The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the d...The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life.展开更多
Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,S...Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)interactions.Tapping into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart home.The Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger system.The work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the system.The simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a time.This is done to measure the system's consistency across a variety of device capabilities.The experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times.展开更多
Energy is essential to practically all exercises and is imperative for the development of personal satisfaction.So,valuable energy has been in great demand for many years,especially for using smart homes and structure...Energy is essential to practically all exercises and is imperative for the development of personal satisfaction.So,valuable energy has been in great demand for many years,especially for using smart homes and structures,as individuals quickly improve their way of life depending on current innovations.However,there is a shortage of energy,as the energy required is higher than that produced.Many new plans are being designed to meet the consumer’s energy requirements.In many regions,energy utilization in the housing area is 30%–40%.The growth of smart homes has raised the requirement for intelligence in applications such as asset management,energy-efficient automation,security,and healthcare monitoring to learn about residents’actions and forecast their future demands.To overcome the challenges of energy consumption optimization,in this study,we apply an energy management technique.Data fusion has recently attracted much energy efficiency in buildings,where numerous types of information are processed.The proposed research developed a data fusion model to predict energy consumption for accuracy and miss rate.The results of the proposed approach are compared with those of the previously published techniques and found that the prediction accuracy of the proposed method is 92%,which is higher than the previously published approaches.展开更多
The development and use of Internet of Things(IoT)devices have grown significantly in recent years.Advanced IoT device characteristics are mainly to blame for the wide range of applications that may now be achieved wi...The development and use of Internet of Things(IoT)devices have grown significantly in recent years.Advanced IoT device characteristics are mainly to blame for the wide range of applications that may now be achieved with IoT devices.Corporations have begun to embrace the IoT concept.Identifying true and suitable devices,security faults that might be used for bad reasons,and administration of such devices are only a few of the issues that IoT,a new concept in technological progress,provides.In some ways,IoT device traffic differs from regular device traffic.Devices with particular features can be classified into categories,irrespective of their function or performance.Ever-changing and complex environments,like a smart home,demand this classification scheme.A total of 41 IoT devices were employed in this investigation.To build a multiclass classification model,IoT devices contributed 13 network traffic parameters.To further preprocess the raw data received,preprocessing techniques like Normalization and Dataset Scaling were utilized.Feature engineering techniques can extract features from the text data.A total of 117,423 feature vectors are contained in the dataset after stratification,which are used to further improve the classification model.In this study,a variety of performance indicators were employed to show the performance of the logiboosted algorithms.Logi-XGB scored 80.2%accuracy following application of the logit-boosted algorithms to the dataset for classification,whereas Logi-GBC achieved 77.8%accuracy.Meanwhile,Logi-ABC attained 80.7%accuracy.Logi-CBC,on the other hand,received the highest Accuracy score of 85.6%.The accuracy of Logi-LGBM and Logi-HGBC was the same at 81.37%each.Our suggested Logi-CBC showed the highest accuracy on the dataset when compared to existing Logit-Boosted Algorithms used in earlier studies.展开更多
The smart grid has enabled users to control their home energy more effectively and efficiently.A home energy management system(HEM)is a challenging task because this requires the most effective scheduling of intellige...The smart grid has enabled users to control their home energy more effectively and efficiently.A home energy management system(HEM)is a challenging task because this requires the most effective scheduling of intelligent home appliances to save energy.Here,we presented a meta-heuristic-based HEM system that integrates the Greywolf Algorithm(GWA)and Harmony Search Algorithms(HSA).Moreover,a fusion initiated on HSA and GWA operators is used to optimize energy intake.Furthermore,many knapsacks are being utilized to ensure that peak-hour load usage for electricity customers does not surpass a certain edge.Hybridization has proven beneficial in achieving numerous objectives simultaneously,decreasing the peak-to-average ratio and power prices.Widespread MATLAB simulations are cast-off to evaluate the routine of the anticipated method,Harmony GWA(HGWA).The simulations are for a multifamily housing complex outfitted with various cool gadgets.The simulation results indicate that GWA functions better regarding cost savings than HSA.In reputes of PAR,HSA is significantly more effective than GWA.The suggested method reduces costs for single and ten-house construction by up to 2200.3 PKR,as opposed to 503.4 in GWA,398.10 in HSA and 640.3 in HGWA.The suggested approach performed better than HSA and GWA in PAR reduction.For single-family homes in HGWA,GWA and HSA,the reduction in PAR is 45.79%,21.92%and 20.54%,respectively.The hybrid approach,however,performs better than the currently used nature-inspired techniques in terms of Cost and PAR.展开更多
