SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Distributed and Parallel
Systems (IJDPS)
ISSN : 0976 - 9757 [Online] ; 2229 - 3957 [Print]
http://airccse.org/journal/ijdps/ijdps.html
Current Issue: November 2019, Volume 10,
Number 4/5/6 --- Table of Contents
http://airccse.org/journal/ijdps/current2019.html
Paper -01
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
Mayada Elsaid, Sara Altuwaijri, Nouf Aljammaz and Anees Ara
Computer Science Department, College of Computer & Information Sciences,
Prince Sultan University, Riyadh, Saudi Arabia
ABSTRACT
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home
environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT
sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart home
based anomaly detection system from a security perspective, to answer the question whether it is reliable
and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis
of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this
paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT
devices in a smart home environment. Consequently, a list of security countermeasures is proposed to
protect the IoT devices from the identified attacks. .
KEYWORDS
Cyber physical systems, anomaly detection system, intrusion detection system, secure smart home, IoT.
FOR MORE DETAILS: http://aircconline.com/ijdps/V10N6/10619ijdps01.pdf
http://airccse.org/journal/ijdps/current2019.html
REFERENCES
[1] Aran, O., Sanchez-Cortes, D., Do, M. T., & Gatica-Perez, D. (2016, October). "Anomaly detection in elderly daily
behavior in ambient sensing environments". In International Workshop on Human Behavior Understanding (pp. 51-
67). Springer, Cham.
[2] Paudel, R., Dunn, K., Eberle, W., & Chaung, D. (2018, May). "Cognitive Health Prediction on the Elderly Using
Sensor Data in Smart Homes". In The Thirty-First International Flairs Conference.
[3] Hoque, E., Dickerson, R. F., Preum, S. M., Hanson, M., Barth, A., & Stankovic, J. A. (2015, June). "Holmes: A
comprehensive anomaly detection system for daily in-home activities". In 2015 International Conference on
Distributed Computing in Sensor Systems (pp. 40-51). IEEE.
[4] Hsu, Y. L., Chou, P. H., Chang, H. C., Lin, S. L., Yang, S. C., Su, H. Y., ... & Kuo, Y. C. (2017). "Design and
implementation of a smart home system using multisensor data fusion technology". Sensors, 17(7), 1631.
[5] Pal, D., Triyason, T., & Funikul, S. (2017, December). Smart homes and quality of life for the elderly: A systematic
review. In 2017 IEEE International Symposium on Multimedia (ISM) (pp. 413- 419). IEEE.
[6] Lê, Q., Nguyen, H. B., & Barnett, T. (2012). "Smart homes for older people: Positive aging in a digital world".
Future internet, 4(2), 607-617.
[7] Boyanov, L., & Minchev, Z. (2014). "Cyber Security Challenges in Smart Homes". Volume 38: Cyber Security and
Resiliency Policy Framework,IOS Press Ebooks
[8] Paudel, R., Eberle, W., & Holder, L. B (2018). "Anomaly Detection of Elderly Patient Activities in Smart Homes
using a Graph-Based Approach". In: Proceedings of the 2018 International Conference on Data Science, pp. 163–169.
CSREA .
[9] Rao, T. A. "Security Challenges Facing IoT Layers and its Protective Measures". International Journal of Computer
Applications, 975, 8887.
[10] Lin, H., & Bergmann, N. (2016). "IoT privacy and security challenges for smart home environments".
Information, 7(3), 44.
[11] Ara, A., Al-Rodhaan, M., Tian, Y., & Al-Dhelaan, A. (2015). "A secure service provisioning framework for cyber
physical cloud computing systems". arXiv preprint arXiv:1611.00374.
[12] Mtshali, P., & Khubisa, F. (2019, March). "A Smart Home Appliance Control System for Physically Disabled
People". In 2019 Conference on Information Communications Technology and Society (ICTAS) (pp. 1-5). IEEE.
[13] Karimi, K., & Krit, S. (2019, July). "Smart home-Smartphone Systems: Threats, Security Requirements and Open
research Challenges". In 2019 International Conference of Computer Science and Renewable Energies (ICCSRE) (pp.
1-5). IEEE.
[14] Adiono, T., Tandiawan, B., & Fuada, S. (2018). "Device protocol design for security on internet of things based
smart home". International Journal of Online Engineering (iJOE), 14(07), 161-170.
[15] Sultana, S. N., Ramu, G., & Reddy, B. E. (2014). "Cloud-based development of smart and connected data in
healthcare application". International Journal of Distributed and Parallel Systems, 5(6), 1.
AUTHORS BIOGRAPHY
Mayada Elsaid is a senior Software Engineering ( Cyber Security) student in Prince Sultan University. She is an IEEE
member and chair in IEEE-Student Chapter. Her areas of interest and research are cyber physical systems security and
IoT. She has presented security and business process management papers in local conferences and research forums.
Sara Altuwaijri is a bachelor student, majoring in Software Engineering (Cyber Security) at Prince Sultan University.
She’s currently leading two clubs in the university by arranging events and bootcamps that are related to many topics
of computer science. She’s the president of Edtech club and the Vice Chair if IEEE chapter at PSU. She received nano
degrees in Artificial Intelligence and Self-driving cars. Her research interests include security & privacy in IoT and
cyber physical systems.
Nouf Aljammaz is a senior Computer Science (Cyber Security) student focused on improving facility security through
diligent approach and sense of personal responsibility. Resilient individual trained in security. Her research interest
includes security domains related to risks management, optimization techniques relates to asset protection and threat
minimizations.
Anees Ara received her BSc in Computer Science and MSc in Mathematics with Computer Science from Osmania
University, India in 2005 and 2007 respectively. She has received her PhD degree from King Saud University and she
is currently working as Assistant Professor at College of Computer and Information Sciences, Prince Sultan University,
Kingdom of Saudi Arabia. She is an active member of Security Engineering Lab, Prince Sultan University, KSA and
IEEE, computing society. In addition, she is an active reviewer of international journals. Her research interests are
broadly divided into privacy and security, which are related to cloud computing, cryptograph, smart environment,
cyber physical systems and big data.

