This report discusses the use of IoT technologies in smart homes, including the integration of smart phones, recent developments, vulnerability assessment, and challenges. It provides insights into the benefits and challenges of implementing IoT in smart homes.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
IoT for smart Home 1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
ABSTRACT In this report, it has summarised about the IoT technologies used in smart homes. In order to connect with electronic appliances through internet. The documentation can be determined the smart phone for integration with IoT devices, user can access information or data in proper manner. Furthermore, it can examine the role of cyber security which always support for protecting and securing from unauthorised access. Thus, it has maintained the entire performance and efficiency of IoT devices. within digital technology, there are various challenges occurred in context of security so that implement suitable solution. 2
Contents INTRODUCTION...........................................................................................................................3 MAIN BODY..................................................................................................................................3 Overview......................................................................................................................................3 Use of IOT in smart home...........................................................................................................4 Some recent developments with respect to use of IoT in smart Home.......................................6 Vulnerability assessment with respect to cyber security.............................................................7 Challenges and its solution........................................................................................................10 CONCLUSION..............................................................................................................................13 REFERENCES..............................................................................................................................14 3
INTRODUCTION IoT Smart homes appliances are connected to the internet and LAN, expands the smart home through IoT.Various IoT devices are establishing the connection with network. It allows for user to communicate with smart home, identifying the information or data through remotely activate tasks. Smart homesystem achieved the great popularity in last decade as they also increasing the comfort and quality of life. The report will discuss about the concept of smart phone with integration of IoT services. It will identify the recent developments with respect to use of Internet ofthingsinSmartHome,identifyingthecheckvulnerabilityintermofcyber-attack. Furthermore, the documentation will describe about the challenges of IoT smart phone and their accurate solutions. MAIN BODY Overview The internet of things paradigm is based on the devices connected to the internet. Each and every device are objects such as actuators, sensors and equipped with telecommunication interface, processing and limited the storage of data. IoT devices are enabling for integration with objects via internet, also establishing the between devices and people. Generally, IoT can be used the modern technologies such as radio frequency identification, intelligence technology and other sensor techniques (HaddadPajouh,Dehghantanhaand Karimipour,2019). It is mainly providing the better processing and communication capabilities along with different algorithms. It allows for established the integration of different element to operate into integrated units. Furthermore, IoT for smart homes, which means that perform significant action in order to connect with other equipment’s. The communication devices in network can be accessible to user of their own location. In order to understand the significant role of IoT in smart homes. All devices will be connected with smart controller for providing the user accessibility. The device will be connected to router through internet and then turn into communicate with other users. In some situation, it can be required the permission to be taken. Use of IOT in smart home Smart homes are a kind of convenient home set up system which is designed for controlling different kinds of applications and devices automatically with the help of internet 4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
though mobile or another kind of deivce which is connected though internet. Current location of person does not matter. All the devices in a smart home are interconnected with each other with the help of internet as internet helps the user in controlling different kinds of functions such as lights, temperature, home theatre, secure access to home etc. Smart homes can be set up either though wired or wireless systems(Mocrii, Chen and Musilek, 2018). IOT in smart homes helps in maintenance of internet connections, managing mobile applications though remote and incorporate different kinds of sensors within the system as well. Nowadays smart homes have become a useful and important system that helpsits users in convenient and automatic maintenance of house. Internet of things in smart homes helps in uniting whole house though one system within one network. IOT can easily help in turning off or switching off lights the moment users enter the house as sensors can detect someone’s presence and turn on lights. IoT plays a vital role in management of all the functions of smart homes. It especially helps in effective working of sensors for proper working of other home appliances. It helps in embedding computer intelligence which further provide different ways though which home condition can be measured, functionality of all the devices within a smart home can also be checked(Kazmi and