Write a research project on the internet of things.
Background/Literature Review
The Internet of Things were developed with the purpose of connecting various electronic components to the internet and gathering data or condoling electronic device from remote locations. The IoT is capable of supporting various day-to-applications. Various organizations are putting effort in making new IoT technologies that can be used for facilitating the business process or selling. One of the most popular method of using the IoT is the application in the smart homes. In the smart home concept, various IoT devices (electronic devices) are connected with each other through wire or wireless communication medium. These devices can also communicate with each other to execute a process. The homes are becoming extensively smart due to use of the IoT devices. These smart homes are often connected to a cloud environment computing system so that the owner of the house can control it from remote location. As the data from the smart home IoT network travels to the server wirelessly, the device becomes extremely vulnerable to cyber-attacks.
At the beginning of the report, the main considerations has been the security issues and smart home network related solutions. Then various arguments will be proposed in the context of security implementations. In the literature review part, the security issues of the smart home has been discussed. Based on the major issues or the issues that is relevantly new will be focused upon. After proper analysis of the circumstances and available IoT technology, the solution to the security issue will be provided.
The main problem of the project is to identify the security issues that is most harmful and providing an utmost solution to it which can be implemented irrespective of the IoT technology platform. The report is focused upon a project with the deliverable of developing a network level security for the security. In the recent years it has been seen that various attacks has been executed on the smart homes successfully. The report provides details of the future works that can be don later on this project outcome.
In order to discuss bout the smart home security issues, the details of the architecture, network, components used and much more things need to be considered. All the entities that make up the IoT based smart home system can be exploited by the cybercriminals to hack into the smart home. At the beginning of the literature review, the idea of a typical smart home architecture will be provided.
The smart homes are the combination of different electronic components and a network. The electronic components are sensors, controllers, circuits and many more. The applications are developed for the user mobile device (smart phones) so the users can control the operations of the IoT based smart home from distance. The connection is a significant part of the homes as this makes the smart home a really advanced technology. These entities are utilized for designing and developing a dynamic heterogeneous architecture [6]. These architecture remains the source of smart home operations. The quality and advancement in the architecture defines the amount of operations that the smart home will be performing. The IoT devices is not equipped with interoperability standards and that is why the connected IoT devices in a smart home architecture can be controlled directly via a smartphone or other device. The sensors that are used within the smart home environment does not have the feature of connecting to the internet directly [11]. In reality, the sensors does not have any direct connection with the internet, the microcontroller provides them all the instruction through the output ports of it.
Architecture of Smart Home Based on IoT
Fig 1 Architecture of a typical Smart Home [1]
The internet connection is established in the hub of the network. The hub works as the local workstation in the smart home architecture. Basically wireless communication mediums are selected for establishing the communication between the hubs and the IoT devices installed in the home. Different manufacturers of the IoT devices develop their devices based on different protocols. These protocols are followed by the architecture while developing the sensor-hub connection. The hub is connected to the internet connection available at home via Wi-Fi interface or the Ethernet connection. This decision depends upon the capabilities of the IoT architecture’s in order to communicate with the outside world. The quality of interaction will be judged based on two phenomenon such as access to internet cloud services that act together with the hub and properly connected to the IoT elements [1]. The second phenomenon is direct interaction with the hub through the internet through the use of the connectivity and services that hub offers.
The remote interaction with the IoT devices are often done by considering the above two options. These two phenomenon must be considered simultaneously while developing the IoT architecture best remote interaction experience can be provided to user. There are basically two modes defined in the architecture to forward instructions from the user device to the hub [24]. The first one is through the cloud service while the user is sending instruction from remote location outside the range of the local network. The second is directly to the hub through the hub while the user is within the local network. In the later, no internet access is required as the network (Ethernet or Wi-Fi) sends the instructions sends the information using local connection.
This device is considered as a lovely alarm clock that is technologically advanced from the conventional ones. This device remains close to the bed and analyze the environment in the room during and before sleep [3]. In order to analyze the environment, the device uses the state-of-art sensors.
Monitoring devices are used for total monitoring of the home based IoT system. These devices are connected to the hub or often used as the hub in case of small scale IoT implementation. Smart thermostats are used for automation in the temperature of the home. Wireless speaker systems are a favorite IoT technology of various smart home owners. This speakers can be connected from anywhere at the home and play music wirelessly. Smart lights are used for controlling the lights of the rooms wirelessly through mobile device or automatically switch off or on the bulbs [22]. The hub is the key of connecting the devices to the user device. Various other IoT devices are used in the smart home that has not been discussed in this report.