Energy demand will continue to rise as a result of predicted population growth. In this work, a user-friendly home energy monitoring system based on IoT is described, which is capable of collecting, analyzing, and dis...Energy demand will continue to rise as a result of predicted population growth. In this work, a user-friendly home energy monitoring system based on IoT is described, which is capable of collecting, analyzing, and displaying data. Users register their sensors and devices on the monitoring platform. PostgreSQL and Elasticsearch databases are used to store the resulting measurements. In a smart home, the wireless sensor ACS712 was used to monitor the flow of electricity (current and voltage) for a household device. The user can share data about electricity consumption and costs with a third party via the private IPFS (InterPlanetary File System) network. A third party can download all the energy consumption data for a device or many devices from the platform for 1 day, 3 months, 6 months, and 1 year. The studies on the development of energy-efficient technology for home devices benefit greatly from the gathered data. For security in the system, it is preferred to run Keyrock Idm, Wilma Pep Proxy, and Orion Context Broker in HTTPS mode, and MQTTS is used to retrieve sensor data. The experimental results showed that the energy monitoring system accurately records voltage, current, active power, and the total amount of power used and offers low-cost solutions to the users using household devices in a day.展开更多
In this paper, a smart home system based on ZigBee technology is designed. The system includes home network, home server and mobile terminal. The program is highly scalable and cost-effective. This paper developed the...In this paper, a smart home system based on ZigBee technology is designed. The system includes home network, home server and mobile terminal. The program is highly scalable and cost-effective. This paper developed the home server-side application based on MFC technology and the mobile terminal application. The mobile client can remotely control home devices and query the running state, electric energy information and historical data of home devices. At the same time, the home server-side application can store electric energy information and electricity consumption of home devices. Combined with household distributed photovoltaic generation system, the system can be applied to home energy management system. Through running tests and application, the results show that the system has realized basic functions of smart home and achieved the desired design goals.展开更多
Anomaly detection in smart homes provides support to enhance the health and safety of people who live alone.Compared to the previous studies done on this topic,less attention has been given to hybrid methods.This pape...Anomaly detection in smart homes provides support to enhance the health and safety of people who live alone.Compared to the previous studies done on this topic,less attention has been given to hybrid methods.This paper presents a two-steps hybrid probabilistic anomaly detection model in the smart home.First,it employs various algorithms with different characteristics to detect anomalies from sensory data.Then,it aggregates their results using a Bayesian network.In this Bayesian network,abnormal events are detected through calculating the probability of abnormality given anomaly detection results of base methods.Experimental evaluation of a real dataset indicates the effectiveness of the proposed method by reducing false positives and increasing true positives.展开更多
In a typical discrete manufacturing process,a new type of reconfigurable production line is introduced,which aims to help small-and mid-size enterprises to improve machine utilization and reduce production cost.In ord...In a typical discrete manufacturing process,a new type of reconfigurable production line is introduced,which aims to help small-and mid-size enterprises to improve machine utilization and reduce production cost.In order to effectively handle the production scheduling problem for the manufacturing system,an improved multi-objective particle swarm optimization algorithm based on Brownian motion(MOPSO-BM)is proposed.Since the existing MOPSO algorithms are easily stuck in the local optimum,the global search ability of the proposed method is enhanced based on the random motion mechanism of the BM.To further strengthen the global search capacity,a strategy of fitting the inertia weight with the piecewise Gaussian cumulative distribution function(GCDF)is included,which helps to maintain an excellent convergence rate of the algorithm.Based on the commonly used indicators generational distance(GD)and hypervolume(HV),we compare the MOPSO-BM with several other latest algorithms on the benchmark functions,and it shows a better overall performance.Furthermore,for a real reconfigurable production line of smart home appliances,three algorithms,namely non-dominated sorting genetic algorithm-II(NSGA-II),decomposition-based MOPSO(dMOPSO)and MOPSO-BM,are applied to tackle the scheduling problem.It is demonstrated that MOPSO-BM outperforms the others in terms of convergence rate and quality of solutions.展开更多
With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and ...With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and sensors are connected to the internet, and these devices can easily become the target of attacks. To mitigate the risk of using smart home devices, the security and privacy thereof must be artificially smart so they can adapt based on user behavior and environments. The security and privacy systems must accurately analyze all actions and predict future actions to protect the smart home system. We propose a Hybrid Intrusion Detection (HID) system using machine learning algorithms, including random forest, X gboost, decision tree, K -nearest neighbors, and misuse detection technique.展开更多
