IOT and home networks
In the recent past electronics, electrical and electromagnetic devices were supporting all the functions and activities which were associated with the day to day life (Gubbi et al., 2013). Among them some devices were semi automated and some were fully automated. In present era, due to advancement of the information and communication technology, trend is more towards the automation phase wherein all the required day to day life functionalities can be carried out with very less individual’s intervention (Kellyc et al., 2013). Therefore, the present report is mainly focused on the beneficial of IOT and smart home network in day to day life activities. The report also emphasizes on the explanation of the IOT devices uses in smart home.
According to the Sanchez et al., (2014), IOT i.e. internet of things is the word where virtual, digital and real environments combine to make a smart society which makes the life style easy. Due to advancement of the software and hardware system it is possible to communicate between heterogeneous and homogeneous devices (Tao et al., 2014). From the users perspective internet of thing makes the system more easy, flexible, convenient and cheap to handle all the devices which are utilized at workplace and homes.
Due to advancement of the technology, today’s world is digitalized. Beginning from the handled devices to smart appliance to computer system, world is digitalized. Thereby, smart home would be better steps for the next future (Lee & Lee, 2015). The system is effectively controlled the devices, appliances and lights; therefore it helps the users to reduce the power consumption. The system mainly uses the internet technology to control the home appliances as well as the lights. Apart from that switching on and switching off the lights, the system can effectively control via ambient temperature sensor and can also adjust the weather inside the home. Moreover it helps the users to control the appliance system from remote locations using hand held devices.
IOT benefits in day to day living Convenience is considered one of the biggest benefits of smart homes and it provides the users to remote access to system such as culling and heating system, multimedia and music system and intercoms devices throughout the dwelling. Therefore the first and foremost advantage of smart phone is convenient as the users can access and controlled several operations including temperature and lighting in easy and fast manner. In addition to this, adoption of this technology helps the individuals to solve security related problems as it offers high level of the security system (Xu, Wendt & Potkonjak, 2014). Moreover it can help conserve energy and reduce the costs. Therefore the discussion shows that use of the IOT technogly not only helps to simplify the activities of life but also helps them to perform multiple tasks in a fast and easy manner.
IOT benefits in day to day living
Privacy and Security: – It is considered one of the vital issues associated with the smart home. As the advancement of the information technology, several persons implement the smart home concepts that create information beach problems. As all the information is associated with the internet, therefore hackers or attackers can attack the systems in order to steal the information and compromise the security of smart homes (Lee & Lee, 2015).
Compatibility: – presently, there are international rules and regulations of compatibility for the monitoring and tagging of the equipments (Riahi et al., 2013) For this reason some organizations make these devices with less level of security. Therefore in my opinion it is also considered to be the main issue of smart home.
Complexity:- As all the systems are connected with the internet therefore there are more opportunities of failure. With IOT, failure could sky rocket.
Safety: – Safety is also considered to be one of the main issues because there is no industry standard associated with the IOT devices.
Home network Domotics of home automation is building automation for dwelling, known as the smart house or smart home. It involves in automation and control of lighting, heating (including smart thermostats), air conditions, ventilation and security as well as home devices including oven, washer, and freezer. In order to access the functionality of the IOT devices, users mainly implemented WIFI technology (Hwang, 2015). Home appliances mainly controlled using internet known as the internet of things.
The WIFI technology has been mainly implemented in my smart home and it helps in connecting IOT devices to interact with the database. Smart system mainly consists with the web server based on Arduino WIFI and hardware interface modules as well as Android smart phone application. The smart home architecture in mainly divided into the three sections these are Home Environment, Home network and Remote Environment (Gubbi et al., 2013).
Remote environment mainly shows that users who mainly access the system on their Android phone apps via WIFI. Home environment mainly includes home network and all the devices. The main objective or functions of the home network is to communicate devices and users. In my, smart home the main component of the home network is Arduino and WIFI. The main functions of the Arduino are to control, monitor, manage system component that enable the hardware devices module to effectively execute its tasks.
Hardware devices systems are directly connected with the sensors. It has abilities to control energy management system such as Fans, Lights, Washing Machine and Water Taps. In order to effectively monitor the home appliances; users implements the humidity and temperature, Door status, Motion detection and video monitoring and others. Functionality of the smart home is presented below;
If the user wants to switch off the light, then they send request to home network through android phone using WIFI technology. The home network is mainly consists with the WIFI devices and Arduino UNO devices that helps to control the all devices in better manner. When Ardunino devices ((based on the ATmega 328P with 16 digital input and output pins) accept the request then they send these request to relay driver 1. When relay driver 1 accept the request then they performed their operations and switch off the light. After completion of the operations they send the completion request to Ardunino and further the message send to the user’s mobiles in form of status message that light is switch off.
