SlideShare a Scribd company logo
International Journal of Distributed and Parallel
Systems (IJDPS)
ISSN : 0976 - 9757 [Online] ; 2229 - 3957 [Print]
http://airccse.org/journal/ijdps/ijdps.html
Current Issue: November 2019, Volume 10,
Number 4/5/6 --- Table of Contents
http://airccse.org/journal/ijdps/current2019.html
Paper -01
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
Mayada Elsaid, Sara Altuwaijri, Nouf Aljammaz and Anees Ara
Computer Science Department, College of Computer & Information Sciences,
Prince Sultan University, Riyadh, Saudi Arabia
ABSTRACT
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home
environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT
sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart home
based anomaly detection system from a security perspective, to answer the question whether it is reliable
and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis
of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this
paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT
devices in a smart home environment. Consequently, a list of security countermeasures is proposed to
protect the IoT devices from the identified attacks. .
KEYWORDS
Cyber physical systems, anomaly detection system, intrusion detection system, secure smart home, IoT.
FOR MORE DETAILS: http://aircconline.com/ijdps/V10N6/10619ijdps01.pdf
http://airccse.org/journal/ijdps/current2019.html
REFERENCES
[1] Aran, O., Sanchez-Cortes, D., Do, M. T., & Gatica-Perez, D. (2016, October). "Anomaly detection in elderly daily
behavior in ambient sensing environments". In International Workshop on Human Behavior Understanding (pp. 51-
67). Springer, Cham.
[2] Paudel, R., Dunn, K., Eberle, W., & Chaung, D. (2018, May). "Cognitive Health Prediction on the Elderly Using
Sensor Data in Smart Homes". In The Thirty-First International Flairs Conference.
[3] Hoque, E., Dickerson, R. F., Preum, S. M., Hanson, M., Barth, A., & Stankovic, J. A. (2015, June). "Holmes: A
comprehensive anomaly detection system for daily in-home activities". In 2015 International Conference on
Distributed Computing in Sensor Systems (pp. 40-51). IEEE.
[4] Hsu, Y. L., Chou, P. H., Chang, H. C., Lin, S. L., Yang, S. C., Su, H. Y., ... & Kuo, Y. C. (2017). "Design and
implementation of a smart home system using multisensor data fusion technology". Sensors, 17(7), 1631.
[5] Pal, D., Triyason, T., & Funikul, S. (2017, December). Smart homes and quality of life for the elderly: A systematic
review. In 2017 IEEE International Symposium on Multimedia (ISM) (pp. 413- 419). IEEE.
[6] Lê, Q., Nguyen, H. B., & Barnett, T. (2012). "Smart homes for older people: Positive aging in a digital world".
Future internet, 4(2), 607-617.
[7] Boyanov, L., & Minchev, Z. (2014). "Cyber Security Challenges in Smart Homes". Volume 38: Cyber Security and
Resiliency Policy Framework,IOS Press Ebooks
[8] Paudel, R., Eberle, W., & Holder, L. B (2018). "Anomaly Detection of Elderly Patient Activities in Smart Homes
using a Graph-Based Approach". In: Proceedings of the 2018 International Conference on Data Science, pp. 163–169.
CSREA .
[9] Rao, T. A. "Security Challenges Facing IoT Layers and its Protective Measures". International Journal of Computer
Applications, 975, 8887.
[10] Lin, H., & Bergmann, N. (2016). "IoT privacy and security challenges for smart home environments".
Information, 7(3), 44.
[11] Ara, A., Al-Rodhaan, M., Tian, Y., & Al-Dhelaan, A. (2015). "A secure service provisioning framework for cyber
physical cloud computing systems". arXiv preprint arXiv:1611.00374.
[12] Mtshali, P., & Khubisa, F. (2019, March). "A Smart Home Appliance Control System for Physically Disabled
People". In 2019 Conference on Information Communications Technology and Society (ICTAS) (pp. 1-5). IEEE.
[13] Karimi, K., & Krit, S. (2019, July). "Smart home-Smartphone Systems: Threats, Security Requirements and Open
research Challenges". In 2019 International Conference of Computer Science and Renewable Energies (ICCSRE) (pp.
1-5). IEEE.
[14] Adiono, T., Tandiawan, B., & Fuada, S. (2018). "Device protocol design for security on internet of things based
smart home". International Journal of Online Engineering (iJOE), 14(07), 161-170.
[15] Sultana, S. N., Ramu, G., & Reddy, B. E. (2014). "Cloud-based development of smart and connected data in
healthcare application". International Journal of Distributed and Parallel Systems, 5(6), 1.
AUTHORS BIOGRAPHY
Mayada Elsaid is a senior Software Engineering ( Cyber Security) student in Prince Sultan University. She is an IEEE
member and chair in IEEE-Student Chapter. Her areas of interest and research are cyber physical systems security and
IoT. She has presented security and business process management papers in local conferences and research forums.
Sara Altuwaijri is a bachelor student, majoring in Software Engineering (Cyber Security) at Prince Sultan University.
She’s currently leading two clubs in the university by arranging events and bootcamps that are related to many topics
of computer science. She’s the president of Edtech club and the Vice Chair if IEEE chapter at PSU. She received nano
degrees in Artificial Intelligence and Self-driving cars. Her research interests include security & privacy in IoT and
cyber physical systems.
Nouf Aljammaz is a senior Computer Science (Cyber Security) student focused on improving facility security through
diligent approach and sense of personal responsibility. Resilient individual trained in security. Her research interest
includes security domains related to risks management, optimization techniques relates to asset protection and threat
minimizations.
Anees Ara received her BSc in Computer Science and MSc in Mathematics with Computer Science from Osmania
University, India in 2005 and 2007 respectively. She has received her PhD degree from King Saud University and she
is currently working as Assistant Professor at College of Computer and Information Sciences, Prince Sultan University,
Kingdom of Saudi Arabia. She is an active member of Security Engineering Lab, Prince Sultan University, KSA and
IEEE, computing society. In addition, she is an active reviewer of international journals. Her research interests are
broadly divided into privacy and security, which are related to cloud computing, cryptograph, smart environment,
cyber physical systems and big data.

