scholarly journals Listen Only When Spoken To: Interpersonal Communication Cues as Smart Speaker Privacy Controls

2020 ◽  
Vol 2020 (2) ◽  
pp. 251-270
Author(s):  
Abraham Mhaidli ◽  
Manikandan Kandadai Venkatesh ◽  
Yixin Zou ◽  
Florian Schaub

AbstractInternet of Things and smart home technologies pose challenges for providing effective privacy controls to users, as smart devices lack both traditional screens and input interfaces. We investigate the potential for leveraging interpersonal communication cues as privacy controls in the IoT context, in particular for smart speakers. We propose privacy controls based on two kinds of interpersonal communication cues – gaze direction and voice volume level – that only selectively activate a smart speaker’s microphone or voice recognition when the device is being addressed, in order to avoid constant listening and speech recognition by the smart speaker microphones and reduce false device activation. We implement these privacy controls in a smart speaker prototype and assess their feasibility, usability and user perception in two lab studies. We find that privacy controls based on interpersonal communication cues are practical, do not impair the smart speaker’s functionality, and can be easily used by users to selectively mute the microphone. Based on our findings, we discuss insights regarding the use of interpersonal cues as privacy controls for smart speakers and other IoT devices.

Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


2016 ◽  
Vol 3 (2) ◽  
pp. 75-82 ◽  
Author(s):  
Naresh Babu Bynagari

‘Industrial application of Internet of Things deals with the application of Internet of things to produce industrial services. It analyzed how industries can carry out multiple services with function remotely using IoT-connected devices. The several benefits and drawbacks to the application of IoT services were also investigated. The IoT is a network of connected systems and smart devices that use encoded networks like sensors, processors, and interactive hardware to receive, send and store data. The utilization of IoT for industrial functions will significantly improve industrial output, and in the future, more industries will come to apply IoT devices and systems for greater efficiency.  


2021 ◽  
pp. 1-16
Author(s):  
Abdelaziz A. Abdelhamid ◽  
Sultan R. Alotaibi

Internet of things (IoT) plays significant role in the fourth industrial revolution and attracts an increasing interest due to the rapid development of smart devices. IoT comprises factors of twofold. Firstly, a set of things (i.e., appliances, devices, vehicles, etc.) connected together via network. Secondly, human-device interaction to communicate with these things. Speech is the most natural methodology of interaction that can enrich user experience. In this paper, we propose a novel and effective approach for building customized voice interaction for controlling smart devices in IoT environments (i.e., Smart home). The proposed approach is based on extracting customized tiny decoding graph from a large graph constructed using weighted finite sates transducers. Experimental results showed that tiny decoding graphs are very efficient in terms of computational resources and recognition accuracy in clean and noisy conditions. To emphasize the effectiveness of the proposed approach, the standard Resources Management (RM1) dataset was employed and promising results were achieved when compared with four competitive approaches.


Sensors ◽  
2020 ◽  
Vol 20 (10) ◽  
pp. 2783 ◽  
Author(s):  
Linh-An Phan ◽  
Taehong Kim

Smart home is one of the most promising applications of the Internet of Things. Although there have been studies about this technology in recent years, the adoption rate of smart homes is still low. One of the largest barriers is technological fragmentation within the smart home ecosystem. Currently, there are many protocols used in a connected home, increasing the confusion of consumers when choosing a product for their house. One possible solution for this fragmentation is to make a gateway to handle the diverse protocols as a central hub in the home. However, this solution brings about another issue for manufacturers: compatibility. Because of the various smart devices on the market, supporting all possible devices in one gateway is also an enormous challenge. In this paper, we propose a software architecture for a gateway in a smart home system to solve the compatibility problem. By creating a mechanism to dynamically download and update a device profile from a server, the gateway can easily handle new devices. Moreover, the proposed gateway also supports unified control over heterogeneous networks. We implemented a prototype to prove the feasibility of the proposed gateway architecture and evaluated its performance from the viewpoint of message execution time over heterogeneous networks, as well as the latency for device profile downloads and updates, and the overhead needed for handling unknown commands.


Sensors ◽  
2020 ◽  
Vol 20 (9) ◽  
pp. 2468 ◽  
Author(s):  
Khalid Haseeb ◽  
Ahmad Almogren ◽  
Ikram Ud Din ◽  
Naveed Islam ◽  
Ayman Altameem

Nowadays, the integration of Wireless Sensor Networks (WSN) and the Internet of Things (IoT) provides a great concern for the research community for enabling advanced services. An IoT network may comprise a large number of heterogeneous smart devices for gathering and forwarding huge data. Such diverse networks raise several research questions, such as processing, storage, and management of massive data. Furthermore, IoT devices have restricted constraints and expose to a variety of malicious network attacks. This paper presents a Secure Sensor Cloud Architecture (SASC) for IoT applications to improve network scalability with efficient data processing and security. The proposed architecture comprises two main phases. Firstly, network nodes are grouped using unsupervised machine learning and exploit weighted-based centroid vectors for the development of intelligent systems. Secondly, the proposed architecture makes the use of sensor-cloud infrastructure for boundless storage and consistent service delivery. Furthermore, the sensor-cloud infrastructure is protected against malicious nodes by using a mathematically unbreakable one-time pad (OTP) encryption scheme to provide data security. To evaluate the performance of the proposed architecture, different simulation experiments are conducted using Network Simulator (NS3). It has been observed through experimental results that the proposed architecture outperforms other state-of-the-art approaches in terms of network lifetime, packet drop ratio, energy consumption, and transmission overhead.


