scholarly journals Seamless Integration of Heterogeneous Devices and Access Control in Smart Homes

Author(s):  
Ji Eun Kim ◽  
George Boulos ◽  
John Yackovich ◽  
Tassilo Barth ◽  
Christian Beckel ◽  
...  
2015 ◽  
Vol 9 (1) ◽  
pp. 23-39 ◽  
Author(s):  
Ji Eun Kim ◽  
Tassilo Barth ◽  
George Boulos ◽  
John Yackovich ◽  
Christian Beckel ◽  
...  

2018 ◽  
Vol 14 (8) ◽  
pp. 155014771879461 ◽  
Author(s):  
Maria J Santofimia ◽  
David Villa ◽  
Oscar Aceña ◽  
Xavier del Toro ◽  
Cristian Trapero ◽  
...  

This article presents an Internet of Things architecture for Smart Homes that specifically targets service composition and reconfiguration as enablers for the actuation and smart behavior capabilities. To this end, the main challenge that has to be addressed is the support to a seamless integration, composition, and reconfiguration of Internet of Things objects. Two enabling technologies are proposed here: a planning strategy based on a common-sense reasoning approach for service composition and a virtual-network protocol for Inter-Domain Messaging. The planner will identify the services that, properly connected, will cater for arisen, and therefore, unexpected needs. The virtual-network protocol will provide the support for this interconnection to take place in a transparent and orthogonal manner. This is particularly important to enable autonomous systems to instantiate composite services. To demonstrate the capabilities of the resulting framework, two use cases are presented, which under real circumstances demonstrate the potential of the proposed approach.


2013 ◽  
Vol 7 (3) ◽  
pp. 36-52 ◽  
Author(s):  
Esraa Omran ◽  
Tyrone Grandison ◽  
David Nelson ◽  
Albert Bokma

The importance of electronic healthcare has caused numerous changes in both substantive and procedural aspects of healthcare processes. These changes have produced new challenges for patient privacy and information secrecy. Traditional privacy policies cannot respond to rapidly increased privacy needs of patients in electronic healthcare. Technically enforceable privacy policies are needed in order to protect patient privacy in modern healthcare with its cross-organizational information sharing and decision making. This paper proposes a personal information flow model that proposes a limited number of acts on this type of information. Ontology-classified chains of these acts can be used instead of the “intended business purposes” in the context of privacy access control. This enables the seamless integration of security and privacy into existing healthcare applications and their supporting infrastructures. In this paper, the authors present their idea of a Chain-Based Access Control (ChBAC) mechanism and provide a comparative analysis of it to Role-Based Access Control (RBAC). The evaluation is grounded in the healthcare domain and examines a range of typical access scenarios and approaches.


2017 ◽  
Vol 4 (13) ◽  
pp. 152546
Author(s):  
Susanna Spinsante ◽  
Laura Montanini ◽  
Veronica Bartolucci ◽  
Manola Ricciuti ◽  
Danny Pigini ◽  
...  

2018 ◽  
Vol 9 (1) ◽  
pp. 67-70
Author(s):  
Kristóf Barnabás Dombi ◽  
János Tóth

Abstract Nowadays, the number of smart homes is increasing steadily. People tend to try anything for better comfort for their family, or simply for themselves. We spend roughly half of our lives at home, so it’s only logical to focus and pursue higher comfort levels for our homes. This phenomenon opens enormous potential for automation, whether it is automatic garage doors, motorized shutters, access control systems, HVAC systems, or anything else that serves our well-being. This project looks at the implementation of some automation tasks, using a PLC (Programmable Logic Controller). This approach is different from conventional automation, thanks to the ability of the PLC to control everything in a building thus condensing three, or even four floors into one central unit.


2021 ◽  
Vol 26 (6) ◽  
pp. 906-917
Author(s):  
Ziarmal Nazar Mohammad ◽  
Fadi Farha ◽  
Adnan O. M. Abuassba ◽  
Shunkun Yang ◽  
Fang Zhou
Keyword(s):  

Internet of Things (IoT) involves interconnecting smart devices for data collection and making intelligent decisions where, the usual devices become autonomous and smart. With the swift and fast paced developments in the area of smart cities, smart homes, and smart everything the Internet of Things (IoT) is creating an exceptional role that has scope for immense growth and potential. Its objective is the seamless integration of digital and physical worlds into one ecosystem that would lead to the latest intelligent era of the Internet. This state of the art technology can offer huge potential for businesses and offer opportunities for already existent areas like healthcare, energy etc. Yet due to insufficient security techniques IoT is not completely fool proof against security breaches and privacy issues. Since IoT is made up of devices that are resourceconstrained and it has a complex environment, which makes enforcement of security measures even more complicated and tricky. This is where Blockchain’s (BC) “security by design” comes in; that is capable of tackling IoT’s foremost security requirements. Features like transparency, data encryption, auditability, operational resilience and immutability can help remove IoT’s architectural shortcomings. This paper focuses on this relationship and surveys the most relevant work in this area, for analyzing how blockchain is capable of solving the issues related to authorization and access control for IoT environments.


2001 ◽  
Vol 84 (9) ◽  
pp. 16-26
Author(s):  
Tadao Saito ◽  
Hitoshi Aida ◽  
Terumasa Aoki ◽  
Soichiro Hidaka ◽  
Tredej Toranawigtrai ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document