Skip to main content

Design of an IoT-Based Efficient Security Scheme in Home Wireless System

  • Conference paper
  • First Online:
  • 1359 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11634))

Abstract

Home security is a typical Internet of Things application with a broad market prospect. This paper proposes a framework for building a home security system based on the IoT three-tier architecture. Under the architecture of this system, the home sensor node communicates with the home gateway through wireless communication, and the platform-level business cloudization solution can facilitate the expansion of home security services. A testbed of a simple home network application system that includes a gateway and multiple sensors is created to test its user interaction capabilities. Experimental results show that the proposed test system can run stably; it can be applied to other monitoring areas and simultaneously supports a multi-ubiquitous sensor network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ding, F., Song, A.G., Zhang, D.Y., Tong, E., Pan, Z.W., You, Y.H.: Interference-aware wireless network for home monitoring and performance evaluation. IEEE Trans. Autom. Sci. Eng. 15(3), 1286–1297 (2018)

    Article  Google Scholar 

  2. Su, J., Hong, D., Tang, J.L., Chen, H.P.: An efficient anti-collision algorithm based on improved collision detection scheme. IEICE Trans. Commun. E99-B(2), 465–469 (2016)

    Article  Google Scholar 

  3. Sultana, S., Akand, T., Dey, M.: Design and implementation of home security system using PZT. In: Proceedings of the 9th International Conference on Electrical and Computer Engineering (ICECE), 13 February 2017, pp. 554–557 (2017)

    Google Scholar 

  4. Isa, E., Sklavos, N.: Smart home automation: GSM security system design & implementation. J. Eng. Sci. Technol. Rev. 10(3), 170–174 (2017)

    Article  Google Scholar 

  5. Kulsiriruangyos, J., Rattanawutikul, V., Sangsartra, P., Wongsawang, D.: Home security system for alone elderly people. In: Proceedings of the 5th ICT International Student Project Conference (ICT-ISPC), 22 July 2016, pp. 65–68 (2016)

    Google Scholar 

  6. Wayt, G.W.: DIY home security: deter intruders with an extra loud alarm. IEEE Spectr. 53(1), 20–21 (2016)

    Article  Google Scholar 

  7. Sahani, M., Subudhi, S., Mohanty, M.N.: Design of face recognition based embedded home security system. KSII Trans. Internet Inf. Syst. 10(4), 1751–1767 (2016)

    Google Scholar 

  8. Peter, S., Gopal, R.K.: Multi-level authentication system for smart home-security analysis and implementation. In: Proceedings of the International Conference on Inventive Computation Technologies (ICICT), 18 January 2017, vol. 2 (2017)

    Google Scholar 

  9. Jose, A.C., Malekian, R.: Improving smart home security: integrating logical sensing into smart home. IEEE Sens. J. 17(13), 4269–4286 (2017)

    Article  Google Scholar 

  10. Chilipirea, C., Ursache, A., Popa, D.O., Pop, F.: Energy efficiency and robustness for IoT: Building a smart home security system. In: Proceedings - IEEE 12th International Conference on Intelligent Computer Communication and Processing (ICCP), 7 November 2016, pp. 43–48 (2016)

    Google Scholar 

  11. Li, D.H., Zhang, G.Z., Xu, Z.: Modelling the roles of cewebrity trust and platform trust in consumers’ propensity of live-streaming: an extended TAM method. CMC Comput. Mater. Continua 55(1), 137–150 (2018)

    Google Scholar 

  12. Jayaprakash, G., Muthuraj, M.P.: Prediction of compressive strength of various SCC mixes using relevance vector machine. CMC Comput. Mater. Continua 54(1), 83–102 (2018)

    Google Scholar 

  13. Ding, F., Song, A.G., Tong, E., Li, J.Q.: A smart gateway architecture for improving efficiency of home network applications. J. Sens. 2016, 10 (2016). Article ID 2197237

    Google Scholar 

Download references

Acknowledgements

This work is partially supported by the Ministry of Education-China Mobile Research Foundation, China (No. MCM20170205), the Scientific Research Foundation of the Higher Education Institutions of Jiangsu Province, China (nos. 15KJA510002 and 17KJB510043), Six talent peaks project in Jiangsu Province (No. DZXX-008), and the Research Foundation for Advanced Talents of Nanjing University of Posts and Telecommunications (No. NY217146). The home service framework mentioned in this paper partially refers to China Mobile’s home business system, and we are grateful for the relevant proposals and technical guidance from many experts.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dengyin Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ding, F., Li, Z., Ai, C., Su, R., Zhang, D., Zhu, H. (2019). Design of an IoT-Based Efficient Security Scheme in Home Wireless System. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11634. Springer, Cham. https://doi.org/10.1007/978-3-030-24271-8_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24271-8_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24270-1

  • Online ISBN: 978-3-030-24271-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics