716 research outputs found

    Reliable image notifications for smart home security with MQTT

    Get PDF

    The Impacts of Privacy Rules on Users' Perception on Internet of Things (IoT) Applications: Focusing on Smart Home Security Service

    Get PDF
    Department of Management EngineeringAs communication and information technologies advance, the Internet of Things (IoT) has changed the way people live. In particular, as smart home security services have been widely commercialized, it is necessary to examine consumer perception. However, there is little research that explains the general perception of IoT and smart home services. This article will utilize communication privacy management theory and privacy calculus theory to investigate how options to protect privacy affect how users perceive benefits and costs and how those perceptions affect individuals??? intentions to use of smart home service. Scenario-based experiments were conducted, and perceived benefits and costs were treated as formative second-order constructs. The results of PLS analysis in the study showed that smart home options to protect privacy decreased perceived benefits and increased perceived costs. In addition, the perceived benefits and perceived costs significantly affected the intention to use smart home security services. This research contributes to the field of IoT and smart home research and gives practitioners notable guidelines.ope

    Securing Our Future Homes: Smart Home Security Issues and Solutions

    Get PDF
    The Internet of Things, commonly known as IoT, is a new technology transforming businesses, individuals’ daily lives and the operation of entire countries. With more and more devices becoming equipped with IoT technology, smart homes are becoming increasingly popular. The components that make up a smart home are at risk for different types of attacks; therefore, security engineers are developing solutions to current problems and are predicting future types of attacks. This paper will analyze IoT smart home components, explain current security risks, and suggest possible solutions. According to “What is a Smart Home” (n.d.), a smart home is a home that always operates in consideration of security, energy, efficiency and convenience, whether anyone is home or not

    Smart Home Security System

    Get PDF
    Práca sa zaoberá zabezpečovaním bytov a rodinných domov pomocou technológie Bluetooth Low Energy (BLE). Cieľom práce je vytvorenie a následná implementácia zabezpečovacieho zariadenia, ktoré pomocou Bluetooth dokáže detekovať prítomnosť majiteľa. V práci sú popísané zabezpečovacie systémy, technológia BLE a mikrokontrolér ESP32. Súčasťou práce je aj vytvorenie mobilnej aplikácie, ktorá slúži na nastavenie systému a jeho správu. V práci je ďalej popísaný návrh, zostrojenie prototypu a jeho implementácia. Poslednou časťou je overenie funkčnosti, testovanie a návrh možností ďalšieho rozšírenia vytvoreného prototypu.This thesis deals with the security of flats and houses using Bluetooth Low Energy (BLE) technology. The aim of the thesis is to develop an electronic security system for access and intrusion control exploiting the possibilities of Bluetooth Low Energy technology for improved user experience. The thesis describes security systems, BLE technology and ESP32 microcontroller. The creation of a mobile application that is used to set up the system and its management is included, as well. The thesis also describes the design, construction of a prototype and its implementation. The last part is the verification of functionality, testing and suggestions of possibilities for further improvement of the created prototype.

    Smart Home Security System

    Get PDF
    The Home Attender is a scalable security system which integrates various components into a more complete product. It will include components as accelerometers, a thermal and optical camera module, networking, a storage for recorded data, and a phone application to alert the user of criminal activity and fires.  Benefits of the Home Attender include convenience, allowing the owner to setup an alert system and receive information about dangers from wherever they are. The system will use thermal cameras for increased accuracy in detecting intruders and fires, greatly reducing the chance of a false alarm. The Home Attender is also designed to be a scalable system and can be extended to protect large facilities such as farms or shopping centers. The scalability factor will also allow additional security features to be developed added to the Home Attender in the future

    Context-aware Authorization in Highly Dynamic Environments

    Get PDF
    Highly dynamic computing environments, like ubiquitous and pervasive computing environments, require frequent adaptation of applications. Context is a key to adapt suiting user needs. On the other hand, standard access control trusts users once they have authenticated, despite the fact that they may reach unauthorized contexts. We analyse how taking into account dynamic information like context in the authorization subsystem can improve security, and how this new access control applies to interaction patterns, like messaging or eventing. We experiment and validate our approach using context as an authorization factor for eventing in Web service for device (like UPnP or DPWS), in smart home security

    Autonomous and Collaborative Smart Home Security System (ACSHSS)

    Full text link
    Firstly, the proposed solution provides remotely accessible integrated IoT resources for the safety and security of the building. By using Sha ort Messaging System (SMS), the age is sent to the user by the Global System for Mobile (GSM) system. An SMS alert is sent to the user in case any sensor detects an abnormality in their operation. Secondly, an authentication mechanism is deployed to enable only authorized users to access resources. Thirdly, in case of a malicious approach in accessing IoT resources, a timely alert should be received by the owner. A Network Intrusion Detection System (NIDS) is deployed to detect and real-time information in case of any suspicious activity while accessing the Internet of Things network.Comment: nil

    Investigating smart home security : is blockchain the answer?

    Get PDF
    Smart Home automation is increasingly gaining popularity among current applications of Internet of Things (IoT) due to the convenience and facilities it provides to the home owners. Sensors are employed within the home appliances via wireless connectivity to be accessible remotely by home owners to operate these devices. With the exponential increase of smart home IoT devices in the marketplace such as door locks, light bulbs, power switches etc, numerous security concerns are arising due to limited storage and processing power of such devices, making these devices vulnerable to several attacks. Due to this reason, security implementations in the deployment of these devices has gained popularity among researchers as a critical research area. Moreover, the adoption of traditional security schemes has failed to address the unique security concerns associated with these devices. Blockchain, a decentralised database based on cryptographic techniques, is gaining enormous attention to assure security of IoT systems. The blockchain framework within an IoT system is a fascinating substitute to the traditional centralised models, which has some significant concerns in fulfilling the demand of smart homes security. In this article, we aim to examine the security of smart homes by instigating the adoption of blockchain and exploring some of the currently proposed smart home architectures using blockchain technology. To present our findings, we describe a simple secure smart home framework based on a refined version of blockchain called Consortium blockchain. We highlight the limitations and opportunities of adopting such an architecture. We further evaluate our model and conclude with the results by designing an experimental testbed using a few household IoT devices commonly available in the marketplace. © 2013 IEEE
    corecore