This is a user sandbox of Durgalavanya. You can use it for testing or practicing edits. This is not the sandbox where you should draft your assigned article for a dashboard.wikiedu.org course. To find the right sandbox for your assignment, visit your Dashboard course page and follow the Sandbox Draft link for your assigned article in the My Articles section. |
Overview
editIn the Home Automation wikipedia article we can add more content in the history and we have to provide more citations and references and we can provide more information about applications and technology because technology plays a crucial role in the automation and we can add security as one section in this article.The communication protocol uses a topic publisher architecture that allows for full decentralization of devices, if needed. A standard set of topics and commands have been designed to create the common language for each device to talk to others.
Security
editloT can be employed in our homes to control various appliances like that of lighting, heating, air conditioning systems, entertainment gadgets and other home security devices to improve convenience and also optimize energy consumption. All the devices are connected in a seamless fashion such that the needs of the occupants are met in a convenient manner. Any device having ON or OFF mechanism can be connected to the Internet for remote access. So, pertaining to our Home system, there are many such devices that can be accessed and controlled using loT. Such devices include lighting systems, heating systems, media and entertainment systems and several others.
Security in Zigbee
Security provides data transmission confidentiality and integrity.In ZigBee network, three key types are used for symmetric cryptography. A master key, which is longterm security key between two devices, is used for delivery of network and link keys. The second key is a link key which provides security on specific link between two devices. The third key type is a network key used when nodes transfer the information to member of network. Using these keys, ZigBee network provides secure network, but it also has disadvantages in terms of the number of keys, limited services in home automation.In a full mesh network each node shares the each pair of keys whose complexity is ( ) 2 O n . Second, we need to consider various situations including inviting authority restriction depending on attributes of users. System security involves many layers of the Internet of things (IoT). As the IoT grows, system integrity becomes important to avoid negative risks such as catastrophic errors[3]. Using Reed Solomon Codes for error detection and correction before any operation invoked by the user gets executed can assist in preventing such occurrences.
Allowing for affordable security is also important. An embedded programmable logic controller based security method was designed which prevents simple manipulation of user data[4]. The integrity of the system is secured using a simplified sequence, rolling code encryption of the transmitted data.
Visual surveillance is the main aspect of any intelligent home security system. Various technological developments will provide operation of the system and identifying the number of people, when to operate, and allow for efficient use of the devices[5].
Data collection is a normal process for systems and protecting the data also becomes important[6]. Sensors are connected to a host network to improve processing, achieve high reliability, and reduce costs.
A ZigBee network is considered as the most attractive technology for home automation such as high availability, low power consumption and cost-effective device for constructing the wireless sensor network[7]. This allows users to designate home network and control home appliances depending on their connectivity and ease of use.
Remote device vulnerabilities have provided for improved security needs throughout any system. Examples of this risk include garage door openers, automobiles, and home appliances[8]. Light weight intrusion checkers are based on detecting irregular operations by comparing the current firmware execution with the past recurrent execution behavior. Any deviation is identified and evaluated which provide for clear detection with negligible risk.
Environment focused environment
· Low cost energy security management
Using dynamic priority for household appliances and its current status provide for the low cost energy deployment for systems now and in the future[9]. This includes the scheduling for renewable energy capability for all devised in the system. Security on home automation is a developing aspect for the Internet of Things. This includes securing the data in-between connected devices and the devices themselves. Currently, security has developed into the following topcis:
· Device security
· System Security
· Environment focused environment
Device Security
· Device fingerprinting
· Mobile device security
There is a dual focus on the security of the devices. Device fingerprinting is evolving with improvements and failures of the approach. Using a dual approach of device fingerprinting and login credentials, provide a high level of security and identification, up to 97.93%[1]. Mobile device security demand is growing with the volume of connected devices grows. HASec, Home Automation and Security system for mobile devices, operates and controls the device though motion detectors and video camera for remote sensing, surveillance, live video streams, record for playback, and manages the device operation[2]. This includes turning the device on or off. For security, the detected motion will trigger alerts for possible violations. The main components for interaction include iOS application for device interaction and server scripts for interaction with the cloud.
System Security
· Reed Solomon codes
· Embedded programmable logic controller
· Vision based intelligent security system
· Agent based system
· Zigbee security – attribute based re-encryption
· Intrusion checkers to resist malicious attacks
System security involves many layers of the Internet of things (IoT). As the IoT grows, system integrity becomes important to avoid negative risks such as catastrophic errors[3]. Using Reed Solomon Codes for error detection and correction before any operation invoked by the user gets executed can assist in preventing such occurrences.
Allowing for affordable security is also important. An embedded programmable logic controller based security method was designed which prevents simple manipulation of user data[4]. The integrity of the system is secured using a simplified sequence, rolling code encryption of the transmitted data.
Visual surveillance is the main aspect of any intelligent home security system. Various technological developments will provide operation of the system and identifying the number of people, when to operate, and allow for efficient use of the devices[5].
Data collection is a normal process for systems and protecting the data also becomes important[6]. Sensors are connected to a host network to improve processing, achieve high reliability, and reduce costs.
A ZigBee network is considered as the most attractive technology for home automation such as high availability, low power consumption and cost-effective device for constructing the wireless sensor network[7]. This allows users to designate home network and control home appliances depending on their connectivity and ease of use.
Remote device vulnerabilities have provided for improved security needs throughout any system. Examples of this risk include garage door openers, automobiles, and home appliances[8]. Light weight intrusion checkers are based on detecting irregular operations by comparing the current firmware execution with the past recurrent execution behavior. Any deviation is identified and evaluated which provide for clear detection with negligible risk.
References
editHwajeong Seo; Howon Kim Consumer Electronics (ISCE), 2011 IEEE 15th International Symposium.
Idris Afzal Shah; Faizan Amin Malik; Syed Arshid Ahmad 2016 International Conference on Wireless Communications, Signal Processing and Networking.
Mohd Adib B. Sarijari; Rozeha A. Rashid; Mohd Rozaini Abd Rahim; Nur Hija Mahalin Telecommunication Technologies 2008 and 2008 2nd Malaysia Conference on Photonics. NCTT-MCP 2008. 6th National Conference.
Artee Kunal Dalsaniya; Dhanashri H. Gawali 2016 10th International Conference on Intelligent Systems and Control (ISCO)
Anupama A. Ghodake; S. D. Shelke 2016 10th International Conference on Intelligent Systems and Control (ISCO)
Vikram Puri; Anand Nayyar 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom)
Matthias Mielke; Rainer Brück 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)