• Title/Summary/Keyword: Smart Homes

Search Result 117, Processing Time 0.023 seconds

Study on the Camera Image Frame's Comparison for Authenticating Smart Phone Users (스마트폰 사용자 인증을 위한 카메라 영상 프레임 비교에 관한 연구)

  • Jang, Eun-Gyeom;Nam, Seok-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.155-164
    • /
    • 2011
  • APP based on the smart phone is being utilized to various scopes such as medical services in hospitals, financing services at banks and credit card companies, and ubiquitous technologies in companies and homes etc. In this service environment, exposures of smart phones cause loss of assets including leaks of official/private information by outsiders. Though secret keys, pattern recognition technologies, and single image authentication techniques are being applied as protective methods, but they have problems in that accesses are possible by utilizing static key values or images like pictures. Therefore, this study proposes a face authentication technology for protecting smart phones from these dangerous factors and problems. The proposed technology authenticates users by extracting key frames of user's facial images by real time, and also controls accesses to the smart phone. Authentication information is composed of multiple key frames, and the user' access is controlled by distinction algorism of similarity utilizing DC values of image's pixel and luminance.

A Design of Smart Sensor Framework for Smart Home System Bsed on Layered Architecture (계층 구조에 기반을 둔 스마트 홈 시스템를 위한 스마트 센서 프레임워크의 설계)

  • Chung, Won-Ho;Kim, Yu-Bin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.49-59
    • /
    • 2017
  • Smart sensing plays a key role in a variety of IoT applications, and its importance is growing more and more together with the development of artificial intelligence. Therefore the importance of smart sensors cannot be overemphasized. However, most studies related to smart sensors have been focusing on specific application purposes, for example, security, energy saving, monitoring, and there are not much effort on researches on how to efficiently configure various types of smart sensors to be needed in the future. In this paper, a component-based framework with hierarchical structure for efficient construction of smart sensor is proposed and its application to smart home is designed and implemented. The proposed method shows that various types of smart sensors to be appeared in the near future can be configured through the design and development of necessary components within the proposed software framework. In addition, since it has a layered architecture, the configuration of the smart sensor can be expanded by inserting the internal or external layers. In particular, it is possible to independently design the internal and external modules when designing an IoT application service through connection with the external device layer. A small-scale smart home system is designed and implemented using the proposed method, and a home cloud operating as an external layer, is further designed to accommodate and manage multiple smart homes. By developing and thus adding the components of each layer, it will be possible to efficiently extend the range of applications such as smart cars, smart buildings, smart factories an so on.

Long-Term Wildfire Reconstruction: In Need of Focused and Dedicated Pre-Planning Efforts

  • Harris, William S.;Choi, Jin Ouk;Lim, Jaewon;Lee, Yong-Cheol
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.923-928
    • /
    • 2022
  • Wildfire disasters in the United States impact lives and livelihoods by destroying private homes, businesses, community facilities, and infrastructure. Disaster victims suffer from damaged houses, inadequate shelters, inoperable civil infrastructure, and homelessness coupled with long-term recovery and reconstruction processes. Cities and their neighboring communities require an enormous commitment for a full recovery for as long as disaster recovery processes last. State, county, and municipal governments inherently have the responsibility to establish and provide governance and public services for the benefit and well being of community members. Municipal governments' comprehensive and emergency response plans are the artifacts of planning efforts that guide accomplishing those duties. Typically these plans include preparation and response to natural disasters, including wildfires. The standard wildfire planning includes and outlines (1) a wildfire hazard assessment, (2) response approaches to prevent human injury and minimize damage to physical property, and (3) near- and long-term recovery and reconstruction efforts. There is often a high level of detail in the assessment section, but the level of detail and specificity significantly lessons to general approaches in the long-term recovery subsection. This paper aims to document the extent of wildfire preparedness at the county level in general, focusing on the long-term recovery subsections of municipal plans. Based on the identified challenges, the researchers provide recommendations for better longer-term recovery and reconstruction opportunities: 1) building permit requirements, 2) exploration of the use of modular construction, 3) address through relief from legislative requirements, and 4) early, simple, funding, and the aid application process.

  • PDF

Implement IoT device Authentication System (IoT 단말 인증 시스템 구현)

  • Kang, Dong-Yeon;Jeon, Ji-Soo;Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.344-345
    • /
    • 2022
  • ogy is being used in many fields, such as smart farms, smart oceans, smart homes, and smart energy. Various IoT terminals are used for these IoT services. Here, IoT devices are physically installed in various places. A malicious attacker can access the IoT service using an unauthorized IoT device, access unauthorized important information, and then modify it. In this study, to solve these problems, we propose an authentication system for IoT devices used in IoT services. The IoT device authentication system proposed in this study consists of an authentication module mounted on the IoT device and an authentication module of the IoT server. If the IoT device authentication system proposed in this study is used, only authorized IoT devices can access the service and access of unauthorized IoT devices can be denied. Since this study proposes only the basic IoT device authentication mechanism, additional research on additional IoT device authentication functions according to the security strength is required.IoT technol

  • PDF

The Windows Push Server System with Smart Device Identifying Fingerprints over IEEE 802.15.4 Protocol (IEEE 802.15.4 통신을 활용한 지문인식 스마트 기기 연동 푸쉬서버 시스템)

  • Choi, Sung-Ja;Kang, Byeong-Gwon
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.419-425
    • /
    • 2012
  • In these days, the trends of home networking system is implementation of easily configured system with home security of emergency alarm and visitor verification services. In this paper, we implemented push server system based on Arduino of open source physical computation platform to verify visitors for the homes without home networking services. In the suggested system, visitor verification is performed in and out of home, and home access security of the system could be constructed with low-cost price by use of windows push server system and smart devices with alarm operation in corresponding to not allowed access trying.

