Proceedings ArticleDOI
Evaluation of wireless home automation technologies
A. J. Dinusha Rathnayaka,Vidyasagar Potdar,Samitha Kuruppu +2 more
- pp 76-81
TLDR
This article presents an evaluation of these emerging wireless technologies and discusses their suitability for smart home networks.Abstract:
Introduction of Wireless Home Automation (WHA) has become a positive inspiration to the new home and renovation projects, as it increases the quality of life and comfort of the inhabitants, simultaneously facilitating energy conservation and environmental sustainability. Generally WHA networks comprise of wireless embedded sensors and actuators that intelligently interconnect with each other through a suitable wireless architecture. Many wireless technologies have been emerged recently targeting WHA, hence selecting the optimal technology is challenging. In this article, we present an evaluation of these emerging wireless technologies and discuss their suitability for smart home networks.read more
Citations
More filters
Proceedings ArticleDOI
Internet of Things (IoT) communication protocols: Review
TL;DR: This comparison aims at presenting guidelines for the researchers to be able to select the right protocol for different applications, with an emphasis on the main features and behaviors of various metrics of power consumption security spreading data rate, and other features.
Journal ArticleDOI
Internet of Things (IoT) Operating Systems Support, Networking Technologies, Applications, and Challenges: A Comparative Review
TL;DR: This review provides a detailed comparison of the OSs designed for IoT devices on the basis of their architecture, scheduling methods, networking technologies, programming models, power and memory management methods, together with other features required for IoT applications.
Journal ArticleDOI
Wireless Architectures for Heterogeneous Sensing in Smart Home Applications: Concepts and Real Implementation
TL;DR: The proposed architecture is based also on existing wireless devices and exploits, in an opportunistic way, the characteristics of wireless signals to estimate the presence, the movements, and the behaviors of inhabitants, reducing the system complexity and costs.
Journal ArticleDOI
Prosumer Communities and Relationships in Smart Grids: A Literature Review, Evolution and Future Directions
TL;DR: In this article, the authors systematically examined the literature on prosumer community based smart grid by reviewing relevant literature published from 2009 to 2018 in reputed energy and technology journals and specifically focused on two dimensions namely prosumers community groups and prosumer relationships.
Journal ArticleDOI
MAC Layer Protocols for Internet of Things: A Survey
Luiz Oliveira,Joel J. P. C. Rodrigues,Sergei A. Kozlov,Ricardo A. L. Rabelo,Victor Hugo C. de Albuquerque +4 more
TL;DR: This paper presents a deep study of medium access control (MAC) layer protocols that are used in IoT with a detailed description of such protocols grouped (by short and long distance coverage).
References
More filters
Book
UWB theory and applications
TL;DR: This paper presents UWB Channel Models, a Hierarchical Model for Modulation Schemes of Receiver Structures, and Integrated Circuit Topologies, which describe the construction of receiver structures and the role of antennas in this system.
Journal ArticleDOI
A zigbee-based home automation system
TL;DR: The proposed ZigBee based home automation system and Wi-Fi network are integrated through a common home gateway and a dedicated virtual home is implemented to cater for the system's security and safety needs.
Proceedings ArticleDOI
The 6LoWPAN architecture
TL;DR: Some of the underlying assumptions and decision points made during the development of 6LoWPAN are described and how the "stacked header" concept is applied so that in using the protocol you only have to "pay for" what you use.
Proceedings ArticleDOI
A Performance Comparison of Data Encryption Algorithms
TL;DR: It has been concluded that the Blowfish is the best performing algorithm among the algorithms chosen for implementation, and their performance is compared by encrypting input files of varying contents and sizes, on different Hardware platforms.