et. al., 2017). IoT helps smart homes in controlling all the applications within a home from anywhere in the world. IOT in smart homes is used for many different factors, some of them have been explained below: Monitoring and controlling: IoT in smart homes help the users in monitoring and controlling all kinds of processes that take place at user’s home. It helps smart tomes to analyse the way in which household works, it processes this data and then bring important and significant changes. For example, with the help of smart home, users can add any kind of item within their shopping list. Energy and cost saving: Each and every device connected to smart home system has their own energy consumption. Smart homes can easily adjust setting of devices in such a manner that it can help the user in saving both energy and cost. Smart home system can also be allowed to do anything or everything on their own so that then any kind of device is not in use then it can be shut down which directly help in saving power consumption especially when no one is at home 5
(Kazmi and et. al., 2017). So, it can be said that it is an important way of ways of cutting down cost and save more energy. Environmental impact: It can help in reducing emission of carbon dioxide done by most of household devices like AC because of which negative impact upon environment increases. It can also be said that IOT in smart homes can help in living a greener life. Better security: IoT in smart homes has an important use which is to provide better security to house and it helps in providing control of all the devices and applications installed within a home to user regardless of a fact that they are inside or outside the house. All the security devices like camera, smoke sensors, motion detectors work together and can inform the user whether anything unusual is detected so that user can check what is going on inside the house so that required action can be taken from anywhere in the world. Comfort: Another important use of IoT in smart homes is that it helps in providing high level of comfort to the user(Geneiatakis and et. al., 2017). It helps the user in simplifying any kind of task and makes life simpler by providing all kinds of control of all the applications and devices that are installed within a home in hands of user. Insurance: As it has already been discussed that one of the main and prominent use of IoT in Smart homes is security which is provided by this system. IoT smart homes can be insured and smart sensors should be installed so that if there is problem in any device or application then it can be easily detected and can prevent the system from further significant damages. For example, water sensors can help in detecting leakages within pipes so that plumber can be called and leakage can be treated before leaky pipe burst. Various kinds of insurance companies provide discount to clients who implement IoT in smart Homes So, it can be said that there are variety of uses of smart homes that has helped in making lives of people much simpler and easier(Pirbhulal and et. al., 2017). Users can manage their work despite of not being at home. For example, of user wants to do laundry and they are outside their home then they can operate their washing machine outside their home though smart home system and manage all the required functionalities of washing machine. It has not only helped in saving energy and cost but has also helped in saving time of users and they need to take stress or tension of reaching home as fast as they can for doing any kind of work. Not only this, if users 6
forget to turn off any device and it is dangerous then they can do it with the help of IoT in smart home system(Singh and et. al., 2018). Due to advancement in technology use of IoT in smart homes has become useful especially for people who are living in highly developed areas. Some recent developments with respect to use of IoT in smart Home. In recently, the first generation of smart homes had little to do with IoT technologies. It was completely depending on the remote control and automation. A past decade, a futuristic space where it could operate blinder from different smartphone.In 2019, it has identified the majorly use ofIoT technology in smart homes which implies in home devices such as sensor datum. It automatically adjusts the regimes on the regular basis (Tawalbeh,Muheidatand Quwaider,2020). Sometimes, it helps for monitor the current location in real time and then turn into heating on and off accordingly. This is recent innovation for smart homes for save both energy and money. By using IoT for smart homes, it provides the best level of control over household. No only support for remote processing but also switch off and on appliances. The entire control can be occurred in full range of functionality on web applications and mobile phone. For example- recently developed the smart LF fridges that allows to pre-order extra ice production when still in target for buying stuff for purpose of party. Afterwards, it also identifying the expiration dates on the items. Insider the smart intelligence expects to connect with multiple devices on planet to reach 50-million by 2025. Usually, it mainly includes smart appliances such as dryers, washers and refrigerators.In additional, it will be required to maintain safety and security by using different sensors, alarm, cameras and monitors.In this way, it consider as great of IoT for smart homes for maintain the different tasks (Patronoand et.al.,2019). Beyond this, smart home IoT devices can reduce the cost/price and conserve energy. Nowadays, there are several smart home IoT devices hit the market and made in different way to gain more popularity. Amazon Echo is considering as recent development which may use as smart home gadgets. It is automatically activated the voice assistant, Alex and provide the better convenience for users. In 2020, IoT devices and smart home automation has entered at homes, filled with connectedwith differentdevices.Itpossibletomakeliveseasier,convenientandmore 7
