期刊文献+
共找到2,936篇文章
< 1 2 147 >
每页显示 20 50 100
Efficient and Secure IoT Based Smart Home Automation Using Multi-Model Learning and Blockchain Technology
1
作者 Nazik Alturki Raed Alharthi +5 位作者 Muhammad Umer Oumaima Saidani Amal Alshardan Reemah M.Alhebshi Shtwai Alsubai Ali Kashif Bashir 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第6期3387-3415,共29页
The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the d... The concept of smart houses has grown in prominence in recent years.Major challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device itself.Current home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical features.This paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in homes.We have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT devices.Our system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing devices.We have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache server.The feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time settings.It is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation systems.Additionally,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber threats.The trial results support the proposed system and demonstrate its potential for use in everyday life. 展开更多
关键词 Blockchain Internet of Things(IoT) smart home automation CYBERSECURITY
下载PDF
Blockchain-based DDoS attack mitigation protocol for device-to-device interaction in smart home
2
作者 Bello Musa Yakubu Majid Iqbal Khan +2 位作者 Abid Khan Farhana Jabeen Gwanggil Jeon 《Digital Communications and Networks》 SCIE CSCD 2023年第2期383-392,共10页
Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,S... Smart home devices are vulnerable to a variety of attacks.The matter gets more complicated when a number of devices collaborate to launch a colluding attack(e.g.,Distributed-Denial-of-Service(DDoS))in a network(e.g.,Smart home).To handle these attacks,most studies have hitherto proposed authentication protocols that cannot necessarily be implemented in devices,especially during Device-to-Device(D2D)interactions.Tapping into the potential of Ethereum blockchain and smart contracts,this work proposes a lightweight authentication mechanism that enables safe D2D interactions in a smart home.The Ethereum blockchain enables the implementation of a decentralized prototype as well as a peer-to-peer distributed ledger system.The work also uses a single server queuing system model and the authentication mechanism to curtail DDoS attacks by controlling the number of service requests in the system.The simulation was conducted twenty times,each with varying number of devices chosen at random(ranging from 1 to 30).Each requester device sends an arbitrary request with a unique resource requirement at a time.This is done to measure the system's consistency across a variety of device capabilities.The experimental results show that the proposed protocol not only prevents colluding attacks,but also outperforms the benchmark protocols in terms of computational cost,message processing,and response times. 展开更多
关键词 DDoS attack Device-to-device smart homes Blockchain AUTHENTICATION Ethereum smartcontract
下载PDF
Intelligent Energy Consumption For Smart Homes Using Fused Machine-Learning Technique
3
作者 Hanadi AlZaabi Khaled Shaalan +5 位作者 Taher M.Ghazal Muhammad A.Khan Sagheer Abbas Beenu Mago Mohsen A.A.Tomh Munir Ahmad 《Computers, Materials & Continua》 SCIE EI 2023年第1期2261-2278,共18页
Energy is essential to practically all exercises and is imperative for the development of personal satisfaction.So,valuable energy has been in great demand for many years,especially for using smart homes and structure... Energy is essential to practically all exercises and is imperative for the development of personal satisfaction.So,valuable energy has been in great demand for many years,especially for using smart homes and structures,as individuals quickly improve their way of life depending on current innovations.However,there is a shortage of energy,as the energy required is higher than that produced.Many new plans are being designed to meet the consumer’s energy requirements.In many regions,energy utilization in the housing area is 30%–40%.The growth of smart homes has raised the requirement for intelligence in applications such as asset management,energy-efficient automation,security,and healthcare monitoring to learn about residents’actions and forecast their future demands.To overcome the challenges of energy consumption optimization,in this study,we apply an energy management technique.Data fusion has recently attracted much energy efficiency in buildings,where numerous types of information are processed.The proposed research developed a data fusion model to predict energy consumption for accuracy and miss rate.The results of the proposed approach are compared with those of the previously published techniques and found that the prediction accuracy of the proposed method is 92%,which is higher than the previously published approaches. 展开更多
