scispace - formally typeset
Search or ask a question

Showing papers on "Home automation published in 2020"


Journal ArticleDOI
TL;DR: An in-depth survey of state-of-the-art proposals having 5G-enabled IoT as a backbone for blockchain-based industrial automation for the applications such as-Smart city, Smart Home, Healthcare 4.0, Smart Agriculture, Autonomous vehicles and Supply chain management is presented.

366 citations


Journal ArticleDOI
TL;DR: A new secure remote user authentication scheme for a smart home environment that is efficient for resource-constrained smart devices with limited resources as it uses only one-way hash functions, bitwise XOR operations and symmetric encryptions/decryptions.
Abstract: The Information and Communication Technology (ICT) has been used in wide range of applications, such as smart living, smart health and smart transportation. Among all these applications, smart home is most popular, in which the users/residents can control the operations of the various smart sensor devices from remote sites also. However, the smart devices and users communicate over an insecure communication channel, i.e., the Internet. There may be the possibility of various types of attacks, such as smart device capture attack, user, gateway node and smart device impersonation attacks and privileged-insider attack on a smart home network. An illegal user, in this case, can gain access over data sent by the smart devices. Most of the existing schemes reported in the literature for the remote user authentication in smart home environment are not secure with respect to the above specified attacks. Thus, there is need to design a secure remote user authentication scheme for a smart home network so that only authorized users can gain access to the smart devices. To mitigate the aforementioned isses, in this paper, we propose a new secure remote user authentication scheme for a smart home environment. The proposed scheme is efficient for resource-constrained smart devices with limited resources as it uses only one-way hash functions, bitwise XOR operations and symmetric encryptions/decryptions. The security of the scheme is proved using the rigorous formal security analysis under the widely-accepted Real-Or-Random (ROR) model. Moreover, the rigorous informal security analysis and formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool is also done. Finally, the practical demonstration of the proposed scheme is also performed using the widely-accepted NS-2 simulation.

253 citations


Journal ArticleDOI
TL;DR: In this paper, the authors investigated an energy cost minimization problem for a smart home in the absence of a building thermal dynamics model with the consideration of a comfortable temperature range, and proposed an energy management algorithm based on deep deterministic policy gradients.
Abstract: In this article, we investigate an energy cost minimization problem for a smart home in the absence of a building thermal dynamics model with the consideration of a comfortable temperature range. Due to the existence of model uncertainty, parameter uncertainty (e.g., renewable generation output, nonshiftable power demand, outdoor temperature, and electricity price), and temporally coupled operational constraints, it is very challenging to design an optimal energy management algorithm for scheduling heating, ventilation, and air conditioning systems and energy storage systems in the smart home. To address the challenge, we first formulate the above problem as a Markov decision process, and then propose an energy management algorithm based on deep deterministic policy gradients. It is worth mentioning that the proposed algorithm does not require the prior knowledge of uncertain parameters and building the thermal dynamics model. The simulation results based on real-world traces demonstrate the effectiveness and robustness of the proposed algorithm.

213 citations


Journal ArticleDOI
TL;DR: Passban is presented, an intelligent intrusion detection system (IDS) able to protect the IoT devices that are directly connected to it that can be deployed directly on very cheap IoT gateways, taking full advantage of the edge computing paradigm to detect cyber threats as close as possible to the corresponding data sources.
Abstract: Cyber-threat protection is today’s one of the most challenging research branches of information technology, while the exponentially increasing number of tiny, connected devices able to push personal data to the Internet is doing nothing but exacerbating the battle between the involved parties. Thus, this protection becomes crucial with a typical Internet-of-Things (IoT) setup, as it usually involves several IoT-based data sources interacting with the physical world within various application domains, such as agriculture, health care, home automation, critical industrial processes, etc. Unfortunately, contemporary IoT devices often offer very limited security features, laying themselves open to always new and more sophisticated attacks and also inhibiting the expected global adoption of IoT technologies, not to mention millions of IoT devices already deployed without any hardware security support. In this context, it is crucial to develop tools able to detect such cyber threats. In this article, we present Passban, an intelligent intrusion detection system (IDS) able to protect the IoT devices that are directly connected to it. The peculiarity of the proposed solution is that it can be deployed directly on very cheap IoT gateways (e.g., single-board PCs currently costing few tens of U.S. dollars), hence taking full advantage of the edge computing paradigm to detect cyber threats as close as possible to the corresponding data sources. We will demonstrate that Passban is able to detect various types of malicious traffic, including Port Scanning, HTTP and SSH Brute Force, and SYN Flood attacks with very low false positive rates and satisfactory accuracies.

