Smartphone: The Key to your Connected Smart Home

被引:0
作者
Pienaar, J. P. [1 ]
Fisher, R. M. [1 ,2 ]
Hancke, G. P. [2 ]
机构
[1] Univ Pretoria, Dept Elect Elect & Comp Engn, Pretoria, South Africa
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
来源
PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN) | 2015年
关键词
Authentication; Facial Recognition; Biometrics; Internet-of-Things; User Centric Automation; RECOGNITION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Automation systems are gaining popularity around the world. The use of these powerful technologies for home security has been proposed and some systems have been developed. Other implementations see the user taking a central role in providing and receiving updates to the system. We propose a system making use of an Android based smartphone as the user control point. Our Android application allows for dual factor (facial and secret pin) based authentication in order to protect the privacy of the user. The system successfully implements facial recognition on the limited resources of a smartphone by making use of the Eigenfaces algorithm. The system we created was designed for home automation but makes use of technologies that allow it to be applied within any environment. This opens the possibility for more research into dual factor authentication and the architecture of our system provides a blue print for the implementation of home based automation systems. This system with minimal modifications can be applied within an industrial application.
引用
收藏
页码:999 / 1004
页数:6
相关论文
共 50 条
  • [1] Anonymous Secure Framework in Connected Smart Home Environments
    Kumar, Pardeep
    Braeken, An
    Gurtov, Andrei
    Iinatti, Jari
    Ha, Phuong Hoai
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (04) : 968 - 979
  • [2] Traversing the Quagmire that is Privacy in your Smart Home
    Gao, Chuhan
    Chandrasekaran, Varun
    Fawaz, Kassem
    Banerjee, Suman
    PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18), 2018, : 22 - 28
  • [3] A Secure and Dependable Connected Smart Home System For Elderly
    Alelaiwi, Abdulhameed
    Hassan, Mohammad Mehedi
    Bhuiyan, Md Zakirul Alam
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 722 - 727
  • [4] mIDoT-key: A Smart Key Instantly Generated on Your Item
    Kudo, Yuta
    Yachida, Shoji
    Takahashi, Toru
    Ishiyama, Rui
    PROCEEDINGS OF THE 2017 ACM MULTIMEDIA CONFERENCE (MM'17), 2017, : 1243 - 1244
  • [5] Gesture Control of ZigBee Connected Smart Home Internet of Things
    Rashid, M. A.
    Han, Xiao
    2016 5TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS AND VISION (ICIEV), 2016, : 667 - 670
  • [6] Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment
    Wazid, Mohammad
    Das, Ashok Kumar
    Odelu, Vanga
    Kumar, Neeraj
    Susilo, Willy
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) : 391 - 406
  • [7] Demo Abstract: iCrutch: A Smartphone-based Intelligent Crutch for Smart Home Applications
    Lin, Ke
    Cheng, Siyao
    Li, Jianzhong
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 1328 - 1329
  • [8] Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home
    Huang, Zhigang
    Zhang, Lei
    Meng, Xinyu
    Choo, Kim-Kwang Raymond
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (02) : 1039 - 1047
  • [9] Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography
    Dey, Shreya
    Hossain, Ashraf
    IEEE SENSORS LETTERS, 2019, 3 (04)
  • [10] Design of a Novel Lightweight Key Establishment Mechanism for Smart Home Systems
    Jawadwala, Qaidjohar
    Patil, Kailas
    2016 11TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2016, : 469 - 473