Privacy in the Age of Mobility and Smart Devices in Smart Homes

Author(s):  
Abdullahi Arabo ◽  
Ian Brown ◽  
Fadi El-Moussa
Keyword(s):  
Sensors ◽  
2021 ◽  
Vol 21 (7) ◽  
pp. 2347
Author(s):  
Yanyan Wang ◽  
Lin Wang ◽  
Ruijuan Zheng ◽  
Xuhui Zhao ◽  
Muhua Liu

In smart homes, the computational offloading technology of edge cloud computing (ECC) can effectively deal with the large amount of computation generated by smart devices. In this paper, we propose a computational offloading strategy for minimizing delay based on the back-pressure algorithm (BMDCO) to get the offloading decision and the number of tasks that can be offloaded. Specifically, we first construct a system with multiple local smart device task queues and multiple edge processor task queues. Then, we formulate an offloading strategy to minimize the queue length of tasks in each time slot by minimizing the Lyapunov drift optimization problem, so as to realize the stability of queues and improve the offloading performance. In addition, we give a theoretical analysis on the stability of the BMDCO algorithm by deducing the upper bound of all queues in this system. The simulation results show the stability of the proposed algorithm, and demonstrate that the BMDCO algorithm is superior to other alternatives. Compared with other algorithms, this algorithm can effectively reduce the computation delay.


Sensors ◽  
2020 ◽  
Vol 20 (10) ◽  
pp. 2783 ◽  
Author(s):  
Linh-An Phan ◽  
Taehong Kim

Smart home is one of the most promising applications of the Internet of Things. Although there have been studies about this technology in recent years, the adoption rate of smart homes is still low. One of the largest barriers is technological fragmentation within the smart home ecosystem. Currently, there are many protocols used in a connected home, increasing the confusion of consumers when choosing a product for their house. One possible solution for this fragmentation is to make a gateway to handle the diverse protocols as a central hub in the home. However, this solution brings about another issue for manufacturers: compatibility. Because of the various smart devices on the market, supporting all possible devices in one gateway is also an enormous challenge. In this paper, we propose a software architecture for a gateway in a smart home system to solve the compatibility problem. By creating a mechanism to dynamically download and update a device profile from a server, the gateway can easily handle new devices. Moreover, the proposed gateway also supports unified control over heterogeneous networks. We implemented a prototype to prove the feasibility of the proposed gateway architecture and evaluated its performance from the viewpoint of message execution time over heterogeneous networks, as well as the latency for device profile downloads and updates, and the overhead needed for handling unknown commands.


Sensors ◽  
2018 ◽  
Vol 18 (9) ◽  
pp. 2784 ◽  
Author(s):  
Chao Qu ◽  
Ming Tao ◽  
Ruifen Yuan

With the fast development and expansion of the Internet of Things (IoT), billions of smart devices are being continuously connected, and smart homes, as a typical IoT application, are providing people with various convenient applications, but face security and privacy issues. The idea of Blockchain (BC) theory has brought about a potential solution to the IoT security problem. The emergence of blockchain technology has brought about a change of decentralized management, providing an effective solution for the protection of network security and privacy. On the other hand, the smart devices in IoT are always lightweight and have less energy and memory. This makes the application of blockchain difficult. Against this background, this paper proposes a blockchain model based on hypergraphs. The aims of this model are to reduce the storage consumption and to solve the additional security issues. In the model, we use the hyperedge as the organization of storage nodes and convert the entire networked data storage into part network storage. We discuss the design of the model and security strategy in detail, introducing some use cases in a smart home network and evaluating the storage performance of the model through simulation experiments and an evaluation of the network.


2017 ◽  
Vol 11 (1) ◽  
pp. 6-12 ◽  
Author(s):  
Alberto Brunete González ◽  
Micheline Selmes ◽  
Jacques Selmes

Purpose The purpose of this paper is to analyse the needs of people with Alzheimer’s disease and their caregivers in terms of information and communications technology (ICT) and home automation, and how to foster the use of smart devices in their homes and also, to determine whether the use of ICT can extend people with Alzheimer’s disease stay at home in the first stages of the illness, while facilitating their caregivers’ tasks. Design/methodology/approach Groups of caregivers, ICT researchers and Alzheimer’s disease experts were gathered to discuss the utility of several solutions. Sessions were grouped into four topics: safety, leisure, activities of daily living and friendly atmosphere. In total, 23 ICT-based solutions to improve life at home of people with Alzheimer’s disease were analysed and grouped under “no interest”, “some interest” and “very interesting”. Caregivers rated these solutions and suggested improvements to them. Findings In total, 18 out of 23 proposals were considered “very interesting”, meaning that caregivers considered that they could truly improve the lives of people with Alzheimer’s disease. Caregivers also suggested how to progressively introduce these technical solutions into their homes. Originality/value ICT and home automation advances could be very useful if used conveniently. Caregivers consider that smart homes can help people with Alzheimer’s disease in the security, leisure and daily tasks fields, increasing the time they can live alone in their own homes.


2021 ◽  
Vol 1 (1) ◽  
Author(s):  
Iakovos T. Michailidis ◽  
Athanasios Ch. Kapoutsis ◽  
Christos D. Korkas ◽  
Panagiotis T. Michailidis ◽  
Kyriaki A. Alexandridou ◽  
...  