The patterns, contents and metadata of the network traffic is consisting of various sensitive information of the user of the smart home. If these entities are hacked by the cybercriminals, then all the sensitive data will be revealed to the attacker. The websites were the only way of communicating with the internet based resources, but with the emerging of cloud and IoT the usage of the internet has become a vast concept [3]. The IoT smart home is also connected to the user mobile device, so it the network of smart home is hacked, the cybercriminals will get a way to the mobile device in an unauthorized way. The mobile devices can be hacked for getting personal data of the user.
Components of IoT smart home
It has been a great way of securing the traffic from the user device to the IoT hub. In this traffic strategy, the packets will be considered as the main part to examine. The IP address adversary can be prevented using the division of traffic packets as per device strategy are being used. In this methodology, the network traffic is divided into streams of meaningful data. The home gateway routers are basically used as the NAT or network address translator. The purpose of the NAT is to overwrite the IP address of various IoT connected devices a sole IP address that has been provided by the ISP [3]. There is an issues in this method as the counting of the various clients of the NAT is difficult.
After the distinct streams are separated, the identification of the IoT device that is responsible for individual streams are done. It is then possible to map the queries of the DNS to the associated device. The devices that are manufactured by the same organization, can communicate using the same IP address.
As the domains only holds the sense and hello, identification of traffic to and fro sense sleep monitor is an easy task.
Fig 2 Sense sleep monitor network traffic send/receive rates [3]
The study has been conducted for a 12 hour period starting form 10.40 pm to 10.40 am. The user activity is reason of the send and receive of the packets. The peak between the 5.20 am to 7 am shows that the user was out of bed temporarily. This figure shows a general idea regarding how the IoT device operates automatically on the basis of the user activities. If the intruders are able to get hand to these kinds of data then they can identify the daily activities of the user. This will allow the intruders to target the home easily as they will know when the home remains empty. Various other circumstances can be imagined based on the security flaws of the IoT smart home technology.
The NDN or named data networking is the basis of the Named Data netwOrking for sMart home aUtomation Systems. The whole architecture is consisting of three layers such as thing-layer, NDOMUS and application layer. In the thing layer, the IoT devices are installed in the home [15]. NDOMUS is consisting of the operations such as routing of packets, security protocols, caching of data packets, naming strategy, configuration of the network and the service model. The NDOMUS is then connected to the application layer which is the larger picture of the IoT smart home like home automation system.
Fig 3 The NDOMUS framework [15]
This methodology is consisted with the naming scheme in which management and configuration of namespace is done and task namespace is defined. A prefix to the device is provided during the initialization of the home network through which management and configuration of the operations done by the device are done. The task name space is generally used for tracking and controlling purpose.
Privacy Vulnerability
The service model divides the home applications into three parts called as pull, event-triggered push and periodic push. The NDOMUS model that has been considered in this methodology is capable of supporting all the three strategies [34]. This is a strong point in the favor of this methodology. The NDN generally supports this pull service model. Periodic pushing provides the benefit of periodically measuring the reading for each of the sensors. Event-triggered pushing is referred to the process of taking measurements triggered by predefined events.
Smart home applications uses the 1C:1S communication along with the multiparty communication. The NDN natively support the multi-consumer communication via data catching and interest aggregation [15]. As a single data in the NDOMUS framework of Multi-source communication is related to only one pending request multi differentiated interests are used for retrieving data.
Deice management is consisted of five parts such as the proxy layer, device management layer and service enablement layer. Different protocols and communication technologies are used for developing the proxy layer. This layer is essential in the Smart Home network as the IoT devices or the hub is connected to each other through the BLE module, Wi-Fi or any other device [28]. In order to establish the interaction of the devices with the network, the proxy layer configured with various communication technologies and protocols. The legacy devices ate setup using the CoRE Link Format so that it can be ensured that the smart home is consisting with legacy and smart IoT devices.
Fig 4 IoT device management framework [28]
The device management layer is developed with the purpose of executing various operations. The device responsible for device identification and services regarding the analytics and processing. The services processing allows the users to configure the internet of thing devices. The configuration management ensures the availability of the configuration resources regarding all the smart home environment’s entities. The automatic collection of data from the IoT devices are done by the service analytics [44]. The most fundamental part of the proposed device management framework is the device identification. Through this device discovery feature of the framework, the user will be able to know the property, device name and device capacity.
