Volume- 9
Issue- 4
Year- 2021
DOI: 10.55524/ijircst.2021.9.4.13 | DOI URL: https://doi.org/10.55524/ijircst.2021.9.4.13
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0)
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Pooja Jadon
A clever home or structure is a modern house or construction with special organized wiring that enables residents to control or program a variety of automatic household electrical devices remotely with a single order. Traditional security systems keep intruders at bay, keeping homeowners and their valuables safe. On either hand, a smart house protection system offers a host of extra benefits. Home automation technology notifies homeowners of possible problems, allowing them to investigate. This article discusses smart houses and security, as well as a smart home security technology. Whether you give your command by voice, tv remote, or computer, the home will fulfill it. The most popular uses include light, home protection, house theater and entertainment, and temperature adjustment. Security has been a serious worry in smart home technologies.
[1] J. Sahoo, S. Mohapatra, and R. Lath, “Virtualization: A survey on concepts, taxonomy and associated security issues,” 2010, doi: 10.1109/ICCNT.2010.49.
[2] R. J. Robles and T. Kim, “A review on security in smart home development,” Int. J. Adv. Sci. Technol., 2010.
[3] N. Gupta and A. Kumar Agarwal, “Object identification using super sonic sensor: Arduino object radar,” 2018, doi: 10.1109/SYSMART.2018.8746951.
[4] N. Mishra, P. Singhal, and S. Kundu, “Application of IoT products in smart cities of India,” 2020, doi: 10.1109/SMART50582.2020.9337150.
[5] K. Ghirardello, C. Maple, D. Ng, and P. Kearney, “Cyber security of smart homes: Development of a reference architecture for attack surface analysis,” 2018, doi: 10.1049/cp.2018.0045.
[6] G. Goswami and P. K. Goswami, “Artificial Intelligence based PV-Fed Shunt Active Power Filter for IOT Applications,” 2020, doi: 10.1109/SMART50582.2020.9337063.
[7] B. Ali and A. I. Awad, “Cyber and physical security vulnerability assessment for IoT-based smart homes,” Sensors (Switzerland), 2018, doi: 10.3390/s18030817.
[8] S. Shetty, D. Shah, G. Goyal, N. Kathuria, J. Abraham, and V. Bhatia, “A study to find the status of probiotics in New Delhi, India and review of strains of bacteria used as probiotics,” Journal of International Society of Preventive and Community Dentistry. 2014, doi: 10.4103/2231- 0762.144570.
[9] C. Wilson, T. Hargreaves, and R. Hauxwell-Baldwin, “Benefits and risks of smart home technologies,” Energy Policy, 2017, doi: 10.1016/j.enpol.2016.12.047.
[10] P. P. Singh, P. K. Goswami, S. K. Sharma, and G. Goswami, “Frequency reconfigurable multiband antenna for IoT applications in WLAN, Wi-max, and C-band,” Prog. Electromagn. Res. C, 2020, doi: 10.2528/pierc20022503.
[11] C. Qu, M. Tao, and R. Yuan, “A hypergraph-based blockchain model and application in internet of things-enabled smart homes,” Sensors (Switzerland), 2018, doi: 10.3390/s18092784.
[12] T. S. Gunawan, M. H. H. Gani, F. D. A. Rahman, and M. Kartiwi, “Development of face recognition on raspberry pi for security enhancement of smart home system,” Indones. J. Electr. Eng. Informatics, 2017, doi: 10.11591/ijeei.v5i4.361.
[13] Y. Qian et al., “Towards decentralized IoT security enhancement: A blockchain approach,” Comput. Electr. Eng., 2018, doi: 10.1016/j.compeleceng.2018.08.021.
[14] A. Aziz, M. H. A. Wahab, A. Mustapha, and M. F. M. Mohsin, “Design and development of smart home security system for disabled and elderly people,” J. Telecommun. Electron. Comput. Eng., 2017.
[15] Z. Ling, J. Luo, Y. Xu, C. Gao, K. Wu, and X. Fu, “Security Vulnerabilities of Internet of Things: A Case Study of the Smart Plug System,” IEEE Internet Things J., 2017, doi: 10.1109/JIOT.2017.2707465.
[16] S. Singh, P. K. Sharma, and J. H. Park, “SH-SecNet: An enhanced secure network architecture for the diagnosis of security threats in a smart home,” Sustain., 2017, doi: 10.3390/su9040513.
Assistant Professor, Department of Computer Science and Engineering, Vivekananda Global University, Jaipur, India
No. of Downloads: 16 | No. of Views: 443
Dr. A. Seshagiri Rao, V. Nagarjuna, M. Sivudu.
November 2022 - Vol 10, Issue 6
Dr. Satish Saini.
March 2022 - Vol 10, Issue 2
Krishna Tomar.
March 2022 - Vol 10, Issue 2