Weitere ähnliche Inhalte

Was ist angesagt?

Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsMaurice Dawson
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
 
Professor Aboul ella Hassanien (Abo) full list of publications till October...
Professor Aboul ella Hassanien (Abo)   full list of publications till October...Professor Aboul ella Hassanien (Abo)   full list of publications till October...
Professor Aboul ella Hassanien (Abo) full list of publications till October...Aboul Ella Hassanien
 
The technologies of ai used in different corporate world
The technologies of ai used in different  corporate worldThe technologies of ai used in different  corporate world
The technologies of ai used in different corporate worldEr. rahul abhishek
 
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...Swapsg
 
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research AIRCC Publishing Corporation
 
rpaper
rpaperrpaper
rpaperimu409
 
Energy Conservation in a Smart Home via an Embedded Platform
Energy Conservation in a Smart Home via an Embedded PlatformEnergy Conservation in a Smart Home via an Embedded Platform
Energy Conservation in a Smart Home via an Embedded PlatformEditor IJCATR
 

Was ist angesagt? (14)

Security Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of ThingsSecurity Solutions for Hyperconnectivity in the Internet of Things
Security Solutions for Hyperconnectivity in the Internet of Things
 
123
123123
123
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
Professor Aboul ella Hassanien (Abo) full list of publications till October...
Professor Aboul ella Hassanien (Abo)   full list of publications till October...Professor Aboul ella Hassanien (Abo)   full list of publications till October...
Professor Aboul ella Hassanien (Abo) full list of publications till October...
 
The technologies of ai used in different corporate world
The technologies of ai used in different  corporate worldThe technologies of ai used in different  corporate world
The technologies of ai used in different corporate world
 
Vedansh thakkar resume
Vedansh thakkar resumeVedansh thakkar resume
Vedansh thakkar resume
 
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
Bioinformatics and Artificial Intelligence (AI) the interrelation between the...
 