关键词 Energy consumption INTELLIGENT machine learning TECHNIQUE smart homes PREDICTION
下载PDF
Smart Home IoT Privacy and Security Preservation via Machine Learning Techniques
4
作者 Mubarak Almutairi 《Computers, Materials & Continua》 SCIE EI 2023年第1期1959-1983,共25页
The development and use of Internet of Things(IoT)devices have grown significantly in recent years.Advanced IoT device characteristics are mainly to blame for the wide range of applications that may now be achieved wi... The development and use of Internet of Things(IoT)devices have grown significantly in recent years.Advanced IoT device characteristics are mainly to blame for the wide range of applications that may now be achieved with IoT devices.Corporations have begun to embrace the IoT concept.Identifying true and suitable devices,security faults that might be used for bad reasons,and administration of such devices are only a few of the issues that IoT,a new concept in technological progress,provides.In some ways,IoT device traffic differs from regular device traffic.Devices with particular features can be classified into categories,irrespective of their function or performance.Ever-changing and complex environments,like a smart home,demand this classification scheme.A total of 41 IoT devices were employed in this investigation.To build a multiclass classification model,IoT devices contributed 13 network traffic parameters.To further preprocess the raw data received,preprocessing techniques like Normalization and Dataset Scaling were utilized.Feature engineering techniques can extract features from the text data.A total of 117,423 feature vectors are contained in the dataset after stratification,which are used to further improve the classification model.In this study,a variety of performance indicators were employed to show the performance of the logiboosted algorithms.Logi-XGB scored 80.2%accuracy following application of the logit-boosted algorithms to the dataset for classification,whereas Logi-GBC achieved 77.8%accuracy.Meanwhile,Logi-ABC attained 80.7%accuracy.Logi-CBC,on the other hand,received the highest Accuracy score of 85.6%.The accuracy of Logi-LGBM and Logi-HGBC was the same at 81.37%each.Our suggested Logi-CBC showed the highest accuracy on the dataset when compared to existing Logit-Boosted Algorithms used in earlier studies. 展开更多
关键词 IOT smart home machine learning PRIVACY SECURITY
下载PDF
Power Scheduling with Max User Comfort in Smart Home:Performance Analysis and Tradeoffs
5
作者 Muhammad Irfan Ch.Anwar Ul Hassan +7 位作者 Faisal Althobiani Nasir Ayub Raja Jalees Ul Hussen Khan Emad Ismat Ghandourah Majid A.Almas Saleh Mohammed Ghonaim V.R.Shamji Saifur Rahman 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1723-1740,共18页
The smart grid has enabled users to control their home energy more effectively and efficiently.A home energy management system(HEM)is a challenging task because this requires the most effective scheduling of intellige... The smart grid has enabled users to control their home energy more effectively and efficiently.A home energy management system(HEM)is a challenging task because this requires the most effective scheduling of intelligent home appliances to save energy.Here,we presented a meta-heuristic-based HEM system that integrates the Greywolf Algorithm(GWA)and Harmony Search Algorithms(HSA).Moreover,a fusion initiated on HSA and GWA operators is used to optimize energy intake.Furthermore,many knapsacks are being utilized to ensure that peak-hour load usage for electricity customers does not surpass a certain edge.Hybridization has proven beneficial in achieving numerous objectives simultaneously,decreasing the peak-to-average ratio and power prices.Widespread MATLAB simulations are cast-off to evaluate the routine of the anticipated method,Harmony GWA(HGWA).The simulations are for a multifamily housing complex outfitted with various cool gadgets.The simulation results indicate that GWA functions better regarding cost savings than HSA.In reputes of PAR,HSA is significantly more effective than GWA.The suggested method reduces costs for single and ten-house construction by up to 2200.3 PKR,as opposed to 503.4 in GWA,398.10 in HSA and 640.3 in HGWA.The suggested approach performed better than HSA and GWA in PAR reduction.For single-family homes in HGWA,GWA and HSA,the reduction in PAR is 45.79%,21.92%and 20.54%,respectively.The hybrid approach,however,performs better than the currently used nature-inspired techniques in terms of Cost and PAR. 展开更多