204 citations


Journal ArticleDOI
TL;DR: The existing wireless sensing systems are surveyed in terms of their basic principles, techniques and system structures to describe how the wireless signals could be utilized to facilitate an array of applications including intrusion detection, room occupancy monitoring, daily activity recognition, gesture recognition, vital signs monitoring, user identification and indoor localization.
Abstract: With the advancement of wireless technologies and sensing methodologies, many studies have shown the success of re-using wireless signals (e.g., WiFi) to sense human activities and thereby realize a set of emerging applications, ranging from intrusion detection, daily activity recognition, gesture recognition to vital signs monitoring and user identification involving even finer-grained motion sensing. These applications arguably can brace various domains for smart home and office environments, including safety protection, well-being monitoring/management, smart healthcare and smart-appliance interaction. The movements of the human body impact the wireless signal propagation (e.g., reflection, diffraction and scattering), which provide great opportunities to capture human motions by analyzing the received wireless signals. Researchers take the advantage of the existing wireless links among mobile/smart devices (e.g., laptops, smartphones, smart thermostats, smart refrigerators and virtual assistance systems) by either extracting the ready-to-use signal measurements or adopting frequency modulated signals to detect the frequency shift. Due to the low-cost and non-intrusive sensing nature, wireless-based human activity sensing has drawn considerable attention and become a prominent research field over the past decade. In this paper, we survey the existing wireless sensing systems in terms of their basic principles, techniques and system structures. Particularly, we describe how the wireless signals could be utilized to facilitate an array of applications including intrusion detection, room occupancy monitoring, daily activity recognition, gesture recognition, vital signs monitoring, user identification and indoor localization. The future research directions and limitations of using wireless signals for human activity sensing are also discussed.

185 citations


Journal ArticleDOI
TL;DR: A new lightweight authentication mechanism in cloud-based IoT environment, called LAM-CIoT, which offers better security, and low communication and computation overheads as compared to the closely related authentication schemes.

166 citations


Journal ArticleDOI
TL;DR: An industry-led case study demonstrates how to turn conventional appliances to smart products and systems (SPS) by utilising the state-of-the-art Industry 4.0 technologies.

163 citations


Journal ArticleDOI
TL;DR: A smart floor monitoring system through the integration of self-powered triboelectric floor mats and deep learning-based data analytics is shown, establishing the foundation using floor as the functional interface for diverse applications in smart building/home, e.g., intelligent automation, healthcare, and security.
Abstract: Toward smart building and smart home, floor as one of our most frequently interactive interfaces can be implemented with embedded sensors to extract abundant sensory information without the video-taken concerns. Yet the previously developed floor sensors are normally of small scale, high implementation cost, large power consumption, and complicated device configuration. Here we show a smart floor monitoring system through the integration of self-powered triboelectric floor mats and deep learning-based data analytics. The floor mats are fabricated with unique “identity” electrode patterns using a low-cost and highly scalable screen printing technique, enabling a parallel connection to reduce the system complexity and the deep-learning computational cost. The stepping position, activity status, and identity information can be determined according to the instant sensory data analytics. This developed smart floor technology can establish the foundation using floor as the functional interface for diverse applications in smart building/home, e.g., intelligent automation, healthcare, and security. Designing efficient and fast monitoring and response systems for smart building/home applications remains a challenge. Here, the authors propose a smart floor monitoring system developed through the integration of self-powered triboelectric sensing mechanism and deep learning data analytics.