JMIR Aging ◽  
10.2196/21964 ◽  
2020 ◽  
Vol 3 (2) ◽  
pp. e21964
Author(s):  
Yong K Choi ◽  
Hilaire J Thompson ◽  
George Demiris

Background The Internet-of-Things (IoT) technologies can create smart residences that integrate technology within the home to enhance residents’ safety as well as monitor their health and wellness. However, there has been little research on real-world testing of IoT smart home devices with older adults, and the feasibility and acceptance of such tools have not been systematically examined. Objective This study aims to conduct a pilot study to investigate the feasibility of using IoT smart home devices in the actual residences of older adults to facilitate healthy aging. Methods We conducted a 2-month feasibility study on community-dwelling older adults. Participants chose among different IoT devices to be installed and deployed within their homes. The IoT devices tested varied depending on the participant’s preference: a door and window sensor, a multipurpose sensor (motion, temperature, luminosity, and humidity), a voice-operated smart speaker, and an internet protocol (IP) video camera. Results We recruited a total of 37 older adults for this study, with 35 (95%) successfully completing all procedures in the 2-month study. The average age of the sample was 78 (SD 9) years and primarily comprised women (29/37, 78%), those who were educated (31/37, 86%; bachelor’s degree or higher), and those affected by chronic conditions (33/37, 89%). The most widely chosen devices among the participants were multipurpose sensors and smart speakers. An IP camera was a significantly unpopular choice among participants in both phases. The participant feedback suggests that perceived privacy concerns, perceived usefulness, and curiosity to technology were strong factors when considering which device to have installed in their home. Conclusions Overall, our deployment results revealed that the use of IoT smart home devices is feasible in actual residences of older adults. These findings may inform the follow-up assessment of IoT technologies and their impact on health-related outcomes and advance our understanding of the role of IoT home-based monitoring technologies to promote successful aging-in-place for older adults. Future trials should consider older adults’ preferences for the different types of smart home devices to be installed in real-world residential settings.


2020 ◽  
Vol 8 (6) ◽  
pp. 5021-5027

Internet of Things (IoT) growing at a rate of exponential numbers in recent years has received extensive attention with BlockChain (BC) technology which provide trust to IoT with its immutable nature, decentralization in computing, resource constraints, security and privacy. The distributed ledger of transactions in BC is path leading technology for addressing Cyber Threats in the form of data theft; it provides secure application architecture which has proven track of record for securing data. IoT devices using BC enabled to communicate between objects, share data, decide based on business criteria and act as a medium to securely transmit information. This work provides lightweight BlockChain with two prominent consensus mechanism PoW – Proof of Work and PoS – Proof of Stake for smart IoT devices. Next, Smart Home Device (SMD) is ensures providing best-in-class Security and Privacy for smart home Appliances. Further provides future advances in the Approach.


2018 ◽  
Vol 1 (1) ◽  
pp. 18-26 ◽  
Author(s):  
Istabraq M. Al-Joboury ◽  
Emad H. Hemiary

The Internet of Things (IoT) contains smart devices placed in different environments, connected with each other across networks and Internet. The integration between Things and Cloud Computing (CC) for monitoring and permanent storage is required for future IoT applications. Therefore, this paper proposes IoT architecture based Cloud for healthcare network when patients are remotely monitored by their family and physicians. This proposed architecture is different from the traditional IoT architecture that consists of Things, getaways, middleware, and application layers which in turn need connectivity insurance between them. The proposed architecture is designed and configured using Cisco Packet Tracer version 7.0 over two sites: Site 'A' located at smart home and site 'B' located at the smart hospital. The results show that the IoT based Cloud enhances the patient life style by using smart sensors and mobile application, as well as the physicians can remotely monitor the data in real time.


Author(s):  
Dan-Radu Berte

Abstract IoT, or the Internet of Things, has been in use since circa 1999. It defines a next chapter in the evolution of the Internet where computing devices embedded in everyday objects are able to send and receive data themselves. In recent years miniaturization and economies of scale brought a boon of new devices to the consumer and enterprise market, prompting Gartner to predict over 20bln live IoT devices by 2020. However, the definition of IoT is loose and, for the purpose of predicting trends or discussing security, formulating a clear understanding of the term is crucial. In fact, Internet of Things is a term only mostly used by the media, academia and the industry. Customers in the consumer space refer to the technologies by their benefit describing term of “Smart Home”. A quick analysis of this gap shows how it’s entirely possible no knowledge permeates the business and market worlds because of the incompatible terms used. As more devices, OSes and heterogeneous platforms entrench the concept of a new digital lifestyle, the new “Digital Kingdom” opens its doors to radical disruption, such as the latest massive Mirai and Reaper attacks. Our ability to correctly define the IoT, it’s platforms and components, should lead to better market dynamics and better preparedness, as one can’t secure something that can’t be defined. This paper proposes to further understand the IoT by exploring available definitions, reiterating misuse and equivocal perception, concluding with a more suiting, contemporary definition.


Author(s):  
Mana Saleh Al Reshan

Information Security is the foremost concern for IoT (Internet of things) devices and applications. Since the advent of IoT, its applications and devices have experienced an exponential increase in numerous applications which are utilized. Nowadays we people are becoming smart because we started using smart devices like a smartwatch, smart TV, smart home appliances. These devices are part of the IoT devices. The IoT device differs widely in capacity storage, size, computational power, and supply of energy. With the rapid increase of IoT devices in different IoT fields, information security, and privacy are not addressed well. Most IoT devices having constraints in computational and operational capabilities are a threat to security and privacy, also prone to cyber-attacks. This study presents a CIA triad-based information security implementation for the four-layer architecture of the IoT devices. An overview of layer-wise threats to the IoT devices and finally suggest CIA triad-based security techniques for securing the IoT devices.


Sign in / Sign up

Export Citation Format

Share Document