• Title/Summary/Keyword: home security

Search Result 735, Processing Time 0.03 seconds

Design and implementation of security and control system for home electronic appliances

  • Kim, Eung-Soo;Kim, Won-Jae;Jo, Jun-Mo
    • Journal of Sensor Science and Technology
    • /
    • v.15 no.2
    • /
    • pp.134-138
    • /
    • 2006
  • We have been designed and developed a security system including home automation with control of electronic appliances. The system can detect intruders using infrared sensors and monitor rooms or offices in real time by web camera. The password was needed to enter a house or office. The operation of home electronic appliances also can be easy and remotely controlled by Internet. The system was designed by VHDL. The size of the fabricated system is small and it showed good performance.

A study of the DHCP message authentication at home network (홈네트워크에서 DHCP 메시지 인증에 관한 연구)

  • Ju, Hong-Il;Hwang, Jin-Bum;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.837-840
    • /
    • 2005
  • 본 논문은 DHCP(Dynamic Host Configuration Protocol) 메시지 인증에 관한 것으로 홈네트워크에서 적용 가능한 디바이스 인증 및 사용자 인증과의 관련성에 대해 살펴본다. 또한, 본 논문에서 제안하는 DHCP 메시지 인증은 DHCP 서버가 IP 주소 할당을 요구하는 DHCP 클라이언트들에게 IP 주소를 할당함에 있어서, 인증 과정을 거친 후 인증에 성공한 클라이언트에게만 IP 주소를 할당 해주고, DHCP 클라이언트도 자신이 등록된 DHCP 서버로부터만 IP 주소를 할당 받을 수 있는 DHCP 메시지 인증 방법을 제안함에 있어서 효과적이고 보안성을 강화한 키관리 방법으로 리플레이 공격에 대한 방지법을 포함하는 DHCP 메시지 인증 방법을 제공한다.

  • PDF

Design and Implementation of a Secure Smart Home with a Residential Gateway

  • Kim, Sang-kon;Kim, Tae-kon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.9-17
    • /
    • 2022
  • In this paper, we propose a secure smart home network model and a novel cryptographic protocol called the Smart Home Security Protocol (SHSP). Authentication, key distribution, and encryption functions are properly supported in order to make a smart home secure, and a residential gateway (RG) plays a central role in performing these functions. According to the characteristics of networks and attached devices, we classify smart homes into three different types of sub-networks and these networks are interconnected with one another by the RG. Depending on a sub-network, we use different types of secure schemes to reduce the burden of the process and the delay in devices while it provides proper security functions. The proposed secure smart home model is implemented and verified by using a variety of embedded system environments.

Modeling and Simulation of Smart Home Energy Consumption

  • Naziha Labiadh;Imen Amdouni;Lilia El Amraoui
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.77-82
    • /
    • 2024
  • The Smart home energy consumption represents much of the total energy consumed in advanced countries. For this reason, the main objectif of this paper is to study the energy consumption profile by day for each home appliances: controllable appliances for example Washing machine, Tumble dryer and Air conditioning and uncontrollable appliances for example TV, PC, Lighting, Refrigerator and Electric heater. In this paper, we start with presentation of a smart home energy management systems. Next, we present the modeling and simulation of controllable appliances and uncontrollable appliances. Finally, concludes this paper with some prospects. The modeling and the simulation of a Smart home appliances is based on MATLAB/Simulink software.

Residents' Awareness of Assisted Living Facility(ALF) as a 'Home': Cases of Virginia, U.S.A. (미국 노인보호주택 거주자들의 '집'으로서의 속성에 관한 사례 연구)

  • Kim Young-Joo
    • Journal of Families and Better Life
    • /
    • v.23 no.4 s.76
    • /
    • pp.67-77
    • /
    • 2005
  • The purpose of this study was to identify housing attributes that make residents feel 'at home' in ALFs in Southwest Virginia. For this purpose, residents' needs, experiences, and opinions of the physical environment, the social environment and the organizational environments such as policies and programs of ALFs were identified. As a multi-case study, five ALFs in Southwest Virginia were studied using constant comparative methods of data analysis. In addition to face-to-face interviews with 25 residents and 5 administrators of five ALFs, observations were conducted with personal journal. Each facility was designed to be a single-family house or multi-family dwelling in outside appearance. Most of the respondents were satisfied with their current dwelling as a 'home' in terms of homelike attributes such as 'autonomy/ privacy', personalization,' safety and security,' services and care,' independence,' social interaction/friendship,' family support,' and 'rules and regulations.' In spite of high satisfaction with the facility, however, many people did not think of their current dwelling as a real 'home'. As the biggest difference between living in their own homes and living in the ALF, people feinted out a lack of independence and social interaction. Residents of ALFs may have reordered their priorities in their current life situation so that safety, security, and caie were more important to them than fooling "at home."