Comprehensive Survey on Internet of Things, Architecture, Security Aspects, Applications, Related Technologies, Economic Perspective, and Future Directions

  • Gafurov, Khusanbek;Chung, Tai-Myoung
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.797-819
    • /
    • 2019
  • Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.

Artificial Intelligence Inspired Intelligent Trust Based Routing Algorithm for IoT

  • Kajol Rana;Ajay Vikram Singh;P. Vijaya
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.149-161
    • /
    • 2023
  • Internet of Things (IoT) is a relatively new concept that has gained immense popularity in a short period of time due to its wide applicability in making human life more convenient and automated. As an illustration: the development of smart homes, smart cities, etc. However, it is also accompanied by a substantial number of risks and flaws. IoT makes use of low-powered devices, so secure, less time-consuming and energy-intensive transmission (routing) of messages due to the limited availability of energy is one of the many and most significant concerns for IoT developers. The following paper presents a trust-based routing scenario for the Internet of Things (IoT) that exploits the past transmission record from the cupcarbon simulator's log files. Artificial Neural Network is used to quantify knowledge of trust, calculate the value of trust, and share this information with other network devices. As a human behavioural pattern, trust provides a superior method for making routing decisions. If there is a tie in the trust values and no other path is available, the remaining battery power is used to break the tie and make a forwarding decision; this is also seen as a more efficient use of the available resources. The proposed algorithm is observed to have superior energy consumption and routing decisions compared to conventional routing algorithms, and it improves the communication pattern.

Development of Product Control Apps using MQTT (MQTT를 이용한 제품 제어 앱 개발)

  • Dong-Jin Shin;Seung-Yeon Hwang;Jeong-Joon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.5
    • /
    • pp.77-82
    • /
    • 2023
  • Intelligence Home and Home Automation, which attracted attention before Smart Home, caused inconvenience to users by focusing on applying cutting-edge technologies to homes, and failed to popularize them due to lack of unemployment efficiency. However, with the 4th Industrial Revolution, various services using technologies related to big data, artificial intelligence, and the Internet of Things are increasing, and the rate of smart home services that operate, manage, and automate products at home is gradually increasing. In line with this trend, this paper implements a program app that can connect, manipulate, and manage products using MQTT server, Django web framework, and WIFI communication module.

Mobile Robot Control using Smart Phone for internet of Things (사물인터넷 구축을 위한 스마트폰을 이용한 이동로봇의 제어)

  • Yu, Je-Hun;Ahn, Seong-In;Lee, Sung-Won;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.5
    • /
    • pp.396-401
    • /
    • 2016
  • Owing to developments in the internet of things, many products have developed and various researches have processed. Smart home systems in Internet of things area are receiving attention from many people than the other areas. Autonomous mobile robots perform various parts in many industries. In this paper, a smart housekeeping robot was implemented using internet of things and an autonomous mobile robot. In order to make a smart housekeeping robot, Raspberry Pi, wireless USB camera, and uBrain robot of Huins Corp. is used. To control the robot, cell-phone connected with IP of Raspberry Pi, and then Raspberry Pi connected with uBrain robot using Bluetooth. a smart housekeeping robot was controlled using commands of a cell-phone application. If some user wants to move a robot automatically, we implemented that a robot can be chosen an autonomous driving mode from the user. In addition, we checked a realtime video using a cell-phone and computer. This smart housekeeping robot can help user check their own homes in real time.

Heterogeneous Interface Decision Engine and Architecture for Constructing Low Power Home Networks (저전력의 홈 네트워크 구축을 위한 이기종 인터페이스 결정 엔진 및 아키텍처)

  • Bae, Puleum;Jo, Yeong-Myeong;Moon, Eui-Kyum;Ko, Young-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.313-324
    • /
    • 2015
  • In this paper, in order to support the construction of a smart home environment of low power consumption, we propose a heterogeneous interface determination engine and architecture. Technology of "smart home" is in the spotlight according to the development of IT technology nowadays. Smart homes are configured with multiple sub-networks, and each sub-network is formed by the smart devices using various communication interfaces. Thus, in the smart home environment, interlocking technology between heterogeneous interfaces is essentially required for supporting communication between different networks. Further, each communication interface is a difference in power consumption, and home smart devices are often operated in 24 hours, especially smart phones and other wireless devices are sensitive to power consumption. Therefore, in order to build a energy efficient home network, It is important to select the appropriate interface to handle traffic depending on the situation. In this paper, we propose "The Heterogeneous Interface Decision Engine and Architecture for constructing of Low Power Home Network," and analyze the performance of the proposed method and verify the validity through experiments on the test bed.