Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart
home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks.
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOijccsa
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
Body Sensor Networks have considerably facilitated the continuous measurement of physiological
parameters of human body. The sensors used to measure the body parameters, have several limitations
in terms of power, computation capability, memory and communication capability. In this paper a novel
architecture has been proposed to ensure continuous, unobtrusive and remote patient monitoring, taking
into account the inherent hardware constraints of the sensors. The proposed architecture would enable
senior citizens, patients with chronic ailments and patients requiring post-operative care to be remotely
monitored in the comfort of their homes. Security threats and challenges inherent to wireless
communication of sensor data have been discussed and a security mechanism to ensure data
confidentiality, integrity and authentication has been proposed.
Wearables are small electronic devices, often comprising one or more sensors and having computational capability. Devices such as wrist watches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. The Nigerian state at this period is faced with a lot of kidnapping activities in schools, homes and abduction for the purpose of ransomed collection and other illegal activities necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria.
DEDA: An algorithm for early detection of topology attacks in the internet of...IJECEIAES
The internet of things (IoT) is used in domestic, industrial as well as mission-critical systems including homes, transports, power plants, industrial manufacturing and health-care applications. Security of data generated by such systems and IoT systems itself is very critical in such applications. Early detection of any attack targeting IoT system is necessary to minimize the damage. This paper reviews security attack detection methods for IoT Infrastructure presented in the state-of-the-art. One of the major entry points for attacks in IoT system is topology exploitation. This paper proposes a distributed algorithm for early detection of such attacks with the help of predictive descriptor tables. This paper also presents feature selection from topology control packet fields. The performance of the proposed algorithm is evaluated using an extensive simulation carried out in OMNeT++. Performance parameter includes accuracy and time required for detection. Simulation results presented in this paper show that the proposed algorithm is effective in detecting attacks ahead in time.
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY IJCNCJournal
The Internet of Things (IoT) enables numerous business opportunities in fields as diverse as e-health, smart
cities, smart homes, among many others. The IoT incorporates multiple long-range, short-range, and
personal area wireless networks and technologies into the designs of IoT applications. Localisation in
indoor positioning systems plays an important role in the IoT. Location Based IoT applications range from
tracking objects and people in real-time, assets management, agriculture, assisted monitoring technologies
for healthcare, and smart homes, to name a few. Radio Frequency based systems for indoor positioning
such as Radio Frequency Identification (RFID) is a key enabler technology for the IoT due to its costeffective,
high readability rates, automatic identification and, importantly, its energy efficiency
characteristic. This paper reviews the state-of-the-art RFID technologies in IoT Smart Homes applications.
It presents several comparable studies of RFID based projects in smart homes and discusses the
applications, techniques, algorithms, and challenges of adopting RFID technologies in IoT smart home
systems.
COMPLEX EVENT PROCESSING USING IOT DEVICES BASED ON ARDUINOijccsa
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
Body Sensor Networks have considerably facilitated the continuous measurement of physiological
parameters of human body. The sensors used to measure the body parameters, have several limitations
in terms of power, computation capability, memory and communication capability. In this paper a novel
architecture has been proposed to ensure continuous, unobtrusive and remote patient monitoring, taking
into account the inherent hardware constraints of the sensors. The proposed architecture would enable
senior citizens, patients with chronic ailments and patients requiring post-operative care to be remotely
monitored in the comfort of their homes. Security threats and challenges inherent to wireless
communication of sensor data have been discussed and a security mechanism to ensure data
confidentiality, integrity and authentication has been proposed.
Wearables are small electronic devices, often comprising one or more sensors and having computational capability. Devices such as wrist watches, pens, and glasses with installed cameras are now available at cheap prices for user to purchase to monitor or securing themselves. The Nigerian state at this period is faced with a lot of kidnapping activities in schools, homes and abduction for the purpose of ransomed collection and other illegal activities necessitate these reviews. The success of the wearable technology in medical uses prompted the research into application into security uses. The method of research is the use of case studies and literature search. This paper takes a look at the possible applications of the wearable technology to combat the cases of abduction and kidnapping in Nigeria.
DEDA: An algorithm for early detection of topology attacks in the internet of...IJECEIAES
The internet of things (IoT) is used in domestic, industrial as well as mission-critical systems including homes, transports, power plants, industrial manufacturing and health-care applications. Security of data generated by such systems and IoT systems itself is very critical in such applications. Early detection of any attack targeting IoT system is necessary to minimize the damage. This paper reviews security attack detection methods for IoT Infrastructure presented in the state-of-the-art. One of the major entry points for attacks in IoT system is topology exploitation. This paper proposes a distributed algorithm for early detection of such attacks with the help of predictive descriptor tables. This paper also presents feature selection from topology control packet fields. The performance of the proposed algorithm is evaluated using an extensive simulation carried out in OMNeT++. Performance parameter includes accuracy and time required for detection. Simulation results presented in this paper show that the proposed algorithm is effective in detecting attacks ahead in time.
RFID LOCALISATION FOR INTERNET OF THINGS SMART HOMES: A SURVEY IJCNCJournal
The Internet of Things (IoT) enables numerous business opportunities in fields as diverse as e-health, smart
cities, smart homes, among many others. The IoT incorporates multiple long-range, short-range, and
personal area wireless networks and technologies into the designs of IoT applications. Localisation in
indoor positioning systems plays an important role in the IoT. Location Based IoT applications range from
tracking objects and people in real-time, assets management, agriculture, assisted monitoring technologies
for healthcare, and smart homes, to name a few. Radio Frequency based systems for indoor positioning
such as Radio Frequency Identification (RFID) is a key enabler technology for the IoT due to its costeffective,
high readability rates, automatic identification and, importantly, its energy efficiency
characteristic. This paper reviews the state-of-the-art RFID technologies in IoT Smart Homes applications.
It presents several comparable studies of RFID based projects in smart homes and discusses the
applications, techniques, algorithms, and challenges of adopting RFID technologies in IoT smart home
systems.
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based
healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.
Multipurpose medical assistant robot (Docto-Bot) based on internet of things IJECEIAES
The world's population is growing every day, and so is the number of patients. People's life expectancy is increasing due to technology's welfare, but the problem is that the health sector has always faced a shortage of inadequate doctors. This research main objective was to design and implement a biomedical-based medical assistant robot named "Docto-Bot" to deal with this problem. This research concerns this medical assistant robot's design and development for the disabled and the patients in need. Such a robot's prime utilization is to minimize person-to-person contact and ensure the cleaning, sterilization, and support in hospitals and similar facilities such as quarantine. This prototype robot consists of a medicine reminding and medicine providing system, Automatic hand sanitizer and IoT based physiological monitoring system (body temperature, pulse rate, ECG, Oxygen saturation level). A direct one-to-one server-based communication method and user-end android app maintaining system designed. It also included the controlling part, which control automatically and manually by users. Docto-Bot will play a very significant factor in bio-medical robot applications. Though the achievements described in the paper look fruitful and advanced, shortcomings still exist.