The service layer uses a service named as RESTful web service is the key of providing all the details to the user. The interoperability with vast numbers of IoT devices are provided by this layer [28]. It is also responsible for implementing the access control policies.
The consumers who purchase the IoT devices have the tendency of making assumptions like the manufacturers have provided all the privacy related security in the device. Detecting security problems and providing solutions those issues is a significant part of network level security project. In contrast to the device level security, the network level security that consist of all the devices connected to the network is a more crucial step toward security of smart home [48]. The device level security is limited to only the device where the network level security can be extended to the cloud and can be continued further. The network level security is consisted with the SMP or security management provider. The SMP is responsible for developing the access control protocols that can be used for better security in the whole access to the network.
IoT traffic analysis strategy
From interface customization to network level function translation all the works are done by the SMP. The operations that are translated are generally invoked through the application program interface. The home router API that is capable of supporting an external SMP entity is need to be considered in this methodology.
The main purpose of this methodology is to reduce the chance of hacking into the IoT based smart home environment while the messages are transferred between IoT hub and cloud API. It ensures that traffic analysis is complex enough that no hacker can attack this system. Though the network uses the encryption technology, it is not always possible to protect the data [8]. The passive listening can be used by the hackers to capture the sequences of initialization vectors that are used in the protected communication medium. Proper traffic analysis techniques will be used for establishing the connection between the servers and the hub. Synthetic packet injection is particularly designed based on software application. In real world, injection of the synthetic packet will have the same impact on the network security as in the simulation. The VPN serves as a crucial part of this methodology as it is used for encrypting the packets in the network traffic. The synthetic packet can be used in the application service and virtual private network.
From the above literature review it has been understood that providing control and security to the IoT based smart home is a crucial factor. Various methodologies can be used for providing the security. It can be done through offering uninterrupted and secure control over the sensors and devices, or it can be done through creating a safe and secure network level security. Inn case of the synthetic packet injection, the use of the VPN can be a solution to prevent capturing of packets. Though the attackers cannot monitor the packet transfer in the network, the main purpose of smart IoT based home is the real issue in security. The mobile device of the user can be used for hacking into the system and get access to the personal data. No matter how much the device is secured from being hacked, the threat of traffic analysis always remain on the IoT devices. If the whole network can be secured then it will be very effective in securing the whole smart home architecture.
The requirements of the project is an IoT device or sensor, hub, home router, cloud service API. The cloud service will be connected to the mobile device. The concept of the device management framework can be seen in this project. However, the main focus remains on the network security. The SMP or security management provider will be developed to secure the network additionally. The home router must be chosen that can support the SMP. The project prototype will be developed for providing various customization options to the users.
Thus the main problem statement is developing the prototype that will be used for developing the network that can support security from the device level to cloud level. Configuration the router to support the security management provider is another problem of the project.
The project has been developed using a prototype that will be done considering a three part architecture and application program interface for providing various advanced options. The users of the IoT architecture will be able to control the devices through the cloud service API [48]. Project also proposed the advancement in the access switch and controlling of the ISP network modules. The SMP will be responsible for operating a web based graphical user interface. The Amazon cloud has been selected for running the SMP and the ISP will in a safe data-center (not been identified still). Two settings has been considered while testing the project outcome. The first one is testing it in campus network that is SDN-enabled and consist of over than three thousand Wi-Fi access points. The second is the small amount of houses where the network will be operating as the OTTor over the top legacy ISP network [37].
Fig 5 Proposed network prototype in the project [48]
The figure 5 shows the prototype of the proposed network. In the project it has been assumed that SDN enabled internet service providers’ access switches will be used within the network. The layer 2 protocols of the solution network will be more secure due to the use of the SDN controllers. It is considered that the ISP will be able to see the household IoT entities. The MAC address are the unique and static identifier for identifying the devices in the network. The ISP access switches will be running Open vSwitch 1.9.0 (OVS). In addition to that, it will be exposing showing the OpenFlow APIs. The ISP network controller will be controlled through the Floodlight OpenFlow controller. The version of the Floodlight is 0.09 [48]. The API calls that are successful is resulted into the proper flow of table protocol. These flows are then added or removed from the OVS Bridge, respectively, based on which OVS bridge is serving the user. In order to have a access control, the fresh Floodlight module has been used for developing the Application Program Interface [23]. This access point provides the wrapper to the firewall module of the flood light in order to activate the SMP to push the access control policies into the network into the smart home IoT device.
