MITS Advanced Research Techniques: Smart Home Security Proposal

Verified

Added on  2022/08/24

|17
|3763
|18
Project
AI Summary
This research proposal focuses on the security aspects of smart home applications, addressing the growing concerns surrounding data privacy and potential vulnerabilities. The proposal outlines the background, purpose, and rationale for investigating security routines and methods for smart homes. It explores the use of IoT devices, wireless sensor networks, and the associated risks like malware, data breaches, and unauthorized access. The research aims to identify effective techniques, such as firewalls and encryption, to enhance data security in smart home environments. The methodological approach includes interpretivism philosophy and a combination of inductive and deductive research approaches, with a close-ended survey for data collection. The study intends to contribute to a better understanding of smart home security, providing insights into mitigating risks and improving data protection for users. The proposal emphasizes the importance of addressing security concerns to ensure the continued growth and adoption of smart home technologies. It highlights the research questions, goals, and the significance of the study in the context of rapidly evolving smart home applications.
Document Page
RESEARCH PROPOSAL 0
Student Name
Higher Education Department
Victorian Institute of Technology
Smart home application
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
RESEARCH PROPOSAL 1
Table of Contents
Proposed title...............................................................................................................................................2
Abstract.......................................................................................................................................................2
Outline of the proposed research.................................................................................................................3
Background.............................................................................................................................................5
Research purpose....................................................................................................................................7
Research goals........................................................................................................................................7
Rationale.................................................................................................................................................7
Research topic and central research question...............................................................................................8
Methodological approach............................................................................................................................9
Introduction.............................................................................................................................................9
Research philosophy................................................................................................................................9
Research approach.................................................................................................................................10
Research design.....................................................................................................................................10
Research Strategy..................................................................................................................................11
Data collection method..........................................................................................................................11
Sampling process...................................................................................................................................12
Data analysis..........................................................................................................................................12
Contribution..............................................................................................................................................13
Proposed Time schedule............................................................................................................................14
Literature references..................................................................................................................................15
Document Page
RESEARCH PROPOSAL 2
Proposed title
Security routine appropriate for smart home application
Abstract
Smart home applications are helpful for the individual that helps to monitor and activate home-based devices
through the mobile application. It is beneficial to operate home devices like turn on/off bulb, TV, lights and other
appliances. Numerous studies issued in the last few years that highlighted the benefits and challenges of integrating
smart home applications. It is argued that security is a key problem while using smart home applications where the
attackers transfer traffic and malware signals. This paper focuses on data security in regards to smart home
applications.
For obtaining data a close-ended survey is conducted that helped to gather information from the participants.
Various security issues occur in the smart home applications including malware, DoS, spyware and many more
which are reviewed in this paper. It is found that the lack of privacy and the presence of unauthorized signals are
major factors that lead to security concerns in the smart home application. This paper concluded that the utilization
of smart home application requires data security systems like firewall and encryption. Therefore, it is suggested that
developers should include firewall-based networks and focus on security while implementing smart home
applications. The future research will evaluate effective methods and techniques for protecting data from the cyber-
crimes in regards to the smart home applications.
Keywords: smart home application, security, lack of privacy and encryption
Document Page
RESEARCH PROPOSAL 3
Outline of the proposed research
Smart home devices are automated home devices that are capable to automatically monitor home
appliances. Smart home application is also defined as a home automation app that is mainly
utilized to remotely control and handle linked non-computing systems in the home from a mobile
device. There are various benefits of using smart home devices including enhance reliability,
hands-free convenience, save time, customization and many more.
However, security is a major weakness of smart home application as it contains wireless systems
and IoT networks which are less likely towards privacy. Dorri, Kanhere, Jurdak and,
Gauravaram, (2017) determined that smart home device contain network topology that has the
potential to manage communication gaps and interconnect networks and hubs in a reliable
manner. Wireless sensor networks have become indispensable to realization of smart home
devices that helps to perform data communication among transmitter and receiver. The below
figure indicates the network topology of smart home devices where numerous nodes are
interconnected with the main server called as coordinator:
Source: Network topology of smart home device
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
RESEARCH PROPOSAL 4
(Source: Dorri, Kanhere, Jurdak and, Gauravaram, 2017)
Chifor, Bica, Patriciu and, Pop, (2018) reported that numerous weaknesses of smart home
devices include more costly, require proper communication among networks, dependency on
internet, dependency on professionals, security concerns, and complex for troubleshooting
wireless networks and so on [2]. In smart home devices, wireless sensor networks are
interconnected to the IoT devices for performing operations but it is significant to implement
networks with effective security tools for enhancing data privacy.
