A Smart Home System based on Internet of Things

被引:0
作者
Al-Mutawa, Rihab Fahd [1 ]
Eassa, Fathy Albouraey [1 ]
机构
[1] King Abdulaziz Univ, Fac Comp & Informat Technol, Jeddah, Saudi Arabia
关键词
Internet of Things (IoT); smart home; system; architecture; security; management; RECOGNITION;
D O I
10.14569/ijacsa.2020.0110234
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things (IoT) describes a network infrastructure of identifiable things that share data through the Internet. A smart home is one of the applications for the Internet of Things. In a smart home, household appliances could be monitored and controlled remotely. This raises a demand for reliable security solutions for IoT systems. Authorization and authentication are challenging IoT security operations that need to be considered. For instance, unauthorized access, such as cyber-attacks, to a smart home system could cause danger by controlling sensors and actuators, opening the doors for a thief. This paper applies an extra layer of security of multi-factor authentication to act as a prevention method for mitigating unauthorized access. One of those factors is face recognition, as it has recently become popular due to its non-invasive biometric techniques, which is easy to use with cameras attached to most trending computers and smartphones. In this paper, the gaps in existing IoT smart home systems have been analyzed, and we have suggested improvements for overcoming them by including necessary system modules and enhancing user registration and log-in authentication. We propose software architecture for implementing such a system. To the best of our knowledge, the existing IoT smart home management research does not support face recognition and liveness detection within the authentication operation of their suggested software architectures.
引用
收藏
页码:260 / 267
页数:8
相关论文
共 36 条
[1]  
Alexakis George, 2019, Designs, V3, DOI 10.3390/designs3030032
[2]  
[Anonymous], ARXIV160404823
[3]  
Arora G., 2019, SELFIE BIOMETRICS, P197, DOI [10.1007/978-3-030-26972-2_9, DOI 10.1007/978-3-030-26972-2_9]
[4]  
Dasgupta D., 2017, ADV USER AUTHENTICAT, P185, DOI DOI 10.1007/978-3-319-58808-7_5
[5]  
Dhivya B., 2019, IMPLEMENTATION SECUR
[6]   Speech Rhythm in L1 and L2 Arabic [J].
Droua-Hamdani, Ghania ;
Selouani, Sid-Ahmed ;
Alotaibi, Yousef A. ;
Boudraa, Malika .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2016, 41 (03) :1173-1181
[7]  
Dzogovic B, 2019, 2019 IEEE 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION SYSTEMS (ICCCS 2019), P543, DOI [10.1109/CCOMS.2019.8821727, 10.1109/ccoms.2019.8821727]
[8]   Managing the Internet of Things [J].
Elkhodr, Mahmoud ;
Shahrestani, Seyed ;
Cheung, Hon .
2015 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND DATA INTENSIVE SYSTEMS, 2015, :579-585
[9]   A Smart Home Application based on the Internet of Things Management Platform [J].
Elkhodr, Mahmoud ;
Shahrestani, Seyed ;
Cheung, Hon .
2015 IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND DATA INTENSIVE SYSTEMS, 2015, :491-496
[10]  
Gope R., 2018, CONCEPT REALITY INTE, P313