The Ruby-on-Rails programming environment has been selected in the project to develop the security orchestrator. This orchestrator will be responsible for holding the logic and state. These logic and states are further used by the security movement provider to handle the security of the user of the smart home IoT technology. The communication between the ISP and SMP occurs in one way that is from SMP to ISP as portrayed in the fig 5. The RESTful application program interface come into the big picture while the SMP communicates with the user applications and front-end portal. In order to make the project budget friendly, the MySQL database has been used for storing the information of the subscribers, policies, preferences of the users, devices, and statistics [48]. The subscriber commands serves as the source that triggers SMP to retrieve the information related to the command. The REST command is used in user device that triggers the retrieval.
The sensor management framework will be developed to control the devices within the IoT environment. At the beginning of the development it has to be make sure that all the sensors are active. The data will be stored in the proposed MySQL database. A smart control algorithm has been proposed in the project that starts after all the dependencies among the output of the sensors has been recognized and classified. The smart algorithm involves sensor switch off process correlated to the sets of dependent variables, predicting the results of the dependent variables through the use of the independent variables [23]. During the later process it will be assumed that the correlation among the sensors and output has been followed. The SMP will inject its policies while the output will be generated so that the impact of the SMP on the network can be tested. In case the recent value and predicted value’s difference exceeds the threshold, the current reading is stored in the MySQL and the control is reset.
Fig 6 Smart Control Algorithm [21]
This management framework is significant in power improvement. The controlling method deactivates the sensors that are not used for any purpose. Often the sensors are deactivated while the readings can be predicted using other sensors. The master controller or microcontroller uses more power for the additional effort to be put in the calculations. The power consumption of the master controller is significantly less than the power consumed by all the sensors together. This allows the SMP to use more power and compute security policies without any issue [21]. The proposed architecture the data collected from the sensors are sent to the master controller and then from there to cloud server. The bandwidth load will be high in such cases. The local master, in the proposed framework, receives a relatively low amount of data as many readings are calculated. The main advantage of the proposed framework is that it is able to provide the network the capability of fault tolerance. This is not only beneficial to the sensor management but also handy in terms of providing security.
Instead of web-based portal, a mobile application has been considered within the project. The main purpose of this decision is providing flexibility to the user. Mobile devices are more user friendly and easily accessible. The internet connection in mobile device is much cheap than Broadband connection. The application user interface will be consisting a list of devices that will be connected to the hub [17]. These information will be collected either through the cloud API or local network in which both the user and hub is connected. The application will automatically maintain the list of the devices based on the installed devices.
Fig 7 A sample architecture of device management framework [41]
The application will have predefined actions installed so that the user can easily access all the features of the device. The mobile application will be developed for both the iOS and Android. To make the system more secure, any direct communication form the smartphone to the IoT device will be disabled so that all the request must transfer through the hub and the SMP ca inject all the security protocols required to make the network secure.
In this section the application of VPN in this project has been discussed in broad. An open VPN tunnel will be established so that remote service to the cloud can be provide to the users with proper security. At the time of establishing VPN tunnel through the use of the VPN client private network, no restriction to the communication is imposed. This way the endpoints become able to communicate endlessly. As the cloud server is not as safe as the VPN, proper rules are deployed to secure the communication. This will make sure that even if the cloud server is hacked, the hub or local network will be secured.
In the future research, the IPsec tunnel can be considered instead of the VPN tunnel. This tunnel will be using the IP protocol based mechanism to establish compunction in the network. Various changes can be done in the microcontroller that acts as the hub. The connection method of device and smartphone can be more secured. The changes can be done in the application interface. The network will be modified to analyze the traffic coming from the IoT devices so the device status can be checked. Research into security and privacy of IoT is still in its infancy, and much of the prior work has focused on understanding and identifying potential threats and adapting existing security techniques to the IoT environment – see a recent survey article. A majority of the work advocates embedding security architectures within the IoT device, including securing the communication protocols. For example, proposes optimizing the DLTS communication protocol for securing IoT data exchange, avises implementation of IEEE 802.15.4 compliant link layer security procedures, and presents a lightweight encryption/decryption method for ID authentication among sensor nodes. Concepts from Artificial Immune System (AIS) have been imported to detect attacks on IoT, and an IoT intrusion detection system with dynamic defense was developed in. VIRTUS, a middleware solution for management of applications in IoT environments adopts open standards such as XMPP and OSGi. Accesscontrol mechanisms based on an optimized implementation of elliptic-curve digital signatures (ECDSA) and token-based access to CoAP resources have been developed in.