162 citations


Proceedings ArticleDOI
08 Jul 2020
TL;DR: A novel multi-stage privacy attack against user privacy in a smart environment utilizing state-of-the-art machine-learning approaches for detecting and identifying the types of IoT devices, their states, and ongoing user activities in a cascading style by only passively sniffing the network traffic from smart home devices and sensors is introduced.
Abstract: A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them and facilitate their living styles through the sensors already embedded in these devices. Sensor data contains a lot of sensitive information about the user and devices. However, an attacker inside or near a smart home environment can potentially exploit the innate wireless medium used by these devices to exfiltrate sensitive information from the encrypted payload (i.e., sensor data) about the users and their activities, invading user privacy. With this in mind, in this work, we introduce a novel multi-stage privacy attack against user privacy in a smart environment. It is realized utilizing state-of-the-art machine-learning approaches for detecting and identifying the types of IoT devices, their states, and ongoing user activities in a cascading style by only passively sniffing the network traffic from smart home devices and sensors. The attack effectively works on both encrypted and unencrypted communications. We evaluate the efficiency of the attack with real measurements from an extensive set of popular off-the-shelf smart home IoT devices utilizing a set of diverse network protocols like WiFi, ZigBee, and BLE. Our results show that an adversary passively sniffing the traffic can achieve very high accuracy (above 90%) in identifying the state and actions of targeted smart home devices and their users. To protect against this privacy leakage, we also propose a countermeasure based on generating spoofed traffic to hide the device states and demonstrate that it provides better protection than existing solutions.

133 citations


Journal ArticleDOI
TL;DR: Patients in self-isolation or self-quarantine can use the new platform to send daily health symptoms and challenges to doctors via their mobile phones so that improved healthy living and a comfortable lifestyle can still be achieved even during such a problematic period of the 2019 COVID-19 pandemic.

118 citations


Journal ArticleDOI
TL;DR: A blockchain-based smart home gateway network that counters possible attacks on the gateway of smart homes and is implemented on the Ethereum blockchain technology and evaluated in terms of standard security measures including security response time and accuracy.
Abstract: With the advancement of Information and Communication Technology (ICT) and the proliferation of sensor technologies, the Internet of Things (IoT) is now being widely used in smart home for the purposes of efficient resource management and pervasive sensing. In smart homes, various IoT devices are connected to each other, and these connections are centered on gateways. The role of gateways in the smart homes is significant, however, its centralized structure presents multiple security vulnerabilities such as integrity, certification, and availability. To address these security vulnerabilities, in this paper, we propose a blockchain-based smart home gateway network that counters possible attacks on the gateway of smart homes. The network consists of three layers including device, gateway, and cloud layers. The blockchain technology is employed at the gateway layer wherein data is stored and exchanged in the form blocks of blockchain to support decentralization and overcome the problem from traditional centralized architecture. The blockchain ensures the integrity of the data inside and outside of the smart home and provides availability through authentication and efficient communication between network members. We implemented the proposed network on the Ethereum blockchain technology and evaluated in terms of standard security measures including security response time and accuracy. The evaluation results demonstrate that the proposed security solutions outperforms over the existing solutions.

Proceedings ArticleDOI
01 Feb 2020
TL;DR: PINGPONG, a tool that can automatically extract packet-level signatures for device events from network traffic, is presented, showing its robustness in different settings: events triggered by local and remote smartphones, as well as by homeautomation systems.
Abstract: mart home devices are vulnerable to passive inference attacks based on network traffic, even in the presence of encryption. In this paper, we present PINGPONG, a tool that can automatically extract packet-level signatures for device events (e.g., light bulb turning ON/OFF) from network traffic. We evaluated PINGPONG on popular smart home devices ranging from smart plugs and thermostats to cameras, voice-activated devices, and smart TVs. We were able to: (1) automatically extract previously unknown signatures that consist of simple sequences of packet lengths and directions; (2) use those signatures to detect the devices or specific events with an average recall of more than 97%; (3) show that the signatures are unique among hundreds of millions of packets of real world network traffic; (4) show that our methodology is also applicable to publicly available datasets; and (5) demonstrate its robustness in different settings: events triggered by local and remote smartphones, as well as by home automation systems.

