Security in Smart Home Development: A Review
Keywords:
Automation, Protection, Smart Home, SecurityAbstract
A clever home or structure is a modern house or construction with special organized wiring that enables residents to control or program a variety of automatic household electrical devices remotely with a single order. Traditional security systems keep intruders at bay, keeping homeowners and their valuables safe. On either hand, a smart house protection system offers a host of extra benefits. Home automation technology notifies homeowners of possible problems, allowing them to investigate. This article discusses smart houses and security, as well as a smart home security technology. Whether you give your command by voice, tv remote, or computer, the home will fulfill it. The most popular uses include light, home protection, house theater and entertainment, and temperature adjustment. Security has been a serious worry in smart home technologies.
Downloads
References
J. Sahoo, S. Mohapatra, and R. Lath, “Virtualization: A survey on concepts, taxonomy and associated security issues,” 2010, doi: 10.1109/ICCNT.2010.49.
R. J. Robles and T. Kim, “A review on security in smart home development,” Int. J. Adv. Sci. Technol., 2010. [3] N. Gupta and A. Kumar Agarwal, “Object identification using super sonic sensor: Arduino object radar,” 2018, doi: 10.1109/SYSMART.2018.8746951.
N. Mishra, P. Singhal, and S. Kundu, “Application of IoT products in smart cities of India,” 2020, doi: 10.1109/SMART50582.2020.9337150.
K. Ghirardello, C. Maple, D. Ng, and P. Kearney, “Cyber security of smart homes: Development of a reference architecture for attack surface analysis,” 2018, doi: 10.1049/cp.2018.0045.
G. Goswami and P. K. Goswami, “Artificial Intelligence based PV-Fed Shunt Active Power Filter for IOT Applications,” 2020, doi: 10.1109/SMART50582.2020.9337063.
B. Ali and A. I. Awad, “Cyber and physical security vulnerability assessment for IoT-based smart homes,” Sensors (Switzerland), 2018, doi: 10.3390/s18030817.
S. Shetty, D. Shah, G. Goyal, N. Kathuria, J. Abraham, and V. Bhatia, “A study to find the status of probiotics in New Delhi, India and review of strains of bacteria used as probiotics,” Journal of International Society of Preventive and Community Dentistry. 2014, doi: 10.4103/2231- 0762.144570.
C. Wilson, T. Hargreaves, and R. Hauxwell-Baldwin, “Benefits and risks of smart home technologies,” Energy Policy, 2017, doi: 10.1016/j.enpol.2016.12.047.
P. P. Singh, P. K. Goswami, S. K. Sharma, and G. Goswami, “Frequency reconfigurable multiband antenna for IoT applications in WLAN, Wi-max, and C-band,” Prog. Electromagn. Res. C, 2020, doi: 10.2528/pierc20022503.
C. Qu, M. Tao, and R. Yuan, “A hypergraph-based blockchain model and application in internet of things enabled smart homes,” Sensors (Switzerland), 2018, doi: 10.3390/s18092784.
T. S. Gunawan, M. H. H. Gani, F. D. A. Rahman, and M. Kartiwi, “Development of face recognition on raspberry pi for security enhancement of smart home system,” Indones. J. Electr. Eng. Informatics, 2017, doi: 10.11591/ijeei.v5i4.361.
Y. Qian et al., “Towards decentralized IoT security enhancement: A blockchain approach,” Comput. Electr. Eng., 2018, doi: 10.1016/j.compeleceng.2018.08.021.
A. Aziz, M. H. A. Wahab, A. Mustapha, and M. F. M. Mohsin, “Design and development of smart home security system for disabled and elderly people,” J. Telecommun. Electron. Comput. Eng., 2017.
Z. Ling, J. Luo, Y. Xu, C. Gao, K. Wu, and X. Fu, “Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System,” IEEE Internet Things J., 2017, doi: 10.1109/JIOT.2017.2707465.
S. Singh, P. K. Sharma, and J. H. Park, “SH-SecNet: An enhanced secure network architecture for the diagnosis of security threats in a smart home,” Sustain., 2017, doi: 10.3390/su9040513.