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
Protection has become one of the biggest fields of study for several years, however the demand for this is growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from any workstation to cloud, and though protection must be incredibly important all over. Throughout the past two decades, sufficient focus has been given to substantiation along with validation in the technology model. Identifying a legal person is increasingly become the difficult activity with the progression of time. Some attempts are introduced in that same respect, in particular by utilizing human movements such as fingerprints, facial recognition, palm scanning, retinal identification, DNA checking, breathing, speech checker, and so on. A number of methods for effective iris detection have indeed been suggested and researched. A general overview of current and state-of-the-art approaches to iris recognition is presented in this paper. In addition, significant advances in techniques, algorithms, qualified classifiers, datasets and methodologies for the extraction of features are also discussed.
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...IAEME Publication
In recent times and as far as technological advancement goes, the Internet of
Things is the trending topic in the world. Internet of Things popularly called IoT is the
internetworking of interconnected devices over the internet to enable interaction
between those devices without any human interference. Cisco predicts at least 50
billion of such devices to be available by the year 2020. This leaves a huge gap as to
the appropriate awareness and literacy of the world as a collective to be receptive of
the massive IoT technology overhaul coming in the nearest future. This paper gives a
little insight into the basics of IoT, its core fundamentals, its architecture and
furthermore contributes to knowledge the application of IoT to the education sector.
Considering the number of connected devices expected to be produced, it is expected
also that sufficient amount of personnel are trained in IoT systems adequately to meet
with the rising demand
KARE – A Patent Protected AI based Technology into Hospital and Healthcare IIJSRJournal
Artificial Intelligence (AI) is a technology that, when linked with healthcare apps and smart wearable devices, can anticipate the onset of health issues in users by gathering and analyzing their health data. The integration of AI with smart wearable devices offers a wide range of potential applications in smart healthcare, however there is an issue with the black box operation of AI models' judgments, which has led in a lack of accountability and trust in the decisions made. In the field of healthcare, transparency, outcome tracing, and model improvement are all important. Healthcare providers can be more watchful and proactive in their interactions with patients thanks to the Internet of Things. Wheelchairs, defibrillators, nebulizers, oxygen pumps, and other monitoring devices are all tracked in real time utilizing IoT devices with sensors.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
Researchers create 'self aware' algorithm to ward off hacking attemptsRoen Branham
Watch the full episode on Youtube: https://youtu.be/Mu3noyHGgYo
It sounds like a scene from a spy thriller. An attacker gets through the IT defenses of a nuclear power plant and feeds it fake, realistic data, tricking its computer systems and personnel into thinking operations are normal. The attacker then disrupts the function of key plant machinery, causing it to misperform or break down. By the time system operators realize they've been duped, it's too late, with catastrophic results.
The scenario isn't fictional; it happened in 2010, when the Stuxnet virus was used to damage nuclear centrifuges in Iran. And as ransomware and other cyberattacks around the world increase, system operators worry more about these sophisticated "false data injection" strikes. In the wrong hands, the computer models and data analytics—based on artificial intelligence—that ensure smooth operation of today's electric grids, manufacturing facilities, and power plants could be turned against themselves.
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector.
Mobile devices are used for everyday life, such as personal information exchange – chatting, email,
shopping, and mobile banking, contributing to information security threats. Users' behavior can influence
information security threats. More research is needed to understand users' threat avoidance behavior and
motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced
mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks.
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
A FRAMEWORK FOR SMART HOMES FOR ELDERLY PEOPLE USING LABVIEW®IJCI JOURNAL
This paper deals with home automation systems that are essential for safe and independent living of elderly
people. These individuals must be able to perform their Activities of Daily Living (ADLs) without help from
caretakers. They must be confident enough that help is just a few minutes with the systems in place. The
focus will be on the medical and emergency systems, which are most essential for independent living. Zigbee based Wireless Sensor Networks (WSN) are used to collect the data throughout the home. Smart
shirts and smart phones monitor different parameters of the individual and transmit the data to the home network. A PC running LabVIEW is used as the central control unit for the entire house. The house must
have a fail proof communication framework for connecting with emergency services, doctors, helpers and relatives. The home network is connected to the Public Switched Telephone Network (PSTN) and internet.
SMS, email, prerecorded voice-based telephone calls are appropriately used to report emergencies. A GUI
(Graphical User Interface) was built in LabVIEW in order to control and simulate an entire home. Ambient Intelligence is built into the system to make it adaptive and dynamic as far as possible.
Complex Event Processing Using IOT Devices Based on Arduinoneirew J
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT combines smart devices to provide smart services and applications like smart cities, smart healthcare, smart home, and digital farm etc. But it is very crucial to secure connected IoT devices and networks because of the nature of IoT system. In this paper, the existing works are analyzed and an IoT based
healthcare system architecture is proposed. An authentication scheme to enhance the security of the proposed healthcare system is also present.
Multipurpose medical assistant robot (Docto-Bot) based on internet of things IJECEIAES
The world's population is growing every day, and so is the number of patients. People's life expectancy is increasing due to technology's welfare, but the problem is that the health sector has always faced a shortage of inadequate doctors. This research main objective was to design and implement a biomedical-based medical assistant robot named "Docto-Bot" to deal with this problem. This research concerns this medical assistant robot's design and development for the disabled and the patients in need. Such a robot's prime utilization is to minimize person-to-person contact and ensure the cleaning, sterilization, and support in hospitals and similar facilities such as quarantine. This prototype robot consists of a medicine reminding and medicine providing system, Automatic hand sanitizer and IoT based physiological monitoring system (body temperature, pulse rate, ECG, Oxygen saturation level). A direct one-to-one server-based communication method and user-end android app maintaining system designed. It also included the controlling part, which control automatically and manually by users. Docto-Bot will play a very significant factor in bio-medical robot applications. Though the achievements described in the paper look fruitful and advanced, shortcomings still exist.
FEATURE EXTRACTION METHODS FOR IRIS RECOGNITION SYSTEM: A SURVEYijcsit
Protection has become one of the biggest fields of study for several years, however the demand for this is growing exponentially mostly with rise in sensitive data. The quality of the research can differ slightly from any workstation to cloud, and though protection must be incredibly important all over. Throughout the past two decades, sufficient focus has been given to substantiation along with validation in the technology model. Identifying a legal person is increasingly become the difficult activity with the progression of time. Some attempts are introduced in that same respect, in particular by utilizing human movements such as fingerprints, facial recognition, palm scanning, retinal identification, DNA checking, breathing, speech checker, and so on. A number of methods for effective iris detection have indeed been suggested and researched. A general overview of current and state-of-the-art approaches to iris recognition is presented in this paper. In addition, significant advances in techniques, algorithms, qualified classifiers, datasets and methodologies for the extraction of features are also discussed.