Home security should be a top concern for everyone who owns or rents a home. Moreover, safe and secure residential space is the necessity of every individual as most of the family members are working. The home is left...Home security should be a top concern for everyone who owns or rents a home. Moreover, safe and secure residential space is the necessity of every individual as most of the family members are working. The home is left unattended for most of the day-time and home invasion crimes are at its peak as constantly monitoring of the home is difficult. Another reason for the need of home safety is specifically when the elderly person is alone or the kids are with baby-sitter and servant. Home security system i.e. HomeOS is thus applicable and desirable for resident’s safety and convenience. This will be achieved by turning your home into a smart home by intelligent remote monitoring. Smart home comes into picture for the purpose of controlling and monitoring the home. It will give you peace of mind, as you can have a close watch and stay connected anytime, anywhere. But, is common man really concerned about home security? An investigative study was done by conducting a survey to get the inputs from different people from diverse backgrounds. The main motivation behind this survey was to make people aware of advanced HomeOS and analyze their need for security. This paper also studied the necessity of HomeOS investigative study in current situation where the home burglaries are rising at an exponential rate. In order to arrive at findings and conclusions, data were analyzed. The graphical method was employed to identify the relative significance of home security. From this analysis, we can infer that the cases of having kids and aged person at home or location of home contribute significantly to the need of advanced home security system. At the end, the proposed system model with its flow and the challenges faced while implementing home security systems are also discussed.展开更多
Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays,home appliances are communicating with each other with home gateways,using existing short-range home area network ...Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays,home appliances are communicating with each other with home gateways,using existing short-range home area network communication protocols such as Zig Bee,Bluetooth,RFID,and Wi Fi. A Gateway allows homeowners and utilities to communicate remotely with the appliances via long-range communication networks such as GPRS,Wi Max,LTE,and power liner carrier. This paper utilizes the Internet of Things(Io T) concepts to monitor and control home appliances. Moreover,this paper proposes a framework that enables the integration and the coordination of Human-to-Appliance,Utility-toAppliance,and Appliance-to-Appliance. Utilizing the concepts of Internet of Things leads to one standard communication protocols,TCP/IPV6,which overcomes the many diverse home area networks and neighborhood area networks protocols. This work proposes a cloud based framework that enables the Io Ts integration and supports the coordination between devices,as well as with device-human interaction. A prototype is designed,implemented,and tested to validate the proposed solution.1 Index TermsInternet of things(Io T),Internet of things(Io T) cloud framework,smart homes,smart appliances.展开更多
User behavior prediction has become a core element to Internet of Things(IoT)and received promising attention in the related fields.Many existing IoT systems(e.g.smart home systems)have been deployed various sensors a...User behavior prediction has become a core element to Internet of Things(IoT)and received promising attention in the related fields.Many existing IoT systems(e.g.smart home systems)have been deployed various sensors and the user’s behavior can be predicted through the sensor data.However,most of the existing sensor-based systems use the annotated behavior data which requires human intervention to achieve the behavior prediction.Therefore,it is a challenge to provide an automatic behavior prediction model based on the original sensor data.To solve the problem,this paper proposed a novel automatic annotated user behavior prediction(AAUBP)model.The proposed AAUBP model combined the Discontinuous Solving Order Sequence Mining(DVSM)behavior recognition model and behavior prediction model based on the Long Short Term Memory(LSTM)network.To evaluate the model,we performed several experiments on a real-world dataset tuning the parameters.The results showed that the AAUBP model can effectively recognize behaviors and had a good performance for behavior prediction.展开更多
The revolution in Internet of Things(IoT)-based devices and applications has provided smart applications for humans.These applications range from healthcare to traffic-flow management,to communication devices,to smart...The revolution in Internet of Things(IoT)-based devices and applications has provided smart applications for humans.These applications range from healthcare to traffic-flow management,to communication devices,to smart security devices,and many others.In particular,government and private organizations are showing significant interest in IoT-enabled applications for smart homes.Despite the perceived benefits and interest,human safety is also a key concern.This research is aimed at systematically analyzing the available literature on smart homes and identifying areas of concern or risk with a view to supporting the design of safe and secure smart homes.For this systematic review process,relevant work in the most highly regarded journals published in the period 2016–2020(a section of 2020 is included)was analyzed.A final set of 99 relevant articles(journal articles,book sections,conference papers,and survey papers)was analyzed in this study.This analysis is focused on three research questions and relevant keywords.The systematic analysis results and key insights will help researchers and practitioners to make more informed decisions when dealing with the safety and security risks of smart homes,especially in emergency situations.展开更多
