scholarly journals Management of IOT Devices in a Smart Home Through the Application of an Interactive Mirror

2017 ◽  
Vol 22 (4) ◽  
pp. 43-50 ◽  
Author(s):  
Michał Majchrowicz ◽  
Mateusz Hufnagiel

Abstract Internet of Things (IoT) devices are big part of concept, which is called by electronic producers and many others Smart Home. Authors of this paper have decided to take a look at it and as a result of this analysis propose and implement (in a form of working prototype) a system that could manage different kinds of devices. The main objective of the project presented in this paper is a device that looks like a mirror and it is known to most people also is an interactive center, a place to obtain information of the devices that surround us and various parameters coming from sensors. Authors have prepared a prototype, that will be the central point of the apartment and will allow users to control all devices connected to this main system. Prototype allows to connect external sensors over GPIO (general purpose input/output) interface or Internet connection. There is also a possibility to add another communication interfaces such as 433MHz radio module, which is very cheap and works great in small areas or bluetooth module.

JMIR Aging ◽  
10.2196/21964 ◽  
2020 ◽  
Vol 3 (2) ◽  
pp. e21964
Author(s):  
Yong K Choi ◽  
Hilaire J Thompson ◽  
George Demiris

Background The Internet-of-Things (IoT) technologies can create smart residences that integrate technology within the home to enhance residents’ safety as well as monitor their health and wellness. However, there has been little research on real-world testing of IoT smart home devices with older adults, and the feasibility and acceptance of such tools have not been systematically examined. Objective This study aims to conduct a pilot study to investigate the feasibility of using IoT smart home devices in the actual residences of older adults to facilitate healthy aging. Methods We conducted a 2-month feasibility study on community-dwelling older adults. Participants chose among different IoT devices to be installed and deployed within their homes. The IoT devices tested varied depending on the participant’s preference: a door and window sensor, a multipurpose sensor (motion, temperature, luminosity, and humidity), a voice-operated smart speaker, and an internet protocol (IP) video camera. Results We recruited a total of 37 older adults for this study, with 35 (95%) successfully completing all procedures in the 2-month study. The average age of the sample was 78 (SD 9) years and primarily comprised women (29/37, 78%), those who were educated (31/37, 86%; bachelor’s degree or higher), and those affected by chronic conditions (33/37, 89%). The most widely chosen devices among the participants were multipurpose sensors and smart speakers. An IP camera was a significantly unpopular choice among participants in both phases. The participant feedback suggests that perceived privacy concerns, perceived usefulness, and curiosity to technology were strong factors when considering which device to have installed in their home. Conclusions Overall, our deployment results revealed that the use of IoT smart home devices is feasible in actual residences of older adults. These findings may inform the follow-up assessment of IoT technologies and their impact on health-related outcomes and advance our understanding of the role of IoT home-based monitoring technologies to promote successful aging-in-place for older adults. Future trials should consider older adults’ preferences for the different types of smart home devices to be installed in real-world residential settings.


2020 ◽  
Vol 8 (6) ◽  
pp. 5021-5027

Internet of Things (IoT) growing at a rate of exponential numbers in recent years has received extensive attention with BlockChain (BC) technology which provide trust to IoT with its immutable nature, decentralization in computing, resource constraints, security and privacy. The distributed ledger of transactions in BC is path leading technology for addressing Cyber Threats in the form of data theft; it provides secure application architecture which has proven track of record for securing data. IoT devices using BC enabled to communicate between objects, share data, decide based on business criteria and act as a medium to securely transmit information. This work provides lightweight BlockChain with two prominent consensus mechanism PoW – Proof of Work and PoS – Proof of Stake for smart IoT devices. Next, Smart Home Device (SMD) is ensures providing best-in-class Security and Privacy for smart home Appliances. Further provides future advances in the Approach.


