Abstract: Outcomes of exhaustion of natural resources started influencing each spirit on this planet. Energy is an essential factor in this aspect. To restore the circumstance to the appropriate track, all attempts must focus on two fundamental branches: producing electricity from clean and renewable reserves and decreasing the overall unnecessary consumption of energy. The focal point of this paper will be on lessening the power consumption in the household's segment. This paper is an attempt to give a clear understanding of a framework called Reduction of Energy Consumption in Household Sector (RECHS) and how it should help householders to reduce their power consumption by substituting their household appliances, turning-off the appliances when stand-by modus is detected, and scheduling their appliances operation periods. Technically, the framework depends on utilizing Z-Wave compatible plug-ins which will be connected to the usual house devices to gauge and control them remotely and semi-automatically. The suggested framework underpins numerous quality characteristics, for example, integrability, scalability, security and adaptability.
Abstract: The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.
Abstract: Global Automation is an emerging technology of today’s era and is based on Internet of Things (IoT). Global automation deals with the controlling of electrical appliances throughout the world. The fabrication of this system has been carried out with interfacing an electrical control system module to Raspberry Pi. An electrical control system module includes a relay driver mechanism through which appliances are controlled automatically in respective condition. In this research project, one email ID has been assigned to Raspberry Pi, and the users from different location having different email ID can mail to Raspberry Pi on assigned email address “[email protected]” with subject heading “Device Control” with predefined command on compose email line. Also, a notification regarding current working condition of this system has been updated on respective user email ID. This approach is an innovative way of implementing smart automation system through which a user can control their electrical appliances like light, fan, television, refrigerator, etc. in their home with the use of email facility. The development of this project helps to enhance the concept of smart home application as well as industrial automation.
Abstract: One of the major challenges for sustainable smart
building systems is to support device interoperability, i.e. connecting
sensor or actuator devices from different vendors, and present their
functionality to the external applications. Furthermore, smart building
systems are supposed to connect with devices that are not available
yet, i.e. devices that become available on the market sometime later.
It is of vital importance that a sustainable smart building platform
provides an appropriate external interface that can be leveraged
by external applications and smart services. An external platform
interface must be stable and independent of specific devices and
should support flexible and scalable usage scenarios. A typical
approach applied in smart home systems is based on a generic
device interface used within the smart building platform. Device
functions, even of rather complex devices, are mapped to that generic
base type interface by means of specific device drivers. Our new
approach, presented in this work, extends that approach by using the
smart building system’s rule engine to create complex virtual devices
that can represent the most diverse properties of real devices. We
examined and evaluated both approaches by means of a practical
case study using a smart building system that we have developed.
We show that the solution we present allows the highest degree
of flexibility without affecting external application interface stability
and scalability. In contrast to other systems our approach supports
complex virtual device configuration on application layer (e.g. by
administration users) instead of device configuration at platform layer
(e.g. platform operators). Based on our work, we can show that
our approach supports almost arbitrarily flexible use case scenarios
without affecting the external application interface stability. However,
the cost of this approach is additional appropriate configuration
overhead and additional resource consumption at the IoT platform
level that must be considered by platform operators. We conclude
that the concept of complex virtual devices presented in this work
can be applied to improve the usability and device interoperability of
sustainable intelligent building systems significantly.
Abstract: Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.
Abstract: With the widespread adoption of the Internet-connected
devices, and with the prevalence of the Internet of Things (IoT)
applications, there is an increased interest in machine learning
techniques that can provide useful and interesting services in the
smart home domain. The areas that machine learning techniques
can help advance are varied and ever-evolving. Classifying smart
home inhabitants’ Activities of Daily Living (ADLs), is one
prominent example. The ability of machine learning technique to find
meaningful spatio-temporal relations of high-dimensional data is an
important requirement as well. This paper presents a comparative
evaluation of state-of-the-art machine learning techniques to classify
ADLs in the smart home domain. Forty-two synthetic datasets and
two real-world datasets with multiple inhabitants are used to evaluate
and compare the performance of the identified machine learning
techniques. Our results show significant performance differences
between the evaluated techniques. Such as AdaBoost, Cortical
Learning Algorithm (CLA), Decision Trees, Hidden Markov Model
(HMM), Multi-layer Perceptron (MLP), Structured Perceptron and
Support Vector Machines (SVM). Overall, neural network based
techniques have shown superiority over the other tested techniques.
Abstract: Intelligent electronic equipment and automation network is the brain of high-tech energy management systems in critical role of smart homes dominance. Smart home is a technology integration for greater comfort, autonomy, reduced cost, and energy saving as well. These services can be provided to home owners for managing their home appliances locally or remotely and consequently allow them to automate intelligently and responsibly their consumption by individual or collective control systems. In this study, three smart plugs are described and one of them tested on typical household appliances. This article proposes to collect the data from the wireless technology and to extract some smart data for energy management system. This smart data is to quantify for three kinds of load: intermittent load, phantom load and continuous load. Phantom load is a waste power that is one of unnoticed power of each appliance while connected or disconnected to the main. Intermittent load and continuous load take in to consideration the power and using time of home appliances. By analysing the classification of loads, this smart data will be provided to reduce the communication of wireless sensor network for energy management system.