The recent surge in development of smart homes and smart cities can be observed in many developed countries.While the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by ...The recent surge in development of smart homes and smart cities can be observed in many developed countries.While the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by the user who is outside the home might sound fancy,but it comes with a lot of potential threats.There can be many attackers who will be trying to take advantage of this.So,there is a need for designing a secure scheme whichwill be able to distinguish among genuine/authorized users of the system and attackers.And knowing about the details of when and what IoT devices are used by the user,the attacker can trace the daily activities of user and can plan an attack accordingly.Thus,the designed security scheme should guarantee confidentiality,anonymity and un-traceability.Most of the schemes proposed in the literature are either non-blockchain based which involves inherent problems of storing data in a single-server or assuming weaker attack models.In this work,we propose a novel scheme based on blockchain technology,assuming a stronger Canetti and Krawczyk(CK)-threat model.Through the formal and informal security,and comparative analysis,we show that the proposed scheme provides a superior security and more functionality features,with less communication cost and comparable computational cost as compared to other competent schemes.Moreover,the blockchain based simulation study on the proposed scheme has been conducted to show its feasibility in real-life application.展开更多
Smart home technology provides consumers with network connectivity,automation or enhanced services for home devices.With the Internet of Things era,a vast data flow makes business platforms have to own the same comput...Smart home technology provides consumers with network connectivity,automation or enhanced services for home devices.With the Internet of Things era,a vast data flow makes business platforms have to own the same computing power to match their business services.It achieves computing power through implementing big data algorithms deployed in the cloud data center.However,because of the far long geographical distance between the client and the data center or the massive data capacity gap,potentially high latency and high packet loss will reduce the usability of smart home systems if service providers deploy all services in the cloud data center.Edge computing and fog computing can significantly improve the utilization of network resources and reconstruct the network architecture for the user’s home.This article enables a fog resource-based resource allocation management technology.It provides a method that can more reasonably allocate network resources through a virtualized middle-tier method to ensure low response time and configure Quality of Service to ensure the use of delay-sensitive critical applications to improve the reliability of smart home communication system.Besides,the proposed method has is tested and verified by adjusting the variables of the network environment.We realize the optimization of resource allocation of client network without changing the hardware of client.展开更多
In the recent Smart Home(SH)research work,intelligent service recommendation technique based on behavior recognition,it has been extensively preferred by researchers.However,most current research uses the Semantic rec...In the recent Smart Home(SH)research work,intelligent service recommendation technique based on behavior recognition,it has been extensively preferred by researchers.However,most current research uses the Semantic recognition to construct the user’s basic behavior model.This method is usually restricted by environmental factors,the way these models are built makes it impossible for them to dynamically match the services that might be provided in the user environment.To solve this problem,this paper proposes a Semantic behavior assistance(Semantic behavior assistance,SBA).By joining the semantic model on the intelligent gateway,building an SA model,in this way,a logical Internet networks for smart home is established.At the same time,a behavior assistant method based on SBA model is proposed,among them,the user environment-related entities,sensors,devices,and user-related knowledge models exist in the logical interconnection network of the SH system through the semantic model.In this paper,the data simulation experiment is carried out on the method.The experimental results show that the SBA model is better than the knowledge-based pre-defined model.展开更多
With the emerging of sensor networks, research on sensor-based activity recognition has attracted much attention. Many existing methods cannot well deal with the cases that contain hundreds of sensors and their recogn...With the emerging of sensor networks, research on sensor-based activity recognition has attracted much attention. Many existing methods cannot well deal with the cases that contain hundreds of sensors and their recognition accuracy is requisite to be further improved. A novel framework for recognizing human activities in smart home was presented. First, small, easy-to-install, and low-cost state change sensors were adopted for recording state change or use of the objects. Then the Bayesian belief network (BBN) was applied to conducting activity recognition by modeling statistical dependencies between sensor data and human activity. An edge-encode genetic algorithm (EEGA) approach was proposed to resolve the difficulties in structure learning of the BBN model under a high dimension space and large data set. Finally, some experiments were made using one publicly available dataset. The experimental results show that the EEGA algorithm is effective and efficient in learning the BBN structure and outperforms the conventional approaches. By conducting human activity recognition based on the testing samples, the BBN is effective to conduct human activity recognition and outperforms the naive Bayesian network (NBN) and multiclass naive Bayes classifier (MNBC).展开更多
基金funded by Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2024R333)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life.
文摘Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)interactions.Tapping into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart home.The Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger system.The work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the system.The simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a time.This is done to measure the system's consistency across a variety of device capabilities.The experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times.
文摘Energy is essential to practically all exercises and is imperative for the development of personal satisfaction.So,valuable energy has been in great demand for many years,especially for using smart homes and structures,as individuals quickly improve their way of life depending on current innovations.However,there is a shortage of energy,as the energy required is higher than that produced.Many new plans are being designed to meet the consumer’s energy requirements.In many regions,energy utilization in the housing area is 30%–40%.The growth of smart homes has raised the requirement for intelligence in applications such as asset management,energy-efficient automation,security,and healthcare monitoring to learn about residents’actions and forecast their future demands.To overcome the challenges of energy consumption optimization,in this study,we apply an energy management technique.Data fusion has recently attracted much energy efficiency in buildings,where numerous types of information are processed.The proposed research developed a data fusion model to predict energy consumption for accuracy and miss rate.The results of the proposed approach are compared with those of the previously published techniques and found that the prediction accuracy of the proposed method is 92%,which is higher than the previously published approaches.
文摘The development and use of Internet of Things(IoT)devices have grown significantly in recent years.Advanced IoT device characteristics are mainly to blame for the wide range of applications that may now be achieved with IoT devices.Corporations have begun to embrace the IoT concept.Identifying true and suitable devices,security faults that might be used for bad reasons,and administration of such devices are only a few of the issues that IoT,a new concept in technological progress,provides.In some ways,IoT device traffic differs from regular device traffic.Devices with particular features can be classified into categories,irrespective of their function or performance.Ever-changing and complex environments,like a smart home,demand this classification scheme.A total of 41 IoT devices were employed in this investigation.To build a multiclass classification model,IoT devices contributed 13 network traffic parameters.To further preprocess the raw data received,preprocessing techniques like Normalization and Dataset Scaling were utilized.Feature engineering techniques can extract features from the text data.A total of 117,423 feature vectors are contained in the dataset after stratification,which are used to further improve the classification model.In this study,a variety of performance indicators were employed to show the performance of the logiboosted algorithms.Logi-XGB scored 80.2%accuracy following application of the logit-boosted algorithms to the dataset for classification,whereas Logi-GBC achieved 77.8%accuracy.Meanwhile,Logi-ABC attained 80.7%accuracy.Logi-CBC,on the other hand,received the highest Accuracy score of 85.6%.The accuracy of Logi-LGBM and Logi-HGBC was the same at 81.37%each.Our suggested Logi-CBC showed the highest accuracy on the dataset when compared to existing Logit-Boosted Algorithms used in earlier studies.
基金The authors gratefully acknowledge the Deanship of Scientific Research at Najran University in the Kingdom of Saudi Arabia for funding this work through the Research Groups funding program with the Grant Code Number(NU/RG/SERC/11/7).
文摘The smart grid has enabled users to control their home energy more effectively and efficiently.A home energy management system(HEM)is a challenging task because this requires the most effective scheduling of intelligent home appliances to save energy.Here,we presented a meta-heuristic-based HEM system that integrates the Greywolf Algorithm(GWA)and Harmony Search Algorithms(HSA).Moreover,a fusion initiated on HSA and GWA operators is used to optimize energy intake.Furthermore,many knapsacks are being utilized to ensure that peak-hour load usage for electricity customers does not surpass a certain edge.Hybridization has proven beneficial in achieving numerous objectives simultaneously,decreasing the peak-to-average ratio and power prices.Widespread MATLAB simulations are cast-off to evaluate the routine of the anticipated method,Harmony GWA(HGWA).The simulations are for a multifamily housing complex outfitted with various cool gadgets.The simulation results indicate that GWA functions better regarding cost savings than HSA.In reputes of PAR,HSA is significantly more effective than GWA.The suggested method reduces costs for single and ten-house construction by up to 2200.3 PKR,as opposed to 503.4 in GWA,398.10 in HSA and 640.3 in HGWA.The suggested approach performed better than HSA and GWA in PAR reduction.For single-family homes in HGWA,GWA and HSA,the reduction in PAR is 45.79%,21.92%and 20.54%,respectively.The hybrid approach,however,performs better than the currently used nature-inspired techniques in terms of Cost and PAR.