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...IAEME Publication
In recent times and as far as technological advancement goes, the Internet of
Things is the trending topic in the world. Internet of Things popularly called IoT is the
internetworking of interconnected devices over the internet to enable interaction
between those devices without any human interference. Cisco predicts at least 50
billion of such devices to be available by the year 2020. This leaves a huge gap as to
the appropriate awareness and literacy of the world as a collective to be receptive of
the massive IoT technology overhaul coming in the nearest future. This paper gives a
little insight into the basics of IoT, its core fundamentals, its architecture and
furthermore contributes to knowledge the application of IoT to the education sector.
Considering the number of connected devices expected to be produced, it is expected
also that sufficient amount of personnel are trained in IoT systems adequately to meet
with the rising demand
KARE – A Patent Protected AI based Technology into Hospital and Healthcare IIJSRJournal
Artificial Intelligence (AI) is a technology that, when linked with healthcare apps and smart wearable devices, can anticipate the onset of health issues in users by gathering and analyzing their health data. The integration of AI with smart wearable devices offers a wide range of potential applications in smart healthcare, however there is an issue with the black box operation of AI models' judgments, which has led in a lack of accountability and trust in the decisions made. In the field of healthcare, transparency, outcome tracing, and model improvement are all important. Healthcare providers can be more watchful and proactive in their interactions with patients thanks to the Internet of Things. Wheelchairs, defibrillators, nebulizers, oxygen pumps, and other monitoring devices are all tracked in real time utilizing IoT devices with sensors.
oT applications usually rely on cloud computing services to perform data analysis such as filtering,
aggregation, classification, pattern detection, and prediction. When applied to specific domains, the IoT
needs to deal with unique constraints. Besides the hostile environment such as vibration and electric-
magnetic interference, resulting in malfunction, noise, and data loss, industrial plants often have Internet
access restricted or unavailable, forcing us to design stand-alone fog and edge computing solutions.
Researchers create 'self aware' algorithm to ward off hacking attemptsRoen Branham
Watch the full episode on Youtube: https://youtu.be/Mu3noyHGgYo
It sounds like a scene from a spy thriller. An attacker gets through the IT defenses of a nuclear power plant and feeds it fake, realistic data, tricking its computer systems and personnel into thinking operations are normal. The attacker then disrupts the function of key plant machinery, causing it to misperform or break down. By the time system operators realize they've been duped, it's too late, with catastrophic results.
The scenario isn't fictional; it happened in 2010, when the Stuxnet virus was used to damage nuclear centrifuges in Iran. And as ransomware and other cyberattacks around the world increase, system operators worry more about these sophisticated "false data injection" strikes. In the wrong hands, the computer models and data analytics—based on artificial intelligence—that ensure smooth operation of today's electric grids, manufacturing facilities, and power plants could be turned against themselves.
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector.
Mobile devices are used for everyday life, such as personal information exchange – chatting, email,
shopping, and mobile banking, contributing to information security threats. Users' behavior can influence
information security threats. More research is needed to understand users' threat avoidance behavior and
motivation. Using Technology threat avoidance theory (TTAT), this study assessed factors that influenced
mobile device users' threat avoidance motivations and behaviors as it relates to phishing attacks.
ENCRYPTION BASED WATERMARKING TECHNIQUE FOR SECURITY OF MEDICAL IMAGEijcsit
This paper proposes an encryption-based image watermarking scheme for medical images using a customized quantization of wavelet coefficient and a crypto system based on the chaotic cipher of Singular Value Decomposition (SVD). In order to spread the robustness of our algorithm and provide extra security, an improved SVD-CHAOS embedding and extraction procedure has been used to scramble the watermark logo in the preprocessing step of the proposed method. In the process of watermark embedding, an R-level discrete wavelet transform was applied to the host image. The high frequency wavelet coefficients are selected to carry these scrambled-watermarks by using adaptive quantization low bit modulation (LBM). The proposed image watermarking method endures entirety attacks and rightly extracts the hidden watermark without significant degradation in the image quality, Thus, when the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation (NC) performance of the proposed algorithm is compared with other related techniques.
With rapid growth of science and information technology, Internet of things (IoT) becomes as an integral part of daily life. The applications of IoT are expanded starting from connected cars, wearables, connected health, smart retail and healthcare. However, security issues are increasing with the increase of its use. Lack of compliances on the part of IoT manufacturers, lack of user knowledge and awareness, device update and management, lack of physical hardening and botnet attacks are considered as the major reasons for security issues in IoT based applications. In this aspect, it becomes important to analyze security issues involved with IoT and its impact on the users that has been performed in the present study
A FRAMEWORK FOR SMART HOMES FOR ELDERLY PEOPLE USING LABVIEW®IJCI JOURNAL
This paper deals with home automation systems that are essential for safe and independent living of elderly
people. These individuals must be able to perform their Activities of Daily Living (ADLs) without help from
caretakers. They must be confident enough that help is just a few minutes with the systems in place. The
focus will be on the medical and emergency systems, which are most essential for independent living. Zigbee based Wireless Sensor Networks (WSN) are used to collect the data throughout the home. Smart
shirts and smart phones monitor different parameters of the individual and transmit the data to the home network. A PC running LabVIEW is used as the central control unit for the entire house. The house must
have a fail proof communication framework for connecting with emergency services, doctors, helpers and relatives. The home network is connected to the Public Switched Telephone Network (PSTN) and internet.
SMS, email, prerecorded voice-based telephone calls are appropriately used to report emergencies. A GUI
(Graphical User Interface) was built in LabVIEW in order to control and simulate an entire home. Ambient Intelligence is built into the system to make it adaptive and dynamic as far as possible.
Complex Event Processing Using IOT Devices Based on Arduinoneirew J
Complex event processing systems have gained importance since recent developments in communication
and integrated circuits technologies. Developers can easily develop many smart space systems by
connecting various sensors to an Arduino as an internet of thing device. These systems are useful for many
places such as factories, greenhouses (plant house) and smart-homes. Especially in plant houses when the
desired humidity, temperature, light and soil moisture drops the certain level, the users should be notified
through their smartphones. The sensor information is sent to a central server over the internet via an
access point. The collected sensor data needs to be processed online to check whether an event is occurred
or not. The event processing system based on a complex event processing tool is created on the central
server. It is also an important issue to inform mobile users whenever an event occurs. A publish-subscribe
event based system is implemented on the central server. A mobile user is subscribed to the desired event
topic. When an event occurred, which is related with a specific topic, an alarm notification is sent to the
mobile users about the event information so as to take necessary precautions.
Data Analytics Project proposal: Smart home based ambient assisted living - D...Tarun Swarup
In Ambient Assisted Living environments, monitoring the elderly population can detect a wide range of environmental and user-specific parameters such as daily activities, a regular period of inactivity, usual behavioural patterns and other basic routines. The prime goal of this proposal is to experiment the anomaly detection methods and clustering techniques such as K-means, local outlier factor, K-nearest, DBSCAN and CURE on data and determine the most efficient and accurate method among all.