The main advantage of the project is the control over the network from remote location. Taken as an example, no matter where the user is, he/she can access the hub if proper internet connection is available. The user can access and see the videos from the other cities through the application installed in the mobile device. The system will be collecting all the data from the device and send the data to the mobile device through the cloud API. The hub will allow the user to access the data only after it is verified as authorized [5]. This verification process increases the security as the user device requesting the data will only access after successfully very to the system in both the cloud and the hub. The cloud is protected through the different user id and password and the hub uses a unique identifier.
The MAC address of the device is not used as the identifier as it will restrict the user access. Taken as an example, the user will be able to access the network using a different mobile device even if the previous mobile is stolen or sold [30]. The user will only need to remember the unique identification number that has been given to him. Making the whole authorization technique based on the software based has made the network more flexible and user friendly.
The application graphical user interface will be consisting of only the required data like the buttons and device name. No additional and unnecessary data will be shown to the user. This not only makes the syste more user friendly but also allow the user to be faster during controlling the devices. Only the options of the devices that are connected to the hub will be shown so that the users can be accessing the application without having any knowledge of the configuration.
Using the SMP or security management provider has proved to be a great advantage. This not only allows the developers to inject protocols that are best suited for the network but custom made configurations are highly adaptable to the changes. The SMP will be monitoring all the packets that will transfer through the hub. Taken as an example, if an intruder wants to access the system, the SMP will verify the access based on the predefined network protocols and reject the access [16]. The only way to access the devices are only by hacking them physically. The communication between the device and cloud is done through the VPN. The VPN allows the packets to be encrypted so that even if the information is stolen it cannot be read.
There are various advantages of using the amazon cloud services. The amazon are one of the leading cloud service providers in the whole world and choosing the amazon service has provided the opportunity to neglect the security concerns of cloud storage. The amazon cloud can be purchased as per the usage requirements and investment can be done as various ways. The payment can be done based on resource usage or per month basis [28]. The services that amazon cloud provides are capable of supporting high performance application. Taken as example, if the number of users are exceeded to more than thousands then the number of devices connected to the cloud through the hub will be more than ten thousand. Now the data flow and processing of data will be much immense and without proper high performance support, the network will go down. The amazon cloud is maintained by several experienced staff. These staff can take care of user request. In addition to that, the organization is capable of providing unique solutions to the cloud related issues in the network level security planning.
The biggest disadvanatge of the project is its complexity. Developing an application that consist of all the features of the device is a critical task. The possibility of occuring any issue is high. The application reuests are sent to the hub through a open internet connection [45]. The hackers can get access to the user reuest to the hub even if they do not have access to the cloud serice API.
The cloud is a seroius consideration while security is the topic. The cloud services are always vulnerable to the cyber attacks. The cloud service providers can sell the sensitve data to other organzations without giving warning to the clients. The user will not have authority of controlling the cloud services. Though this is not a seriuos conern for a signle user but for a organiztion that is providing services to thousands of users is a signficnat matter. The cloud services are not also dependable. Taken as an example, the user is in diferne town and wants to control the curtains of the window [37]. If the cloud service is down, there is no way the user will be able to get access to those curtains.
The devices are not provided any security by the network. If the attacker able to hack into a IoT device seperately then the attack will not be detected by the network. It is because the network does not employ any protocol to check the device configuration. This happens because the project has been developed without collaborating the manufacturing organization [21]. Taken as an example, the attackers has hacked into the ssecueity camera and providing the hub only the inframtion that the attacker wants to send. In this case, the user will be able to access the camera but will not be seeing the original infroamtion taken by the camrea. The user will be seeeing the images that the hacker wants to make them see.
Another disadvantage is with the SMP. Proper configuration of the SMP is not possible in a signle go. There are various threats that can be used for hacking into system or making it go down. The DDoS attack in the cloud can be done to prevent the hub to send or receive any information to the cloud. The SMP will not be able to handle any intrision attack in this case as the cloud will not be able to assist the SMP.
The hub will store any specific device as the controller. In case the user-id is theft then the intruder can authorizely control all the devices form a remote location. No matter how much the user tries to prevent this issue, there no way than trunfing off the hub and cllaing the experts to solve the issues. Taken as an example, the user sells the mmobile in which the application is stored it will have the id of the user in it. Then the buyer can use this device to access the hub [47]. There other numerarous security and computation related issues that the project should have been considered.
Conclusion
The report has presented a network level security solution and IoT device management framework. As per the project has been discussed in the report, device security is essential but the security in the network-level. The privacy concern of the network security is the biggest disadvantage of the IoT based smart home security. The attackers are tend to get into the home system through the local routers or cloud services. Attacking the cloud or local routers are competitively easy for the attackers. The attackers then either remain in the system for a longtime or get all the required data and leave the system. In both cases the privacy security concern is very high. The attackers can also get access to various IoT devices and control it. The report has represented a security management provider that implies protocols and policies to the incoming requests and verify the user. The VPN approach of securing the communication between the cloud and the hub is a good approach. Proper protocols must be implied to the network. The network must be monitored for a long period (say about three months) so that proper testing of the network can be done.
The security of the IoT smart home system is related to the control framework over the IoT devices. The project will be using a unique algorithm to get control over the devices. In order to have a universal controller which will signal the devices, installing a microcontroller is essential. In this case, raspberry-pi is a suitable microcontroller which is able to handle all the computation functions. The report has successfully proposed the methodologies of securing an IoT based smart home network but lacks in describing the threats that can be used for attacking the system. The project will be consisting of devices/sensors that will gather data periodically and as well triggered by an event. These devices will need to be configured to cope with the scope of the project. The system may be monitored even after the deployment so that required changes can be done in the system. No matter how much a network is secured, there always a flaw in it. In case of the proposed network, the security flaw is in the cloud level. The project did not consider making any assumptions on securing the solution. It is completely depended upon the security provide by Amazon. In case an organization is going for its hybrid cloud infrastructure there is no solution for that part. The proposed network solution is able to provide the security to all the devices that are connected to the network. The network will identify all the request by the user device and send it to the desired device. The project has considered the device management system that is able to provide the user all the freedom. The user will be able to access all the features of the device through a single application. Various IoT device manufacturers have their own applications. In the future project modifications can be done by collaborating with them. This will reduce the effort of application development and microcontroller configuration.
This report has been developed with the help of <Your teacher name>. The university <your university> has provided all the resources that were required to develop the report.
References
- Geneiatakis, D., Kounelis, I., Neisse, R., Nai-Fovino, I., Steri, G., & Baldini, G. (2017). Security and privacy issues for an IoT based smart home. In Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2017 40th International Convention on (pp. 1292-1297). IEEE.
- Apthorpe, N., Reisman, D., & Feamster, N. (2017). A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic. arXiv preprint arXiv:1705.06805.
- Patel, S. M., & Kanawade, S. Y. (2017). Internet of Things Based Smart Home with Intel Edison. In Proceedings of International Conference on Communication and Networks (pp. 385-392). Springer, Singapore.
- Pirbhulal, S., Zhang, H., E Alahi, M. E., Ghayvat, H., Mukhopadhyay, S. C., Zhang, Y. T., & Wu, W. (2016). A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors, 17(1), 69.
- Yoon, S., Park, H., & Yoo, H. S. (2015). Security issues on smarthome in IoT environment. In Computer Science and its Applications (pp. 691-696). Springer, Berlin, Heidelberg.
- Singh, D., Tripathi, G., & Jara, A. J. (2014, March). A survey of Internet-of-Things: Future vision, architecture, challenges and services. In Internet of things (WF-IoT), 2014 IEEE world forum on (pp. 287-292). IEEE.
- Jian, M. S., Wu, J. Y., Chen, J. Y., Li, Y. J., Wang, Y. C., & Xu, H. Y. (2017, February). IOT base smart home appliances by using Cloud Intelligent Tetris Switch. In Advanced Communication Technology (ICACT), 2017 19th International Conference on (pp. 589-592). IEEE.
- Yoshigoe, K., Dai, W., Abramson, M., & Jacobs, A. (2015, December). Overcoming invasion of privacy in smart home environment with synthetic packet injection. In TRON Symposium (TRONSHOW), 2015 (pp. 1-7). IEEE.
- Stojkoska, B. L. R., & Trivodaliev, K. V. (2017). A review of Internet of Things for smart home: Challenges and solutions. Journal of Cleaner Production, 140, 1454-1464.
- Al-Ali, A. R., & Aburukba, R. (2015). Role of internet of things in the smart grid technology. Journal of Computer and Communications, 3(05), 229.