关键词 Metaheuristics techniques artificial intelligence energy management data analytics smart grid smart home
下载PDF
A Smart Home Energy Monitoring System Based on Internet of Things and Inter Planetary File System for Secure Data Sharing
6
作者 Aytun Onay Gökhan Ertürk +2 位作者 Cem Kıranlı Hande Ateş Yunus E. Isikdemir 《Journal of Computer and Communications》 2023年第10期64-81,共18页
Energy demand will continue to rise as a result of predicted population growth. In this work, a user-friendly home energy monitoring system based on IoT is described, which is capable of collecting, analyzing, and dis... Energy demand will continue to rise as a result of predicted population growth. In this work, a user-friendly home energy monitoring system based on IoT is described, which is capable of collecting, analyzing, and displaying data. Users register their sensors and devices on the monitoring platform. PostgreSQL and Elasticsearch databases are used to store the resulting measurements. In a smart home, the wireless sensor ACS712 was used to monitor the flow of electricity (current and voltage) for a household device. The user can share data about electricity consumption and costs with a third party via the private IPFS (InterPlanetary File System) network. A third party can download all the energy consumption data for a device or many devices from the platform for 1 day, 3 months, 6 months, and 1 year. The studies on the development of energy-efficient technology for home devices benefit greatly from the gathered data. For security in the system, it is preferred to run Keyrock Idm, Wilma Pep Proxy, and Orion Context Broker in HTTPS mode, and MQTTS is used to retrieve sensor data. The experimental results showed that the energy monitoring system accurately records voltage, current, active power, and the total amount of power used and offers low-cost solutions to the users using household devices in a day. 展开更多
关键词 Energy Monitoring System MQTT Fiware Architecture the ACS712 Wireless Sensor smart home
下载PDF
Design of Smart Home System Based on ZigBee Technology and R&D for Application 被引量:5
7
作者 Lin Gao Zhixin Wang +1 位作者 Jianlong Zhou Chao Zhang 《Energy and Power Engineering》 2016年第1期13-22,共10页
In this paper, a smart home system based on ZigBee technology is designed. The system includes home network, home server and mobile terminal. The program is highly scalable and cost-effective. This paper developed the... In this paper, a smart home system based on ZigBee technology is designed. The system includes home network, home server and mobile terminal. The program is highly scalable and cost-effective. This paper developed the home server-side application based on MFC technology and the mobile terminal application. The mobile client can remotely control home devices and query the running state, electric energy information and historical data of home devices. At the same time, the home server-side application can store electric energy information and electricity consumption of home devices. Combined with household distributed photovoltaic generation system, the system can be applied to home energy management system. Through running tests and application, the results show that the system has realized basic functions of smart home and achieved the desired design goals. 展开更多
关键词 smart home ZIGBEE home Server Mobile Terminal Distributed Photovoltaic Generation
下载PDF
I Smart Home移动通信系统设计 被引量:1
8
作者 蒋强 何都益 +1 位作者 何岚 房彪 《乐山师范学院学报》 2015年第8期14-17,共4页
智能家居技术正蓬勃发展,为紧跟信息技术发展前沿,文章利用labview开发了I smart home智能家居中控系统,通过串口与控制器进行通信。开发了基于Android的手机控制客户端,通过wifi移动通信技术实现了对控制器输出的控制。通过外接LED进... 智能家居技术正蓬勃发展,为紧跟信息技术发展前沿,文章利用labview开发了I smart home智能家居中控系统,通过串口与控制器进行通信。开发了基于Android的手机控制客户端,通过wifi移动通信技术实现了对控制器输出的控制。通过外接LED进行实验测试,结果表明技术路线正确可行。 展开更多
关键词 LABVIEW 智能家居 手机控制 WIFI控制
下载PDF
A Novel Probabilistic Hybrid Model to Detect Anomaly in Smart Homes 被引量:1
9
作者 Sasan Saqaeeyan Hamid Haj Seyyed Javadi Hossein Amirkhani 《Computer Modeling in Engineering & Sciences》 SCIE EI 2019年第12期815-834,共20页
Anomaly detection in smart homes provides support to enhance the health and safety of people who live alone.Compared to the previous studies done on this topic,less attention has been given to hybrid methods.This pape... Anomaly detection in smart homes provides support to enhance the health and safety of people who live alone.Compared to the previous studies done on this topic,less attention has been given to hybrid methods.This paper presents a two-steps hybrid probabilistic anomaly detection model in the smart home.First,it employs various algorithms with different characteristics to detect anomalies from sensory data.Then,it aggregates their results using a Bayesian network.In this Bayesian network,abnormal events are detected through calculating the probability of abnormality given anomaly detection results of base methods.Experimental evaluation of a real dataset indicates the effectiveness of the proposed method by reducing false positives and increasing true positives. 展开更多