Locating and securing an Alzheimers patient who is outdoors and in wandering is crucial to an Alzheimer patient safety. Although advances in geo tracking and mobile technology have made locating patients instantly possible, reaching them while in wandering state may take time. However, a social network of caregivers may help shorten the time that it takes to reach and secure a wandering AD patient. This study proposes a new type of intervention based on novel mobile application architecture to form and direct a social support network of caregivers for locating and securing wandering patients as soon as possible. System employs, aside from the conventional tracking mechanism, a wandering detection mechanism, both of which operates through a tracking device installed a Subscriber Identity Module for Global System for Mobile Communications Network (GSM). Keywords: Alzheimer Disease (AD), Global System for Mobile Communication (GSM), Global Positioning System (GPS), Mild Cognitive Impairment (MCI), Electronic Geo- Tracking (EGT), Short Message Service (SMS), Radio Frequency Identification (RFID), Secure Digital Card (SD Card), Digital-to-Analog Converter (DAC), Active-Radio Frequency Identification Localization System (ARFIDLS), General Packet Radio Service (GPRS), Real-time Locating Systems (RTLS). Haroon Dar | Shreyansh Jain | Jyoti Shukla | V. M. Sardeshmukh"Alzheimer Patient Tracking and Alert System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11218.pdf http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/11218/alzheimer-patient-tracking-and-alert-system/haroon-dar
Smart internet of things kindergarten garbage observation system using Ardui...IJECEIAES
Increase the in population and kindergarten number, especially in urban areas made it difficult to properly manage waste. Thus, this paper proposed a system dedicated to kindergartens to manage to dispose of waste, the system can be called smart garbage based on internet of things (SGI). To ensure a healthy environment and an intelligent waste in the kindergarten management system in an integrated manner and supported by the internet of things (IoT), we presented it in detail identification, the SGI system includes details like a display system, an automatic lid system, and a communication system. This system supplied capabilities to monitor the status of waste continuously and on IoT website can show the percentage of waste placed inside the bin. And by using a Wi-Fi communication system, between the system unit and the monitoring body, to collect waste when the trash is full. The smart system proposed in this paper is the most efficient system of traditional waste management systems because it reduces the use of manpower and significantly limits the spread of waste and fully controls it. Additionally, it can be linked via the IoT to the mobile, thus forming an integrated monitoring system.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Efficient machine learning classifier to detect and monitor COVID-19 cases b...IJECEIAES
In this research work, coronavirus disease 2019 (COVID-19) has been considered to help mankind survive the present-day pandemic. This research is helpful to monitor the patients newly infected by the virus, and patients who have already recovered from the disease, and also to study the flow of virus from similar health issues. In this paper, an internet of things (IoT) framework has been developed for the early detection of suspected cases. This framework is used for collecting and uploading symptoms (data) through sensor devices to the physician, data analytics center, cloud, and isolation/health centers. The symptoms of the first wave, second wave, and omicron are used to identify the suspects. Five machine learning algorithms which are considered to be the best in the existing literature have been used to find the best machine learning classifier in this research work. The proposed framework is used for the rapid detection of COVID-19 cases from real-world COVID-19 symptoms to mitigate the spread in society. This model also monitors the affected patient who has undergone treatment and recovered. It also collects data for analysis to perform further improvements in algorithms based on daily updated information from patients to provide better solutions to mankind.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Final project report on grocery store management system..pdf
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
1. International Journal of Distributed and Parallel Systems (IJDPS) Vol.10, No.4/5/6, November 2019
DOI:10.5121/ijdps.2019.10601 1
DESIGN AND ANALYSIS OF SECURE SMART HOME
FOR ELDERLY PEOPLE
Mayada Elsaid, Sara Altuwaijri, Nouf Aljammaz and Anees Ara
Computer Science Department, College of Computer & Information Sciences, Prince
Sultan University, Riyadh, Saudi Arabia
ABSTRACT
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home
environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT
sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart
home based anomaly detection system from a security perspective, to answer the question whether it is
reliable and secure enough to leave elderly people alone in their smart homes. In this direction
comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT
device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to
simulate a network of IoT devices in a smart home environment. Consequently, a list of security
countermeasures is proposed to protect the IoT devices from the identified attacks. .
KEYWORDS
Cyber physical systems, anomaly detection system, intrusion detection system, secure smart home, IoT.
1. INTRODUCTION
Smart homes are those built with automation to control appliances and monitor activities. One of
the primary goals for smart homes is to guarantee comfort, control, and safety for the home
residents, so smart homes accustom to user behaviour. To improve the safety of the elderly their
daily behaviour is collected using IoT sensors and then modelled to detect any abnormal
behaviour [2].
Anomaly Detection System is a system that identifies both network and computer interruptions
and abuse by observing the system's regular behaviour and deciding if other behaviour is ordinary
or atypical[1]. Internet of Things (IoT) is the expansion of Internet network into physical regular
devices. These devices are connected with each other over the Internet, and they can be controlled
and monitored remotely. IoT is often also referred to as cyber-physical systems.
The basic architecture of IoT devices based anomaly detection system consists of four layers:
Perception Layer, Network Layer, Processing Layer and Application Layer. Perception layer
comprises of different sensors, for example, infrared, RFID, and QR code for collecting data
about the environment such ad pressure, humidity, and temperature [11]. These sensors collect
the data to send it to the next level, while actuators receive control commands to perform specific
actions. Network layer comprises of network communication software which is in charge of
2. International Journal of Distributed and Parallel Systems (IJDPS) Vol.10, No.4/5/6, November 2019
2
transmitting data procured from the sensors to different layers. Internet layer includes the data
aggregation, measurement, and control. The processing layer, called middleware layer, breaks
down, stores and processes a tremendous amount of data. Numerous advances like cloud
computing and big data processing work in the processing layer. These are the edge of IT
systems. All needed pre-processing and analytics before entering the data center is done here. It’s
the stage of analysis, management, and storage of data. Lastly, application layer gives the services
to the user according to his necessity. However each of these layers is prone to a set of potential
attacks.
1.1. Research Objective
The evaluation of real-life sensor data obtained from elderly people's households using
movement, windows, doors and pressure sensors can then help detect irregularities in the sensor
data. Such smart home tools that help identify and filter unexpected events do not simply use
rules; they use statistical analysis and advanced machine learning methods to collect data from
internet-connected home devices and store it on a cloud. Whether it is used in simple reminder
systems or prompting systems that urge users to take a necessary action in response to an alarm,
anomaly detection systems play a major role in smart homes where elderly people live.
For instance, one approach to monitor activities in order to find out the temporal, spatial, or
behavioural anomalies is graph-based. A network graph shows the activities and their durations
for a person and stores it for comparisons. If unusual trends occur, such as when a resident forgets
the appropriate pattern of activities, doctors can guess whether a person is at the stage of forming
cognitive disabilities[2].
Although advances in wireless sensor systems have empowered the observing of day by day
activities of elderly people, many cyber-security attacks are expected as a result for these IoT
systems being connected to the Internet [3]. From having the stored data disclosed to being
hijacked and controlled remotely, these anomaly detection systems are not very reliable
considering the multitude of possible security breaches they are exposed to.
Therefore, this research aims to find out if the anomaly detection devices and sensors are secure
enough. The answer will determine whether it is safe to leave elderly people alone in a smart
home with anomaly detection systems recognizing and reporting alarm situations.
