2016
DOI: 10.1016/j.pisc.2016.04.104
|View full text |Cite
|
Sign up to set email alerts
|

Email based remote access and surveillance system for smart home infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…There are many motivations to design and develop applications in smart homes, the main ones being independent living [ 3 , 7 , 9 , 10 , 11 , 57 ]; wellbeing [ 4 , 6 , 8 , 12 , 58 ]; efficient use of electricity [ 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , 71 , 72 ]; and safety and security [ 73 , 74 , 75 , 76 , 77 , 78 , 79 , 80 , 81 , 82 , 83 , 84 , 85 , 86 , 87 , 88 ].…”
Section: Related Workmentioning
confidence: 99%
“…There are many motivations to design and develop applications in smart homes, the main ones being independent living [ 3 , 7 , 9 , 10 , 11 , 57 ]; wellbeing [ 4 , 6 , 8 , 12 , 58 ]; efficient use of electricity [ 59 , 60 , 61 , 62 , 63 , 64 , 65 , 66 , 67 , 68 , 69 , 70 , 71 , 72 ]; and safety and security [ 73 , 74 , 75 , 76 , 77 , 78 , 79 , 80 , 81 , 82 , 83 , 84 , 85 , 86 , 87 , 88 ].…”
Section: Related Workmentioning
confidence: 99%
“…Other works discuss secure healthcare architecture and communication of nodes in a Constrained Application Protocol (CoAP; an application layer protocol that is prepared for use in Internet devices in IoT smart homes, such as wireless sensor network nodes) network [19], as well as security challenges between heterogeneous devices and different applications in smart homes [7]. Some studies focus on password security and applications for IoT smart home systems [20] [21], secure software updates in smart home devices, and security system devices (e.g., surveillance cameras) and their use in smart homes [22]. Home automation and security threats are also defined, A new solution is presented to address risk reduction in cases of privacy breaches in smart energy management systems [23].…”
Section: High (H)mentioning
confidence: 99%
“…In other to tackle the high cost of deployment and further encourage widespread adoption of Smart Home technologies, innovative yet effective new ways of applying technology in the Smart Home architecture could be explored. For instance, the use of image processing based mechanism, generic email service protocols and providers to provide remote access, security and surveillance for the Smart Home (Pooshkar, Rohit & Mahesh, 2016). This ingenious mechanism for access control and surveillance is cost effective, efficient, reliable, robust and can be easily deployed on generic hardware.…”
Section: Cutting Smart Home Design Costmentioning
confidence: 99%