2018
DOI: 10.1016/j.future.2017.05.048
|View full text |Cite
|
Sign up to set email alerts
|

A security authorization scheme for smart home Internet of Things devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
61
0
5

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 112 publications
(67 citation statements)
references
References 9 publications
1
61
0
5
Order By: Relevance
“…www.ijacsa.thesai.org Smart Home: Smart Home is a term utilized to depict a home that contains a communication network that interfaces with various devices and enables them to be remotely controlled, observed, and got to by utilizing your smartphone applications, PC, and tablets [10]. It allows us to control our home appliances from a remote distance anytime and anywhere with Internet access [7]. The IoT smart home services are growing step by step, the technologies can viably communicate with one another using Internet Protocol (IP) addresses.…”
Section: B Iot Applications Involved In Security Issuesmentioning
confidence: 99%
See 1 more Smart Citation
“…www.ijacsa.thesai.org Smart Home: Smart Home is a term utilized to depict a home that contains a communication network that interfaces with various devices and enables them to be remotely controlled, observed, and got to by utilizing your smartphone applications, PC, and tablets [10]. It allows us to control our home appliances from a remote distance anytime and anywhere with Internet access [7]. The IoT smart home services are growing step by step, the technologies can viably communicate with one another using Internet Protocol (IP) addresses.…”
Section: B Iot Applications Involved In Security Issuesmentioning
confidence: 99%
“…It has restricted adaptability in design and security and it isn't perfect for organizations or clients who utilize sensitive information [6]. In this manner, we require secure verification protocol for cloud-driven IoT-based applications in which a genuine client and an IoT sensor can commonly validate each other for secure communication yet in a recently published paper by Bogdan-Cosmin Chifor et.al [7] proposed a theft safe security scheme utilizing a keep-alive protocol that is executed intermittently and each time the client request a Fido verification via cloud platform. The Fido UAF model gives focal points over traditional verification mechanisms, such as strong authentication and a simplified registration and authentication method [8].…”
Section: Introductionmentioning
confidence: 99%
“…IoT omtales ofte som at de fysiske grensene mellom Cyber Space og den virkelige verden brytes ned, noe som leder til at vi får et såkalt cyberfysisk samfunn, der hverdagen er integrert med digitale enheter på nett (de Bruijn & Janssen, 2017;Kobara, 2016). Det gjelder for individer som omgir seg med såkalt smarte enheter, for eksempel smarte hus, selvkjørende biler, smarte TV-er, smarte klokker (Shackelford et al, 2017;Chifor, Bica, Patriciu & Pop, 2018;Devi, Rohini & Suganya, 2016). Men det gjelder også for virksomheter (Wu et al, 2018) og handel (Razzaq et al, 2017), og på samfunnsnivå innen transport, helse og smarte byer (Razzaq et al, 2017;Chifor, Bica & Patriciu, 2017).…”
Section: Tidligere Studierunclassified
“…this is a major challenge in designing software for Smarthome. [9] And another study entitled Design of Smart Home Security System using Object Recognition and PIR Sensor states that the security monitoring system based on Internet of Things technology uses Raspberry Pi 3, Arduino, PIR sensor, web camera and buzzer technology and incorporates human detection capabilities with HoG and SVM. [10] From the review that has been discussed, there are several researchers who discuss smart home by using several arduino, raspberry and other technologies.…”
Section: Related Workmentioning
confidence: 99%