The contributions of this paper are as follows:
1. We present a comprehensive literature review about the anomaly detection systems in
elderly remote monitoring systems
2. We propose a secure smart home architecture model to simulate a network of IOT
devices applicable in smart environment.
3. We highlight the recommendations for the counter measures to protect the IOT devices
from some list of identified attacks.
The organisation of the paper is described as follows: section 3 comprises of the related work,
section 4 discusses the proposed secure smart home architecture model, the section 5 highlights
the recommended security countermeasures and open research issues and finally section 6
concludes the paper with some future directions.
3. International Journal of Distributed and Parallel Systems (IJDPS) Vol.10, No.4/5/6, November 2019
3
2. RELATED WORK
In [1], the authors described how smart homes can promote elderly people with better health-care
and social support services. They found that elderly people have a positive attitude towards the
smart homes implementations[4]. Moreover, elderly people were interested in the health
monitoring system which can lead them to live independently. However, at the same time, they
were having some concerns about the privacy of their data and the security provided by the smart
homes [5]. The researchers in [5] concentrated on answering the question whether the smart-
homes really have an influence on the elderly quality of life. Smart homes have helped elderly
people to reduce the feeling of loneliness, helped them remembering their medicines and daily
tasks, such as brushing their teeth and drinking water. On the other hand, Lê and Barnett in [6]
said that elderly people shouldn't live in smart homes because of financial accessibility,
acceptance and technical accessibility. Moreover, smart homes require a lot of technologies
which are costly. Also, elderly people have a limited experience in dealing with advanced
technologies. Boyanov & Minchev [7] supported Lê and Barnett [6], they stated that although
smart homes have many advantages, reliability of sensors, surveillance systems and misuse of
personal or confidential information should be taken into account. Moreover, data could be
modified in communication media by the attacker and sent to the cloud. Also, sensors are
vulnerable to have attacks which can phase out the entire system. Finally, the attacker could read
the data which is against the privacy.
In [8] the authors explained how they will use a graph-based approach using the GBAD tool to
detect anomalies of elderly patients living in smart homes without interfering with residents’
daily activity, and to reduce the cost of healthcare associated with such situations [8]. The authors
defined the anomalous behaviours to be the temporal, spatial, and behavioural anomalies. They
proposed two hypotheses which claim that a graph-based approach can be reliable enough to
detect anomalies of elderly patients in smart homes and discovered anomalies are possible
syndrome of impairment in their cognitive abilities [8]. However, the aim of these anomaly
detection systems is to help the patients’ caregivers and clinicians monitor elderly people and
raise the patient's’ independence to be able to perform the daily tasks and routine safely. These
systems are set up by installing sensors all over the home to gather data about the patients’
activities without interfering with their routines. The authors’ methodology was to collect data,
convert it into graphs with nodes and edges to display temporal and spatial information about the
patients, and finally use these graphs or patterns to clearly analyse their situations and discover
anomalies. They concluded to the result of detecting anomalies from three participants who
mostly had a temporal anomaly. Temporal anomaly is when someone takes longer or shorter time
to carry out a specific task than the usual duration. Moreover, these may be potential indicators
for having a decline in cognitive health [8].
According to Rao & Haq in [9], IoT is widely functional to public activity appliances like smart
homes. User security ought to be guaranteed by preventing illegal access since when an IoT layer
is compromised, attackers can without a lot of effort get access to the whole system through that
compromised node[9]. In addition, viruses, malicious software, and attackers can interfere with
data and information integrity leading to risk for the whole IoT environment. In practical
applications such as emergency, rapid response and traffic control, information collection must be
fast and accurate. The research identifies the potential threats that may occur in all IoT layers.
Perception layer attacks include Forged node insertion, malevolent code insertion, and Hardware
Jamming. Some security Challenges in the Network Layer are Denial-of-Service (DoS) attack,
4. International Journal of Distributed and Parallel Systems (IJDPS) Vol.10, No.4/5/6, November 2019
4
Sinkhole attack, and Man-in-Middle attack. Attacks on the processing layer include Primary
infrastructure security, Data security in cloud computing, Threat to shared resources, and Attack
on Virtual Machines. Engineers attempt to build up an application safe however its security stays
under threat because of lower layers of IoT which is likewise the responsibility of the provider of
the service[9]. In Application layer, attacks are malevolent code assaults, Software
defenselessness, and Phishing attacks.
Arwa et al in [9] discussed how fog computing is a promising technology for distributed
computing providing many services to the edge network, yet faces lots of security and privacy
problems in devices. Since IoT devices have limited resources regarding storage, battery, and
processing capabilities, fog computing is new service that will provide a new solution for
handling these real-time requirements which are not completely achieved by cloud computing
[15]. The authors in [9] explained how fog computing could also address many security and
privacy issues as in the cloud computing. Because of the fog’s service of filling the gap between
the resource-constrained devices and the clouds or remote data centers, and due to its
characteristics like supporting mobility, decreasing latency, location awareness, heterogeneity,
and large scalability, many security issues could be introduced. The researchers summarized the
major challenges of security and privacy in IoT environments such as encryption, trust, red node
detection, confidentiality, access control, intrusion detection, data protection, and others[9].
Authentication is affected in IoT devices because of the lack of processing and storage
capabilities in end devices. Such expensive computations and cryptographic operations are hard
to be accomplished in IoT devices. However, trust is a critical challenge in the IoT devices due to
the integration of sensors and actuators. Furthermore, some malicious nodes in the IoT
environment could pretend to be a legitimate one and may misuse collected data or send wrong
data for malicious purposes. Also, privacy is an inevitable challenge on remotely accessed
devices. Regarding the IoT devices’ inability to perform cryptographic operations on data before
transmission, users’ location and usage information is all vulnerable to attackers.
Another privacy issue is when attackers are able to expose and extract data that are meaningful
when analyzed. Pattern-of-usage analysis violates the users’ privacy when information generated
by IoT devices is accessible by adversaries[10]. Furthermore, access control is an important
technique to ensure no malicious access can perform or generate malicious commands to any of
the interconnected and resource-constrained devices. Intrusion detection on the other hand, is
another challenge in widely interconnected mobile environments. IoT environment makes it hard
to discover the misbehaviour or misuse of data. Moreover, data protection is a challenge in
limited resource devices since data cannot be analyzed or processed in such a level. Data in IoT
devices is sent to the cloud level for further analysis and hence, should be protected before and
after the processing in the cloud. In order to improve their security, a new certificate revocation
scheme is proposed in IoT built on fog computing [9].
The authors in [9] compared the most common methods for transmitting revocation data that is
the Certificate Revocation List (CRL) with the OCSP (Online Certificate Status Protocol). CRL
contains the black-listed certificates’ serial numbers[9]. So, a client must download the list to
know whether an intended certificate is in the list to be trusted or not. Similarly, the OCSP is a
protocol that is used to get information about any digital certificate status. A client needs to
submit the certificate’s serial number to get a confirmation about the certificate if it has no issues.