文摘Energy demand will continue to rise as a result of predicted population growth. In this work, a user-friendly home energy monitoring system based on IoT is described, which is capable of collecting, analyzing, and displaying data. Users register their sensors and devices on the monitoring platform. PostgreSQL and Elasticsearch databases are used to store the resulting measurements. In a smart home, the wireless sensor ACS712 was used to monitor the flow of electricity (current and voltage) for a household device. The user can share data about electricity consumption and costs with a third party via the private IPFS (InterPlanetary File System) network. A third party can download all the energy consumption data for a device or many devices from the platform for 1 day, 3 months, 6 months, and 1 year. The studies on the development of energy-efficient technology for home devices benefit greatly from the gathered data. For security in the system, it is preferred to run Keyrock Idm, Wilma Pep Proxy, and Orion Context Broker in HTTPS mode, and MQTTS is used to retrieve sensor data. The experimental results showed that the energy monitoring system accurately records voltage, current, active power, and the total amount of power used and offers low-cost solutions to the users using household devices in a day.
文摘In this paper, a smart home system based on ZigBee technology is designed. The system includes home network, home server and mobile terminal. The program is highly scalable and cost-effective. This paper developed the home server-side application based on MFC technology and the mobile terminal application. The mobile client can remotely control home devices and query the running state, electric energy information and historical data of home devices. At the same time, the home server-side application can store electric energy information and electricity consumption of home devices. Combined with household distributed photovoltaic generation system, the system can be applied to home energy management system. Through running tests and application, the results show that the system has realized basic functions of smart home and achieved the desired design goals.
文摘Anomaly detection in smart homes provides support to enhance the health and safety of people who live alone.Compared to the previous studies done on this topic,less attention has been given to hybrid methods.This paper presents a two-steps hybrid probabilistic anomaly detection model in the smart home.First,it employs various algorithms with different characteristics to detect anomalies from sensory data.Then,it aggregates their results using a Bayesian network.In this Bayesian network,abnormal events are detected through calculating the probability of abnormality given anomaly detection results of base methods.Experimental evaluation of a real dataset indicates the effectiveness of the proposed method by reducing false positives and increasing true positives.
基金supported by the National Natural Science Foundation of China(71871203,52005447,L1924063)Zhejiang Provincial Natural Science Foundation of China(LY18G010017,LQ21E050014).
文摘In a typical discrete manufacturing process,a new type of reconfigurable production line is introduced,which aims to help small-and mid-size enterprises to improve machine utilization and reduce production cost.In order to effectively handle the production scheduling problem for the manufacturing system,an improved multi-objective particle swarm optimization algorithm based on Brownian motion(MOPSO-BM)is proposed.Since the existing MOPSO algorithms are easily stuck in the local optimum,the global search ability of the proposed method is enhanced based on the random motion mechanism of the BM.To further strengthen the global search capacity,a strategy of fitting the inertia weight with the piecewise Gaussian cumulative distribution function(GCDF)is included,which helps to maintain an excellent convergence rate of the algorithm.Based on the commonly used indicators generational distance(GD)and hypervolume(HV),we compare the MOPSO-BM with several other latest algorithms on the benchmark functions,and it shows a better overall performance.Furthermore,for a real reconfigurable production line of smart home appliances,three algorithms,namely non-dominated sorting genetic algorithm-II(NSGA-II),decomposition-based MOPSO(dMOPSO)and MOPSO-BM,are applied to tackle the scheduling problem.It is demonstrated that MOPSO-BM outperforms the others in terms of convergence rate and quality of solutions.
文摘With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and sensors are connected to the internet, and these devices can easily become the target of attacks. To mitigate the risk of using smart home devices, the security and privacy thereof must be artificially smart so they can adapt based on user behavior and environments. The security and privacy systems must accurately analyze all actions and predict future actions to protect the smart home system. We propose a Hybrid Intrusion Detection (HID) system using machine learning algorithms, including random forest, X gboost, decision tree, K -nearest neighbors, and misuse detection technique.
