ABSTRACT
Privacy has been one of the focus in information security discussion over years and it has become an issue everyone would like to protect though sometime people end up giving up some of their privacy in exchange of other services; however, the privacy in home automation is still crucial as ensuring only allowed users can access the appliances within the house. In this research, we evaluated the drawbacks of using passwords for authentication on mobile application used for home automation and provided and analyzed a more robust system design using fingerprints to take the advantage over uniqueness of fingerprint to identify humans.
- Cyril Jose, A. and Malekian, R. 2015. Smart Home Automation Security: A Literature Review. The Smart Computing Review. (2015).Google Scholar
- http://internetofthingsagenda.techtarget.com/definition/home-automation: 2015. http://What Is Home Automation?. Accessed: 2016-10-27.Google Scholar
- http://lifehacker.com/how-can-i-get-started-with-home-automation-510246491: 2013. Accessed: 2016-10-27.Google Scholar
- http://criminal.findlaw.com/criminal-procedure/fingerprints-the-first-id.html: 2016. Accessed: 2016-10-24.Google Scholar
- http://www.cio.com/article/2454883/consumer-technology/fingerprint-faceoff-apple-touch-id-vs-samsung-finger-scanner.html: 2014. Accessed: 2016-10-18.Google Scholar
- http://www.explainthatstuff.com/fingerprintscanners.html: 2016. Accessed: 2016-10-27.Google Scholar
- 2009. Security Evaluation of Biometrics Authentications for Cellular Phones. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. (2009). Google ScholarDigital Library
- Manabe, H. et al. 2009. Security Evaluation of Biometrics Authentications for Cellular Phones. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. (2009). Google ScholarDigital Library
- Jain, A. http://biometrics.cse.msu.edu/Presentations/AnilJain_UniquenessOfFingerprints_NAS05.pdf.Google Scholar
- Cyril Jose, A. and Malekian, R. 2015. Smart Home Automation Security: A Literature Review. The Smart Computing Review. 5, 4 (2015).Google Scholar
- An, Y. 2012. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards. Journal of Biomedicine and Biotechnology. 2012, (2012), 1--6.Google ScholarCross Ref
- Jacob Ohana, D. et al. 2013. Preventing Cell Phone Intrusion and Theft using Biometrics. IEEE Security and Privacy Workshops. (2013), 1--8. Google ScholarDigital Library
- http://developer.samsung.com/galaxy/pass: 2016. Accessed: 2016-10-20.Google Scholar
- Pandya, B. et al. 2016. Android Based Home Automation System Using Bluetooth & Voice Command. International Research Journal of Engineering and Technology (IRJET). 03, 03 (2016).Google Scholar
- David, N. et al. 2015. Design of a Home Automation System Using Arduino. International Journal of Scientific & Engineering Research. 6, 6 (2015).Google Scholar
- https://developer.android.com/about/versions/marshmallow/android-6.0.html: 2016. Accessed: 2016-10-20.Google Scholar
- Jacob Ohana, D. et al. 2013. Preventing Cell Phone Intrusion and Theft using Biometrics. IEEE Security and Privacy Workshops. (2013). Google ScholarDigital Library
- http://www.androidauthority.com/how-fingerprint-scanners-work-670934/: 2016. Accessed: 2016- 11- 12.Google Scholar
- Ramlee, R. et al. 2013. Bluetooth Remote Home Automation System Using Android Application. The International Journal of Engineering And Science (IJES). 2, 01 (2013), 149--153.Google Scholar
- http://searchsecurity.techtarget.com/definition/brute-force-cracking: 2006. Accessed: 2016- 11- 17.Google Scholar
- Baloch, R. 2011. An Introduction To Keyloggers, RATS And Malware.Google Scholar
- Y Rashid, M. and Zaki, H. RSA Cryptographic Key Generation Using Fingerprint Minutiae. Iraqi Commission for Computers & Informatics (ICCI) Iraqi Journal for Computers and Informatics (IJCI) 1, 1 (2014), 66--69.Google Scholar
- S. Patrick, A. Fingerprint Concerns: Performance, Usability, and Acceptance of Fingerprint Biometric Systems. National Research Council of Canada, Ottawa, 2008.Google Scholar
- A Security Analysis and Reinforcement Design Adopting Fingerprints over Drawbacks of Passwords Based Authentication in Remote Home Automation Control System
Recommendations
Secure remote access to home automation networks
Recent developments in the field of home automation have shifted the technology away from the realms of research and into the homes of consumers. Together with the rapid adoption of the Internet, the ‘anywhere and anytime’ accessible home environment has ...
User-configurable semantic home automation
The ideas of smart home and home automation have been proposed for many years. However, when discussing homes of the future, related studies have usually focused on deploying various smart appliances (or devices) within a home environment and employing ...
A component framework for telecare and home automation
CCNC'10: Proceedings of the 7th IEEE conference on Consumer communications and networking conferenceMany sensors, appliances and smart devices for within the home are becoming readily available to the general public. These can not only enhance everyday living but also allow people requiring care to stay in the comfort of their own homes for longer. ...
Comments