- Pandikumar, S., & Vetrivel, R. S. (2014, March). Internet of things based architecture of web and smart home interface using GSM. In International Journal of Innovative Research in Science, Engineering and Technology (Vol. 3, No. 3, pp. 1721-1727).
- Jacobsson, A., Boldt, M., & Carlsson, B. (2016). A risk analysis of a smart home automation system. Future Generation Computer Systems, 56, 719-733.
- Adhya, S., Saha, D., Das, A., Jana, J., & Saha, H. (2016, January). An IoT based smart solar photovoltaic remote monitoring and control unit. In Control, Instrumentation, Energy & Communication (CIEC), 2016 2nd International Conference on (pp. 432-436). IEEE.
- Chen, M., Yang, J., Zhu, X., Wang, X., Liu, M., & Song, J. (2017). Smart Home 2.0: Innovative Smart Home System Powered by Botanical IoT and Emotion Detection. Mobile Networks and Applications, 1-11.
- Amadeo, M., Campolo, C., Iera, A., & Molinaro, A. (2015, June). Information Centric Networking in IoT scenarios: The case of a smart home. In Communications (ICC), 2015 IEEE International Conference on (pp. 648-653). IEEE.
- Shingala, K., & Patel, J. (2017). Automatic Home Appliances and Security of Smart Home with RFID, SMS, Email and Real Time Algorithm Based on IOT.
- Alletto, S., Cucchiara, R., Del Fiore, G., Mainetti, L., Mighali, V., Patrono, L., & Serra, G. (2016). An indoor location-aware system for an IoT-based smart museum. IEEE Internet of Things Journal, 3(2), 244-253.
- Apthorpe, N., Reisman, D., Sundaresan, S., Narayanan, A., & Feamster, N. (2017). Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. arXiv preprint arXiv:1708.05044.
- Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017, March). Blockchain for IoT security and privacy: The case study of a smart home. In Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on (pp. 618-623). IEEE.
- Lin, H., & Bergmann, N. W. (2016). IoT privacy and security challenges for smart home environments. Information, 7(3), 44.
- Choubey, P. K., Pateria, S., Saxena, A., SB, V. P. C., Jha, K. K., & PM, S. B. (2015, June). Power efficient, bandwidth optimized and fault tolerant sensor management for IOT in Smart Home. In Advance Computing Conference (IACC), 2015 IEEE International (pp. 366-370). IEEE.
- Strohbach, M., Ziekow, H., Gazis, V., & Akiva, N. (2015). Towards a big data analytics framework for IoT and smart city applications. In Modeling and processing for next-generation big-data technologies (pp. 257-282). Springer International Publishing.
- Pradeep, S., Kousalya, T., Suresh, K. A., & Edwin, J. (2016). Iot and its connectivity challenges in smart home.
- Whitmore, A., Agarwal, A., & Da Xu, L. (2015). The Internet of Things—A survey of topics and trends. Information Systems Frontiers, 17(2), 261-274.
- Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440.
- Xu, K., Wang, X., Wei, W., Song, H., & Mao, B. (2016). Toward software defined smart home. IEEE Communications Magazine, 54(5), 116-122.
- Cho, J. Y., Lee, H. S., & Lee, B. G. (2015, February). Connectivity issues on IoT business-the Korean case of smart home network. In The Second International Conference on Electrical, Electronics, Computer Engineering and their Applications (EECEA2015) (p. 120).
- Perumal, T., Datta, S. K., & Bonnet, C. (2015). IoT device management framework for smart home scenarios. In Consumer Electronics (GCCE), 2015 IEEE 4th Global Conference on (pp. 54-55). IEEE.
- Bugeja, J., Jacobsson, A., & Davidsson, P. (2016, August). On Privacy and Security Challenges in Smart Connected Homes. In Intelligence and Security Informatics Conference (EISIC), 2016 European (pp. 172-175). IEEE.
- Chang, C. Y., Kuo, C. H., Chen, J. C., & Wang, T. C. (2015). Design and implementation of an IoT access point for smart home. Applied Sciences, 5(4), 1882-1903.
- Pandikumar, S., & Vetrivel, R. S. (2014, March). Internet of things based architecture of web and smart home interface using GSM. In International Journal of Innovative Research in Science, Engineering and Technology (Vol. 3, No. 3, pp. 1721-1727).
- Kumar, P., & Pati, U. C. (2016, May). IoT based monitoring and control of appliances for smart home. In Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE International Conference on (pp. 1145-1150). IEEE.
