tackled from a UX point of view. ...
doi:10.1145/3334480.3381436
dblp:conf/chi/Chalhoub20
fatcat:hsysmcnkgbb6letjvmwhvvbazm
Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study
2020
Wireless Communications and Mobile Computing
Digital information is the main component of signal control and flow in a smart home, while information security is another important aspect. ...
Since smart homes are automatically controlled, the problem of mobile network security must be taken seriously. ...
Acknowledgments This work is supported by the Faculty of Electrical and Electronics Engineering, Ton Duc Thang University. ...
doi:10.1155/2020/8896637
fatcat:s53zac6wobfmfahvcojww4uvwm
Security Analysis of Emerging Smart Home Applications
2016
2016 IEEE Symposium on Security and Privacy (SP)
We conclude the paper with security lessons for the design of emerging smart home programming frameworks. ...
This paper presents the first in-depth empirical security analysis of one such emerging smart home programming platform. ...
ACKNOWLEDGEMENTS We thank the anonymous reviewers and Stephen Checkoway for their insightful feedback on our work. We thank the user study participants. We also thank Kevin Borders, Kevin ...
doi:10.1109/sp.2016.44
dblp:conf/sp/FernandesJP16
fatcat:5k7hxs2rzje4dnopcklhhjrkdi
Security Implications of Permission Models in Smart-Home Application Frameworks
2017
IEEE Security and Privacy
Analysis of a popular programming framework reveals that many smart-home apps are automatically overprivileged, leaving users at risk for remote attacks that can cause physical, fi nancial, and psychological ...
will inform the early design stages of other programmable smart-home frameworks. ...
We consider the security implications of a key component of such smart-home programming frameworks: their permission models. ese models limit the risk third-party apps pose to users and their devices. ...
doi:10.1109/msp.2017.43
fatcat:ar4qtuykljbmxmvyey5i4yek7i
A Solution Framework for Managing Internet of Things (IOT)
2016
International Journal of Computer Networks & Communications
A key challenge is: how to manage such a diverse set of devices of such massive scale in a secured and effective manner without breaching privacy. ...
The key contribution of this paper is proposal of a reference management system architecture based on cloud technology in addressing various issues related to management of IoThaving billions of smart ...
Security framework enables solution framework security. A rule based access control to the system can be enforced by well-defined rules and policy via policy management component. ...
doi:10.5121/ijcnc.2016.8606
fatcat:hah27wcajnau3k23bmadlqspma
Aegis: A Context-aware Security Framework for Smart Home Systems
[article]
2019
arXiv
pre-print
However, current security solutions consider smart home devices and apps individually to detect malicious actions rather than the context of the SHS as a whole. ...
To address these issues, in this paper, we introduce Aegis, a novel context-aware security framework to detect malicious behavior in a SHS. ...
These smart home devices and sensors are connected to each other via a smart hub. ...
arXiv:1910.03750v1
fatcat:rq63hjeyafhjnmtisjtubw4cyi
Wireless Home Security and Automation System Utilizing ZigBee based Multi-hop Communication
2008
2008 6th National Conference on Telecommunication Technologies and 2008 2nd Malaysia Conference on Photonics
However, the existing wireless smart home system only can cover up to a certain range of area that is limited by the range of wireless module being used. ...
Prototype systems of home security and automation are built utilizing Zigbee based sensor network to present an insight for its practical implementation in smart home concept. ...
SYSTEM IMPLEMETATION AND DISCUSSION This project offers two importance features of a smart home; home security and home automation. ...
doi:10.1109/nctt.2008.4814280
fatcat:drhydnwrybeqjneewbptl7y5xq
SECURECONFIG: NFC and QR-code based hybrid approach for smart sensor configuration
2017
2017 IEEE International Conference on RFID (RFID)
In smart factories and smart homes, devices such as smart sensors are connected to the Internet. ...
Independent of the context in which such a smart sensor is deployed, the possibility to change its configuration parameters in a secure way is essential. ...
ACKNOWLEDGMENT This project has received funding from the Electronic Component Systems for European Leadership Joint Undertaking under grant agreement No 692480. ...
doi:10.1109/rfid.2017.7945585
dblp:conf/rfid/UlzPSLBM17
fatcat:jhdjrpiwrvfbnfa5shktvk37v4
Framework of ubiquitous healthcare system based on cloud computing for elderly living
2013
2013 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference
Since the increasing number of elderly people will live alone, yet requires more smart and automation home services, the proposed framework attempts to develop a smart living helper to improve their later ...
This work discusses a integrating framework on health care, home safety, convenience and entertainment for elderly living. ...
Security Monitor Service Security monitoring service provides the home security for elderly people. ...
doi:10.1109/apsipa.2013.6694298
dblp:conf/apsipa/OuSCKWS13
fatcat:lgbql4j57fepfjsds7aio2ap3y
Design of a Secure Wireless Home Automation System with an Open Home Automation Bus (OpenHAB 2) Framework
2020
Journal of Sensors
In designing a wireless controlled switch for home appliances, two security procedures were implemented, namely, the token-based JSON Web Token (JWT) interface and Advanced Encryption Standard (AES) procedures ...
The results of the design and implementation of the additional layer for the security of the OpenHAB framework provide various theoretical and practical implications for home automation. ...
Acknowledgments The authors would like to express their profound and earnest gratitude to the entire staff of the Computer Engineering Department, University of Ghana, for the invaluable knowledge and ...
doi:10.1155/2020/8868602
fatcat:yzgv5qyjqfgepnkbtzi7cspo7m
Multi-effectiveness Smart Home Monitoring System Based Artificial Intelligence through Arduino
2017
Journal of Software
Home automation refers to the control of the local home appliances and features across the local network or via remote control. ...
interest in the pasture of home automation and smart environments. ...
In this system, two operating modes are designed. The first one is a manually-automated mode in which the appliance (lights) is monitored and accessed by voice command. ...
doi:10.17706/jsw.12.7.546-558
fatcat:ctgx2ypxmfbqpn7ey3njfe7isa
Application of learning algorithms in smart home IoT system security
2018
Mathematical Foundations of Computing
Based on our proposed overall smart home system model, we investigate the application of learning algorithms in smart home IoT system security. Our study includes two angles. ...
On the other side, attackers also treat learning algorithms as a tool, as well as a target, to exploit the security vulnerabilities in smart home systems. ...
Based on our proposed overall smart home system model, we investigate the application of learning algorithms in smart home IoT system security. Our study consists of two aspects. ...
doi:10.3934/mfc.2018004
fatcat:ul4mbbpjrvgtdmkxqqv5sdwqum
Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership
2008
IPSJ Digital Courier
Our prototype implementation employs a smart card to maintain the device's identity, the ownership information and the access control rules securely. ...
We also show how to apply our smart card system for inter-device authentication to the existing standard security protocols. ...
All API requests to the smart card are processed based on the ISO/IEC 7816-4 14) standard interface via a smart card reader. ...
doi:10.2197/ipsjdc.4.114
fatcat:3jv4js5erjfgbo463m3k2xau7u
Smart Home Automation—Use Cases of a Secure and Integrated Voice-Control System
2021
Systems
We demonstrate the model's application in a variety of practical use cases, by implementing a secure and smart voice-based system for an integrated control of several home devices seamlessly. ...
To address these barriers, we propose a model integrating IoT services and wireless technologies for developing a secure smart home automation with a voice-controlled artificial intelligence system. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/systems9040077
fatcat:27xvn77mijdzzphqplozzwfyda
« Previous
Showing results 1 — 15 out of 27,432 results