Home automation systems have become more efficient and cost effective in recent years due to the availability of cheaper hardware and relentless work of start-ups striving to make a dent in this industry. The advancement of technologies like Bluetooth, Wi-Fi, RF, ZigBee, WiMAX, Zwave, etc. paved way for developers to explore many alternatives to design smart home system. On the other hand, that many options also increases the ways in which security breaches can occur. Hence, maintaining security and integrity of such automation systems to prevent theft has not only become an area of interest but also an area of need. One such method which is hard to circumvent is speech recognition -easily integrated with the home automation system and requiring minimum user interaction. There are advantages and disadvantages to this method like any other and, are addressed in this paper. The sheer range of options available to help secure semi-automated or fully-automated home systems makes it cumbersome to address every point of failure. The following study helps an individual to choose a best fit method that suits his/her requirements based on the home automation system.
Internet of Things (IoT) is gaining immense importance in today's world of fast connectivity. The Internet of things (IoT) enables us to connect and exchange data by forming a network of physical devices, vehicles, home appliances, and other items which are embedded with electronics, software, sensors, actuators, and connectivity. Internet of Things (IoT) has changed our lives by bringing a technological revolution. The imagination is the limit regarding the new devices that may arise in the market. With great diversity in the devices and the need to integrate new devices in our lives, there is no structure prepared for emerging diversity in IoT. This paper aims to provide some help by studying the various ways that contribute to the automation of part of the device integration process. IoT devices like unmanned aerial devices, robots and wearable equipment, etc., are widely used which occur in an organizations' inner network and can create a potential threat to the security of the intranet. In this paper we also study a system named IoT Eye, which discovers IoT devices in real time and can discover vulnerabilities before malicious actors and reduces cyber menace to the organization's network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.