scholarly journals Internet of Things (IoT) of Smart Home: Privacy and Security

2019 ◽  
Vol 182 (39) ◽  
pp. 3-8 ◽  
Author(s):  
Zaied Shouran ◽  
Ahmad Ashari ◽  
Tri Kuntoro
Author(s):  
Dr. K. Sai Manoj

For privacy and security, a digital transactional record method plays a major role for its excellent nature of work. This digital method used to solve the check the problems like privacy and protection of data. It also had some unfit things like high bandwidth, computation complexity, latency and restricted scalability which are inadequate for internet of things. This research paper focuses on Efficient Lightweight Integrated Block chain model which is expanded to show the development of internet of things. Especially, this paper presents a model of a digital home which is attempted to prove the various applications used by internet of things. The benefits of this smart home are information transmission, activity of outgoing and incoming in every action. Efficient Lightweight Integrated Block chain model connected with digital transactional method with powerful provided sources to prove privacy and security. Algorithm, Certificate less Cryptography, Distributed Throughput Management schemes and Lightweight Consensus are used to present the Efficient Lightweight Integrated Block Chain model. Various methods are used to prove this model by using time processing, usage of energy and so on. This model saves 60% of time processing while consuming the energy of 0.08 Jm. Many parameters are used to show outcome done by this method.


2021 ◽  
Vol 20 (Supp01) ◽  
pp. 2140004
Author(s):  
Mohammed Imtyaz Ahmed ◽  
G. Kannan

Radio frequency is the technology which enables smart labels to things. Thus, even physical things can participate in computing process. It is becoming popular due to its technological innovation and ability to overcome line of sight problem. With Internet of Things (IoT) technology, RFID usage became ubiquitous in smart applications or IoT use the cases like smart education, smart homes, smart healthcare and smart cities to mention a few. Integration of digital and physical worlds is made possible with IoT, RFID and host of other technologies and standards. When connected devices and things are uniquely identified using RFID technology, it is essential to know its utility in authentication process and security challenges thrown as well. RFID tag and RFID reader are involved in wireless communication and identification. RFID tags may carry sensitive information and its vulnerabilities if any are exploited by adversaries. Moreover, heavy computation is involved in RFID-based authentication. To overcome issues like privacy, security and overhead improvements have been proposed as found in the literature. Researchers used cryptographic tools, hash functions and symmetric key encryption for secure RFID communications. However, the level of security is still inadequate. In this paper, we proposed a cloud-based remote RFID authentication scheme with smart home as the case study. The proposed scheme has features like forward secrecy, anonymity and untraceability besides being light weight. It can withstand various security attacks. Our simulation study revealed that the proposed system model and the cloud-based remote RFID authentication scheme are effective in providing privacy and security as part of access control system in smart home IoT use case.


2019 ◽  
Vol 01 (02) ◽  
pp. 31-39 ◽  
Author(s):  
Duraipandian M. ◽  
Vinothkanna R.

The paper proposing the cloud based internet of things for the smart connected objects, concentrates on developing a smart home utilizing the internet of things, by providing the embedded labeling for all the tangible things at home and enabling them to be connected through the internet. The smart home proposed in the paper concentrates on the steps in reducing the electricity consumption of the appliances at the home by converting them into the smart connected objects using the cloud based internet of things and also concentrates on protecting the house from the theft and the robbery. The proposed smart home by turning the ordinary tangible objects into the smart connected objects shows considerable improvement in the energy consumption and the security provision.


2021 ◽  
pp. 126908
Author(s):  
Wonyoung Choi ◽  
Jisu Kim ◽  
SangEun Lee ◽  
Eunil Park

i-com ◽  
2019 ◽  
Vol 18 (3) ◽  
pp. 197-216 ◽  
Author(s):  
Verena Zimmermann ◽  
Paul Gerber ◽  
Karola Marky ◽  
Leon Böck ◽  
Florian Kirchbuchner

AbstractSmart Home technologies have the potential to increase the quality of life, home security and facilitate elderly care. Therefore, they require access to a plethora of data about the users’ homes and private lives. Resulting security and privacy concerns form a relevant barrier to adopting this promising technology. Aiming to support end users’ informed decision-making through addressing the concerns we first conducted semi-structured interviews with 42 potential and little-experienced Smart Home users. Their diverse concerns were clustered into four themes that center around attacks on Smart Home data and devices, the perceived loss of control, the trade-off between functionality and security, and user-centric concerns as compared to concerns on a societal level. Second, we discuss measures to address the four themes from an interdisciplinary perspective. The paper concludes with recommendations for addressing user concerns and for supporting developers in designing user-centered Smart Home technologies.


Proceedings ◽  
2021 ◽  
Vol 74 (1) ◽  
pp. 1
Author(s):  
Hilal Çepik ◽  
Ömer Aydın ◽  
Gökhan Dalkılıç

With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared.


Sign in / Sign up

Export Citation Format

Share Document