Journal ArticleDOI
TL;DR: In this paper, a secure framework for SDN-based Edge computing in IoT-enabled healthcare system is designed using a lightweight authentication scheme and the results demonstrate that the proposed framework provides better solutions for IoT- enabled healthcare systems.
Abstract: The Internet of Things (IoT) consists of resource-constrained smart devices capable to sense and process data. It connects a huge number of smart sensing devices, i.e., things, and heterogeneous networks. The IoT is incorporated into different applications, such as smart health, smart home, smart grid, etc. The concept of smart healthcare has emerged in different countries, where pilot projects of healthcare facilities are analyzed. In IoT-enabled healthcare systems, the security of IoT devices and associated data is very important, whereas Edge computing is a promising architecture that solves their computational and processing problems. Edge computing is economical and has the potential to provide low latency data services by improving the communication and computation speed of IoT devices in a healthcare system. In Edge-based IoT-enabled healthcare systems, load balancing, network optimization, and efficient resource utilization are accurately performed using artificial intelligence (AI), i.e., intelligent software-defined network (SDN) controller. SDN-based Edge computing is helpful in the efficient utilization of limited resources of IoT devices. However, these low powered devices and associated data (private sensitive data of patients) are prone to various security threats. Therefore, in this paper, we design a secure framework for SDN-based Edge computing in IoT-enabled healthcare system. In the proposed framework, the IoT devices are authenticated by the Edge servers using a lightweight authentication scheme. After authentication, these devices collect data from the patients and send them to the Edge servers for storage, processing, and analyses. The Edge servers are connected with an SDN controller, which performs load balancing, network optimization, and efficient resource utilization in the healthcare system. The proposed framework is evaluated using computer-based simulations. The results demonstrate that the proposed framework provides better solutions for IoT-enabled healthcare systems.

Journal ArticleDOI
TL;DR: Simulation results show that the proposed appliances scheduling approach can smooth the power consumption profile and minimise the electricity cost while considering user’s preferences, user's feedbacks on each action taken and his/her preference settings.
Abstract: As energy demand continues to increase, demand response (DR) programs in the electricity distribution grid are gaining momentum and their adoption is set to grow gradually over the years ahead. Demand response schemes seek to incentivise consumers to use green energy and reduce their electricity usage during peak periods which helps support grid balancing of supply-demand and generate revenue by selling surplus of energy back to the grid. This paper proposes an effective energy management system for residential demand response using Reinforcement Learning (RL) and Fuzzy Reasoning (FR). RL is considered as a model-free control strategy which learns from the interaction with its environment by performing actions and evaluating the results. The proposed algorithm considers human preference by directly integrating user feedback into its control logic using fuzzy reasoning as reward functions. Q-learning, a RL strategy based on a reward mechanism, is used to make optimal decisions to schedule the operation of smart home appliances by shifting controllable appliances from peak periods, when electricity prices are high, to off-peak hours, when electricity prices are lower without affecting the customer’s preferences. The proposed approach works with a single agent to control 14 household appliances and uses a reduced number of state-action pairs and fuzzy logic for rewards functions to evaluate an action taken for a certain state. The simulation results show that the proposed appliances scheduling approach can smooth the power consumption profile and minimise the electricity cost while considering user’s preferences, user’s feedbacks on each action taken and his/her preference settings. A user-interface is developed in MATLAB/Simulink for the Home Energy Management System (HEMS) to demonstrate the proposed DR scheme. The simulation tool includes features such as smart appliances, electricity pricing signals, smart meters, solar photovoltaic generation, battery energy storage, electric vehicle and grid supply.

Journal ArticleDOI
TL;DR: A new home energy management system (HEMS) is proposed, which optimally schedules the operation of home energy resources, with the aim to minimize the home’s one-day electricity cost charged by the real-time pricing while taking into account the monthly basis peak power consumption penalty.
Abstract: Two-way communication facilities and advanced metering infrastructure enable residential buildings to be capable of actively participating in demand side management schemes. This paper proposes a new home energy management system (HEMS), which optimally schedules the operation of home energy resources, with the aim to minimize the home’s one-day electricity cost charged by the real-time pricing while taking into account the monthly basis peak power consumption penalty, charged by the demand charge tariff. To better ensure the user’s lifestyle requirements, the HEMS also models lifestyle-related operational dependencies of household appliances. The numerical simulations and case studies are conducted to validate the reasonability of the proposed method.

