Smartphone: The Key to your Connected Smart Home

被引:0
作者
Pienaar, J. P. [1 ]
Fisher, R. M. [1 ,2 ]
Hancke, G. P. [2 ]
机构
[1] Univ Pretoria, Dept Elect Elect & Comp Engn, Pretoria, South Africa
[2] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
来源
PROCEEDINGS 2015 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN) | 2015年
关键词
Authentication; Facial Recognition; Biometrics; Internet-of-Things; User Centric Automation; RECOGNITION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Automation systems are gaining popularity around the world. The use of these powerful technologies for home security has been proposed and some systems have been developed. Other implementations see the user taking a central role in providing and receiving updates to the system. We propose a system making use of an Android based smartphone as the user control point. Our Android application allows for dual factor (facial and secret pin) based authentication in order to protect the privacy of the user. The system successfully implements facial recognition on the limited resources of a smartphone by making use of the Eigenfaces algorithm. The system we created was designed for home automation but makes use of technologies that allow it to be applied within any environment. This opens the possibility for more research into dual factor authentication and the architecture of our system provides a blue print for the implementation of home based automation systems. This system with minimal modifications can be applied within an industrial application.
引用
收藏
页码:999 / 1004
页数:6
相关论文
共 50 条
  • [41] GDPR Compliance IoT Authentication Model for Smart Home Environment
    Merzeh, Hisham Raad Jafer
    Kara, Mustafa
    Aydin, Muhammed Ali
    Balik, Hasan Huseyin
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 31 (03) : 1953 - 1970
  • [42] Light Weight Authentication Scheme for Smart Home IoT Devices
    Kumar, Vipin
    Malik, Navneet
    Singla, Jimmy
    Jhanjhi, N. Z.
    Amsaad, Fathi
    Razaque, Abdul
    CRYPTOGRAPHY, 2022, 6 (03)
  • [43] Secure user authentication and key agreement scheme for IoT device access control based smart home communications
    Sirisha Uppuluri
    G. Lakshmeeswari
    Wireless Networks, 2023, 29 : 1333 - 1354
  • [44] Secure user authentication and key agreement scheme for IoT device access control based smart home communications
    Uppuluri, Sirisha
    Lakshmeeswari, G.
    WIRELESS NETWORKS, 2023, 29 (03) : 1333 - 1354
  • [45] Secure and Lightweight Authentication With Key Agreement for Smart Wearable Systems
    Li, Jiping
    Zhang, Ning
    Ni, Jianbing
    Chen, Jing
    Du, Ruiying
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 7334 - 7344
  • [46] Humanoid Receptionist Connected to IoT Subsystems and Smart Infrastructure is Smarter than Expected
    Podpora, Michal
    Gardecki, Arkadiusz
    Kawala-Sterniuk, Aleksandra
    IFAC PAPERSONLINE, 2019, 52 (27): : 347 - 352
  • [47] Do you have your smartphone with you? Behavioral barriers for measuring everyday activities with smartphone sensors
    Keusch, Florian
    Wenz, Alexander
    Conrad, Frederick
    COMPUTERS IN HUMAN BEHAVIOR, 2022, 127
  • [48] On the Influence of Home Appliances on the Smartphone's Inertial Sensors
    Truzman, Shunit
    Revach, Guy
    Klein, Itzik
    2021 IEEE SENSORS, 2021,
  • [49] The 'Magic Paradigm' for Programming Smart Connected Devices
    Gueldenpfennig, Florian
    Dudo, Daniel
    Purgathofer, Peter
    CHI EA '19 EXTENDED ABSTRACTS: EXTENDED ABSTRACTS OF THE 2019 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2019,
  • [50] The role of smart data in smart home: health monitoring case
    Puustjarvi, Juha
    Puustjarvi, Leena
    7TH INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION TECHNOLOGY, 2015, 69 : 143 - 151