Author(s):  
Dan-Radu Berte

Abstract IoT, or the Internet of Things, has been in use since circa 1999. It defines a next chapter in the evolution of the Internet where computing devices embedded in everyday objects are able to send and receive data themselves. In recent years miniaturization and economies of scale brought a boon of new devices to the consumer and enterprise market, prompting Gartner to predict over 20bln live IoT devices by 2020. However, the definition of IoT is loose and, for the purpose of predicting trends or discussing security, formulating a clear understanding of the term is crucial. In fact, Internet of Things is a term only mostly used by the media, academia and the industry. Customers in the consumer space refer to the technologies by their benefit describing term of “Smart Home”. A quick analysis of this gap shows how it’s entirely possible no knowledge permeates the business and market worlds because of the incompatible terms used. As more devices, OSes and heterogeneous platforms entrench the concept of a new digital lifestyle, the new “Digital Kingdom” opens its doors to radical disruption, such as the latest massive Mirai and Reaper attacks. Our ability to correctly define the IoT, it’s platforms and components, should lead to better market dynamics and better preparedness, as one can’t secure something that can’t be defined. This paper proposes to further understand the IoT by exploring available definitions, reiterating misuse and equivocal perception, concluding with a more suiting, contemporary definition.


2020 ◽  
Vol 2020 (3) ◽  
pp. 276-1-276-15
Author(s):  
Franziska Schwarz ◽  
Klaus Schwarz ◽  
Reiner Creutzburg

Since its invention, the Internet has changed the world, but above all, it has connected people. With the advent of the Internet of Things, the Internet connects things today much more than people do. A large part of the Internet of Things consists of IoT controlled Smart Home devices. The Internet of Things and the Smart Home have become an increasingly important topic in recent years. The growing popularity of Smart Home devices such as Smart TVs, Smart Door Locks, Smart Light Bulbs, and others is causing a rapid increase in vulnerable areas. In the future, many IoT devices could be just as many targets. The many new and inexperienced manufacturers and the absence of established uniform standards also contribute to the precarious situation. Therefore, new methods are needed to sensitize and detect these threats. In this paper, different existing approaches like those of the National Institute of Standards and Technology (NIST) and the Open Web Application Security Project (OWASP) are combined with concepts of this work like the Smart Home Device Life Cycle. In the context of this paper, a universal 31-page question-based test procedure is developed that can be applied to any Smart Home device. Based on this new, innovative security checklist, the communication between device, app, and the manufacturer's servers, as well as the firmware of IoT devices, can be analyzed and documented in detail. In the course of this paper, also a handout in the abbreviated form will be created, which serves the same purpose.


2019 ◽  
Vol 6 (6) ◽  
pp. 703
Author(s):  
Eri Haryanto ◽  
Imam Riadi

<p>Perangkat Internet of Things (IoT) merupakan perangkat cerdas yang memiliki interkoneksi dengan jaringan internet global. Investigasi kasus yang menyangkut perangkat IoT akan menjadi tantangan tersendiri bagi investigator forensik. Keberagaman jenis perangkat dan teknologi akan memunculkan tantangan baru bagi investigator forensik. Dalam penelitian ini dititikberatkan forensik di level internal device perangkat IoT. Belum banyak bahkan belum penulis temukan penelitian sejenis yang fokus dalam analisis forensik perangkat IoT pada level device. Penelitian yang sudah dilakukan sebelumnya lebih banyak pada level jaringan dan level cloud server perangkat IoT. Pada penelitian ini dibangun environment perangkat IoT berupa prototype smart home sebagai media penelitian dan kajian tentang forensik level device. Pada penelitian ini digunakan analisis model forensik yang meliputi collection, examination, analysis, dan reporting dalam investigasi forensik untuk menemukan bukti digital. Penelitian ini berhasil mengungkap benar-benar ada serangan berupa injeksi malware terhadap perangkat IoT yang memiliki sistem operasi Raspbian, Fedberry dan Ubuntu Mate. Pengungkapan fakta kasus mengalami kesulitan pada perangkat IoT yang memiliki sistem operasi Kali Linux. Ditemukan 1 IP Address komputer penyerang yang diduga kuat menanamkan malware dan mengganggu sistem kerja perangkat IoT.</p><p><em><strong>Abstract</strong></em></p><p class="Abstract"><em>The Internet of Things (IoT) is an smart device that has interconnection with global internet networks. Investigating cases involving IoT devices will be a challenge for forensic investigators. The diversity of types of equipment and technology will create new challenges for forensic investigators. In this study focused on forensics at the IoT device's internal device level, there have not been many similar research that focuses on forensic analysis of IoT devices at the device level. Previous research has been done more at the network level and cloud level of IoT device's. In this study an IoT environment was built  a smart home prototype as a object for research and studies on forensic level devices. This study, using forensic model analysis which includes collection, examination, analysis, and reporting in finding digital evidence. This study successfully revealed that there was really an attack in the form of malware injection against IoT devices that have Raspbian, Fedberry and Ubuntu Mate operating systems. Disclosure of the fact that the case has difficulties with IoT devices that have the Kali Linux operating system. Found 1 IP Address of an attacker's computer that is allegedly strongly infusing malware and interfering with the work system of IoT devices.</em></p><p><em><strong><br /></strong></em></p>