The working principle of smart home device is simple where the user needs to provide command
to the IoT networks and wireless sensor networks help to transmit the applied input to the
receiver. At the receiver side, the wireless networks and communication systems gather the
signal and perform as per the applied input. Proper communication among transmitter and
receiver is required so that signals can be transferred in an appropriate manner. Mainly Wi-Fi is
used in the smart home devices where IoT networks helps to perform data communication
among mobile device and home devices.
Document Page
RESEARCH PROPOSAL 5
This paper will provide a way to enhance skills in regards to the smart home applications and
evaluate security routine appropriate for smart home applications. A literature appraisal will be
involved in this research for reviewing the findings of the recent papers and identify the
appropriate techniques and countermeasures require enhancing data security in smart home
applications. There are various sections will be included in this research proposal, for example,
background, purpose, rationale, methodological approach, research design, contribution, and
timescale.
Background
The smart home application helps consumers to perform data transmission using IoT enabled
systems and mobile communication networks. The key part of the smart home application is that
it reduces complexity for performing home-based activities where users transmit signals through
communication channels and IoT networks help to interconnect home devices with the wireless
server. Smart home device is an IoT application that uses internet servers to monitor and control
appliances through automation system. Lack of IoT technology uses, limited range of wireless
networks and unfriendly user interface are major limitations of current home automation
systems.
Most of the smart home devices are developed using wireless sensor networks and internet of
things due to their potential to provide effective connectivity among two devices. It is found that
smart home devices use wireless networks which are less secured and can be hacked by
transferring malicious codes and traffic signals. Dorri, Kanhere, Jurdak and, Gauravaram, (2017)
agreed and reported that the involvement of mobile networks in smart home applications can
produce security concerns and individuals can lose confidentiality of data easily [1].
Document Page
RESEARCH PROPOSAL 6
In the case of smart home devices, all computing networks and systems are linked to a device
defined as smart central controller that may be connected to a switch module which allow
consumers to access every device separately. The IoT networks are linked to the router for
internet connection which can help users to interact with the devices and home appliances. The
below figure shows architecture of smart home device:
Figure: Architecture of smart home devices
(Source: Dorri, Kanhere, Jurdak and, Gauravaram, 2017)
It is found that there are major three layers include in the smart home device including sensing
layer, network layer and application layer. In which sensing layer is the actual layer that gathers
the information from home appliances and devices and transfer to the middle server? Network
layer send the obtained data to top later for storing and evaluating data. Application layer helps
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
RESEARCH PROPOSAL 7
to trigger the communication system which includes the application developed for performing
communication.
Smart home networks store the personal information of individuals and hackers uses botnet and
malware networks for producing data-breach concerns and access all personal information. From
earlier investigations, it is determined that lack of confidentiality and involvement of less secured
nets can produce data breach issues in the smart home applications.
Chifor, Bica, Patriciu and, Pop, (2018) examined that numerous security threats and risks occur
in the IoT based smart home requests counting a man in the middle, data theft, device hijacking,
DDoS, ransomware and many more [2]. By reducing malware and traffic signals from the
networks can help consumers to lead the security of data while developing smart home
applications. The involvement of encryption-based methods can help consumers to lead the
security of data and mobile networks used in smart home applications.
Research purpose
The major purpose of this proposal is to evaluate the security techniques and approaches that
require enhancing the privacy of data while using the smart home application.
Research goals
There are numerous research goals which are described below:
To define the concept behind the smart home application
To review security concerns linked with the smart home application
To identify data safety tedious and methods appropriate for smart home application
To enhance skills in regards to the data security of smart home application
Document Page
RESEARCH PROPOSAL 8
Rationale
It is determined that the uses of smart home applications are growing quickly and it is significant
to aware individuals about security concerns in regards to the smart home devices. This proposed
research will provide a way to enhance skills in regards to the data safety of smart home and
review the major factors that leading security issues. The previous studies provided less fact
about security concerns associated with smart home devices that produced research gaps [3].
This research will deliver depth information about the smart home application and highlight the
effective techniques and approaches by which the security of data in smart home applications can
be enhanced easily. Researchers will provide depth information about security issues associated
with the smart home application and handle the data breach-related concerns.