Journal ArticleDOI
02 Mar 2020-Energies
TL;DR: This work presents HEMS-IoT, a big data and machine learning-based smart home energy management system for home comfort, safety, and energy saving and presents a case study where a smart home is monitored to ensure comfort and safety and reduce energy consumption.
Abstract: Energy efficiency has aroused great interest in research worldwide, because energy consumption has increased in recent years, especially in the residential sector. The advances in energy conversion, along with new forms of communication, and information technologies have paved the way for what is now known as smart homes. The Internet of Things (IoT) is the convergence of various heterogeneous technologies from different application domains that are used to interconnect things through the Internet, thus allowing for the detection, monitoring, and remote control of multiple devices. Home automation systems (HAS) combined with IoT, big data technologies, and machine learning are alternatives that promise to contribute to greater energy efficiency. This work presents HEMS-IoT, a big data and machine learning-based smart home energy management system for home comfort, safety, and energy saving. We used the J48 machine learning algorithm and Weka API to learn user behaviors and energy consumption patterns and classify houses with respect to energy consumption. Likewise, we relied on RuleML and Apache Mahout to generate energy-saving recommendations based on user preferences to preserve smart home comfort and safety. To validate our system, we present a case study where we monitor a smart home to ensure comfort and safety and reduce energy consumption.

Journal ArticleDOI
TL;DR: In this paper, a home energy management optimization strategy is proposed based on deep Q-learning (DQN) and double deep Q (DDQ) to perform scheduling of home energy appliances and the effectiveness of applied data-driven methods is validated by using a real-world database combined with the household energy storage model.
Abstract: With the development of a smart grid and smart home, massive amounts of data can be made available, providing the basis for algorithm training in artificial intelligence applications. These continuous improving conditions are expected to enable the home energy management system (HEMS) to cope with the increasing complexities and uncertainties in the enduser side of the power grid system. In this paper, a home energy management optimization strategy is proposed based on deep Q-learning (DQN) and double deep Q-learning (DDQN) to perform scheduling of home energy appliances. The applied algorithms are model-free and can help the customers reduce electricity consumption by taking a series of actions in response to a dynamic environment. In the test, the DDQN is more appropriate for minimizing the cost in a HEMS compared to DQN. In the process of method implementation, the generalization and reward setting of the algorithms are discussed and analyzed in detail. The results of this method are compared with those of Particle Swarm Optimization (PSO) to validate the performance of the proposed algorithm. The effectiveness of applied data-driven methods is validated by using a real-world database combined with the household energy storage model.

Journal ArticleDOI
10 Apr 2020-Sensors
TL;DR: A two-level DRL framework is proposed where home appliances are scheduled according to the consumer’s preferred appliance scheduling and comfort level, while the charging and discharging schedules of ESS and EV are calculated at the second level using the optimal solution from the first level along with the consumer environmental characteristics.
Abstract: This paper presents a hierarchical deep reinforcement learning (DRL) method for the scheduling of energy consumptions of smart home appliances and distributed energy resources (DERs) including an energy storage system (ESS) and an electric vehicle (EV). Compared to Q-learning algorithms based on a discrete action space, the novelty of the proposed approach is that the energy consumptions of home appliances and DERs are scheduled in a continuous action space using an actor-critic-based DRL method. To this end, a two-level DRL framework is proposed where home appliances are scheduled at the first level according to the consumer's preferred appliance scheduling and comfort level, while the charging and discharging schedules of ESS and EV are calculated at the second level using the optimal solution from the first level along with the consumer environmental characteristics. A simulation study is performed in a single home with an air conditioner, a washing machine, a rooftop solar photovoltaic system, an ESS, and an EV under a time-of-use pricing. Numerical examples under different weather conditions, weekday/weekend, and driving patterns of the EV confirm the effectiveness of the proposed approach in terms of total cost of electricity, state of energy of the ESS and EV, and consumer preference.