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
comfortable. The advantage of smart homes is handling the more operations such as lighting, temperature.Moreover, IoT devicesprovide the better security for home effectivelyand efficiently. IoT for smart home automation development Internet of thing is considering as modern technology that enable connection of different devices through internet. It also depending on the collection or data or information, which will be monitoring,transferringinformationtootherdevices.Itallowsforspecificactionto automatically activate whenever certain condition or situation arise. For Example- Smart kettle is the best example that can be programmed to automatically turn off once it reaches to highest temperature. It might have send a notification to other user on the basis of smart devices. Nowadays, it has identified that various IoT devices are slowly but perform the different role in daily lives of people.In fact, the market will be reached towards smart home automation by 2020. It is not surprising when consider the better convenience and smart home device offers betterservices(AlmusaylimandZaman,2019).Since,IoTdevicesareestablishedthe connection, which become easier to manage or control multiple operations. The smart home devices also help in reducing price and energy. In currently, there is wide range of devices powered by Internet of things (IoT). It is mainly including security systems, thermostats and refrigerators. In additional, smarter devices are added and adopt smart features. Vulnerability assessment with respect to cybersecurity IoT technology has been anticipated to become as essential need or requirement in development of smart homes, it offers better convenience and efficiency to home residents. in this way, it can achieve the best quality of life. The application of IoT to smart homes, by connecting with objects through internet (Jainand Singh,2020). At certain level, it can be increased the security as well as privacy related challenges in context of integrity, confidentiality and authenticity. These are majorly developed vulnerable situation when exchanged data from one device to another. The challenges make smart homes which extremely vulnerable to different type of security attacks. As a result, IoT based smart homes being insecure. In this way, it is an essential part for identifying possible security risk to represent the complete status of smart 8
homes. The deployment of IoT technology for building the effective smart homes with respect to control processes, automation and other new vulnerabilities within cyber security. Vulnerability assessment It is based on the system review process for identification of security weakness in the information system. In this way, it can be evaluated the system if it is susceptible to any unknownvulnerable.Afterwards,assignsparticularseveritylevelandrecommendsthe mitigation action against them. A vulnerability assessment process can be intended to determine threats, risks they pose. Generally, it involved the use of automated testing tool such as network security scanner (Jeongand Park,2019). As a result, it will be listed the vulnerability assessment report. Each and every individual person who have faced the risk about cyber-attacks and also advantage from vulnerability assessment. The security vulnerabilities can be enabled attacker to access Information technology system and other smart phone applications. It is an essential for business to identify the weakness before establishing the connection. The specific vulnerable assessment along with management program that help for improving the security of entire system. In additional, vulnerability assessment mainly include penetration testing component to identify the personnel, processes and procedures. it might be detected the network or system in proper manner. There are various type of vulnerability assessments as following: Host assessment: it is based on the critical server assessment, which may be increased the vulnerable to attack, if not completely adequately tested or not generated from specific tested machine image. Network and wireless assessment:this type of assessment is mainly focused on the practices, policies to prevent unauthorised access of public as well as private network. In order to provide the better network accessible resources. Databaseassessment:Thedatabaseorbigdatasystemforgeneratingmis- configurations, vulnerabilities. Through this, it can easily be identifying the rogue database or insecure test environment. Afterwards, it may support for classifying the sensitive data or information across the organization’s infrastructure. 9
Application scans:It can be identified the security vulnerabilities in the web application. At some point, automated scan on the dynamic analysis of source code. These are identified the different vulnerabilities within IoT modern technologies. It has been occurred when establishing the connection from one device to another. Hijacking is a type of wireless connection which mainly create a vulnerability where attacker can inject harmful code. Afterwards, it can be executed by other mobile application. Vulnerabilities Assessment related to IT risk, cyber security Most vulnerability assessments can be assigned on the basis of risk-level within each cyber threat. The majorly risk can have a priority and their impact assigned to them. Sometimes, it helps for distribution channel focus on the cyber threats. Otherwise, it could be created the most impactful problem or issue within smart homes. In this way, it is important part for concerned about the vulnerability management in term of IT security (Sharmaand Sharma, 2020). The vulnerability assessment information or data that always help for IT teams to