Abstract: The Internet of things (IoT) is currently a highly
researched topic, especially within the context of the smart home.
These are small sensors that are capable of gathering data and
transmitting it to a server. The majority of smart home products use
protocols such as ZigBee or Bluetooth Low Energy (BLE). As these
small sensors are increasing in number, the need to implement these
with much more capable and ubiquitous transmission technology is
necessary. The high power consumption is the reason that holds
these small sensors back from using other protocols such as the
most ubiquitous form of communication, WiFi. Comparing the power
consumption of existing transmission technologies to one with WiFi
inbuilt, would provide a better understanding for choosing between
these technologies. We have developed a small IoT device with WiFi
capability and proven that it is much more efficient than the first
protocol, 433 MHz. We extend our work in this paper and compare
WiFi power consumption with the other most widely used protocol
BLE. The experimental results in this paper would conclude whether
the developed prototype is capable in terms of power consumption to
replace the existing protocol BLE with WiFi.
Abstract: We assume an IoT-based smart-home environment where the on-off status of each of the electrical appliances including the room lights can be recognized in a real time by monitoring and analyzing the smart meter data. At any moment in such an environment, we can recognize what the household or the user is doing by referring to the status data of the appliances. In this paper, we focus on a smart-home service that is to activate a robot vacuum cleaner at right time by recognizing the user situation, which requires a situation-aware model that can distinguish the situations that allow vacuum cleaning (Yes) from those that do not (No). We learn as our candidate models a few classifiers such as naïve Bayes, decision tree, and logistic regression that can map the appliance-status data into Yes and No situations. Our training and test data are obtained from simulations of user behaviors, in which a sequence of user situations such as cooking, eating, dish washing, and so on is generated with the status of the relevant appliances changed in accordance with the situation changes. During the simulation, both the situation transition and the resulting appliance status are determined stochastically. To compare the performances of the aforementioned classifiers we obtain their learning curves for different types of users through simulations. The result of our empirical study reveals that naïve Bayes achieves a slightly better classification accuracy than the other compared classifiers.
Abstract: Smart metering and demand response are gaining
ground in industrial and residential applications. Smart Appliances
have been given concern towards achieving Smart home. The success
of Smart grid development relies on the successful implementation of
Information and Communication Technology (ICT) in power sector.
Smart Appliances have been the technology under development and
many new contributions to its realization have been reported in the
last few years. The role of ICT here is to capture data in real time,
thereby allowing bi-directional flow of information/data between
producing and utilization point; that lead a way for the attainment of
Smart appliances where home appliances can communicate between
themselves and provide a self-control (switch on and off) using the
signal (information) obtained from the grid. This paper depicts the
background on ICT for smart appliances paying a particular attention
to the current technology and identifying the future ICT trends for
load monitoring through which smart appliances can be achieved to
facilitate an efficient smart home system which promote demand
response program. This paper grouped and reviewed the recent
contributions, in order to establish the current state of the art and
trends of the technology, so that the reader can be provided with a
comprehensive and insightful review of where ICT for smart
appliances stands and is heading to. The paper also presents a brief
overview of communication types, and then narrowed the discussion
to the load monitoring (Non-intrusive Appliances Load Monitoring
‘NALM’). Finally, some future trends and challenges in the further
development of the ICT framework are discussed to motivate future
contributions that address open problems and explore new
possibilities.
Abstract: Test automation allows performing difficult and time
consuming manual software testing tasks efficiently, quickly and
repeatedly. However, development and maintenance of automated
tests is expensive, so it needs a proper prioritization what to automate
first. This paper describes a simple yet efficient approach for such
prioritization of test cases based on the effort needed for both manual
execution and software test automation. The suggested approach is
very flexible because it allows working with a variety of assessment
methods, and adding or removing new candidates at any time. The
theoretical ideas presented in this article have been successfully
applied in real world situations in several software companies by the
authors and their colleagues including testing of real estate websites,
cryptographic and authentication solutions, OSGi-based middleware
framework that has been applied in various systems for smart homes,
connected cars, production plants, sensors, home appliances, car head
units and engine control units (ECU), vending machines, medical
devices, industry equipment and other devices that either contain or
are connected to an embedded service gateway.