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research
 
Implementing Ethics in AI
Implementing Ethics in AIImplementing Ethics in AI
Implementing Ethics in AI
 
N018138696
N018138696N018138696
N018138696
 
rpaper
rpaperrpaper
rpaper
 
Energy Conservation in a Smart Home via an Embedded Platform
Energy Conservation in a Smart Home via an Embedded PlatformEnergy Conservation in a Smart Home via an Embedded Platform
Energy Conservation in a Smart Home via an Embedded Platform
 
Agricultural Informatics as a Branch of Study in Information Sciences and Tec...
Agricultural Informatics as a Branch of Study in Information Sciences and Tec...Agricultural Informatics as a Branch of Study in Information Sciences and Tec...
Agricultural Informatics as a Branch of Study in Information Sciences and Tec...
 
Vedansh thakkar resume
Vedansh thakkar resumeVedansh thakkar resume
Vedansh thakkar resume
 

Ähnlich wie Current Issue: November 2019, Volume 10, Number 4/5/6--- Table of Contents

TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...AIRCC Publishing Corporation
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1IJNSA Journal
 
Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020IJNSA Journal
 
Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...IJNSA Journal
 
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...IJNSA Journal
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...IJNSA Journal
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...IJNSA Journal
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...IJNSA Journal
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thTaunyaCoffman887
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...IJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...ijcisjournal
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IJNSA Journal
 

Ähnlich wie Current Issue: November 2019, Volume 10, Number 4/5/6--- Table of Contents (20)

TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
 
Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020
 
Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...Most trending articles 2020 - International Journal of Network Security & Its...
Most trending articles 2020 - International Journal of Network Security & Its...
 
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
 
Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...Most cited articles in academia - International journal of network security &...
Most cited articles in academia - International journal of network security &...
 
May 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its ApplicationsMay 2021: Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 
January 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2021 - Top 10 Read Articles in Network Security & Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
 
October 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its ApplicationsOctober 2020 - Top Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
 
Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...Most Downloaded article for an year in academia - International Journal of Ne...
Most Downloaded article for an year in academia - International Journal of Ne...
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
March 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2021: Top 10 Read Articles in Network Security and Its Applications
March 2021: Top 10 Read Articles in Network Security and Its Applications
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
 
International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...International Journal of Network Security & Its Applications (IJNSA) - Curren...
International Journal of Network Security & Its Applications (IJNSA) - Curren...
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...
 
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...
 

Kürzlich hochgeladen

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 

Kürzlich hochgeladen (20)

