scholarly journals A Smart Locker

Nowadays, the Internet of Things is becoming a reality more and more. Beside smart thermostats, light switches and power outlets controllable by smart phone apps creating smart homes, technology has solutions for daily encountered problems as well. We have identified two specific problems related to locking system and we proposed solution for the same. The one is vehicle and the second is mail box. Having a lock on a bike or mail box is not a guarantee that the vehicle or the documents won’t get stolen. The proposed work provides a convenient way of locking, providing reliable security system for the vehicle/mail box. The proposed system uses the IoT technology and smart phone to lock or unlock the device remotely through authentication. In particular, this work proposes security enhancement against any physical damage or theft. The proposed locker allows the user to lock and unlock easily and securely. Using user’s phone, the lock system can be locked/unlocked by entering a pass code in the Android application. One can also use the system using the registered touch patterns that can be entered through a touch sensor present in the lock. It provides intelligent lock/unlock with the location of your phone to the locker with the Bluetooth strength. It also provides theft alert to the user.

Author(s):  
Promise Agbedanu ◽  
Anca Delia Jurcut

In this era of explosive growth in technology, the internet of things (IoT) has become the game changer when we consider technologies like smart homes and cities, smart energy, security and surveillance, and healthcare. The numerous benefits provided by IoT have become attractive technologies for users and cybercriminals. Cybercriminals of today have the tools and the technology to deploy millions of sophisticated attacks. These attacks need to be investigated; this is where digital forensics comes into play. However, it is not easy to conduct a forensic investigation in IoT systems because of the heterogeneous nature of the IoT environment. Additionally, forensic investigators mostly rely on evidence from service providers, a situation that can lead to evidence contamination. To solve this problem, the authors proposed a blockchain-based IoT forensic model that prevents the admissibility of tampered logs into evidence.


Author(s):  
Wassila Guebli ◽  
Abdelkader Belkhir

The emergence of the internet of things in the smart homes has given rise to many services to meet the user's expectations. It is possible to control the temperature, the brightness, the sound system, and even the security of the house via a smartphone, at the request of the inhabitant or by scheduling it. This growing number of “things” must deal with material constraints such as home network infrastructure, but also applicative due to the number of proposed services. The heterogeneity of users' preferences often creates conflicts between them like turn on and off light or using a heater and an air conditioner in the same time. To manage these conflicts, the authors proposed a solution based on linked open data (LOD). The LOD allows defining the relation between the different services and things in the house and a better exploitation of the attributes of the inhabitant's profile and services. It consists to find inconsistency relation between the equipment using the antonym thesaurus.


Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 2956 ◽  
Author(s):  
Paolo Lo Giudice ◽  
Antonino Nocera ◽  
Domenico Ursino ◽  
Luca Virgili

In the last years, several attempts to combine the Internet of Things (IoT) and social networking have been made. In the meantime, things involved in IoT are becoming increasingly sophisticated and intelligent, showing a behavior that tends to look like the one of users in social networks. Therefore, it is not out of place to talk about profiles of things and about information and topics exchanged among them. In such a context, constructing topic-driven virtual communities starting from the real ones operating in a Multi-IoT scenario is an extremely challenging issue. This paper aims at providing some contributions in this setting. First of all, it presents the concept of profile of a thing. Then, it introduces the concept of topic-guided virtual IoT. Finally, it illustrates two approaches (one supervised and one unsupervised) to constructing topic-guided virtual IoTs in a Multi-IoT scenario.


Sensors ◽  
2020 ◽  
Vol 20 (10) ◽  
pp. 2783 ◽  
Author(s):  
Linh-An Phan ◽  
Taehong Kim

Smart home is one of the most promising applications of the Internet of Things. Although there have been studies about this technology in recent years, the adoption rate of smart homes is still low. One of the largest barriers is technological fragmentation within the smart home ecosystem. Currently, there are many protocols used in a connected home, increasing the confusion of consumers when choosing a product for their house. One possible solution for this fragmentation is to make a gateway to handle the diverse protocols as a central hub in the home. However, this solution brings about another issue for manufacturers: compatibility. Because of the various smart devices on the market, supporting all possible devices in one gateway is also an enormous challenge. In this paper, we propose a software architecture for a gateway in a smart home system to solve the compatibility problem. By creating a mechanism to dynamically download and update a device profile from a server, the gateway can easily handle new devices. Moreover, the proposed gateway also supports unified control over heterogeneous networks. We implemented a prototype to prove the feasibility of the proposed gateway architecture and evaluated its performance from the viewpoint of message execution time over heterogeneous networks, as well as the latency for device profile downloads and updates, and the overhead needed for handling unknown commands.