关键词 smart homes sensory data anomaly detection Bayesian networks ensemble method
下载PDF
Multi-objective reconfigurable production line scheduling for smart home appliances 被引量:1
10
作者 LI Shiyun ZHONG Sheng +4 位作者 PEI Zhi YI Wenchao CHEN Yong WANG Cheng ZHANG Wenzhu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第2期297-317,共21页
In a typical discrete manufacturing process,a new type of reconfigurable production line is introduced,which aims to help small-and mid-size enterprises to improve machine utilization and reduce production cost.In ord... In a typical discrete manufacturing process,a new type of reconfigurable production line is introduced,which aims to help small-and mid-size enterprises to improve machine utilization and reduce production cost.In order to effectively handle the production scheduling problem for the manufacturing system,an improved multi-objective particle swarm optimization algorithm based on Brownian motion(MOPSO-BM)is proposed.Since the existing MOPSO algorithms are easily stuck in the local optimum,the global search ability of the proposed method is enhanced based on the random motion mechanism of the BM.To further strengthen the global search capacity,a strategy of fitting the inertia weight with the piecewise Gaussian cumulative distribution function(GCDF)is included,which helps to maintain an excellent convergence rate of the algorithm.Based on the commonly used indicators generational distance(GD)and hypervolume(HV),we compare the MOPSO-BM with several other latest algorithms on the benchmark functions,and it shows a better overall performance.Furthermore,for a real reconfigurable production line of smart home appliances,three algorithms,namely non-dominated sorting genetic algorithm-II(NSGA-II),decomposition-based MOPSO(dMOPSO)and MOPSO-BM,are applied to tackle the scheduling problem.It is demonstrated that MOPSO-BM outperforms the others in terms of convergence rate and quality of solutions. 展开更多
关键词 reconfigurable production line improved particle swarm optimization(PSO) multi-objective optimization flexible flowshop scheduling smart home appliances
下载PDF
A Hybrid Intrusion Detection System for Smart Home Security Based on Machine Learning and User Behavior 被引量:1
11
作者 Faisal Alghayadh Debatosh Debnath 《Advances in Internet of Things》 2021年第1期10-25,共16页
With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and ... With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and sensors are connected to the internet, and these devices can easily become the target of attacks. To mitigate the risk of using smart home devices, the security and privacy thereof must be artificially smart so they can adapt based on user behavior and environments. The security and privacy systems must accurately analyze all actions and predict future actions to protect the smart home system. We propose a Hybrid Intrusion Detection (HID) system using machine learning algorithms, including random forest, X gboost, decision tree, K -nearest neighbors, and misuse detection technique. 展开更多
关键词 Anomaly Detection smart home Systems Behavioral Patterns SECURITY Threats
下载PDF
上下文感知在Smart Home系统中的应用
12
作者 吕莉 罗杰 朱华生 《计算机工程与设计》 CSCD 北大核心 2008年第19期5146-5146,F0003,共2页
针对Smart Home环境的复杂性问题,提出了利用上下文技术来提高其智能化的方法。阐述了在普适环境下的上下文在智能家居环境中的重要性,介绍了上下文和上下文感知计算的定义,采用了基元组的形式定义了不同的上下文信息;提出了基于上下文... 针对Smart Home环境的复杂性问题,提出了利用上下文技术来提高其智能化的方法。阐述了在普适环境下的上下文在智能家居环境中的重要性,介绍了上下文和上下文感知计算的定义,采用了基元组的形式定义了不同的上下文信息;提出了基于上下文感知的Smart Home系统模型,并对其功能进行了详细的描述;在Smart Home系统中,应用该模型对具体的上下文实例进行了描述和推理。 展开更多
关键词 上下文 上下文感知计算 smarthome 模型 推理
下载PDF
An Investigative Study for Smart Home Security: Issues, Challenges and Countermeasures 被引量:1
13
作者 Sudhir Chitnis Neha Deshpande Arvind Shaligram 《Wireless Sensor Network》 2016年第4期61-68,共8页