However, the authors proposed a solution to an efficient distribution of the certificate revocation
information. The proposed scheme consists of the Certificate Authority (CA), back-end cloud,
5. International Journal of Distributed and Parallel Systems (IJDPS) Vol.10, No.4/5/6, November 2019
5
fog nodes, and IoT devices. The scheme uses a bloom filter in the fog nodes that stores the
authorized certificates’ serial numbers confirmed by a CA. After receiving a signed and updated
CRL from the CA, the clouds forward them to the specific fog nodes. Then, a bloom filter that
maps revocation information is created by the fog nodes, and then distributed to the intended IoT
devices to verify the signature and store the information. To use it, an IoT device checks the
bloom filter before any communication happens. If the certificate of the indented node to
communicate with is not in the filter, the communication may begin. Security enhancement is
provided by keeping the filter up-to-date, to avoid the risk of malicious use[9].
In the recent years, smart homes have seen a tremendous rise due to the technology addiction.
Smart homes have invented to improve the quality of life for all people, especially ordinary
nondisabled people. The idea of smart homes is to save energy, control the lights, control heating
and air condition, door locks and coffee makers while people are comfortable. However, people
with disabilities will not be able to enjoy the benefits of smart homes devices. Controlling devices
while you are setting using smart technology is a good benefit for people who are physically
disabled and older persons. To solve the problem of disabled people, the researchers in [12]
discussed a control system based on smart home appliance for physically disabled people. In this
paper [12], researchers presented a system that uses smart plugs, smart cameras and digital
assistant, such as Google Assistant, Google Home, Amazon Alexa, or Apple Siri to take the
orders by capturing the physical disabilities person’s voice. Many manufactures have invented
products that can interact with digital assistant, the proposed system in [12] will program those
devices to let them act based on the voice commands.
Additionally, in [13] the researchers studied threats, security requirements and open research
challenges of smart home-smartphone systems. Smart homes become so popular in many people’
life. Controlling the home with a click on a smartphone becomes an aim to a lot of people.
However, data confidentiality, privacy and financial loss are the main concern. Existing smart
homes have much vulnerability and many attacks have occurred on these systems. Therefore,
these systems’ security is a major problem that needs to be analysed and solved. The researchers
in [13] have addressed threats that the systems have. Threats have categorized into two
categories, the first category is internal system threats, such as failure of home devices, power and
internet malfunction, software failure and confidential data leakage. External system threats is the
second category, it has denial of service, malicious injection, eavesdropping and man in the
middle as threats. With the existing of all these threats, some security requirements have been
suggested to increase the security level and minimize the threats exposure. Data encryption,
network monitoring, user authentication could reduce the exposure of external threats while
devices availability, physical protecting and devices authentication will play a major factor in
decreasing internal threats.
6. International Journal of Distributed and Parallel Systems (IJDPS) Vol.10, No.4/5/6, November 2019
6
3. PROPOSED SECURE SMART HOME MODEL FOR ELDERLY PEOPLE
3.1. Proposed Approach
The proposed research is designed from a qualitative point of view where a case study is
evaluated to identify how safe and secure can the anomaly detection systems be for the elderly
people.
3.2. Adversary Model
Many hospitals use anomaly detection systems in smart homes to monitor elderly patients and
track their health. These smart homes use the concept of the internet of things (IoT). Data
collected from the smart home are sent to the cloud for detection of abnormal behaviour that is
reported to the hospital. Since these systems are Internet connected, they are accompanied by
multiple risks and threats that make smart homes not safe enough to leave elderly people alone.
Due to smart homes vulnerability to these Internet-based attacks, an elderly person could die
when an adversary stops sensors, prevents data from reaching the hospital, or sends false
information. A patient could need a treatment, but the hospital is not aware, or the hospital could
give the patient an unneeded treatment in response to fake data it received about the patient. In
the smart home environment there could be a possible list of attack on sensors network such as
denial-of-service (DoS), sinkhole, man-in-middle, radio frequency identification (RFID)
authorized access, gateway, and RFID Spoofing and also they can be extended to the cloud
security risks with exposure of data by unauthorized users.
3.3. Smart Home System Description
The system of a smart home system is made of smart devices that have sensors to record activities
of the elderly home residents. For instance, activities such as opening a smart door can indicate
time spent in the bathroom or kitchen, or turning on a smart light switch can indicate waking up
and sleeping hours (Figure 1). After sensing, smart devices send the real time data collected by
sensors to the cloud to be compared against models of normal user behaviour. Whenever an
abnormal behaviour is detected, the caregiver and hospital of the elderly person are notified.
Figure 1.The smart devices that are controlled by the tablet
7. International Journal of Distributed and Parallel Systems (IJDPS) Vol.10, No.4/5/6, November 2019
7
3.4. List of Anomalies in Smart Home
• Unusual action (movement in abnormal time) - A circumstance of an unordinary action is
the point at which the resident is sitting in the kitchen or the lounge around evening time
for certain hours, yet is expected to be at sleep.
• Wakeful evenings are frequently an indication of some issue.
• Unusually long action - Unusually long term of an action may happen when the resident
falls or loses awareness.
• Unusually short action - Unusually brief length of an activity may happen for example
around evening time, when the resident gets up significantly earlier than expected, for
example he is normally resting till 7:30am however one day awakens at 2:40am. This may
demonstrate medical issues.
3.5. Configuring the Simulation of the case study in Cisco Packet Tracer
The smart devices connected in the smart home environment are:
• Smoke detector to detect an increased level of smoke.
• Garage door to detect entry to and exit from the house.
• Smart door to calculate duration spent in a room.
• Temperature meter to measure temperature.
• Smart coffee to check when is coffee made.
• Smart fan to check when a person is active in a room or to cool a room when necessary.
• Smart Lamp to show sleeping and waking hours.
• Switch to show sleeping and waking hours.
• Motion sensor to indicate movement in a particular room.
• Webcam that records videos to be viewed when necessary.
All devices are using the IoT home gateway as the media path that connects the smart devices.
The home gateway also provides automatic addressing to its wirelessly connected devices.
Moreover, a tablet is connected to the home gateway as means for remote access, control, and
monitoring to the other connected smart devices. Some sensors and actuators are connected to
MCU-PT. The home gateway depends on the remote-control API that is programmed on the
MCU-PT to get the sensor's status (Figure 2). On the other side of the home gateway is the
connection to the cloud cluster, which is consisted of the switch and cloud server. Last, ISP router
connects the hospital PC to the cloud so that the hospital is alarmed upon any detected anomaly
(Figure 3).
Figure 2. Smart home model using Cisco Packet Tracer
8. International Journal of Distributed and Parallel Systems (IJDPS) Vol.10, No.4/5/6, November 2019
8
Figure 3. The home gateway is connected to a cloud service provider that connects the home gateway to the
hospital's server
3.6. Security Concerns
Based on literature reviews where several threats are identified, the network layer and processing
layer of devices are at high risk, therefore, they will be the main concerns of this research.