More Related Content

What's hot

Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
Maurice Dawson
 
123
123123
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
CSCJournals
 
Professor Aboul ella Hassanien (Abo) full list of publications till October...
Professor Aboul ella Hassanien (Abo)   full list of publications till October...Professor Aboul ella Hassanien (Abo)   full list of publications till October...
Professor Aboul ella Hassanien (Abo) full list of publications till October...
Aboul Ella Hassanien
 
The technologies of ai used in different corporate world
The technologies of ai used in different  corporate worldThe technologies of ai used in different  corporate world
The technologies of ai used in different corporate world
Er. rahul abhishek
 
Vedansh thakkar resume
Vedansh thakkar resumeVedansh thakkar resume
Vedansh thakkar resume
VedanshThakkar1
 
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
Swapsg
 
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research
AIRCC Publishing Corporation
 
Implementing Ethics in AI
Implementing Ethics in AIImplementing Ethics in AI
Implementing Ethics in AI
Pekka Abrahamsson / Tampere University
 
N018138696
N018138696N018138696
N018138696
IOSR Journals
 
rpaper
rpaperrpaper
rpaper
imu409
 
Energy Conservation in a Smart Home via an Embedded Platform
Energy Conservation in a Smart Home via an Embedded PlatformEnergy Conservation in a Smart Home via an Embedded Platform
Energy Conservation in a Smart Home via an Embedded Platform
Editor IJCATR
 
Agricultural Informatics as a Branch of Study in Information Sciences and Tec...
Agricultural Informatics as a Branch of Study in Information Sciences and Tec...Agricultural Informatics as a Branch of Study in Information Sciences and Tec...
Agricultural Informatics as a Branch of Study in Information Sciences and Tec...
International Journal of World Policy and Development Studies
 
Vedansh thakkar resume
Vedansh thakkar resumeVedansh thakkar resume
Vedansh thakkar resume
VedanshThakkar1
 

What's hot (14)

Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
 
123
123123
123
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
Professor Aboul ella Hassanien (Abo) full list of publications till October...
Professor Aboul ella Hassanien (Abo)   full list of publications till October...Professor Aboul ella Hassanien (Abo)   full list of publications till October...
Professor Aboul ella Hassanien (Abo) full list of publications till October...
 