AbstractRecently, special attention has been paid in developing methodologies and systems for embedding autonomy within smart devices (Things). Moreover, as Things typically operate in an interconnected IoT ecosystem, autonomous operation must be performed in a cooperative fashion so the different Things coordinate their autonomous actions towards meeting high-level objectives and policies. Embedding Things with cooperative autonomy typically requires a tedious and costly effort not only during the original ecosystem deployment but throughout its lifetime. The current study describes CAO (Cognitive Adaptive Optimization)—and its distributed counterpart L4G-CAO (Local for Global Cognitive Adaptive Optimization)—which can overcome this shortcoming. CAO and L4G-CAO—which have recently been introduced and tested in a variety of IoT applications—can embed Things with cooperative autonomy in a plug-n-play fashion, i.e., without requiring the aforementioned tedious and costly effort. Results of the application of the aforementioned approaches in three different application domains (smart homes and districts, intelligent traffic systems and coordinated swarms of robots) are also presented. The presented results demonstrate the potential, of both approaches, to exploit the IoT automation functionalities in order to significantly improve the overall IoT performance without tedious effort.


2018 ◽  
Author(s):  
Andrew G. Ferguson

102 Cornell Law Review 547 (2017)“Smart” devices radiate data, exposing a continuous, intimate, and revealing pattern of daily life. Billions of sensors collect data from smartphones, smart homes, smart cars, medical devices, and an evolving assortment of consumer and commercial products. But, what are these data trails to the Fourth Amendment? Does data emanating from devices on or about our bodies, houses, things, and digital devices fall within the Fourth Amendment’s protection of “persons, houses, papers, and effects”? Does interception of this information violate a “reasonable expectation of privacy”? This Article addresses the question of how the Fourth Amendment should protect “smart data.” It exposes the growing danger of sensor surveillance and the weakness of current Fourth Amendment doctrine. The Article then suggests a new theory of “informational curtilage” to protect the data trails emerging from smart devices and reclaims the principle of “informational security” as the organizing framework for a digital Fourth Amendment.


Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 7864
Author(s):  
Juana Isabel Méndez ◽  
Ana Victoria Meza-Sánchez ◽  
Pedro Ponce ◽  
Troy McDaniel ◽  
Therese Peffer ◽  
...  

Depression is a common mental illness characterized by sadness, lack of interest, or pleasure. According to the DSM-5, there are nine symptoms, from which an individual must present 4 or 5 in the last two weeks to fulfill the diagnosis criteria of depression. Nevertheless, the common methods that health care professionals use to assess and monitor depression symptoms are face-to-face questionnaires leading to time-consuming or expensive methods. On the other hand, smart homes can monitor householders’ health through smart devices such as smartphones, wearables, cameras, or voice assistants connected to the home. Although the depression disorders at smart homes are commonly oriented to the senior sector, depression affects all of us. Therefore, even though an expert needs to diagnose the depression disorder, questionnaires as the PHQ-9 help spot any depressive symptomatology as a pre-diagnosis. Thus, this paper proposes a three-step framework; the first step assesses the nine questions to the end-user through ALEXA or a gamified HMI. Then, a fuzzy logic decision system considers three actions based on the nine responses. Finally, the last step considers these three actions: continue monitoring through Alexa and the HMI, suggest specialist referral, and mandatory specialist referral.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1488
Author(s):  
JiHyeon Oh ◽  
SungJin Yu ◽  
JoonYoung Lee ◽  
SeungHwan Son ◽  
MyeongHyun Kim ◽  
...  

With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel. Therefore, a secure authentication protocol should be established between the user and smart devices. In 2020, Xiang and Zheng presented a situation-aware protocol for device authentication in smart grid-enabled smart home environments. However, we demonstrate that their protocol can suffer from stolen smart device, impersonation, and session key disclosure attacks and fails to provide secure mutual authentication. Therefore, we propose a secure and lightweight authentication protocol for IoT-based smart homes to resolve the security flaws of Xiang and Zheng’s protocol. We proved the security of the proposed protocol by performing informal and formal security analyses, using the real or random (ROR) model, Burrows–Abadi–Needham (BAN) logic, and the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. Moreover, we provide a comparison of performance and security properties between the proposed protocol and related existing protocols. We demonstrate that the proposed protocol ensures better security and lower computational costs than related protocols, and is suitable for practical IoT-based smart home environments.


Processes ◽  
2021 ◽  
Vol 9 (9) ◽  
pp. 1593
Author(s):  
Zeinab Shahbazi ◽  
Yung-Cheol Byun ◽  
Ho-Young Kwak

The development of information and communication technology in terms of sensor technologies cause the Internet of Things (IoT) step toward smart homes for prevalent sensing and management of resources. The gateway connections contain various IoT devices in smart homes representing the security based on the centralized structure. To address the security purposes in this system, the blockchain framework is considered a smart home gateway to overcome the possible attacks and apply Deep Reinforcement Learning (DRL). The proposed blockchain-based smart home approach carefully evaluated the reliability and security in terms of accessibility, privacy, and integrity. To overcome traditional centralized architecture, blockchain is employed in the data store and exchange blocks. The data integrity inside and outside of the smart home cause the ability of network members to authenticate. The presented network implemented in the Ethereum blockchain, and the measurements are in terms of security, response time, and accuracy. The experimental results show that the proposed solution contains a better outperform than recent existing works. DRL is a learning-based algorithm which has the most effective aspects of the proposed approach to improve the performance of system based on the right values and combining with blockchain in terms of security of smart home based on the smart devices to overcome sharing and hacking the privacy. We have compared our proposed system with the other state-of-the-art and test this system in two types of datasets as NSL-KDD and KDD-CUP-99. DRL with an accuracy of 96.9% performs higher and has a stronger output compared with Artificial Neural Networks with an accuracy of 80.05% in the second stage, which contains 16% differences in terms of improving the accuracy of smart homes.


Sign in / Sign up

Export Citation Format

Share Document