2020
DOI: 10.11591/ijece.v10i3.pp2617-2624
|View full text |Cite
|
Sign up to set email alerts
|

Design and implementation home security system and monitoring by using wireless sensor networks WSN/internet of things IOT

Abstract: The dramatic advancments on communication and networking technologies have led to the emergence of Internet-of-Things (IoT). IoT technology has opened the door for various applications. In particular, the home automation was one of the common applications that took the advantage of IoT. Several research efforts have addressed the home automation system using IoT covering wide range of functionalities. One of the concerning tasks is providing a secure system that can give alarms for suspicious activities within… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(24 citation statements)
references
References 19 publications
0
21
0
Order By: Relevance
“…Research on this subject has two main subtopics. e first subtopic is related to security against cyberattacks in the home network [112,[254][255][256][257][258][259], and the second one is related to home automation providing safety against external physical intrusion [260][261][262][263][264][265][266].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…Research on this subject has two main subtopics. e first subtopic is related to security against cyberattacks in the home network [112,[254][255][256][257][258][259], and the second one is related to home automation providing safety against external physical intrusion [260][261][262][263][264][265][266].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%
“…In the temperature measurement range DHT22 ranges from -40 to +125 °C with a 0.5 °C error rate. As the increasing of the air temperature, it holds extra dampness, consequently, the associated humidity varies with the temperature [20,21]. The electrical operating voltage for each of the sensors is 5-3 volts, while the maximum current used when measuring is 2.5 mA.…”
Section: Dht22 Sensormentioning
confidence: 99%
“…The problems of ensuring the safety of IoT are actively discussed in the scientific literature, various solutions are proposed. For example, ensuring safety by reducing the response time of data transfer protocols in IoT is proposed [18], [19]. To ensure the safety of IoT switching, new algorithms for optimizing things are proposed [20].…”
Section: Correlation Of Russian and International Approaches To Information Security Of The It Sectormentioning
confidence: 99%
“…A set of measures by the FSTEC was proposed to address information security [22]: identification and authentication of access subjects and access objects, access control of access subjects to access objects, limitation of the software environment, protection of machine media, check the security event, antivirus protection, intrusion detection (prevention), control (analysis) of data security, ensure the integrity of the information system and data, ensure the availability of data, protect the virtualization environment, protect technical means, protect the information system (i.e., its means, communication, and data transmission systems), identify incidents, and configuration management for the information s and data protection systems. Scientists and practitioners offer solutions to the above problems [10]- [18], [21], [26].…”
Section: Figure 1 the Iot Reference Modelmentioning
confidence: 99%