Smart Homes and Smart Cities

2022 ◽  
pp. 199-223
Author(s):  
C. N. Marimuthu ◽  
G. Arthy
Keyword(s):  
2021 ◽  
Vol 140 ◽  
pp. 110755
Author(s):  
Hakpyeong Kim ◽  
Heeju Choi ◽  
Hyuna Kang ◽  
Jongbaek An ◽  
Seungkeun Yeom ◽  
...  

Nanomaterials ◽  
2021 ◽  
Vol 11 (11) ◽  
pp. 2975
Author(s):  
Long Liu ◽  
Xinge Guo ◽  
Weixin Liu ◽  
Chengkuo Lee

With the fast development of energy harvesting technology, micro-nano or scale-up energy harvesters have been proposed to allow sensors or internet of things (IoT) applications with self-powered or self-sustained capabilities. Facilitation within smart homes, manipulators in industries and monitoring systems in natural settings are all moving toward intellectually adaptable and energy-saving advances by converting distributed energies across diverse situations. The updated developments of major applications powered by improved energy harvesters are highlighted in this review. To begin, we study the evolution of energy harvesting technologies from fundamentals to various materials. Secondly, self-powered sensors and self-sustained IoT applications are discussed regarding current strategies for energy harvesting and sensing. Third, subdivided classifications investigate typical and new applications for smart homes, gas sensing, human monitoring, robotics, transportation, blue energy, aircraft, and aerospace. Lastly, the prospects of smart cities in the 5G era are discussed and summarized, along with research and application directions that have emerged.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3838
Author(s):  
Muhammad Umair ◽  
Muhammad Aamir Cheema ◽  
Omer Cheema ◽  
Huan Li ◽  
Hua Lu

COVID-19 has disrupted normal life and has enforced a substantial change in the policies, priorities and activities of individuals, organisations and governments. These changes are proving to be a catalyst for technology and innovation. In this paper, we discuss the pandemic’s potential impact on the adoption of the Internet of Things (IoT) in various broad sectors, namely healthcare, smart homes, smart buildings, smart cities, transportation and industrial IoT. Our perspective and forecast of this impact on IoT adoption is based on a thorough research literature review, a careful examination of reports from leading consulting firms and interactions with several industry experts. For each of these sectors, we also provide the details of notable IoT initiatives taken in the wake of COVID-19. We also highlight the challenges that need to be addressed and important research directions that will facilitate accelerated IoT adoption.


2021 ◽  
Author(s):  
Amir Mohammadi Bagha

Internet of Things (IoT) is considered as one of the emerging leading technologies that allow the mainstreaming of smart homes and smart cities in the recent years, by creating a communication system for physical objects over the Internet. In a smart home (also called push-button home automation system), devices are not necessarily homogeneous in terms of topology, security protocols, computational power and communication. This nature of the devices causes some incompatibility with conventional authentication methods and the security requirements of IoT standards. This thesis proposes an RSA-Biometric based three-factor User Authentication Scheme for Smart-Homes using Smartphone (called RSA-B-ASH-S scheme). An informal security analysis of the proposed RSA-B-ASH-S scheme is provided, along with its performance evaluation in terms of computational time, storage requirements and communication overload. Furthermore, a formal analysis of the proposed RSA-B-ASH-S scheme using the Burrows-Abadi-Needham (BAN) Logic is described, showing that the proposed scheme achieves the forward secrecy property by utilizing a fresh encryption key for each session and it also satisfies the anonymity of the user by using a one-time token. A proof of concept of the proposed RSA-B-ASH-S scheme is also provided.


Electronics ◽  
2021 ◽  
Vol 10 (23) ◽  
pp. 3047
Author(s):  
Kolade Olorunnife ◽  
Kevin Lee ◽  
Jonathan Kua

Recent years have seen the rapid adoption of Internet of Things (IoT) technologies, where billions of physical devices are interconnected to provide data sensing, computing and actuating capabilities. IoT-based systems have been extensively deployed across various sectors, such as smart homes, smart cities, smart transport, smart logistics and so forth. Newer paradigms such as edge computing are developed to facilitate computation and data intelligence to be performed closer to IoT devices, hence reducing latency for time-sensitive tasks. However, IoT applications are increasingly being deployed in remote and difficult to reach areas for edge computing scenarios. These deployment locations make upgrading application and dealing with software failures difficult. IoT applications are also increasingly being deployed as containers which offer increased remote management ability but are more complex to configure. This paper proposes an approach for effectively managing, updating and re-configuring container-based IoT software as efficiently, scalably and reliably as possible with minimal downtime upon the detection of software failures. The approach is evaluated using docker container-based IoT application deployments in an edge computing scenario.


The future of Internet of Things (IoT) is already upon us. The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain open. To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of “IoT features”. Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.


2020 ◽  
Vol 2020 ◽  
pp. 1-18
Author(s):  
Tran Anh Khoa ◽  
Le Mai Bao Nhu ◽  
Hoang Hai Son ◽  
Nguyen Minh Trong ◽  
Cao Hoang Phuc ◽  
...  

Smart homes are an element of developing smart cities. In recent years, countries around the world have spared no effort in promoting smart cities. Smart homes are an interesting technological advancement that can make people’s lives much more convenient. The development of smart homes involves multiple technological aspects, which include big data, mobile networks, cloud computing, Internet of Things, and even artificial intelligence. Digital information is the main component of signal control and flow in a smart home, while information security is another important aspect. In the event of equipment failure, the task of safeguarding the system’s information is of the utmost importance. Since smart homes are automatically controlled, the problem of mobile network security must be taken seriously. To address these issues, this paper focuses on information security, big data, mobile networks, cloud computing, and the Internet of Things. Security efficiency can be enhanced by using a Secure Hash Algorithm 256 (SHA-256), which is an authentication mechanism that, with the help of the user, can authenticate each interaction of a given device with a WebServer by using an encrypted username, password, and token. This framework could be used for an automated burglar alarm system, guest attendance monitoring, and light switches, all of which are easily integrated with any smart city base. In this way, IoT solutions can allow real-time monitoring and connection with central systems for automated burglar alarms. The monitoring framework is developed on the strength of the web application to obtain real-time display, storage, and warning functions for local or remote monitoring control. The monitoring system is stable and reliable when applying SHA-256.


2021 ◽  
pp. 103-122
Author(s):  
Shriyash Mohril ◽  
Mahipal Singh Sankhla ◽  
Swaroop S. Sonone ◽  
Rajeev Kumar
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document