Research topic and central research question
The major topic of this research is “smart home application” in which the security-related
concerns will be addressed effectively by providing complete details about risk factors linked
with the smart home application. The major research question is “what are the data security
routines and methods appropriate for smart home applications?” It is determined that the
utilization of smart home applications can help individuals to reduce efforts for performing
operations in the homes and provide automatic networks by which home devices can be operated
easily [4]. It is determined that the consumers use simple passwords in the smart home
applications that can be detected by the criminals using malicious and phishing networks. By
obtaining passwords, hackers handle hubs and routers connected to the wireless networks and
obtain all sensitive data easily. Involvement of two-step verification can help to improve data
safety in the smart home devices where consumers require providing one time password every
time by which unauthorized access can be handled.
Document Page
RESEARCH PROPOSAL 9
The developed research question includes the concept of smart home applications and highlights
the routines and techniques that require enhancing data security of smart home applications. from
recent investigations, it is determined that the smart home applications are capable to provide
reliable services to the consumers but the security of data is a major concern for which the
individuals should include only secured networks and include authorized communication
channels. The research question will be addressed in this research and the privacy of data in the
case of smart home applications will be enhanced effectively.
Methodological approach
Introduction
The research methodology is a key section of the investigation that provides a way to complete
the investigation with better quality and effective outcomes. It is reported that research
methodology has the capability to manage research gaps and help writers to address research
queries by providing effective data gathering methods and techniques [5]. In this research,
numerous methods will be included such as investigation design, research approach, philosophy,
and data assortment techniques and data analysis methods. It is highlighted that the involvement
of research methodology is based on the research topic and developed research questions. Using
effective methods the researcher will be capable to achieve developed goals and solve the
research problems like security issues associated with the smart home applications.
Research philosophy
It is an effective process used in the research that helps to develop logical reasoning for assessing
reliable information and solving research queries effectively. It is highlighted that two kinds of
philosophies involve in studies such as interpretivism and positivism. It is true that the adoption
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
RESEARCH PROPOSAL 10
of philosophies mainly depends on the questions developed in the research [6]. The positivism
method generally evaluates information obtained from observation. On the opposite side, the
interpretivism method provides reliable and depth information in regard to the research queries.
In this research proposal, interpretivism philosophy will be adopted due to their ability to
enhance the study quality. Moreover, it is helpful for highlighting different techniques and
strategies in regard to investigation issues.
Research approach
It is found that the investigation approach is a major unit of methodology that provides a way to
examine the causes for obtaining research processes. It is highlighted that the research approach
is divided into two units including inductive and deductive [7]. The inductive approach is mainly
utilized for assessing in-depth observation data and gathering theoretical aspects in regards to the
questions developed in the research. On the opposite side, a deductive approach is used for
developing a hypothesis. In this research proposal, the inductive approach will be included
because of their larger effectiveness to enhance research quality. Using such methodology, the
writer will be able to obtain effective points in regard to the security routine appropriate for
smart home applications. Moreover, developed objectives and goals will be achieved by using
the inductive approach.
Research design
It is an appropriate methodology that helps to outline the structure of the investigation. It is
determined that the involvement of the research design, can help the writers to get the right
direction and obtain data from reliable sources [8]. It also includes plans and frameworks by the
writers can solve the research questions. Various kinds of research designs involve by the writers
while conducting research such as quantitative and qualitative research design. In this manner,
Document Page
RESEARCH PROPOSAL 11
the quantitative method helps the writer to gather numerical information by including statistical
methods. Qualitative investigation allows the investigator to make views and develop a
hypothesis. For this research proposal, a mixed design will be adopted that will help the writers
to include both theoretical and numerical information in regard to the security concerns linked
with the smart home application. In this manner, the qualitative method will enable the writers to
gather effective information about smart home applications while the quantitative method will
help to include numerical facts by gathering from statistical methods. By using such kinds of
methods the writer can achieve research goals and solve research issues.
Research Strategy
It is a significant section of the investigation that assesses the information obtaining processes by
which the study would be shown in a suitable manner. Numerous plans involve in the studies
including surveys through questionnaires, focus groups, literature search, observation, and case
study. In this research proposal, the literature review will be included for evaluating theoretical
information in regard to the smart home applications. In which data and facts will be obtained
from previous studies, peer-reviewed papers, websites and other sources. Moreover, a survey
through the questionnaire will be included for obtaining fresh information from the participants
and a close-ended survey will be conducted with the participants. Using such strategies the
writers will be capable to obtain reliable information and solve the security issues that occurred
in the smart home applications.
Data collection method
It is highlighted that data gathering is a reliable and appropriate method used in the research for
attaining developed goals due to their potential to pool the facts proficiently. Numerous methods
involved in the data collection such as primary and secondary data. It is found that primary data
chevron_up_icon
1 out of 17
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]