Tehnika ◽  
2020 ◽  
Vol 75 (6) ◽  
pp. 678-683
Author(s):  
Milica Đekić

The Internet of Things (IoT) is a quite recent paradigm going a decade back to the past. With the development and deployment of wireless technologies this new advancement has taken the part in the consumers' lives and businesses. In other words, the IoT is a pretty convenient way to correlated devices with each other and make them communicate in such a network. This is feasible using the internet connection and differently saying, all IoT devices forming the IoT asset got their IP addresses. From this perspective, it's quite clear that this technology got a lot of advantages and the users may feel so thankful for being the part of an IoT community. On the other hand, the consumers would spend less time thinking about the possible security concerns being linked to this new improvement. In this paper, we intend to discuss how secure our IoT infrastructure is, what its strategic implications are and why cyber industry should invest more time and effort in order to better research and develop this concept. In addition, we would try to deal a bit more with the IoT crawlers as the tools for investigating the IoT network and being so handy for both - researchers and hacker's groups.


2018 ◽  
Vol 14 (02) ◽  
pp. 6
Author(s):  
Toni Tegar Sahidi ◽  
Achmad Basuki ◽  
Herman Tolle

<p class="western">Internet of things (IoT) is a complex system with few best practices in building ones, especially on handling real-time communication between IoT devices to the Internet. A framework is often used to fasten building IoT system. This paper present Mobile Internet of Things (MIOT), a framework which use a smartphone as the main component to handle communication between IoT device and the internet. A smartphone is used as the communication gateway (relay) for IoT devices and not as the IoT controller as in common Smartphone-IoT approach. For evaluation purpose, two implementations of IoT prototype scenario is built, an environmental monitoring and a remote controller (RC) car. The experiment shows a quick and easy deployment of IoT system. The Environment Monitoring able to send data to the server in real-time, and control The RC Car with a reasonable response time.</p><p><span>The experiment on 200 ms interval between each packet, shows that MIOT Framework has round-trip latency between MIOT Server and IoT hardware for ≈ 88.007 ms. The addition of smartphone as the main component in the framework (MIOT Apps) contribute to additional latency ≈ 13.145 ms. </span></p><p><span>Using a Smartphone as a gateway for IoT in MIOT Framework is possible and promising. It can be used as a best practice to develop a reliable IoT system which reduces time, effort, and learning overhead on building IoT systems.</span></p>


Author(s):  
Tanishka and Prof. Shikha Gupta

The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. Internet of Things (IoT) is rapidly gaining momentum in the scenario of telecommunications. Conventional networks allow for interactivity and data exchange, but these networks have not been designed for the new features and functions of IoT devices. In this paper, an algorithm is proposed to share common recourse among Things, that is, between different types of smart appliances. . Purpose is to analyze deeper the cases separating the network and IoT layout, giving a deeper explanation of the purpose of the simulations, presenting all the information needed to utilize the exercises but also giving suggestion how to expand the exercises further. This implementation can be implemented effectively using package tracking software that includes IoT functions to control and simulate a smart home. IoT technology can be applied to many real life issues, such as: homework, treatment, campus, office, etc.


With advancement in smart home services on mobile and wearable devices, individual can smartly control his/her home appliances such as fan, refrigerator, TV, air conditioner, etc., in an efficient manner. Internets of Things (IoT) devices are extensively utilized to interchange the data between smart applications, mobiles, and wearables. IoT devices are responsible for monitoring and sensing the data about home appliances with the help of sensor nodes, the obtained data is then communicate to given high-end devices for taking the suitable action. The overall objective of this paper is to study the existing IoT analytics techniques which are used to build smart applications for homes. This paper also discusses the various challenges to design a suitable smart home using IoTs. Thereafter, a comparative analyzes are considered to evaluate the shortcomings of these techniques and various gaps are formulated in the existing techniques. Finally, a methdology has been devised which can overcome the shortcomings of existing models and help enhancing the functioning of human activity recognition in smart homes.


Sign in / Sign up

Export Citation Format

Share Document