The technologies of ai used in different corporate world
The technologies of ai used in different  corporate worldThe technologies of ai used in different  corporate world
The technologies of ai used in different corporate world
 
Vedansh thakkar resume
Vedansh thakkar resumeVedansh thakkar resume
Vedansh thakkar resume
 
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
 
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research
 
Implementing Ethics in AI
Implementing Ethics in AIImplementing Ethics in AI
Implementing Ethics in AI
 
N018138696
N018138696N018138696
N018138696
 
rpaper
rpaperrpaper
rpaper
 
Energy Conservation in a Smart Home via an Embedded Platform
Energy Conservation in a Smart Home via an Embedded PlatformEnergy Conservation in a Smart Home via an Embedded Platform
Energy Conservation in a Smart Home via an Embedded Platform
 
Agricultural Informatics as a Branch of Study in Information Sciences and Tec...
Agricultural Informatics as a Branch of Study in Information Sciences and Tec...Agricultural Informatics as a Branch of Study in Information Sciences and Tec...
Agricultural Informatics as a Branch of Study in Information Sciences and Tec...
 
Vedansh thakkar resume
Vedansh thakkar resumeVedansh thakkar resume
Vedansh thakkar resume
 

Similar to Current Issue: November 2019, Volume 10, Number 4/5/6--- Table of Contents

TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
AIRCC Publishing Corporation
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
IJNSA Journal
 
Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020
IJNSA Journal
 
Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...
IJNSA Journal
 
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
IJNSA Journal
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
IJNSA Journal
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
IJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
IJNSA Journal
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...
IJNSA Journal
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
TaunyaCoffman887
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
IJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...
ijcisjournal
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IJNSA Journal
 

Similar to Current Issue: November 2019, Volume 10, Number 4/5/6--- Table of Contents (20)

TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020
 
Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...
 
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
 

Recently uploaded

Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
Dwarkadas J Sanghvi College of Engineering
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
ijseajournal
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
DharmaBanothu
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
PreethaV16
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
PreethaV16
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
Lubi Valves
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
OKORIE1
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
sydezfe
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
MuhammadJazib15
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
felixwold
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
Kamal Acharya
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
wafawafa52
 
Flow Through Pipe: the analysis of fluid flow within pipes
Flow Through Pipe:  the analysis of fluid flow within pipesFlow Through Pipe:  the analysis of fluid flow within pipes
Flow Through Pipe: the analysis of fluid flow within pipes
Indrajeet sahu
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
snaprevwdev
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
DharmaBanothu
 
Advancements in Automobile Engineering for Sustainable Development.pdf
Advancements in Automobile Engineering for Sustainable Development.pdfAdvancements in Automobile Engineering for Sustainable Development.pdf
Advancements in Automobile Engineering for Sustainable Development.pdf
JaveedKhan59
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
ShurooqTaib
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
paraasingh12 #V08
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
pvpriya2
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
IJCNCJournal
 

Recently uploaded (20)

Introduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.pptIntroduction to Computer Networks & OSI MODEL.ppt
Introduction to Computer Networks & OSI MODEL.ppt
 
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...Call For Paper -3rd International Conference on Artificial Intelligence Advan...
Call For Paper -3rd International Conference on Artificial Intelligence Advan...
 
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...
 
OOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming languageOOPS_Lab_Manual - programs using C++ programming language
OOPS_Lab_Manual - programs using C++ programming language
 
FULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back EndFULL STACK PROGRAMMING - Both Front End and Back End
FULL STACK PROGRAMMING - Both Front End and Back End
 
Butterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdfButterfly Valves Manufacturer (LBF Series).pdf
Butterfly Valves Manufacturer (LBF Series).pdf
 
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
DESIGN AND MANUFACTURE OF CEILING BOARD USING SAWDUST AND WASTE CARTON MATERI...
 
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
一比一原版(uoft毕业证书)加拿大多伦多大学毕业证如何办理
 
Impartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 StandardImpartiality as per ISO /IEC 17025:2017 Standard
Impartiality as per ISO /IEC 17025:2017 Standard
 
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdfAsymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
Asymmetrical Repulsion Magnet Motor Ratio 6-7.pdf
 
Blood finder application project report (1).pdf
Blood finder application project report (1).pdfBlood finder application project report (1).pdf
Blood finder application project report (1).pdf
 
Ericsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.pptEricsson LTE Throughput Troubleshooting Techniques.ppt
Ericsson LTE Throughput Troubleshooting Techniques.ppt
 
Flow Through Pipe: the analysis of fluid flow within pipes
Flow Through Pipe:  the analysis of fluid flow within pipesFlow Through Pipe:  the analysis of fluid flow within pipes
Flow Through Pipe: the analysis of fluid flow within pipes
 
openshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoinopenshift technical overview - Flow of openshift containerisatoin
openshift technical overview - Flow of openshift containerisatoin
 
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
An In-Depth Exploration of Natural Language Processing: Evolution, Applicatio...
 
Advancements in Automobile Engineering for Sustainable Development.pdf
Advancements in Automobile Engineering for Sustainable Development.pdfAdvancements in Automobile Engineering for Sustainable Development.pdf
Advancements in Automobile Engineering for Sustainable Development.pdf
 
paper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdfpaper relate Chozhavendhan et al. 2020.pdf
paper relate Chozhavendhan et al. 2020.pdf
 
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls ChennaiCall Girls Chennai +91-8824825030 Vip Call Girls Chennai
Call Girls Chennai +91-8824825030 Vip Call Girls Chennai
 
Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...Determination of Equivalent Circuit parameters and performance characteristic...
Determination of Equivalent Circuit parameters and performance characteristic...
 
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...
 

