scispace - formally typeset
Search or ask a question
Topic

Home automation

About: Home automation is a research topic. Over the lifetime, 12379 publications have been published within this topic receiving 150711 citations. The topic is also known as: smart home & domotics.


Papers
More filters
Proceedings ArticleDOI
13 Mar 2017
TL;DR: This paper shows that the proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability, and presents simulation results to highlight that the overheads are insignificant relative to its security and privacy gains.
Abstract: Internet of Things (IoT) security and privacy remain a major challenge, mainly due to the massive scale and distributed nature of IoT networks. Blockchain-based approaches provide decentralized security and privacy, yet they involve significant energy, delay, and computational overhead that is not suitable for most resource-constrained IoT devices. In our previous work, we presented a lightweight instantiation of a BC particularly geared for use in IoT by eliminating the Proof of Work (POW) and the concept of coins. Our approach was exemplified in a smart home setting and consists of three main tiers namely: cloud storage, overlay, and smart home. In this paper we delve deeper and outline the various core components and functions of the smart home tier. Each smart home is equipped with an always online, high resource device, known as “miner” that is responsible for handling all communication within and external to the home. The miner also preserves a private and secure BC, used for controlling and auditing communications. We show that our proposed BC-based smart home framework is secure by thoroughly analysing its security with respect to the fundamental security goals of confidentiality, integrity, and availability. Finally, we present simulation results to highlight that the overheads (in terms of traffic, processing time and energy consumption) introduced by our approach are insignificant relative to its security and privacy gains.

1,340 citations

Patent
31 Jan 1989
TL;DR: In this paper, a system for and a method of providing an expandable home automation controller is disclosed which supports multiple numbers and multiple different types of data communications with both appliances and subsystems within the home as well as systems external to the home.
Abstract: A system for and a method of providing an expandable home automation controller is disclosed which supports multiple numbers and multiple different types of data communications with both appliances and subsystems within the home as well as systems external to the home. The system is based upon a central processor, such as a microprocessor-based computer, and is connected by means of a data bus to control the various products and subsystems within a home or commercial building, such as lighting systems, security systems, various sensors, multiple external terminals, as well as to allow for the input of commands by a variety of means such as touchscreens, voice recognition systems, telephones, custom switches or any device capable of providing an input to a computer system. The system functions can be readily controlled by the user utilizing a high resolution graphics display and associated touchscreen interface.

1,080 citations

Journal ArticleDOI
TL;DR: A holistic framework which incorporates different components from IoT architectures/frameworks proposed in the literature, in order to efficiently integrate smart home objects in a cloud-centric IoT based solution is proposed.

1,003 citations

Journal ArticleDOI
TL;DR: A Service-Oriented Context-Aware Middleware architecture for the building and rapid prototyping of context-aware services and a formal context model based on ontology using Web Ontology Language to address issues including semantic representation, context reasoning, context classification and dependency are proposed.

954 citations

Journal ArticleDOI
TL;DR: The basic protocol is described, with details given on the three major component protocols: agent advertisement, registration, and tunneling, and the current problems facing mobile IP are discussed.
Abstract: Mobile IP has been designed within the Internet Engineering Task Force (IETF) to serve the needs of the burgeoning population of mobile computer users who wish to connect to the Internet and maintain communications as they move from place to place. The basic protocol is described, with details given on the three major component protocols: agent advertisement, registration, and tunneling. Then route optimization procedures are outlined, and further topics of current interest are described. The available tunneling mechanisms are shown, which the home agent uses to forward datagrams from the home network to the mobile computer. Having covered the details of the base mobile IP specification, we then describe further protocol messages which help to decrease the inefficiency associated with inserting the home agent in the routing path of data destined for mobile computers. Finally, we summarize and discuss the current problems facing mobile IP, as well as a few areas of active protocol development.

745 citations


Network Information
Related Topics (5)
Wireless sensor network
142K papers, 2.4M citations
89% related
Wireless
133.4K papers, 1.9M citations
86% related
Wireless network
122.5K papers, 2.1M citations
86% related
Network packet
159.7K papers, 2.2M citations
84% related
User interface
85.4K papers, 1.7M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
2023354
2022761
2021610
2020989
20191,175