2020 ◽  
Vol 11 (5) ◽  
pp. 259-269
Author(s):  
V. A. Galatenko ◽  
◽  
K. A. Kostyukhin ◽  

Internet of things technology is developing at an exceptionally fast pace. This applies to both industrial and consumer Internet. The "things" account for billions, and many areas of application have been formed. At the same time, the state of information security of the Internet of things is not satisfactory, and protective measures are clearly inferior to Commerce. This is especially dangerous because the Internet of things spans two worlds: digital and physical, and security breaches can cause both informational and physical damage. The Internet of things is developing rapidly, so it is natural that it experiences typical growth diseases-fragmentation and uneven development. The base for ensuring security is mostly formed (but continues to be formed), the question is how quickly there will be a harmonization of approaches, and advanced ideas will be accepted by device manufacturers. Many state and non-state agencies actively promote security tools, inform and train manufacturers and consumers. The article is an overview of the main provisions of information security of the Internet of things. An attempt is made to consider software and technical and legislative levels of Internet of things security. This makes it different from other publications of a similar nature. Only a holistic, integrated approach can improve real information security. Authors outline basic concepts and describe a reference model of Internet of things, draw attention to the peculiarities of the Internet of things that are important from the security point of view, enumerate typical threats for Internet of things. The legislative level of information security, security recommendations for the Internet of things, manufacturers description of usage, and installation of software corrections are considered in detail.


2019 ◽  
Author(s):  
Israel C. Vidal ◽  
Franck Rousseau ◽  
Javam C. Machado

With the growth of the Internet of Things (IoT) and Smart Homes, there is an ever-growing amount of data coming from within people’s houses. These data are intrinsically private and should be treated carefully, despite their high value for analysis. In this work, we propose a differentially private strategy to estimate frequencies of values in the context of Smart Home data.


The future of Internet of Things (IoT) is already upon us. The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. While enjoying the convenience and efficiency that IoT brings to us, new threats from IoT also have emerged. There are increasing research works to ease these threats, but many problems remain open. To better understand the essential reasons of new threats and the challenges in current research, this survey first proposes the concept of “IoT features”. Then, the security and privacy effects of eight IoT new features were discussed including the threats they cause, existing solutions and challenges yet to be solved.


2020 ◽  
Vol 10 (9) ◽  
pp. 3074 ◽  
Author(s):  
Samad Sepasgozar ◽  
Reyhaneh Karimi ◽  
Leila Farahzadi ◽  
Farimah Moezzi ◽  
Sara Shirowzhan ◽  
...  

This article reviewed the state-of-the-art applications of the Internet of things (IoT) technology applied in homes for making them smart, automated, and digitalized in many respects. The literature presented various applications, systems, or methods and reported the results of using IoT, artificial intelligence (AI), and geographic information system (GIS) at homes. Because the technology has been advancing and users are experiencing IoT boom for smart built environment applications, especially smart homes and smart energy systems, it is necessary to identify the gaps, relation between current methods, and provide a coherent instruction of the whole process of designing smart homes. This article reviewed relevant papers within databases, such as Scopus, including journal papers published in between 2010 and 2019. These papers were then analyzed in terms of bibliography and content to identify more related systems, practices, and contributors. A designed systematic review method was used to identify and select the relevant papers, which were then reviewed for their content by means of coding. The presented systematic critical review focuses on systems developed and technologies used for smart homes. The main question is ”What has been learned from a decade trailing smart system developments in different fields?”. We found that there is a considerable gap in the integration of AI and IoT and the use of geospatial data in smart home development. It was also found that there is a large gap in the literature in terms of limited integrated systems for energy efficiency and aged care system development. This article would enable researchers and professionals to fully understand those gaps in IoT-based environments and suggest ways to fill the gaps while designing smart homes where users have a higher level of thermal comfort while saving energy and greenhouse gas emissions. This article also raised new challenging questions on how IoT and existing developed systems could be improved and be further developed to address other issues of energy saving, which can steer the research direction to full smart systems. This would significantly help to design fully automated assistive systems to improve quality of life and decrease energy consumption.


2017 ◽  
Vol 13 (8) ◽  
pp. 155014771772868 ◽  
Author(s):  
Tri-Hai Nguyen ◽  
Myungsik Yoo

The Internet of Things is a network of physical devices consisting of embedded systems and sensors that interact with each other and connect to the Internet, and the quick growth of the Internet of Things industry has resulted in complex inter-networking on the Internet. Software-defined networking is a recent advance in computer networking that redefines the network paradigm for future communication, and the advantages of software-defined networking can also be applied to Internet of Things, namely as software-defined Internet of Things. In this article, we investigate the vulnerability of the software-defined Internet of Things platform device manager, which monitors the connected Internet of Things devices in the network. Although being the one that performs one of the most crucial services, the device managers in current primary controllers have a big security issue as they do not include any device verification, authentication, or authorization routines. Consequently, the device manager accepts all the changes of device information made by other devices, which leads to potential attacks as demonstrated in this article. To address this problem, a comprehensive and lightweight countermeasure is proposed and its effectiveness is verified through experiments.


Sign in / Sign up

Export Citation Format

Share Document