Current Issue: November 2019, Volume 10, Number 4/5/6--- Table of Contents

  • 1. International Journal of Distributed and Parallel Systems (IJDPS) ISSN : 0976 - 9757 [Online] ; 2229 - 3957 [Print] http://airccse.org/journal/ijdps/ijdps.html Current Issue: November 2019, Volume 10, Number 4/5/6 --- Table of Contents http://airccse.org/journal/ijdps/current2019.html
  • 2. Paper -01 DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE Mayada Elsaid, Sara Altuwaijri, Nouf Aljammaz and Anees Ara Computer Science Department, College of Computer & Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia ABSTRACT Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks. . KEYWORDS Cyber physical systems, anomaly detection system, intrusion detection system, secure smart home, IoT. FOR MORE DETAILS: http://aircconline.com/ijdps/V10N6/10619ijdps01.pdf http://airccse.org/journal/ijdps/current2019.html
  • 3. REFERENCES [1] Aran, O., Sanchez-Cortes, D., Do, M. T., & Gatica-Perez, D. (2016, October). "Anomaly detection in elderly daily behavior in ambient sensing environments". In International Workshop on Human Behavior Understanding (pp. 51- 67). Springer, Cham. [2] Paudel, R., Dunn, K., Eberle, W., & Chaung, D. (2018, May). "Cognitive Health Prediction on the Elderly Using Sensor Data in Smart Homes". In The Thirty-First International Flairs Conference. [3] Hoque, E., Dickerson, R. F., Preum, S. M., Hanson, M., Barth, A., & Stankovic, J. A. (2015, June). "Holmes: A comprehensive anomaly detection system for daily in-home activities". In 2015 International Conference on Distributed Computing in Sensor Systems (pp. 40-51). IEEE. [4] Hsu, Y. L., Chou, P. H., Chang, H. C., Lin, S. L., Yang, S. C., Su, H. Y., ... & Kuo, Y. C. (2017). "Design and implementation of a smart home system using multisensor data fusion technology". Sensors, 17(7), 1631. [5] Pal, D., Triyason, T., & Funikul, S. (2017, December). Smart homes and quality of life for the elderly: A systematic review. In 2017 IEEE International Symposium on Multimedia (ISM) (pp. 413- 419). IEEE. [6] Lê, Q., Nguyen, H. B., & Barnett, T. (2012). "Smart homes for older people: Positive aging in a digital world". Future internet, 4(2), 607-617. [7] Boyanov, L., & Minchev, Z. (2014). "Cyber Security Challenges in Smart Homes". Volume 38: Cyber Security and Resiliency Policy Framework,IOS Press Ebooks [8] Paudel, R., Eberle, W., & Holder, L. B (2018). "Anomaly Detection of Elderly Patient Activities in Smart Homes using a Graph-Based Approach". In: Proceedings of the 2018 International Conference on Data Science, pp. 163–169. CSREA . [9] Rao, T. A. "Security Challenges Facing IoT Layers and its Protective Measures". International Journal of Computer Applications, 975, 8887. [10] Lin, H., & Bergmann, N. (2016). "IoT privacy and security challenges for smart home environments". Information, 7(3), 44. [11] Ara, A., Al-Rodhaan, M., Tian, Y., & Al-Dhelaan, A. (2015). "A secure service provisioning framework for cyber physical cloud computing systems". arXiv preprint arXiv:1611.00374. [12] Mtshali, P., & Khubisa, F. (2019, March). "A Smart Home Appliance Control System for Physically Disabled People". In 2019 Conference on Information Communications Technology and Society (ICTAS) (pp. 1-5). IEEE. [13] Karimi, K., & Krit, S. (2019, July). "Smart home-Smartphone Systems: Threats, Security Requirements and Open research Challenges". In 2019 International Conference of Computer Science and Renewable Energies (ICCSRE) (pp. 1-5). IEEE. [14] Adiono, T., Tandiawan, B., & Fuada, S. (2018). "Device protocol design for security on internet of things based smart home". International Journal of Online Engineering (iJOE), 14(07), 161-170. [15] Sultana, S. N., Ramu, G., & Reddy, B. E. (2014). "Cloud-based development of smart and connected data in healthcare application". International Journal of Distributed and Parallel Systems, 5(6), 1.
  • 4. AUTHORS BIOGRAPHY Mayada Elsaid is a senior Software Engineering ( Cyber Security) student in Prince Sultan University. She is an IEEE member and chair in IEEE-Student Chapter. Her areas of interest and research are cyber physical systems security and IoT. She has presented security and business process management papers in local conferences and research forums. Sara Altuwaijri is a bachelor student, majoring in Software Engineering (Cyber Security) at Prince Sultan University. She’s currently leading two clubs in the university by arranging events and bootcamps that are related to many topics of computer science. She’s the president of Edtech club and the Vice Chair if IEEE chapter at PSU. She received nano degrees in Artificial Intelligence and Self-driving cars. Her research interests include security & privacy in IoT and cyber physical systems. Nouf Aljammaz is a senior Computer Science (Cyber Security) student focused on improving facility security through diligent approach and sense of personal responsibility. Resilient individual trained in security. Her research interest includes security domains related to risks management, optimization techniques relates to asset protection and threat minimizations. Anees Ara received her BSc in Computer Science and MSc in Mathematics with Computer Science from Osmania University, India in 2005 and 2007 respectively. She has received her PhD degree from King Saud University and she is currently working as Assistant Professor at College of Computer and Information Sciences, Prince Sultan University, Kingdom of Saudi Arabia. She is an active member of Security Engineering Lab, Prince Sultan University, KSA and IEEE, computing society. In addition, she is an active reviewer of international journals. Her research interests are broadly divided into privacy and security, which are related to cloud computing, cryptograph, smart environment, cyber physical systems and big data.