Network communication software transmits the collected data from the sensors to be stored on
the cloud and to the hospital’s end devices to alarm the hospital. Confidentiality, integrity,
availability of the data being transmitted are at risk [11]. While the data is transmitting, it is
vulnerable to countless attacks, such as denial-of-service (DoS), sinkhole, man-in-middle, radio
frequency identification (RFID) authorized access, gateway, and RFID Spoofing.
1. Denial-of-Service (DoS) attack, which prevents legitimate users from using the services
of the system. DoS will block the data from being transmitted while sinkhole will drop
the packets which supposed to go to the final destination.
2. Man-in-the-Middle attack that allows the attacker to monitor, control, and capture the
communication between two devices. Man-in-middle will appear between the nodes to
extract the desired information.
3. In RFID authorized access, tags are reachable to anyone since the security is low in tags.
Therefore, tags can be affected easily.
4. RFID Spoofing attack, attacker concentrates on collecting the desired information from
RFID tags in RFID signals. Using the actual ID, the hacker will be capable of
transmitting his own data and taking full sensor control.
Processing layer or middleware layer is responsible for analyzing, processing and storing the
collected data. Cloud computing is a technique used in the processing layer. Application security,
primary infrastructure security, data security in cloud computing, threat to shared resources,
attack on virtual machines and third-party relationship are considered attacks to the processing
layer. In general, the attacks exist because of insecure network services, insecure data transfer and
storage, insufficient privacy protection and access control on cloud, and lack of encryption.
1. Application Security: Is application security the sole obligation of the cloud provider or
the obligation of the application proprietors – and accordingly, applications ought not to
be deployed in the cloud because of security dangers or except if security is legitimately
ensured.
2. Infrastructure Security: In primary infrastructure security, developers try to build secure
applications. However, the security will be always week because of the lower layers of
9. International Journal of Distributed and Parallel Systems (IJDPS) Vol.10, No.4/5/6, November 2019
9
IoT. Data is stored as plain text with means it is not encrypted. Therefore, it is the service
provider responsibility to limit the access and ensure the privacy.
3. Virtual Environment Security: Virtual machines is targeted, since it will shut down the
whole environment when an attack happen.
4. Threat to shared resources: Because of the cloud's nature as a shared resource, it is prone
to breaches in protecting identity, maintaining privacy, and controlling access.
5. Cloud deployed web service security: A third party web service component is provided
by platform as a service (PaaS), and because more than one service is binded, the security
risk is increased.
3.7. Recommended Security Countermeasures
Based on the security concerns list in section 4.6 we list out the some of the recommended
security countermeasures for the secure data collection and transmission at network and
processing layers.
3.7.1. Network Layer
Data privacy: unauthorized access to any of the IoT devices can be avoided by using
cryptographic techniques, authentication mechanisms, security standards or protocol, and
encryption tools.
Routing Security: A basic concept to understand how Internet works, is by understanding the
routing. Transmitted packets from end-to-end need enough information to be on routers to be
forwarded to the next destination. So, it’s vital to secure the routing between any two nodes in the
IoT environment. Any attack on routing security may access the routing tables and modify data
stored on them to write deceptive information and misleading paths. Such an attack can introduce
other major security attacks on the network layer, such as man-in-the-middle, traffic redirection,
and router DoS.
Secure Shell Cryptography (SSH): SSH is a cryptographic protocol in network layer that
ensures secure operations over the network. It provides a lot of options for establishing a strong
authentication. This enhances the integrity of communication between to devices. However, data
integrity is considered major concern in IoT environments, and more specifically, in anomaly
detection systems.
Secure Real-time Transmission Protocol (SRTP): According the high level of sensitivity that
anomaly detection systems have, instant communication and transmission of data is a key factor
to the accuracy of the system. SRTP is an extension protocol of Real-time Transmission Protocol,
which uses AES as the default cipher. It provides the same functionality of RTP while enhancing
its security of unicast and multicast messaging. It’s critical to have both instant and secure
communication between the levels in smart homes of elderly patients to ensure their health safety
and privacy.
P2P Encryption: Point-to-point encryption security standards ensure securing the data stream
between nodes, and aims to minimize the exposure of sensitive data in critical environments. For
example, in healthcare fields, it’s very risky to lose or have wrong data collected. Such
10. International Journal of Distributed and Parallel Systems (IJDPS) Vol.10, No.4/5/6, November 2019
10
environments are connected with many alarms and actuators that may either act wrongly, or be
out-of-service when needed.
Access Control Lists (ACLs): Setting up strategies and authorizations of who can access and
control the IoT framework guarantees the privacy of the information. ACLs can block or permit
traffic and give or block access to requests from diverse users inside or outside of the system.
3.7.2. Processing Layer
Encryption to Secure Classified Information: encryption, encryption is applied to secure
classified information. By doing this technique, the data will be encrypted while it is transmitting
and stored. We have many encryption techniques that defeats side channel attack and secure the
IoT environment.
Fragmentation Redundancy Scattering: Data fragmentation redundancy scattering is basically
separating the data into many fragments and stored them in various serves. The data now
becomes meaningless since each single fragment does not represent anything, so the risk is
minimized.
Web Firewall Applications: Web firewall is able to identify the threats and block them, so the
threats will be blocked from coming into the IoT environment.
Virtual Identity (VID) Framework: The user sends a request of VID to service provider, who
requests client's data, for example, name, age, sex, phone, capability. The VID is then given to the
user. The supplier can issue a client more than one VID, which isn't connected to another. It
stores the data of a user along a VID. The user can only access the system to utilize applications
with his VID. This ensures privacy by preventing unauthorized access.
Software Defined Networking (SDN): SDN-based cloud conveys new opportunities to
overcome DDoS attacks in cloud computing environments. Instead of every node in the system
making its very own sending choices, a centralized software-based controller is in charge of
ordering subordinate nodes on the way traffic is forwarded.
3.8. Implementation of ACL in Proposed Smart Home Environment using CISCO
Packet Tracer
In this section, based on the above recommended list of security countermeasures, we implement
Access Control Lists in a simulated smart home environment using CISCO packet tracer. The
ACL is used to address the authentication and authorization issues in an IoT based smart home
environment. The details of the implementations are as follows:
ACLs implementation: Access control list “ACL” is a list of permissions that specifies that the
device is allowed to send data or not. ACL is implemented in the router to specify which data to
be passed. In addition, ACL is used to make sure that only authorized sensors as discussed in
Figure 1 can send data to the cloud to avoid data integrity. ACL consists of a list of Internet
protocol “IP” address and specify whether the IP is granted to send or not. Moreover, all the
sensors IPs are allowed, and any other IP address is denied (Figure 4).
11. International Journal of Distributed and Parallel Systems (IJDPS) Vol.10, No.4/5/6, November 2019
11
The list is assigned to the interface GigabitEthernet0/1 which is the interface that is connected to
the cloud service provider. The list is applied as an outbound access list (Figure 4) which means
that packets will be routed to the interface and then processed through the access list before being
queued (Figure 5).