Devices description |
Issues |
||||
usage |
control |
connectivity |
security |
privacy |
|
1. Smart television |
In order to operate the smart television users need to have internet connectivity; therefore if connectivity is interrupted for some reason then the device would not work properly |
IOT technology is more complex therefore the controlling of the functionality of the smart TV is not easy. |
Smart TV based on the internet connectivity, therefore; therefore some users face the problems to connect to Net filix or internet. |
Smart TV uses the Web cam; therefore if the hackers or network attackers access Smart TV through internet using hacking process then they access all information in easy manner (Tao et al., 2014). |
Smart TV put the privacy at risks since it uses the smart TV cameras which could be utilized to spy on innocent person. |
solutions |
In order to solve the issues organization needs to implement cryptographic techniques and dual firewall techniques that helps the safe user information in better manner. |
||||
2. |
usage |
control |
connectivity |
security |
privacy |
Temperature sensor |
Temperature sensor devices mainly make decision regarding temperature sensor through available of the information. Therefore if information not available in regular manner then in create problems. |
To control the temperature sensor, controlling devices is used. Therefore if controlling devices are not working in a proper manner than it would also affect the functioning of the temperature sensor. |
If the connectivity of the internet not working properly then it impacted the functionality of the devices. |
The descriptive ability of the network attackers of hackers impact the security of the person. |
Attackers can access uses information. |
solutions |
In order to solve this problem, the first and foremost thing is that smart temperature sensor needs to update in regular basis. Use of this, techniques helps the users to control the room temperature in better manner. |
||||
3 |
usage |
control |
connectivity |
security |
privacy |
camera |
If the Ethernet wire not work properly; then the camera not working properly. |
Controlling the camera functionality done using mobile apps; therefore if wifi connectivity not working properly then it impacted. |
Bad weather condition impacted the connectivity |
With the help of user information hackers can get unauthorized access to their personal data which they would then utilise for their own personal gains. . |
Camera mainly record the users movement and store them in database; therefore if attackers can access their daily life activities. This impacted the User’s privacy. |
solutions |
User’s needs to implements WIFI protected Access encryption protocol system and change password in regular manner. |
||||
4 |
usage |
control |
connectivity |
security |
privacy |
Nest’s smart controlling home temperature |
Lack of the internet connectivity hampered the uses of smart controlling home temperature. |
requires high skills to control |
lack of internet connectivity hampered the connectivity |
If the smart control system is hacked by the hackers then the hackers can execute the devices as per their preferences |
not impacted |
solutions |
In order to control the smart controlling home temperature organization needs to incorporate use of a firewall system and update firmware in regular basis. |
||||
5 |
usage |
control |
connectivity |
security |
privacy |
smart locks |
Smart locks system work with the plain text password; therefore if it has been hacked by hackers then they can steal the objects and items belong to the user. . |
Controlling is complexity and required higher skills and kowndlege |
Improper internet connection affected the functionality of smart phone |
If the hackers can access the users smart locks password then they able to access user’s home appliance in easy manner. |
If the hackers access the data base where information is stored, then privacy is impacted. |
Solutions. |
In order to solve these problems users needs to implements the security software that protect the devices from attackers in easy manner. Moreover users also need to secure their Smartphone. Use of unique password protecting system users also protects their network from attackers. |
||||
6 |
usage |
control |
connectivity |
security |
privacy |
smart home lighting |
It works with the combination of LED lighting with mobile technology. Therefore lighting can be controlled using relay drivers. Thus due to complexity of the architecture smart home lighting not work properly. |
Complexity of the architecture creates problems to control the functionality. |
Smart home lighting connectivity is failure if WIFI connectivity is interrupted. |
Weak password system hampered the security system of the home. |
NO |
solutions |
|||||
7 |
usage |
control |
connectivity |
security |
privacy |
Smart watch |
Risks involves in smart watch as the software can be large and complex. Thus it is creates problems in usage. |
Complexity of the architecture creates problems to control the functionality |
Smart home watch connectivity is failure if WIFI connectivity is interrupted. |
As users using mobile banking using smart watch, therefore hackers may start the target and access the information easily. |
The attackers or hackers access the user’s personal information without his/her concern. Therefore the privacy is hampered effectively. |
solutions |
In order to secure smart watch in better manner users needs to incorporate high password techniques and also needs to update its security software in regular manner (Kellyc et al., 2013). |
||||
8 |
usage |
control |
connectivity |
security |
privacy |
Smart oven |
If the motion system not working properly then oven internal timer not automatically off and it create problems |
Complexity of the architecture creates problems to control the functionality |
If sensor not works effectively then the connectivity is hampered. |
Attackers mainly hacked the smart oven security system that increases the electricity consumptions. |
Privacy is not impacted by hacking of smart oven. |
solutions |
Use both software and hardware firewall system |
Conclusion:
As per the discussion and findings it is seen that smart homes among the advancing technologies and their success is mainly dependent upon the coalescence between developer and vision of engineers for improved security, functionality and power management. From the discussion it is concluded that security is the main problems associated with the smart home architecture.
References:
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660.
Kelly, S. D. T., Suryadevara, N. K., & Mukhopadhyay, S. C. (2013). Towards the implementation of IoT for environmental condition monitoring in homes.IEEE Sensors Journal, 13(10), 3846-3853.
He, W., Yan, G., & Da Xu, L. (2014). Developing vehicular data cloud services in the IoT environment. IEEE Transactions on Industrial Informatics, 10(2), 1587-1595.
Jia, X., Feng, Q., Fan, T., & Lei, Q. (2012, April). RFID technology and its applications in Internet of Things (IoT). In Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on (pp. 1282-1285). IEEE.
Sanchez, L., Muñoz, L., Galache, J. A., Sotres, P., Santana, J. R., Gutierrez, V., … & Pfisterer, D. (2014). SmartSantander: IoT experimentation over a smart city testbed. Computer Networks, 61, 217-238.
Tao, F., Zuo, Y., Da Xu, L., & Zhang, L. (2014). IoT-based intelligent perception and access of manufacturing resource toward cloud manufacturing. IEEE Transactions on Industrial Informatics, 10(2), 1547-1557.
Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440.
Xu, T., Wendt, J. B., & Potkonjak, M. (2014, November). Security of IoT systems: Design challenges and opportunities. In Proceedings of the 2014 IEEE/ACM International Conference on Computer-Aided Design (pp. 417-423). IEEE Press.
Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., & Bouabdallah, A. (2013, May). A systemic approach for IoT security. In Distributed Computing in Sensor Systems (DCOSS), 2013 IEEE International Conference on (pp. 351-355). IEEE.
Hwang, Y. H. (2015, April). Iot security & privacy: threats and challenges. InProceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security(pp. 1-1). ACM.