Journal ArticleDOI
TL;DR: The proposed speech recognition system is flexible with scalability and availability in adapting to existing smart IoT devices, and it provides privacy in managing patient devices.
Abstract: This paper presents an effective solution based on speech recognition to provide elderly people, patients and disabled people with an easy control system. The goal is to build a low-cost system based on speech recognition to easily access Internet of Things (IoT) devices installed in smart homes and hospitals without relying on a centralized supervisory system. The proposed system used a Raspberry Pi board to control home appliances through wireless with smartphones. The main purpose of this system is to facilitate interactions between the user and home appliances through IoT communications based on speech commands. The proposed framework contribution uses a hybrid Support Vector Machine (SVM) with a Dynamic Time Warping (DTW) algorithm to enhance the speech recognition process. The proposed solution is a machine learning-based system for controlling smart devices through speech commands with an accuracy of 97%. The results helped patients and elderly people to access and control IoT devices that are compatible with our system using speech recognition. The proposed speech recognition system is flexible with scalability and availability in adapting to existing smart IoT devices, and it provides privacy in managing patient devices. The research provides an effective method to integrate our systems among medical institutions to help elderly people and patients.

Journal ArticleDOI
TL;DR: This method models user behavior as sequences of user events including operation of home IoT devices and other monitored activities, and generates multiple event sequences by removing some events and learning the frequently observed sequences.
Abstract: As several home appliances, such as air conditioners, heaters, and refrigerators, were connecting to the Internet, they became targets of cyberattacks, which cause serious problems such as compromising safety and even harming users. We have proposed a method to detect such attacks based on user behavior. This method models user behavior as sequences of user events including operation of home IoT (Internet of Things) devices and other monitored activities. Considering users behave depending on the condition of the home such as time and temperature, our method learns event sequences for each condition. To mitigate the impact of events of other users in the home included in the monitored sequence, our method generates multiple event sequences by removing some events and learning the frequently observed sequences. For evaluation, we constructed an experimental network of home IoT devices and recorded time data for four users entering/leaving a room and operating devices. We obtained detection ratios exceeding 90% for anomalous operations with less than 10% of misdetections when our method observed event sequences related to the operation. In this article, we also discuss the effectiveness of our method by comparing with a method learning users’ behavior by Hidden Markov Models.

Journal ArticleDOI
TL;DR: Assessment of smart home technologies ought to guide future innovation patterns, technology deployment, and policy activity relating to smart homes, especially insofar as they can deliver energy services more affordably or help meeting carbon mitigation priorities.

Journal ArticleDOI
TL;DR: The results show that the configuration of PESS is beneficial to the optimal scheduling of household appliances and the peak load and electricity cost of scheme 4 is decreased, and Pareto solutions distribution are more uniform, which can provide more scheduling choices for residential users.

Proceedings ArticleDOI
01 Apr 2020
TL;DR: A measurement study of smart home IoT devices in the wild by instrumenting home gateways and passively collecting real-world network traffic logs from more than 200 homes across a large metropolitan area in the United States, which reveals that it is mostly centralized due to its reliance on a few popular cloud and DNS services.
Abstract: As the smart home IoT ecosystem flourishes, it is imperative to gain a better understanding of the unique challenges it poses in terms of management, security, and privacy. Prior studies are limited because they examine smart home IoT devices in testbed environments or at a small scale. To address this gap, we present a measurement study of smart home IoT devices in the wild by instrumenting home gateways and passively collecting real-world network traffic logs from more than 200 homes across a large metropolitan area in the United States. We characterize smart home IoT traffic in terms of its volume, temporal patterns, and external endpoints along with focusing on certain security and privacy concerns. We first show that traffic characteristics reflect the functionality of smart home IoT devices such as smart TVs generating high volume traffic to content streaming services following diurnal patterns associated with human activity. While the smart home IoT ecosystem seems fragmented, our analysis reveals that it is mostly centralized due to its reliance on a few popular cloud and DNS services. Our findings also highlight several interesting security and privacy concerns in smart home IoT ecosystem such as the need to improve policy-based access control for IoT traffic, lack of use of application layer encryption, and prevalence of third-party advertising and tracking services. Our findings have important implications for future research on improving management, security, and privacy of the smart home IoT ecosystem.

