2015
DOI: 10.14257/ijsia.2015.9.8.05
|View full text |Cite
|
Sign up to set email alerts
|

Security and Usability Improvement on a Digital Door Lock System based on Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…The overall level of environmental information at the national level is also developing constantly. Summarizes the development of environmental information, "twelfth five-year" period, the country overall improve the level of environmental information [39,40], in terms of infrastructure, automatic monitoring ability, laid a certain foundation, but because of the lack of top-level design, there is a large amount of data, information integrity is low, and the problem of information security lack of consideration, information associated with the business support also is very good [41][42][43][44]. The difficulty in sharing existing data is the most serious problem restricting the development of environmental big data.…”
Section: Related Workmentioning
confidence: 99%
“…The overall level of environmental information at the national level is also developing constantly. Summarizes the development of environmental information, "twelfth five-year" period, the country overall improve the level of environmental information [39,40], in terms of infrastructure, automatic monitoring ability, laid a certain foundation, but because of the lack of top-level design, there is a large amount of data, information integrity is low, and the problem of information security lack of consideration, information associated with the business support also is very good [41][42][43][44]. The difficulty in sharing existing data is the most serious problem restricting the development of environmental big data.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, sending a password directly to a user by using a wireless network, such as Wi-Fi or Bluetooth, may run the risk of the data being stolen by hackers. Currently, many studies have proposed solutions to these issues, which are as follows:  Using hardware for authentication: This method involves using a keypad together with sensors and smartphones to form a digital door lock system [1], creating a password from a computer or a smartphone and having a user enter digits using the keypad [2], using a wearable device, such as a smartwatch deploying an android application, for identity verification [3], and using RFID for authentication and access control [4].  Using biometrics for authentication: This method includes developing equipment to unlock a door by using a fingerprint scanner for authentication [5][6], the development of a facial recognition system for authentication when accessing a building, where the system can send a notification to a smartphone when an intruder tries to enter a building [7][8] or use an image classification technique for a smart door closer system [9], and using an iris biometric to control access [10].…”
Section: Related Studies On Residential Access Controlmentioning
confidence: 99%
“…Attackers may be able to find the location of the data owner using search engine queries. e potential for harm is obvious, and it can even lead to the user's information entering illegal contacts [91]. Communicating using proxies and encrypting your account information are two ways to avoid this type of IoT security problem.…”
Section: Home Invasionsmentioning
confidence: 99%