Home security should be a top concern for everyone who owns or rents a home. Moreover, safe and secure residential space is the necessity of every individual as most of the family members are working. The home is left... Home security should be a top concern for everyone who owns or rents a home. Moreover, safe and secure residential space is the necessity of every individual as most of the family members are working. The home is left unattended for most of the day-time and home invasion crimes are at its peak as constantly monitoring of the home is difficult. Another reason for the need of home safety is specifically when the elderly person is alone or the kids are with baby-sitter and servant. Home security system i.e. HomeOS is thus applicable and desirable for resident’s safety and convenience. This will be achieved by turning your home into a smart home by intelligent remote monitoring. Smart home comes into picture for the purpose of controlling and monitoring the home. It will give you peace of mind, as you can have a close watch and stay connected anytime, anywhere. But, is common man really concerned about home security? An investigative study was done by conducting a survey to get the inputs from different people from diverse backgrounds. The main motivation behind this survey was to make people aware of advanced HomeOS and analyze their need for security. This paper also studied the necessity of HomeOS investigative study in current situation where the home burglaries are rising at an exponential rate. In order to arrive at findings and conclusions, data were analyzed. The graphical method was employed to identify the relative significance of home security. From this analysis, we can infer that the cases of having kids and aged person at home or location of home contribute significantly to the need of advanced home security system. At the end, the proposed system model with its flow and the challenges faced while implementing home security systems are also discussed. 展开更多
关键词 homeOS smart home Intelligent Remote Monitoring Graphical Method home Security System
下载PDF
Internet of Things Cloud Framework for Smart Homes
14
作者 RaafatAburukba A.R.Al-Ali +1 位作者 Mohammed Rashid Rizwan Hassan 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第4期319-327,共9页
Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays,home appliances are communicating with each other with home gateways,using existing short-range home area network ... Smart appliances and renewable energy resources are becoming an integral part of smart homes. Nowadays,home appliances are communicating with each other with home gateways,using existing short-range home area network communication protocols such as Zig Bee,Bluetooth,RFID,and Wi Fi. A Gateway allows homeowners and utilities to communicate remotely with the appliances via long-range communication networks such as GPRS,Wi Max,LTE,and power liner carrier. This paper utilizes the Internet of Things(Io T) concepts to monitor and control home appliances. Moreover,this paper proposes a framework that enables the integration and the coordination of Human-to-Appliance,Utility-toAppliance,and Appliance-to-Appliance. Utilizing the concepts of Internet of Things leads to one standard communication protocols,TCP/IPV6,which overcomes the many diverse home area networks and neighborhood area networks protocols. This work proposes a cloud based framework that enables the Io Ts integration and supports the coordination between devices,as well as with device-human interaction. A prototype is designed,implemented,and tested to validate the proposed solution.1 Index TermsInternet of things(Io T),Internet of things(Io T) cloud framework,smart homes,smart appliances. 展开更多
关键词 Internet of things(IoT) Internet of things(Io T) cloud framework smart homes smart appliances
下载PDF
A Novel User Behavior Prediction Model Based on Automatic Annotated Behavior Recognition in Smart Home Systems
15
作者 Ningbo Zhang Yajie Yan +1 位作者 Xuzhen Zhu Jing Wang 《China Communications》 SCIE CSCD 2022年第9期116-132,共17页
User behavior prediction has become a core element to Internet of Things(IoT)and received promising attention in the related fields.Many existing IoT systems(e.g.smart home systems)have been deployed various sensors a... User behavior prediction has become a core element to Internet of Things(IoT)and received promising attention in the related fields.Many existing IoT systems(e.g.smart home systems)have been deployed various sensors and the user’s behavior can be predicted through the sensor data.However,most of the existing sensor-based systems use the annotated behavior data which requires human intervention to achieve the behavior prediction.Therefore,it is a challenge to provide an automatic behavior prediction model based on the original sensor data.To solve the problem,this paper proposed a novel automatic annotated user behavior prediction(AAUBP)model.The proposed AAUBP model combined the Discontinuous Solving Order Sequence Mining(DVSM)behavior recognition model and behavior prediction model based on the Long Short Term Memory(LSTM)network.To evaluate the model,we performed several experiments on a real-world dataset tuning the parameters.The results showed that the AAUBP model can effectively recognize behaviors and had a good performance for behavior prediction. 展开更多