A Study on Hierarchical Distributed Intrusion Detection for Secure Home Networks Service (안전한 홈네트워크 서비스를 위한 계층적 분산 침입탐지에 관한 연구)

  • Yu, Jae-Hak;Choi, Sung-Back;Yang, Sung-Hyun;Park, Dai-Hee;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.49-57
    • /
    • 2008
  • In this paper, we propose a novel hierarchical distributed intrusion detection system, named HNHDIDS(Home Network Hierarchical Distributed Intrusion Detection System), which is not only based on the structure of distributed intrusion detection system, but also fully consider the environment of secure home networks service. The proposed system is hierarchically composed of the one-class support vector machine(support vector data description) and local agents, in which it is designed for optimizing for the environment of secure home networks service. We support our findings with computer experiments and analysis.

A Study on Vulnerability Factors of The Smart Home Service ('스마트홈 서비스'의 보안취약요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.169-176
    • /
    • 2020
  • Recently, the era in which various services using smart devices are used is sometimes referred to as the so-called "smart era". Among these, Smart Home Service' have not only brought about significant changes in the residential environment and culture, but are evolving very rapidly. and The 'Smart Home Service' provides more convenient services to users through communication between various electronic products in general homes, and has a bright future in the future. In particular,'Smart Home Service' provides various services combined based on IoT(Internet of Things) technology and wired/wireless communication in connection between various devices. However, such a "smart home service" inherits the security vulnerabilities of the underlying technologies such as the Internet of Things and wired and wireless communication technologies, and accidents that lead to the leakage of personal information and invasion of privacy continue to occur. So, it is necessary to prepare a countermeasure and prevention against the weak factors of the underlying technologies. Therefore, this paper is expected to be used as basic data for future application technology development and countermeasure technology by examining various security vulnerability factors of 'Smart Home Service'.

Design of Face Recognition based Embedded Home Security System

  • Sahani, Mrutyunjanya;Subudhi, Subhashree;Mohanty, Mihir Narayan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1751-1767
    • /
    • 2016
  • Home security has become the prime concern for everyone in present scenario. In this work an attempt has been made to develop a home security system which is accessible, affordable and yet effective.The proposed system is based on 'Remote Embedded Control System' (RECS) which works both on the web and gsm platform for authentication and monitoring. This system is therefore cost effective as it relies on existing network infrastructure. As PCA is most popular and efficient algorithm for face recognition, it has been usedin this work. Next to it an interface has been developed for communication purpose in the embedded security system through the ZigBee module. Based on this embedded system, automated control of door movement has been implemented through electromagnetic door lock technology. This helps the users to monitor the real-time activities through web services/SMS. The web service consists of either web browser command or e-mail provision. The system establishes the communication between the system and authenticated user. The e-mail received by the system from the authorized person will monitor and control the real-time operation and door lock. The entire control system is reinforced using ARM1176JZF-S microcontroller and tested for actual use in the home environment. The result shows the experimental verification of the proposed system.

The User Needs for the Home Automation System as a Composition of Digital Home Design - Through the Case Study of the Apartment Residents Lived in Busan - (디지털홈 구성 요소로서 홈오토메이션 시스템에 대한 거주자 요구 - 부산시 아파트 거주자를 대상으로 -)

  • iChoi, In-Young;Jang, Kyong-Mi;Lee, Tae-Kyung;Jun, Eu-Jung;Park, Soo-Been;Choi, Sung-Heui
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2004.05a
    • /
    • pp.167-170
    • /
    • 2004
  • This study proposes the method seeking out the user needs for the home automation systems which are one of the compositions of digital home. The findings are as follows. (1) The designing of digital home should be based on the residents' daily life and the their needs for the future house prior to the digital technology, (2) The IT Apartments recently developed in Busan set up the safety and security system and the automatic ventilation system mostly. (3) The residents are more concerned of the safety and security and the comfortable interior environment than convenience and entertainments. (4) The residents have diverse needs for the home automation systems according to their age, residential experience and occupation.

  • PDF

Analyses of Middleware Requirement for Home Network Security (홈 네트워크 보안을 위한 미들웨어 요구 분석)

  • 김정태
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.861-865
    • /
    • 2004
  • Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home network.