Abstract: This paper describes the tradeoffs and the design from
scratch of a self-contained, easy-to-use health dashboard software
system that provides customizable data tracking for patients in smart
homes. The system is made up of different software modules and
comprises a front-end and a back-end component. Built with HTML,
CSS, and JavaScript, the front-end allows adding users, logging into
the system, selecting metrics, and specifying health goals. The backend
consists of a NoSQL Mongo database, a Python script, and a
SimpleHTTPServer written in Python. The database stores user
profiles and health data in JSON format. The Python script makes use
of the PyMongo driver library to query the database and displays
formatted data as a daily snapshot of user health metrics against
target goals. Any number of standard and custom metrics can be
added to the system, and corresponding health data can be fed
automatically, via sensor APIs or manually, as text or picture data
files. A real-time METAR request API permits correlating weather
data with patient health, and an advanced query system is
implemented to allow trend analysis of selected health metrics over
custom time intervals. Available on the GitHub repository system,
the project is free to use for academic purposes of learning and
experimenting, or practical purposes by building on it.
Abstract: Apps are today the most important possibility to adapt
mobile phones and computers to fulfill the special needs of their
users. Location- and context-sensitive programs are hereby the key to
support the interaction of the user with his/her environment and also
to avoid an overload with a plenty of dispensable information. The
contribution shows, how a trusted, secure and really bi-directional
communication and interaction among users and their environment
can be established and used, e.g. in the field of home automation.
Abstract: A low cost Short Message System (SMS) based Home security system equipped with motion, smoke, temperature, humidity and light sensors has been studied and tested. The sensors are controlled by a microprocessor PIC 18F4520 through the SMS having password protection code for the secure operation. The user is able to switch light and the appliances and get instant feedback. Also in cases of emergencies such as fire or robbery the system will send alert message to occupant and relevant civil authorities. The operation of the home security has been tested on Vodafone- Fiji network and Digicel Fiji Network for emergency and feedback responses for 25 samples. The experiment showed that it takes about 8-10s for the security system to respond in case of emergency. It takes about 18-22s for the occupant to switch and monitor lights and appliances and then get feedback depending upon the network traffic.
Abstract: Security has been an important issue and concern in the
smart home systems. Smart home networks consist of a wide range of
wired or wireless devices, there is possibility that illegal access to
some restricted data or devices may happen. Password-based
authentication is widely used to identify authorize users, because this
method is cheap, easy and quite accurate. In this paper, a neural
network is trained to store the passwords instead of using verification
table. This method is useful in solving security problems that
happened in some authentication system. The conventional way to
train the network using Backpropagation (BPN) requires a long
training time. Hence, a faster training algorithm, Resilient
Backpropagation (RPROP) is embedded to the MLPs Neural
Network to accelerate the training process. For the Data Part, 200
sets of UserID and Passwords were created and encoded into binary
as the input. The simulation had been carried out to evaluate the
performance for different number of hidden neurons and combination
of transfer functions. Mean Square Error (MSE), training time and
number of epochs are used to determine the network performance.
From the results obtained, using Tansig and Purelin in hidden and
output layer and 250 hidden neurons gave the better performance. As
a result, a password-based user authentication system for smart home
by using neural network had been developed successfully.
Abstract: This paper proposes a power-controlled scheduling scheme for devices using a directional antenna in smart home. In the case of the home network using directional antenna, devices can concurrently transmit data in the same frequency band. Accordingly, the throughput increases compared to that of devices using omni-directional antenna in proportional to the number of concurrent transmissions. Also, the number of concurrent transmissions depends on the beamwidth of antenna, the number of devices operating in the network , transmission power, interference and so on. In particular, the less transmission power is used, the more concurrent transmissions occur due to small transmission range. In this paper, we considered sub-optimal scheduling scheme for throughput maximization and power consumption minimization. In the scheme, each device is equipped with a directional antenna. Various beamwidths, path loss components, and antenna radiation efficiencies are considered. Numerical results show that the proposed schemes outperform the scheduling scheme using directional antennas without power control.
Abstract: In this paper, a Smart Home Service Robot, McBot II,
which performs mess-cleanup function etc. in house, is designed much
more optimally than other service robots. It is newly developed in
much more practical system than McBot I which we had developed
two years ago. One characteristic attribute of mobile platforms
equipped with a set of dependent wheels is their omni- directionality
and the ability to realize complex translational and rotational
trajectories for agile navigation in door. An accurate coordination of
steering angle and spinning rate of each wheel is necessary for a
consistent motion. This paper develops trajectory controller of
3-wheels omni-directional mobile robot using fuzzy azimuth estimator.
A specialized anthropomorphic robot manipulator which can be
attached to the housemaid robot McBot II, is developed in this paper.
This built-in type manipulator consists of both arms with 3 DOF
(Degree of Freedom) each and both hands with 3 DOF each. The
robotic arm is optimally designed to satisfy both the minimum
mechanical size and the maximum workspace. Minimum mass and
length are required for the built-in cooperated-arms system. But that
makes the workspace so small. This paper proposes optimal design
method to overcome the problem by using neck joint to move the arms
horizontally forward/backward and waist joint to move them
vertically up/down. The robotic hand, which has two fingers and a
thumb, is also optimally designed in task-based concept. Finally, the
good performance of the developed McBot II is confirmed through
live tests of the mess-cleanup task.