Figure 4. List of Access Control
Figure 5. Applying the list to the interface
The above implementation of the ACL is an extract from the recommended security
countermeasures. Due to the limitations of the simulation environment on packet tracer, we were
able to perform few experiments. But in future we plan to extend our work in an real time arduino
based smart home environment, were the flexibility of secure smart home architecture and design
is expected to be high.
4. OPEN RESEARCH ISSUES
There are several open research issues related to the IOT based smart home environment for
elderly monitoring systems. With the continuous growth and demand of the IoT devices and its
applicability in various healthcare environments, the need for concrete privacy and security
design and architecture, protocols and schemes is paramount important. As discussed in literature
review, several researchers are publishing context related security protocols. However, there are
very few research which address an holistic approach that addresses the issues problem related to
identity management of the IoT devices; risk assessment methodologies in remote health
monitoring systems; information control flow approaches in cloud enabled environments; and
security management approaches, like patching, updates on IoT devices is not included. There is
12. International Journal of Distributed and Parallel Systems (IJDPS) Vol.10, No.4/5/6, November 2019
12
a need for the integration of security in design and of secure software design process model in the
development of smart connected homes. Moreover, there is a shortage of privacy by design
measures in the smart home environment.
5. CONCLUSION
A smart home anomaly detection system is prone to several attacks that may cause it to
malfunction and disrupt its purpose. However, by adding sufficient and suitable security defenses,
attacks are not likely to occur. Therefore, in this paper we propose a comprehensive study related
to various security concerns and provide recommendations for security countermeasures. We
propose a sample case study and implementation of smart home environment on cisco packet
tracer. Hence we conclude that if a smart home is well equipped with proper security defenses, it
is safe to leave elderly people alone in the smart home with anomaly detection systems
recognizing and reporting alarm situations. We highlight some open research issues for IoT based
smart home environment. In future research we plan to explore the artificial intelligence-based
algorithms/techniques applicable in detecting an anomaly in elderly patience monitoring systems.
REFERENCES
[1] Aran, O., Sanchez-Cortes, D., Do, M. T., & Gatica-Perez, D. (2016, October). "Anomaly detection in
elderly daily behavior in ambient sensing environments". In International Workshop on Human
Behavior Understanding (pp. 51-67). Springer, Cham.
[2] Paudel, R., Dunn, K., Eberle, W., & Chaung, D. (2018, May). "Cognitive Health Prediction on the
Elderly Using Sensor Data in Smart Homes". In The Thirty-First International Flairs Conference.
[3] Hoque, E., Dickerson, R. F., Preum, S. M., Hanson, M., Barth, A., & Stankovic, J. A. (2015, June).
"Holmes: A comprehensive anomaly detection system for daily in-home activities". In 2015
International Conference on Distributed Computing in Sensor Systems (pp. 40-51). IEEE.
[4] Hsu, Y. L., Chou, P. H., Chang, H. C., Lin, S. L., Yang, S. C., Su, H. Y., ... & Kuo, Y. C. (2017).
"Design and implementation of a smart home system using multisensor data fusion technology".
Sensors, 17(7), 1631.
[5] Pal, D., Triyason, T., & Funikul, S. (2017, December). Smart homes and quality of life for the
elderly: A systematic review. In 2017 IEEE International Symposium on Multimedia (ISM) (pp. 413-
419). IEEE.
[6] Lê, Q., Nguyen, H. B., & Barnett, T. (2012). "Smart homes for older people: Positive aging in a
digital world". Future internet, 4(2), 607-617.
[7] Boyanov, L., & Minchev, Z. (2014). "Cyber Security Challenges in Smart Homes". Volume 38:
Cyber Security and Resiliency Policy Framework,IOS Press Ebooks
[8] Paudel, R., Eberle, W., & Holder, L. B (2018). "Anomaly Detection of Elderly Patient Activities in
Smart Homes using a Graph-Based Approach". In: Proceedings of the 2018 International Conference
on Data Science, pp. 163–169. CSREA .
[9] Rao, T. A. "Security Challenges Facing IoT Layers and its Protective Measures". International
Journal of Computer Applications, 975, 8887.
13. International Journal of Distributed and Parallel Systems (IJDPS) Vol.10, No.4/5/6, November 2019
13
[10] Lin, H., & Bergmann, N. (2016). "IoT privacy and security challenges for smart home environments".
Information, 7(3), 44.
[11] Ara, A., Al-Rodhaan, M., Tian, Y., & Al-Dhelaan, A. (2015). "A secure service provisioning
framework for cyber physical cloud computing systems". arXiv preprint arXiv:1611.00374.
[12] Mtshali, P., & Khubisa, F. (2019, March). "A Smart Home Appliance Control System for Physically
Disabled People". In 2019 Conference on Information Communications Technology and Society
(ICTAS) (pp. 1-5). IEEE.
[13] Karimi, K., & Krit, S. (2019, July). "Smart home-Smartphone Systems: Threats, Security
Requirements and Open research Challenges". In 2019 International Conference of Computer Science
and Renewable Energies (ICCSRE) (pp. 1-5). IEEE.
[14] Adiono, T., Tandiawan, B., & Fuada, S. (2018). "Device protocol design for security on internet of
things based smart home". International Journal of Online Engineering (iJOE), 14(07), 161-170.
[15] Sultana, S. N., Ramu, G., & Reddy, B. E. (2014). "Cloud-based development of smart and connected
data in healthcare application". International Journal of Distributed and Parallel Systems, 5(6), 1.
Authors Biography
Mayada Elsaid is a senior Software Engineering ( Cyber Security) student in Prince Sultan University. She
is an IEEE member and chair in IEEE-Student Chapter. Her areas of interest and research are cyber
physical systems security and IoT. She has presented security and business process management papers in
local conferences and research forums.
Sara Altuwaijri is a bachelor student, majoring in Software Engineering (Cyber Security) at Prince Sultan
University. She’s currently leading two clubs in the university by arranging events and bootcamps that are
related to many topics of computer science. She’s the president of Edtech club and the Vice Chair if IEEE
chapter at PSU. She received nano degrees in Artificial Intelligence and Self-driving cars. Her research
interests include security & privacy in IoT and cyber physical systems.
Nouf Aljammaz is a senior Computer Science (Cyber Security) student focused on improving facility
security through diligent approach and sense of personal responsibility. Resilient individual trained in
security. Her research interest includes security domains related to risks management, optimization
techniques relates to asset protection and threat minimizations.
Anees Ara received her BSc in Computer Science and MSc in Mathematics with Computer Science from
Osmania University, India in 2005 and 2007 respectively. She has received her PhD degree from King
Saud University and she is currently working as Assistant Professor at College of Computer and
Information Sciences, Prince Sultan University, Kingdom of Saudi Arabia. She is an active member of
Security Engineering Lab, Prince Sultan University, KSA and IEEE, computing society. In addition, she is
an active reviewer of international journals. Her research interests are broadly divided into privacy and
security, which are related to cloud computing, cryptograph, smart environment, cyber physical systems
and big data.