scholarly journals Assessment of Smart Home Assistants as an IoT

Author(s):  
Ahmed J. Obaid

A smart home personal assistant technology is an intrinsic system, which incorporates many elements such as users, Smart Home Personal Assistants (SPA) devices, cloud, skill provider and other responsive devices. Even though Smart Home Personal Assistants give a robust security and privacy options, the devices face many weaknesses, which make the system vulnerable and can be comprised by adversaries, who can capitalize on limitations to gain access to delicate information and privacy of users. In this research, the aim is to assess how invention and innovation of security and SPA can be harnessed by users to interrelate with the system. Subsequently, this write-up will address both the problems related to the system and attempt to bring in solutions, which makes the technology more adaptable and versatile to all users. Initial studies show that some of the weakness underlying the technology include the open-nature of the voice channel, complexity of the architecture, software implications, and the utility of the technology to less proficient users. As a result, the study anticipates at solving the voice squatting attack, using the SPA intelligent assistant, incorporating a filer to filter the ultrasonic attack and noise as well as trying to assess the efficacy of the elements developed against the voice squatting attacks. The study found out that there is a need to mitigate the attacks on the blockchain technology and Natural Language Processors (NLP) to assure protection of SPA from attacks.

Author(s):  
Geetha V. ◽  
Gomathy C K ◽  
Manasa Sri Vardhan Kottamasu ◽  
Nukala Pavan Kumar

Personal Assistants, or conversational interfaces, or chat bots reinvent a new way for individuals to interact with computes. A Personal Virtual Assistant allows a user to simply ask questions in the same manner that they would address a human, and are even capable of doing some basic tasks like opening apps, reading out news, taking notes etc., with just a voice command. Personal Assistants like Google Assistant, Alexa, Siri works by Speech Recognition (Speech-to-text) and Text-to-Speech.


Author(s):  
Ch. V. Tejaswi

This is desktop application which can assist people with basic tasks using natural language. Virtual Voice Assistants can go online and search for an answer to a user’s question. Actions can be triggered using text or voice. Voice is the key. A virtual voice assistant is a personal assistant which uses natural language processing (NLP) , voice recognition and speech synthesis to provide a service through a particular application. Natural Language Processing in short is called as NLP. It is basically a branch of artificial intelligence which mainly deals with the interaction between personal computers and human beings using the natural language. The main objective of NLP is to read, convert, understand, and make use of the human languages in a manner that is valuable. Voice recognition is a hardware device or computer software program with the potential to decode the voice of human beings. Voice recognition is usually used to operate a gadget, execute commands, or write without making use of any mouse, keyboard, or press any buttons. Artificial production of human speech is called as Speech Synthesis. A system used for this purpose is called a speech computer or speech synthesizer and can be implemented in many products of software’s and hardware’s.


i-com ◽  
2019 ◽  
Vol 18 (3) ◽  
pp. 197-216 ◽  
Author(s):  
Verena Zimmermann ◽  
Paul Gerber ◽  
Karola Marky ◽  
Leon Böck ◽  
Florian Kirchbuchner

AbstractSmart Home technologies have the potential to increase the quality of life, home security and facilitate elderly care. Therefore, they require access to a plethora of data about the users’ homes and private lives. Resulting security and privacy concerns form a relevant barrier to adopting this promising technology. Aiming to support end users’ informed decision-making through addressing the concerns we first conducted semi-structured interviews with 42 potential and little-experienced Smart Home users. Their diverse concerns were clustered into four themes that center around attacks on Smart Home data and devices, the perceived loss of control, the trade-off between functionality and security, and user-centric concerns as compared to concerns on a societal level. Second, we discuss measures to address the four themes from an interdisciplinary perspective. The paper concludes with recommendations for addressing user concerns and for supporting developers in designing user-centered Smart Home technologies.


2020 ◽  
Vol 53 (6) ◽  
pp. 1-36
Author(s):  
Jide S. Edu ◽  
Jose M. Such ◽  
Guillermo Suarez-Tangil

Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1787
Author(s):  
Ezedin Barka ◽  
Sofiane Dahmane ◽  
Chaker Abdelaziz Kerrache ◽  
Mohamad Khayat ◽  
Farag Sallabi

Healthcare professionals and scholars have emphasized the need for IoT-based remote health monitoring services to track the health of the elderly. Such systems produce a large amount of data, necessitating the security and privacy of that data. On the other hand, Software Defined Networking (SDN) integration could be seen as a good solution to guarantee both flexibility and efficiency of the network which is even more important in the case of healthcare monitoring. Furthermore, Blockchain has recently been proposed as a game-changing tool that can be integrated into the Internet of Things (IoT) to have the optimal level of security and privacy. However, incorporating Blockchain into IoT networks, which rely heavily on patients’ health sensors, is extremely difficult. In this paper, a secure Healthcare Monitoring System (HMS) is proposed with a focus on trust management issues. The architecture seeks to protect multiple healthcare monitoring system components and preserves patient privacy by developing a security interface where separate security modules can be integrated to run side by side to ensure reliable HMS. The security framework architecture we propose takes advantage of the blockchain technology as a secure and timely information back-end. STHM is a proposal that uses Software-Defined Networking (SDN) as the communication medium that allows users to access SDN’s different functional and security technologies and services. Simulation results show that the use of Blockchain for the SDN-based healthcare monitoring can ensure the desired flexibility and security for a very lightweight additional overhead.


Author(s):  
Muthu Ramachandran

Cyber-physical systems (CPS) have emerged to address the need for more efficient integration of modern advancement in cyber and wireless communications technologies such as 5G with physical objects. In addition, CPSs systems also needed to efficient control of security and privacy when we compare them with internet of things (IoT). In recent years, we experienced lack of security concerns with smart home IoT applications such as home security camera, etc. Therefore, this paper proposes a systematic software engineering framework for CPS and IoT systems. This paper also proposed a comprehensive requirements engineering framework for CPS-IoT applications which can also be specified using BPMN modelling and simulation to verify and validate CPS-IoT requirements with smart contracts. In this context, one of the key contribution of this paper is the innovative and generic requirements classification model for CPS-IoT application services, and this can also be applied to other emerging technologies such as fog, edge, cloud, and blockchain computing.


Author(s):  
Muhammad Elsayeh ◽  
Kadry Ali Ezzat ◽  
Hany El-Nashar ◽  
Lamia Nabil Omran

The internet of medical things (IoMT) has a great role in improving the health around the world. IoMT is having a great impact in our life in which the clinical data of the patient is observed and checked and then can be transferred to the third party for using in the future such as the cloud. IoMT is a huge data system with a continuous developing rate, which implies that we should keep a lot of data secure. We propose a combined security architecture that fuses the standard architecture and new blockchain technology. Blockchain is a temper digital ledger which gives peer-to-peer communication and provides communication between non-trust individuals. Using standard in-depth strategy and blockchain, we are able to develop a method to collect vital signs data from IoMT and connected devices and use blockchain to store and retrieve the collected data in a secure and decentralized fashion within a closed system, suitable for healthcare providers such as private clinics, hospitals, and healthcare organizations were sharing data with each other is required. Right now initially examine the innovation behind Blockchain then propose IoMT-based security architecture utilizing Blockchain to guarantee the security of information transmission between associated nodes. Experimental analysis shows that the proposed scheme presents a non-significant overhead; yet it brings major advantages to meet the standard security and privacy requirements in IoMT.


Sign in / Sign up

Export Citation Format

Share Document