文摘Home security should be a top concern for everyone who owns or rents a home. Moreover, safe and secure residential space is the necessity of every individual as most of the family members are working. The home is left unattended for most of the day-time and home invasion crimes are at its peak as constantly monitoring of the home is difficult. Another reason for the need of home safety is specifically when the elderly person is alone or the kids are with baby-sitter and servant. Home security system i.e. HomeOS is thus applicable and desirable for resident’s safety and convenience. This will be achieved by turning your home into a smart home by intelligent remote monitoring. Smart home comes into picture for the purpose of controlling and monitoring the home. It will give you peace of mind, as you can have a close watch and stay connected anytime, anywhere. But, is common man really concerned about home security? An investigative study was done by conducting a survey to get the inputs from different people from diverse backgrounds. The main motivation behind this survey was to make people aware of advanced HomeOS and analyze their need for security. This paper also studied the necessity of HomeOS investigative study in current situation where the home burglaries are rising at an exponential rate. In order to arrive at findings and conclusions, data were analyzed. The graphical method was employed to identify the relative significance of home security. From this analysis, we can infer that the cases of having kids and aged person at home or location of home contribute significantly to the need of advanced home security system. At the end, the proposed system model with its flow and the challenges faced while implementing home security systems are also discussed.
基金supported in part by the Department of Computer Science and Engineering at the American University of Sharjah,UAE
文摘Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays,home appliances are communicating with each other with home gateways,using existing short-range home area network communication protocols such as Zig Bee,Bluetooth,RFID,and Wi Fi. A Gateway allows homeowners and utilities to communicate remotely with the appliances via long-range communication networks such as GPRS,Wi Max,LTE,and power liner carrier. This paper utilizes the Internet of Things(Io T) concepts to monitor and control home appliances. Moreover,this paper proposes a framework that enables the integration and the coordination of Human-to-Appliance,Utility-toAppliance,and Appliance-to-Appliance. Utilizing the concepts of Internet of Things leads to one standard communication protocols,TCP/IPV6,which overcomes the many diverse home area networks and neighborhood area networks protocols. This work proposes a cloud based framework that enables the Io Ts integration and supports the coordination between devices,as well as with device-human interaction. A prototype is designed,implemented,and tested to validate the proposed solution.1 Index TermsInternet of things(Io T),Internet of things(Io T) cloud framework,smart homes,smart appliances.
基金supported by the National Natural Science Foundation of China(62071069)。
文摘User behavior prediction has become a core element to Internet of Things(IoT)and received promising attention in the related fields.Many existing IoT systems(e.g.smart home systems)have been deployed various sensors and the user’s behavior can be predicted through the sensor data.However,most of the existing sensor-based systems use the annotated behavior data which requires human intervention to achieve the behavior prediction.Therefore,it is a challenge to provide an automatic behavior prediction model based on the original sensor data.To solve the problem,this paper proposed a novel automatic annotated user behavior prediction(AAUBP)model.The proposed AAUBP model combined the Discontinuous Solving Order Sequence Mining(DVSM)behavior recognition model and behavior prediction model based on the Long Short Term Memory(LSTM)network.To evaluate the model,we performed several experiments on a real-world dataset tuning the parameters.The results showed that the AAUBP model can effectively recognize behaviors and had a good performance for behavior prediction.
基金supported by Qatar University Internal Grant No.IRCC2020-009.
文摘The revolution in Internet of Things(IoT)-based devices and applications has provided smart applications for humans.These applications range from healthcare to traffic-flow management,to communication devices,to smart security devices,and many others.In particular,government and private organizations are showing significant interest in IoT-enabled applications for smart homes.Despite the perceived benefits and interest,human safety is also a key concern.This research is aimed at systematically analyzing the available literature on smart homes and identifying areas of concern or risk with a view to supporting the design of safe and secure smart homes.For this systematic review process,relevant work in the most highly regarded journals published in the period 2016–2020(a section of 2020 is included)was analyzed.A final set of 99 relevant articles(journal articles,book sections,conference papers,and survey papers)was analyzed in this study.This analysis is focused on three research questions and relevant keywords.The systematic analysis results and key insights will help researchers and practitioners to make more informed decisions when dealing with the safety and security risks of smart homes,especially in emergency situations.
