Design of database and secure communication protocols for Internet-of-things-based smart home system

Author(s):  
Trio Adiono ◽  
Revie Marthensa ◽  
Rahmat Muttaqin ◽  
Syifaul Fuada ◽  
Suksmandhira Harimurti ◽  
...  
2015 ◽  
Vol 32 ◽  
pp. 17-31 ◽  
Author(s):  
Kim Thuat Nguyen ◽  
Maryline Laurent ◽  
Nouha Oualha

2019 ◽  
Vol 01 (02) ◽  
pp. 31-39 ◽  
Author(s):  
Duraipandian M. ◽  
Vinothkanna R.

The paper proposing the cloud based internet of things for the smart connected objects, concentrates on developing a smart home utilizing the internet of things, by providing the embedded labeling for all the tangible things at home and enabling them to be connected through the internet. The smart home proposed in the paper concentrates on the steps in reducing the electricity consumption of the appliances at the home by converting them into the smart connected objects using the cloud based internet of things and also concentrates on protecting the house from the theft and the robbery. The proposed smart home by turning the ordinary tangible objects into the smart connected objects shows considerable improvement in the energy consumption and the security provision.


2021 ◽  
pp. 126908
Author(s):  
Wonyoung Choi ◽  
Jisu Kim ◽  
SangEun Lee ◽  
Eunil Park

Proceedings ◽  
2021 ◽  
Vol 74 (1) ◽  
pp. 1
Author(s):  
Hilal Çepik ◽  
Ömer Aydın ◽  
Gökhan Dalkılıç

With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.


Sign in / Sign up

Export Citation Format

Share Document