2017
DOI: 10.22616/erdev2017.16.n228
|View full text |Cite
|
Sign up to set email alerts
|

Integration of Fibaro system to intruder and hold-up alarm systems

Abstract: Abstract. The Fibaro is a system for automation of smart households, which ensures not only the functions of comfort and power saving, but it also offers the security functions. These security functions were checked and examined in this paper from several perspectives. The evaluation of two submitted model realizations of Intruder and Hold-Up Alarm Systems (I&HAS) with using of the Fibaro system was presented: the Proprietary model, which works with manufacturers' detectors, and the Integration model including… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…It can also allow people to connect via a mobile application or web interface anywhere. Advanced technology can control a modern business from anywhere and save time and money [29].…”
Section: Iot Thermostatmentioning
confidence: 99%
“…It can also allow people to connect via a mobile application or web interface anywhere. Advanced technology can control a modern business from anywhere and save time and money [29].…”
Section: Iot Thermostatmentioning
confidence: 99%
“…The blockchain system verifies all the operations that are made, and once the transaction is done, it keeps track of all the transactions, therefore being impossible to destroy those records. The blockchain gives a real verification to the transactions and keeps a solid record which can never be misguided [10]. Blockchain technology can be used for all multilevel transactions where high traceability and visibility is needed.…”
Section: Security For the Sealedgrid Architecturementioning
confidence: 99%
“…Each application frame can be encrypted and signed, which are enclosed in a security frame. Symmetric encryption is used in this frame by utilizing the Advanced Encryption Standard, and three shared keys [8].…”
Section: B Z-wave Securitymentioning
confidence: 99%