Journal ArticleDOI
TL;DR: A new Human Activity Recognition based on Improved Bayesian Convolution Network (IBCN) has been proposed which allows each smart system to download data via either traditional Radio Frequency (RF) communication or low power back dispersion communications with cloud assistance.
Abstract: In the current scenario, it is significant to design active learning paradigms for analyzing human activities using Wearable Internet of Things (W-IoT) sensors for health parameter analysis. Further, in the healthcare sector, data collection using decision-making tools uses wearable sensors for monitoring using Cloud assisted Internet of Things (IoT). Although several conventional algorithms and deep learning models show promising results in sensor data analysis for recognizing human behaviors, the evaluation of their ambiguity in decision-making is still difficult and several conventional systems are more complex. Due to the restricted computing capacity, low-power W-IoT devices need an optimized network to manage the healthcare data effectively and efficiently for reliable analysis. Hence, a new Human Activity Recognition based on Improved Bayesian Convolution Network (IBCN)has been proposed which allows each smart system to download data via either traditional Radio Frequency (RF) communication or low power back dispersion communications with cloud assistance. In IBCN, A distribution of the model’s latent variable is designed and the features are extracted using convolution layers, the performance of the W-IoT has been improved by combining a variable autoencoder with a standard deep net classifier. Furthermore, the Bayesian network helps to address the security issues using Enhanced deep learning (EDL) design with an effective offloading strategy. The experimental results show that the data collected from the wearable IoT sensor is sensitive to various sources of uncertainty, i.e. aleatoric and epistemic, as especially named noise and reliability. Furthermore, lab-scale experimental analysis on patient’s health data classification accuracy has been considerably developed using IBCN than conventional design as namedCognitive radio (CR) learning, deep learning-based sensor activity recognition (DL-SAR) and Cloud-assisted Agent-based Smart home Environment (CASE).

Journal ArticleDOI
TL;DR: Internet of things (IoT) Based home automation system is designed for old and disabled people and can be used as a recommendation system for old people as well as physically impaired people those who didn’t do their work independently and easily.
Abstract: Smart home automation system is the current and upcoming trending technology in the market which makes life simpler and easier to control. Internet of things (IoT) Based home automation system is designed for old and disabled people. This system design is not only using IoT technology but also using the feature of artificial intelligence (AI) as well as cloud. Due to this advancement people get an assistant to manage home and their needs, based on the commands they told them to do. The main control system using wireless communication technology is to provide remote access from tablet or Smartphone. Here, natural language processing (NLP) plays a vital role since it acts as an interface between human interaction and machines. Through NLP users can either command or control devices at home even though disabled persons command or request varies from presets. Home controls like door monitoring, home appliances monitoring, and bed movement monitoring will be assisted through IoT which in turn is controlled by AI and the information is stored in the cloud. All the controls of the home are thrown at AI. The user assists all the IoT functions using voice control and all related information is sent to the cloud. Predictions can be done through a predictive engine which in turn can be used in the near future. This work can be used as a recommendation system for old people as well as physically impaired people those who didn’t do their work independently and easily.

Journal ArticleDOI
01 Mar 2020
TL;DR: A new scheme for user authentication that combines physical context awareness and transaction history is proposed and offers two advantages: it does not maintain a verification table and avoids clock synchronization problem.
Abstract: Smart home technology is an emerging application of Internet-of-Things (IoT) where the user can remotely control home devices. Since the user/home communication channel is insecure, an efficient and anonymous authentication scheme is required to provide secure communications in smart home environment. In this paper, we propose a new scheme for user authentication that combines physical context awareness and transaction history. The new scheme offers two advantages: it does not maintain a verification table and avoids clock synchronization problem . Communication overhead and computational cost of the proposed scheme are analyzed and compared with other related schemes. The security of the scheme is evaluated using three different methods: (1) formal analysis using the Burrows-Abadi-Needham logic (BAN); (2) informal analysis; (3) model check using the automated validation of internet security protocols and applications (AVISPA) tool.

