Securing the operation of Smart Home Systems: a literature review

Author(s):  
Noureddine Amraoui ◽  
Belhassen Zouari
Author(s):  
Isabel Richter ◽  
Corinna Mielke ◽  
Reinhold Haux

Smart home systems create new opportunities for patient care. In this paper, a role model is created for the different groups of people involved in the care process of an occupant. Based on a systematic literature review seven roles were identified. A second literature review deals with the topic Feedback of Smart Home Systems. Combining both reviews visualization proposals were created and are presented for two of the roles. The role model is adapted to German health system but could be transformed for different countries. To confirm the results an evaluation of role model and visualization proposal should be done in collaboration with possible users of smart homes.


Author(s):  
Mladen Matic ◽  
Igor Stefanovic ◽  
Roman Pavlovic ◽  
Istvan Pap
Keyword(s):  

Proceedings ◽  
2021 ◽  
Vol 74 (1) ◽  
pp. 1
Author(s):  
Hilal Çepik ◽  
Ömer Aydın ◽  
Gökhan Dalkılıç

With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.


Sensors ◽  
2021 ◽  
Vol 21 (3) ◽  
pp. 864 ◽  
Author(s):  
Ju Wang ◽  
Nicolai Spicher ◽  
Joana M. Warnecke ◽  
Mostafa Haghi ◽  
Jonas Schwartze ◽  
...  

With the advances in sensor technology, big data, and artificial intelligence, unobtrusive in-home health monitoring has been a research focus for decades. Following up our research on smart vehicles, within the framework of unobtrusive health monitoring in private spaces, this work attempts to provide a guide to current sensor technology for unobtrusive in-home monitoring by a literature review of the state of the art and to answer, in particular, the questions: (1) What types of sensors can be used for unobtrusive in-home health data acquisition? (2) Where should the sensors be placed? (3) What data can be monitored in a smart home? (4) How can the obtained data support the monitoring functions? We conducted a retrospective literature review and summarized the state-of-the-art research on leveraging sensor technology for unobtrusive in-home health monitoring. For structured analysis, we developed a four-category terminology (location, unobtrusive sensor, data, and monitoring functions). We acquired 912 unique articles from four relevant databases (ACM Digital Lib, IEEE Xplore, PubMed, and Scopus) and screened them for relevance, resulting in n=55 papers analyzed in a structured manner using the terminology. The results delivered 25 types of sensors (motion sensor, contact sensor, pressure sensor, electrical current sensor, etc.) that can be deployed within rooms, static facilities, or electric appliances in an ambient way. While behavioral data (e.g., presence (n=38), time spent on activities (n=18)) can be acquired effortlessly, physiological parameters (e.g., heart rate, respiratory rate) are measurable on a limited scale (n=5). Behavioral data contribute to functional monitoring. Emergency monitoring can be built up on behavioral and environmental data. Acquired physiological parameters allow reasonable monitoring of physiological functions to a limited extent. Environmental data and behavioral data also detect safety and security abnormalities. Social interaction monitoring relies mainly on direct monitoring of tools of communication (smartphone; computer). In summary, convincing proof of a clear effect of these monitoring functions on clinical outcome with a large sample size and long-term monitoring is still lacking.


Author(s):  
Ye Fu ◽  
Daojuan Zhang ◽  
Chonghua Wang ◽  
Xi Luo ◽  
Wenxin Liu ◽  
...  

Author(s):  
Wei-Chung Teng ◽  
Yu-Chun Pao ◽  
Sheng-Luen Chung
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document