dc.identifier.citation |
[1]R.Fielding and J. Reschke, "Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content," IETF RFC 7231, June 2014. Available: https://www.rfc-editor.org/info/rfc7231 [2] N. Kushalnagar, G. Montenegro, and C. Schumacher, "IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, assumptions, problem statement, and goals," IETF RFC 4919, Aug. 2007. Available: https://www.rfc-editor.org/info/rfc4919 [3]M. Alam, P. Shakarian, and C. Shakarian, "An automated approach for smart home security," Proceedings of the 15th IEEE International Conference on Smart Homes and Health Telematics (ICOST), pp. 76-83, Aug. 2017. DOI: 10.1109/ICOST.2017.8004932 [4]N.Kumar, J. Lei, and T. H. Luan, "Smart-home intelligent system based on IEEE 802.11 and IoT framework," IEEE Wireless Communications, vol. 24, no. 4, pp. 66-72, Aug. 2017. DOI: 10.1109/MWC.2017.1700054 [5]M.Ismail and W. Z. Khan, "The future of smart homes: shaping the new frontier of IoT," IEEE Consumer Electronics Magazine, vol. 6, no. 4, pp. 43-49, Oct. 2017. DOI: 10.1109/MCE.2017.2705601 44 | [6]E. Fernandes, J. Jung, and A. Prakash, "Security analysis of emerging smart home applications," Proceedings of the 37th IEEE Symposium on Security and Privacy (SP), pp. 636-654, May 2016. DOI: 10.1109/SP.2016.44 [7]H. Ning and H. Liu, "Cyber-physical-social systems: The state of the art and perspectives," IEEE Transactions on Human-Machine Systems, vol. 43, no. 1, pp. 49-63, Jan. 2013. DOI: 10.1109/TSMCC.2012.221360 [8]C. Lin and D. He, "Security and privacy for the internet of things: Challenges and solutions," IEEE Internet of Things Journal, vol. 3, no. 5, pp. 525-528, Oct. 2016. DOI: 10.1109/JIOT.2016.2579198 [9]S. Han, S. H. Kim, and K. R. Park, "Smart home energy management system including renewable energy based on ZigBee and PLC," IEEE Transactions on Consumer Electronics, vol. 60, no. 2, pp. 198-202, May 2014. DOI: 10.1109/TCE.2014.6851994 [10] M. Kovatsch, M. Lanter, and Z. Shelby, "Californium: Scalable cloud services for the Internet of Things with CoAP," Proceedings of the 4th International Conference on the Internet of Things (IoT), pp. 1-6, Oct. 2014. DOI: 10.1109/IOT.2014.7030106 [11] Stojmenovic, I., & Wen, S. (2014). The fog computing paradigm: Scenarios and security issues. Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 1-8. DOI: 10.15439/2014F503 45 | [12] Abomhara, M., & Køien, G. M. (2014). Security and privacy in the Internet of Things: Current status and open issues. Proceedings of the International Conference on Privacy and Security in Mobile Systems (PRISMS), 1-8. DOI: 10.1109/PRISMS.2014.6970594 [13] Zhang, Y., & Wen, J. (2017). The IoT electric business model: Using blockchain technology for the internet of things. Peer-to-Peer Networking and Applications, 10(4), 983-994. DOI: 10.1007/s12083- 016-0456-1 [14] Zhao, K., & Ge, L. (2013). A survey on the internet of things security. Proceedings of the 9th International Conference on Computational Intelligence and Security, 663-667. DOI: 10.1109/CIS.2013.145 [15] Sun, Y., Wang, X., Wang, H., & Yang, Q. (2017). Efficient security protocol for smart home communication based on lightweight cryptography. IEEE Transactions on Consumer Electronics, 63(3), 301-309. DOI: 10.1109/TCE.2017.014991 [16] Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146-164. DOI: 10.1016/j.comnet.2014.11.008 [17] Perera, C., Zaslavsky, A., Christen, P., & Georgakopoulos, D. (2014). Context-aware computing for the Internet of Things: A survey. IEEE Communications Surveys & Tutorials, 16(1), 414-454. DOI: 10.1109/SURV.2013.042313.0019 |
en_US |
dc.description.abstract |
The increasing demand for secure, cost-effective, and efficient smart home
systems has led to the development of a novel solution that integrates
intranet and WAN connectivity. Our project leverages the ESP32 micro- controller as the cornerstone of the hardware interface, combined with the
Home Assistant platform to deliver a comprehensive smart home experience. This system ensures privacy, security, and user convenience by
implementing advanced communication protocols and centralized control
through various devices. Additionally, the project addresses potential
security vulnerabilities by establishing a private local network (intranet) and
incorporating voice control functionalities via Google Home. To further
enhance accessibility, the system integrates the Tail scale App, enabling
secure remote control globally through VPN technology. This app allows
users to manage their smart home environment from anywhere, providing
significant advantages in terms of security and ease of use. The implemented system successfully controls four lights, one fan, and
monitors room temperature in real-time, supporting both manual and
automated operations. The system demonstrated high reliability, with
response times consistently under one second, and received positive
feedback for its user-friendly interface and flexibility. Security measures
such as strong encryption protocols and robust authentication mechanisms
ensure data privacy and protection against cyber threats. The integration of
VPN technology with the Tail scale App enhances security by encrypting
remote connections, thus maintaining the integrity and confidentiality of
user data. This project contributes to the field of smart home technology by
showcasing the practical integration of intranet and WAN connectivity, emphasizing security and user convenience. It provides a model for future
developments, highlighting the benefits of combining local and global
control mechanisms. Despite the successful implementation, the system is
currently limited to a small number of devices, indicating the need for future
expansions to support a wider range of smart home applications. Future
work should focus on enhancing the system's scalability, integrating more
devices, and exploring advanced automation capabilities using AI
algorithms |
en_US |