check availability of authorised person. if in case, it has been identified third party involvement, to prioritizevulnerabilitiesfortakeaction,whichoftenmeansremediation.Forinstances, uncovered vulnerability is considering as low impact and low likelihood for occurring. Another way, it would require to fix the critical vulnerability risk, threat itself. In order to improve IT business processes. Thevulnerabilitiesassessmentcanbeidentifiedbyusingautomatedvulnerability scanning software. Thisis becoming useful for provide leverage database, identifying the potential flaws within network system. Generally, it has been occurred when accessed the data or information through smart devices. Comprehensively, it also performed the scanning process through IoT technologies. Once the scans have been completed, platform will report on all problem or issue which may be identified. Afterwards, it will be suggested to implement suitable action and remove all necessary threats, risk in term of cyber security. Challenges and its solution In past decade, there was a breeze of IoT everywhere and individual people was talking about the specific vision of 2020 where 20 million of IoT devices would be generated. In 2019, it has been rapidly evolved IoT environment where each and every people use them. The modern 10
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
technologies are considering the concept of IoT and also identifying the different application in smart homes. According to survey, there are more than 50% population willing to invest money in smart home devices and other appliances. In this way, it has rapidly increasing use of IoT in global marketplace (Jeongand Park,2019). IoT is the most widely deployed in smart homes and automate perform different tasks. Usually, the smart homes devices are transforming TV, doors, refrigerator and make it easier for people. It allows for business to provide best IoT devices. Challenges Internet of things promises various convenience for end-user as apparent within smart homes. It has been increasing privacy as well as security issues. In this way, it concerns about the overall system because not much work is done for infrastructure design pattern. From WannaCry incident, it is apparent that IoT devices are providing the great opportunities for attackers to launch excessive attacks. Afterwards, it can be identified the commercial available devices such as motion sensor, smoke alarm and other analyzer. This will help for generating a signal against threat or risk. In case if it has been occurred malicious action towards smart home devices. The IoT in smart homes that are interconnected with multiple devices in great way to identifyvulnerable in termof securitythreats, risk. The sensor, used a lot of sensitive information so that it become easier for attacker to track or monitor activities of system(Jeong and Park,2019). Afterward, hacker can use malicious source code for purpose of attacks. In additional, security and privacy issues are apparent. It will be continuously persisting and increase demand of attention towards awareness from IoT technology. Unfortunately, Denial of service is one of the most common attacks for IoT for smart homes. It makes the web server to increase the large amount of traffic. Since, IoT involved the multiple devices such as huge network of sensor connected with the internet. Afterwards, Denial of service attack can harm the overall system. Sometimes, it may consider as serious problem or issue that effects on the network system. Including some additional security challenges within IoT for smart home. The rise of Botnets: in recently, it has been developed the issue of botnets among multiple IoT devices. It may exist when hackers remotely control internet connection through different device 11
and use them for illegal purpose. It could have their device as part of botnet without prior knowledge of this thing. Sometimes, it has increased the problem but can be managed through real time security solution. Lack of encryption: it is a type of challenging issue or problem when occurred lack of encryption within network. It became easier for hackers to access data or information. It is one of learning IoT security challenges. Thus, each and every device have a lack of storage and processing capabilities that would be identified on the traditional devices. As a result, it can easily increase chances of attacks where hacker can manipulate the specific algorithms that were designed for purpose of protection. Outdated legacy security: The vulnerabilities among different IoT devices and another concern about the interconnection between legacy systems(Jeongand Park,2019). It has rapidly growing the use of IoT in smart homes. It might have seen out of places. A breach of IoT device can be identified, which directly affecting the security standards. Phishing attacks:it is concerned about the security across IoT device for smart homes, which is mainly representing latest attack vendor. Hackers could perform the operation and send a signal to IoT devices. Afterwards, it triggered the various complication. Although, it is the most common approach in term of security attacks. Usually, it can be controlled or managed through effective strategies. Infrequent update: it is important way to ensure that all devices are secured but Some IoT device may have a lack of large amount of software update. In this way, it struggles to provide the better critical security update to IoT devices. Weak Default passwords:many other IoT devices come from with original password that are consider as weak. Sometimes, it has been developed as failure which take important step to improve the weakness. Easy way to guess the password by hackers, IoT devices vulnerable to brute force attacks. Solutions There is no specific plug that can turn on and IoT devices get secured in proper manner. There are different available solutions which is mainly adopted by individuals. In order to increase the security aspects. Other hand, it is important for identifying the technical community 12