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 

Current Issue: November 2019, Volume 10, Number 4/5/6--- Table of Contents

  • 1. International Journal of Distributed and Parallel Systems (IJDPS) ISSN : 0976 - 9757 [Online] ; 2229 - 3957 [Print] http://airccse.org/journal/ijdps/ijdps.html Current Issue: November 2019, Volume 10, Number 4/5/6 --- Table of Contents http://airccse.org/journal/ijdps/current2019.html
  • 2. Paper -01 DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE Mayada Elsaid, Sara Altuwaijri, Nouf Aljammaz and Anees Ara Computer Science Department, College of Computer & Information Sciences, Prince Sultan University, Riyadh, Saudi Arabia ABSTRACT Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks. . KEYWORDS Cyber physical systems, anomaly detection system, intrusion detection system, secure smart home, IoT. FOR MORE DETAILS: http://aircconline.com/ijdps/V10N6/10619ijdps01.pdf http://airccse.org/journal/ijdps/current2019.html
  • 3. REFERENCES [1] Aran, O., Sanchez-Cortes, D., Do, M. T., & Gatica-Perez, D. (2016, October). "Anomaly detection in elderly daily behavior in ambient sensing environments". In International Workshop on Human Behavior Understanding (pp. 51- 67). Springer, Cham. [2] Paudel, R., Dunn, K., Eberle, W., & Chaung, D. (2018, May). "Cognitive Health Prediction on the Elderly Using Sensor Data in Smart Homes". In The Thirty-First International Flairs Conference. [3] Hoque, E., Dickerson, R. F., Preum, S. M., Hanson, M., Barth, A., & Stankovic, J. A. (2015, June). "Holmes: A comprehensive anomaly detection system for daily in-home activities". In 2015 International Conference on Distributed Computing in Sensor Systems (pp. 40-51). IEEE. [4] Hsu, Y. L., Chou, P. H., Chang, H. C., Lin, S. L., Yang, S. C., Su, H. Y., ... & Kuo, Y. C. (2017). "Design and implementation of a smart home system using multisensor data fusion technology". Sensors, 17(7), 1631. [5] Pal, D., Triyason, T., & Funikul, S. (2017, December). Smart homes and quality of life for the elderly: A systematic review. In 2017 IEEE International Symposium on Multimedia (ISM) (pp. 413- 419). IEEE. [6] Lê, Q., Nguyen, H. B., & Barnett, T. (2012). "Smart homes for older people: Positive aging in a digital world". Future internet, 4(2), 607-617. [7] Boyanov, L., & Minchev, Z. (2014). "Cyber Security Challenges in Smart Homes". Volume 38: Cyber Security and Resiliency Policy Framework,IOS Press Ebooks [8] Paudel, R., Eberle, W., & Holder, L. B (2018). "Anomaly Detection of Elderly Patient Activities in Smart Homes using a Graph-Based Approach". In: Proceedings of the 2018 International Conference on Data Science, pp. 163–169. CSREA . [9] Rao, T. A. "Security Challenges Facing IoT Layers and its Protective Measures". International Journal of Computer Applications, 975, 8887. [10] Lin, H., & Bergmann, N. (2016). "IoT privacy and security challenges for smart home environments". Information, 7(3), 44. [11] Ara, A., Al-Rodhaan, M., Tian, Y., & Al-Dhelaan, A. (2015). "A secure service provisioning framework for cyber physical cloud computing systems". arXiv preprint arXiv:1611.00374. [12] Mtshali, P., & Khubisa, F. (2019, March). "A Smart Home Appliance Control System for Physically Disabled People". In 2019 Conference on Information Communications Technology and Society (ICTAS) (pp. 1-5). IEEE. [13] Karimi, K., & Krit, S. (2019, July). "Smart home-Smartphone Systems: Threats, Security Requirements and Open research Challenges". In 2019 International Conference of Computer Science and Renewable Energies (ICCSRE) (pp. 1-5). IEEE. [14] Adiono, T., Tandiawan, B., & Fuada, S. (2018). "Device protocol design for security on internet of things based smart home". International Journal of Online Engineering (iJOE), 14(07), 161-170. [15] Sultana, S. N., Ramu, G., & Reddy, B. E. (2014). "Cloud-based development of smart and connected data in healthcare application". International Journal of Distributed and Parallel Systems, 5(6), 1.
  • 4. AUTHORS BIOGRAPHY Mayada Elsaid is a senior Software Engineering ( Cyber Security) student in Prince Sultan University. She is an IEEE member and chair in IEEE-Student Chapter. Her areas of interest and research are cyber physical systems security and IoT. She has presented security and business process management papers in local conferences and research forums. Sara Altuwaijri is a bachelor student, majoring in Software Engineering (Cyber Security) at Prince Sultan University. She’s currently leading two clubs in the university by arranging events and bootcamps that are related to many topics of computer science. She’s the president of Edtech club and the Vice Chair if IEEE chapter at PSU. She received nano degrees in Artificial Intelligence and Self-driving cars. Her research interests include security & privacy in IoT and cyber physical systems. Nouf Aljammaz is a senior Computer Science (Cyber Security) student focused on improving facility security through diligent approach and sense of personal responsibility. Resilient individual trained in security. Her research interest includes security domains related to risks management, optimization techniques relates to asset protection and threat minimizations. Anees Ara received her BSc in Computer Science and MSc in Mathematics with Computer Science from Osmania University, India in 2005 and 2007 respectively. She has received her PhD degree from King Saud University and she is currently working as Assistant Professor at College of Computer and Information Sciences, Prince Sultan University, Kingdom of Saudi Arabia. She is an active member of Security Engineering Lab, Prince Sultan University, KSA and IEEE, computing society. In addition, she is an active reviewer of international journals. Her research interests are broadly divided into privacy and security, which are related to cloud computing, cryptograph, smart environment, cyber physical systems and big data.