基金supported by the Basic Science Research Program through the National Research Foundation of Korea(NRF)funded by the Ministry of Education under Grant 2020R1I1A3058605The authors also extend their gratitude to the Deanship of Scientific Research at King Khalid University for funding this work through research groups programunder Grant Number R.G.P.1/399/42。
文摘The recent surge in development of smart homes and smart cities can be observed in many developed countries.While the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by the user who is outside the home might sound fancy,but it comes with a lot of potential threats.There can be many attackers who will be trying to take advantage of this.So,there is a need for designing a secure scheme whichwill be able to distinguish among genuine/authorized users of the system and attackers.And knowing about the details of when and what IoT devices are used by the user,the attacker can trace the daily activities of user and can plan an attack accordingly.Thus,the designed security scheme should guarantee confidentiality,anonymity and un-traceability.Most of the schemes proposed in the literature are either non-blockchain based which involves inherent problems of storing data in a single-server or assuming weaker attack models.In this work,we propose a novel scheme based on blockchain technology,assuming a stronger Canetti and Krawczyk(CK)-threat model.Through the formal and informal security,and comparative analysis,we show that the proposed scheme provides a superior security and more functionality features,with less communication cost and comparable computational cost as compared to other competent schemes.Moreover,the blockchain based simulation study on the proposed scheme has been conducted to show its feasibility in real-life application.
基金supported by Soongsil University research funding.
文摘Smart home technology provides consumers with network connectivity,automation or enhanced services for home devices.With the Internet of Things era,a vast data flow makes business platforms have to own the same computing power to match their business services.It achieves computing power through implementing big data algorithms deployed in the cloud data center.However,because of the far long geographical distance between the client and the data center or the massive data capacity gap,potentially high latency and high packet loss will reduce the usability of smart home systems if service providers deploy all services in the cloud data center.Edge computing and fog computing can significantly improve the utilization of network resources and reconstruct the network architecture for the user’s home.This article enables a fog resource-based resource allocation management technology.It provides a method that can more reasonably allocate network resources through a virtualized middle-tier method to ensure low response time and configure Quality of Service to ensure the use of delay-sensitive critical applications to improve the reliability of smart home communication system.Besides,the proposed method has is tested and verified by adjusting the variables of the network environment.We realize the optimization of resource allocation of client network without changing the hardware of client.
基金supported by the National Natural Science Foundation of China(61772196,61472136)the Hunan Provincial Focus Social Science Fund(2016ZDB006)+2 种基金Hunan Provincial Social Science Achievement Review Committee results in appraisal identification project(Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee(XSP 19ZD1005)financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology(2017TP1026)。
文摘In the recent Smart Home(SH)research work,intelligent service recommendation technique based on behavior recognition,it has been extensively preferred by researchers.However,most current research uses the Semantic recognition to construct the user’s basic behavior model.This method is usually restricted by environmental factors,the way these models are built makes it impossible for them to dynamically match the services that might be provided in the user environment.To solve this problem,this paper proposes a Semantic behavior assistance(Semantic behavior assistance,SBA).By joining the semantic model on the intelligent gateway,building an SA model,in this way,a logical Internet networks for smart home is established.At the same time,a behavior assistant method based on SBA model is proposed,among them,the user environment-related entities,sensors,devices,and user-related knowledge models exist in the logical interconnection network of the SH system through the semantic model.In this paper,the data simulation experiment is carried out on the method.The experimental results show that the SBA model is better than the knowledge-based pre-defined model.
基金National Natural Science Foundation of China(No. 70971021)
文摘With the emerging of sensor networks, research on sensor-based activity recognition has attracted much attention. Many existing methods cannot well deal with the cases that contain hundreds of sensors and their recognition accuracy is requisite to be further improved. A novel framework for recognizing human activities in smart home was presented. First, small, easy-to-install, and low-cost state change sensors were adopted for recording state change or use of the objects. Then the Bayesian belief network (BBN) was applied to conducting activity recognition by modeling statistical dependencies between sensor data and human activity. An edge-encode genetic algorithm (EEGA) approach was proposed to resolve the difficulties in structure learning of the BBN model under a high dimension space and large data set. Finally, some experiments were made using one publicly available dataset. The experimental results show that the EEGA algorithm is effective and efficient in learning the BBN structure and outperforms the conventional approaches. By conducting human activity recognition based on the testing samples, the BBN is effective to conduct human activity recognition and outperforms the naive Bayesian network (NBN) and multiclass naive Bayes classifier (MNBC).