- Ghayvat, H., Mukhopadhyay, S., Liu, J., Babu, A., Alahi, M. E. E., & Gui, X. (2015). Internet of things for smart homes and buildings. Australian Journal of Telecommunications and the Digital Economy, 3(4).
- Meddeb, M., Dhraief, A., Belghith, A., Monteil, T., & Drira, K. (2017). Named Data Networking: A promising architecture for the Internet of things (IoT).
- Kim, J. (2016). HEMS (Home Energy Management System) base on the IoT smart home. Contemporary Engineering Sciences, 9(1), 21-28.
- Karmakar, G., Roy, S., Chattopadhyay, G., & Xiao, Z. (2017, February). Dynamically controlling exterior and interior window coverings through IoT for environmental friendly smart homes. In Mechatronics (ICM), 2017 IEEE International Conference on (pp. 487-491). IEEE.
- Wallis, K., & Reich, C. (2016). Secure Zero Configuration of IoT Devices-A Survey. BW-CAR| SINCOM, 59.
- La Marra, A., Martinelli, F., Mori, P., & Saracino, A. (2017, August). Implementing usage control in internet of things: a smart home use case. In Trustcom/BigDataSE/ICESS, 2017 IEEE (pp. 1056-1063). IEEE.
- Cui, X. (2016). The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-68). Palgrave Macmillan, London.
- Elkhodr, M., Shahrestani, S., & Cheung, H. (2015, December). A smart home application based on the Internet of Things management platform. In Data Science and Data Intensive Systems (DSDIS), 2015 IEEE International Conference on (pp. 491-496). IEEE.
- Chen, H., Xie, X., Shu, W., & Xiong, N. (2016). An Efficient Recommendation Filter Model on Smart Home Big Data Analytics for Enhanced Living Environments. Sensors, 16(10), 1706.
- Mano, L. Y., Faiçal, B. S., Nakamura, L. H., Gomes, P. H., Libralon, G. L., Meneguete, R. I., ... & Ueyama, J. (2016). Exploiting IoT technologies for enhancing Health Smart Homes through patient identification and emotion recognition. Computer Communications, 89, 178-190.
- Li, M., & Lin, H. J. (2015). Design and implementation of smart home control systems based on wireless sensor networks and power line communications. IEEE Transactions on Industrial Electronics, 62(7), 4430-4442.
- Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164.
- Lee, Y. T., Hsiao, W. H., Huang, C. M., & Seng-cho, T. C. (2016). An integrated cloud-based smart home management system with community hierarchy. IEEE Transactions on Consumer Electronics, 62(1), 1-9.
- Hoffman, D. L., & Novak, T. P. (2015). Emergent experience and the connected consumer in the smart home assemblage and the internet of things.
- Kang, D. H., Park, M. S., Kim, H. S., Kim, D. Y., Kim, S. H., Son, H. J., & Lee, S. G. (2017, February). Room Temperature Control and Fire Alarm/Suppression IoT Service Using MQTT on AWS. In Platform Technology and Service (PlatCon), 2017 International Conference on (pp. 1-5). IEEE.
- Sivaraman, V., Gharakheili, H. H., Vishwanath, A., Boreli, R., & Mehani, O. (2015, October). Network-level security and privacy control for smart-home IoT devices. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference on (pp. 163-167). IEEE.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Security Issues And Solutions In Smart Home IoT Architecture Essay.. Retrieved from https://myassignmenthelp.com/free-samples/elec4740-internet-of-things/a-report-on-iot-in-smart-home.html.
"Security Issues And Solutions In Smart Home IoT Architecture Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/elec4740-internet-of-things/a-report-on-iot-in-smart-home.html.
My Assignment Help (2021) Security Issues And Solutions In Smart Home IoT Architecture Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/elec4740-internet-of-things/a-report-on-iot-in-smart-home.html
[Accessed 24 November 2024].
My Assignment Help. 'Security Issues And Solutions In Smart Home IoT Architecture Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/elec4740-internet-of-things/a-report-on-iot-in-smart-home.html> accessed 24 November 2024.
My Assignment Help. Security Issues And Solutions In Smart Home IoT Architecture Essay. [Internet]. My Assignment Help. 2021 [cited 24 November 2024]. Available from: https://myassignmenthelp.com/free-samples/elec4740-internet-of-things/a-report-on-iot-in-smart-home.html.