and other enterprise need to work together and enhance the device security. Generally, it can be used the important steps to improve security and privacy of IoT devices(Jeongand Park,2019). It makes sure that all devices protected with strong password and also learned about the suitable features which mainly provide by device. In this way, it is required to turn “On”, detecting the unauthorized access. The Home router is based on the main gateway to outside which are completely insecure internet. It makes sure that maintain proper Wi-Fi setting, other encryption. On regular basis, it would check the non-default password. Long term solutions It is an essential part for enabling the privacy as well as security option within IoT devices. Generally, it may use SDN to provide the better security as service for smart home IoT devices. Another approach is to consider block chain architecture to enhance security and privacy among different IoT devices. This will help for reducing threats, risks within entire system. IoT has several applications in term of next generation and their evolution. Success can be achieved when protect or secure IoT devices. Otherwise, it is becoming as challenges in term of privacy and security. In additional, malware bytes offers various cyber security solution for both business and home. It is helping to protect against the ransomware, malware and other malicious website. However, it should be including the different important solution for providing better security within system. Wireshark tool: it is one of important protocol analyzer support windows, Solaris, Linux. It help for easily capture the live performance. in order to provide as powerful display filters to maintain security. Webroot: It is one of most common antivirus which help for providing the better internet security in which different devices protect sensitive information or data. It will storage 25 GB memory. It is the best solution for offices, business and other partners. Cloud Computing 13
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Cloud Centric as a solution, which is mainly applied in every part of system such as production, transmission and distribution. Smart home has become as major application interest on term of smart grid. Generally, smart grid can be used the ICT in home control, ranging from managing and controlling appliances in term of automation feature. It is based on the element of smart home that can use as intelligence power to maintain the security aspects. Cloud server can use to store or collect large amount of sensitive information or data. In this way, it always supports for reducing authorised access of third parties. Afterwards, it is useful to eliminate threats, risks within IoT devices (Jeongand Park,2019). Thus, users can access the data with full of protection. All devices are secured or protected through different malicious actions, hackers because cloud server may use encryption technique for protecting signals during transmission from different IoT devices. CONCLUSION From above discussion, it has beenidentified the IoTfor smart home, which is mainly consider as electronic appliances to be connected with computer control system. In this report, it has summarised concept of smart phone with integration of IoT services. It can be identified the recent innovation developments with respect to use of Internet of things in Smart Home. it involves automation refrigerator, washer and amazon echo. These are considered as smart home devices for established the connection through internet. Moreover, the documentation has been described about the certain in term of cyber security, which directly affecting on the overall performance and efficiency. However, it has concluded that challenges and its solution. 14
REFERENCES Book and Journals Almusaylim, Z.A. and Zaman, N., 2019. A review on smart home present state and challenges: linked to context-awareness internet of things (IoT).Wireless networks.25(6). pp.3193- 3204. Geneiatakis, D., and et. al., 2017, May. Security and privacy issues for an IoT based smart home. In2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)(pp. 1292-1297). IEEE. HaddadPajouh, H., Dehghantanha, A. and Karimipour, H., 2019. A survey on internet of things security: Requirements, challenges, and solutions.Internet of Things. p.100129. Jain,A.andSingh,T.,2020.SecurityChallengesandSolutionsofIoTEcosystem. InInformation and Communication Technology for Sustainable Development(pp. 259- 270). Springer, Singapore. Jeong, Y.S. and Park, J.H., 2019. IoT and Smart City Technology: Challenges, Opportunities, and Solutions.JIPS.15(2). pp.233-238. Kazmi, S., and et. al., 2017. Towards optimization of metaheuristic algorithms for IoT enabled smarthomestargetingbalanceddemandandsupplyofenergy.IEEEAccess.7. pp.24267-24281. Mocrii, D., Chen, Y. and Musilek, P., 2018. IoT-based smart homes: A review of system architecture, software, communications, privacy and security.Internet of Things.1. pp.81-98. Patrono, L. and et.al., 2019. Challenges to be addressed to realize Internet of Things solutions for smart environments. Pirbhulal, S., and et. al., 2017. A novel secure IoT-based smart home automation system using a wireless sensor network.Sensors.17(1). p.69. Sharma, A. and Sharma, R., 2020. A Review of Applications, Approaches, and Challenges in Internet of Things (IoT). InProceedings of ICRIC 2019(pp. 257-269). Springer, Cham. Singh, H., and et. al., 2018, March. IoT based smart home automation system using sensor node. In2018 4th International Conference on Recent Advances in Information Technology (RAIT)(pp. 1-5). IEEE. Tawalbeh, L.A., Muheidat, F. and Quwaider, M., 2020. IoT Privacy and security: Challenges and solutions.Applied Sciences.10(12). p.4102. 15