关键词 Internet of Things behavior recognition behavior prediction LSTM smart home systems
下载PDF
Systematic Analysis of Safety and Security Risks in Smart Homes
16
作者 Habib Ullah Khan Mohammad Kamel Alomari +5 位作者 Sulaiman Khan Shah Nazir Asif Qumer Gill Alanoud Ali Al-Maadid Zaki Khalid Abu-Shawish Mostafa Kamal Hassan 《Computers, Materials & Continua》 SCIE EI 2021年第7期1409-1428,共20页
The revolution in Internet of Things(IoT)-based devices and applications has provided smart applications for humans.These applications range from healthcare to traffic-flow management,to communication devices,to smart... The revolution in Internet of Things(IoT)-based devices and applications has provided smart applications for humans.These applications range from healthcare to traffic-flow management,to communication devices,to smart security devices,and many others.In particular,government and private organizations are showing significant interest in IoT-enabled applications for smart homes.Despite the perceived benefits and interest,human safety is also a key concern.This research is aimed at systematically analyzing the available literature on smart homes and identifying areas of concern or risk with a view to supporting the design of safe and secure smart homes.For this systematic review process,relevant work in the most highly regarded journals published in the period 2016–2020(a section of 2020 is included)was analyzed.A final set of 99 relevant articles(journal articles,book sections,conference papers,and survey papers)was analyzed in this study.This analysis is focused on three research questions and relevant keywords.The systematic analysis results and key insights will help researchers and practitioners to make more informed decisions when dealing with the safety and security risks of smart homes,especially in emergency situations. 展开更多
关键词 smart buildings IOT smart homes systematic literature review prototype model
下载PDF
Blockchain-Based Robust Data Security Scheme in IoT-Enabled Smart Home
17
作者 Anusha Vangala Ashok Kumar Das +1 位作者 YoungHo Park Sajjad Shaukat Jamal 《Computers, Materials & Continua》 SCIE EI 2022年第8期3549-3570,共22页
The recent surge in development of smart homes and smart cities can be observed in many developed countries.While the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by ... The recent surge in development of smart homes and smart cities can be observed in many developed countries.While the idea to control devices that are in home(embedded with the Internet of Things(IoT)smart devices)by the user who is outside the home might sound fancy,but it comes with a lot of potential threats.There can be many attackers who will be trying to take advantage of this.So,there is a need for designing a secure scheme whichwill be able to distinguish among genuine/authorized users of the system and attackers.And knowing about the details of when and what IoT devices are used by the user,the attacker can trace the daily activities of user and can plan an attack accordingly.Thus,the designed security scheme should guarantee confidentiality,anonymity and un-traceability.Most of the schemes proposed in the literature are either non-blockchain based which involves inherent problems of storing data in a single-server or assuming weaker attack models.In this work,we propose a novel scheme based on blockchain technology,assuming a stronger Canetti and Krawczyk(CK)-threat model.Through the formal and informal security,and comparative analysis,we show that the proposed scheme provides a superior security and more functionality features,with less communication cost and comparable computational cost as compared to other competent schemes.Moreover,the blockchain based simulation study on the proposed scheme has been conducted to show its feasibility in real-life application. 展开更多
关键词 Internet of things(IoT) smart home ubiquitous computing blockchain SECURITY
下载PDF
Design, Implementation and Verification of Topology Network Architecture of Smart Home Tree
18
作者 Youbang Guan Bong Jun Choi 《Computers, Materials & Continua》 SCIE EI 2021年第8期2399-2411,共13页
Smart home technology provides consumers with network connectivity,automation or enhanced services for home devices.With the Internet of Things era,a vast data flow makes business platforms have to own the same comput... Smart home technology provides consumers with network connectivity,automation or enhanced services for home devices.With the Internet of Things era,a vast data flow makes business platforms have to own the same computing power to match their business services.It achieves computing power through implementing big data algorithms deployed in the cloud data center.However,because of the far long geographical distance between the client and the data center or the massive data capacity gap,potentially high latency and high packet loss will reduce the usability of smart home systems if service providers deploy all services in the cloud data center.Edge computing and fog computing can significantly improve the utilization of network resources and reconstruct the network architecture for the user’s home.This article enables a fog resource-based resource allocation management technology.It provides a method that can more reasonably allocate network resources through a virtualized middle-tier method to ensure low response time and configure Quality of Service to ensure the use of delay-sensitive critical applications to improve the reliability of smart home communication system.Besides,the proposed method has is tested and verified by adjusting the variables of the network environment.We realize the optimization of resource allocation of client network without changing the hardware of client. 展开更多
关键词 Topology network smart home tree resource allocation internet of things
下载PDF
A New Behavior-Assisted Semantic Recognition Method for Smart Home
19
作者 Weijin Jiang Xiaoliang Liu +3 位作者 Xingbao Liu Yang Wang Sijian Lv Fang Ye 《China Communications》 SCIE CSCD 2020年第6期26-36,共11页
In the recent Smart Home(SH)research work,intelligent service recommendation technique based on behavior recognition,it has been extensively preferred by researchers.However,most current research uses the Semantic rec... In the recent Smart Home(SH)research work,intelligent service recommendation technique based on behavior recognition,it has been extensively preferred by researchers.However,most current research uses the Semantic recognition to construct the user’s basic behavior model.This method is usually restricted by environmental factors,the way these models are built makes it impossible for them to dynamically match the services that might be provided in the user environment.To solve this problem,this paper proposes a Semantic behavior assistance(Semantic behavior assistance,SBA).By joining the semantic model on the intelligent gateway,building an SA model,in this way,a logical Internet networks for smart home is established.At the same time,a behavior assistant method based on SBA model is proposed,among them,the user environment-related entities,sensors,devices,and user-related knowledge models exist in the logical interconnection network of the SH system through the semantic model.In this paper,the data simulation experiment is carried out on the method.The experimental results show that the SBA model is better than the knowledge-based pre-defined model. 展开更多
关键词 smart home(SH) semantic behavior assistance(SBA) user behavior intention behavior assisted method
下载PDF
An EEGA-Based Bayesian Belief Network Model for Recognition of Human Activity in Smart Home
20
作者 曾献辉 陈晓婷 叶承阳 《Journal of Donghua University(English Edition)》 EI CAS 2012年第6期497-500,共4页
With the emerging of sensor networks, research on sensor-based activity recognition has attracted much attention. Many existing methods cannot well deal with the cases that contain hundreds of sensors and their recogn... With the emerging of sensor networks, research on sensor-based activity recognition has attracted much attention. Many existing methods cannot well deal with the cases that contain hundreds of sensors and their recognition accuracy is requisite to be further improved. A novel framework for recognizing human activities in smart home was presented. First, small, easy-to-install, and low-cost state change sensors were adopted for recording state change or use of the objects. Then the Bayesian belief network (BBN) was applied to conducting activity recognition by modeling statistical dependencies between sensor data and human activity. An edge-encode genetic algorithm (EEGA) approach was proposed to resolve the difficulties in structure learning of the BBN model under a high dimension space and large data set. Finally, some experiments were made using one publicly available dataset. The experimental results show that the EEGA algorithm is effective and efficient in learning the BBN structure and outperforms the conventional approaches. By conducting human activity recognition based on the testing samples, the BBN is effective to conduct human activity recognition and outperforms the naive Bayesian network (NBN) and multiclass naive Bayes classifier (MNBC). 展开更多
关键词 human activity recognition edge-encoded genetic algorithm(EEGA) Bayesian belief network (BBN) smart home
下载PDF
上一页 1 2 147 下一页 到第
使用帮助 返回顶部