2022
DOI: 10.11591/ijeecs.v26.i3.pp1581-1588
|View full text |Cite
|
Sign up to set email alerts
|

A survey of security and smart home automation based on internet of things technology

Abstract: The <span>internet of things (IoT) refers to the physical tools that are embedded with Internet, software, electronics, sensors and network connectivity. This involves many different systems, for example, healthcare, smart home and so on. The security problem of the Internet of Things and the Smart Home infrastructure is considered, which has become an urgent issue due to the high popularity, low systemic research and the growth of threats to "us" (people seeking comfort) from "them" (surrounding things,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Developers with little or no experience in IoT or programming can quickly build functional projects using the app's intuitive interface and pre-built widgets. At the same time, experienced developers can leverage Blynk's advanced features and integrations to create complex and powerful IoT solutions [46]. To use Blynk, we need to first create an account on the Blynk website and then download the Blynk app onto the patient's mobile device.…”
Section: Softwarementioning
confidence: 99%
“…Developers with little or no experience in IoT or programming can quickly build functional projects using the app's intuitive interface and pre-built widgets. At the same time, experienced developers can leverage Blynk's advanced features and integrations to create complex and powerful IoT solutions [46]. To use Blynk, we need to first create an account on the Blynk website and then download the Blynk app onto the patient's mobile device.…”
Section: Softwarementioning
confidence: 99%
“…Due to the large amount of sensitive data processed over the Internet using IoT devices, the IoT network is associated with security risks. Intruders can harm not only objects but also people, for example, by disabling a video surveillance system [6]. Blockchain can be used to improve the security of IoT systems and ensure the confidentiality of sensitive data [1].…”
Section: Introductionmentioning
confidence: 99%
“…Anomaly detection is a key dispute in assuring security and avoiding malicious attacks in WSNs [14]. Elliptic curve digital signature (ECDSA) algorithm to evaluate the HELLO message count, key generation time, and packet size [15]. Elliptical curve cryptography and ECDSA algorithm have computationally efficient and offer more security [16].…”
Section: Introductionmentioning
confidence: 99%