Journal ArticleDOI
15 Jun 2020
TL;DR: This work crowdsource the largest known dataset of labeled network traffic from smart home devices from within real-world home networks, and finds widespread cross-border communications between devices and Internet services that are located in countries with potentially poor privacy practices.
Abstract: The proliferation of smart home devices has created new opportunities for empirical research in ubiquitous computing, ranging from security and privacy to personal health. Yet, data from smart home deployments are hard to come by, and existing empirical studies of smart home devices typically involve only a small number of devices in lab settings. To contribute to data-driven smart home research, we crowdsource the largest known dataset of labeled network traffic from smart home devices from within real-world home networks. To do so, we developed and released IoT Inspector, an open-source tool that allows users to observe the traffic from smart home devices on their own home networks. Between April 10, 2019 and January 21, 2020, 5,404 users have installed IoT Inspector, allowing us to collect labeled network traffic from 54,094 smart home devices. At the time of publication, IoT Inspector is still gaining users and collecting data from more devices. We demonstrate how this data enables new research into smart homes through two case studies focused on security and privacy. First, we find that many device vendors, including Amazon and Google, use outdated TLS versions and send unencrypted traffic, sometimes to advertising and tracking services. Second, we discover that smart TVs from at least 10 vendors communicated with advertising and tracking services. Finally, we find widespread cross-border communications, sometimes unencrypted, between devices and Internet services that are located in countries with potentially poor privacy practices. To facilitate future reproducible research in smart homes, we will release the IoT Inspector data to the public.

Journal ArticleDOI
TL;DR: A simple secure smart home framework based on a refined version of blockchain called Consortium blockchain is described and highlighted, which highlights the limitations and opportunities of adopting such an architecture.
Abstract: Smart Home automation is increasingly gaining popularity among current applications of Internet of Things (IoT) due to the convenience and facilities it provides to the home owners. Sensors are employed within the home appliances via wireless connectivity to be accessible remotely by home owners to operate these devices. With the exponential increase of smart home IoT devices in the marketplace such as door locks, light bulbs, power switches etc, numerous security concerns are arising due to limited storage and processing power of such devices, making these devices vulnerable to several attacks. Due to this reason, security implementations in the deployment of these devices has gained popularity among researchers as a critical research area. Moreover, the adoption of traditional security schemes has failed to address the unique security concerns associated with these devices. Blockchain, a decentralised database based on cryptographic techniques, is gaining enormous attention to assure security of IoT systems. The blockchain framework within an IoT system is a fascinating substitute to the traditional centralised models, which has some significant concerns in fulfilling the demand of smart homes security. In this article, we aim to examine the security of smart homes by instigating the adoption of blockchain and exploring some of the currently proposed smart home architectures using blockchain technology. To present our findings, we describe a simple secure smart home framework based on a refined version of blockchain called Consortium blockchain. We highlight the limitations and opportunities of adopting such an architecture. We further evaluate our model and conclude with the results by designing an experimental testbed using a few household IoT devices commonly available in the marketplace.

Book ChapterDOI
01 Jan 2020
TL;DR: This chapter gives detailed study about the different applications of IoT with the integration of WSN (wireless sensor networks) with Internet connectivity, which allows applications to communicate among themselves and users on a global scale.
Abstract: The Internet of Things (IoT) represents the physical world of devices and objects connected over the network using wireless sensors. This chapter gives detailed study about the different applications of IoT with the integration of WSN (wireless sensor networks) with Internet connectivity. This allows applications to communicate among themselves and users on a global scale. A large number of IoT applications, like smart home, buildings, transport, water management, healthcare, agriculture, environment and industries, together form the smart city. Along with this, various challenges in the implementation of applications are discussed related to the reliability, sustainability, and efficiency. An open architecture looking into current need of IoT is also proposed and discussed.

Journal ArticleDOI
TL;DR: In this article, there is little evidence that smart home technologies will reduce home energy use overall, and there are a range of emerging detrimental social impacts that require further attention from researchers, policymakers and practitioners.
Abstract: The smart home technology industry promises energy savings and lifestyle improvements. However, there is little evidence that smart home technologies will reduce home energy use overall, and there are a range of emerging detrimental social impacts that require further attention from researchers, policymakers and practitioners.