Improving Smart Home Security: Integrating Logical Sensing Into Smart Home

This paper explains various security issues in the existing home automation systems and proposes the use of logic-based security algorithms to improve home security. This paper classifies natural access points to a home as primary and secondary access points depending on their use. Logic-based sensing is implemented by identifying normal user behavior at these access points and requesting user verification when necessary. User position is also considered when various access points changed states. Moreover, the algorithm also verifies the legitimacy of a fire alarm by measuring the change in temperature, humidity, and carbon monoxide levels, thus defending against manipulative attackers. The experiment conducted in this paper used a combination of sensors, microcontrollers, Raspberry Pi and ZigBee communication to identify user behavior at various access points and implement the logical sensing algorithm. In the experiment, the proposed logical sensing algorithm was successfully implemented for a month in a studio apartment. During the course of the experiment, the algorithm was able to detect all the state changes of the primary and secondary access points and also successfully verified user identity 55 times generating 14 warnings and 5 alarms.

[1]  Abdul Hanan Abdullah,et al.  Traffic Engineering Based on Effective Envelope Algorithm on Novel Resource Reservation Method over Mobile Internet Protocol Version 6 , 2012, ArXiv.

[2]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[3]  Young-Bae Ko,et al.  Design and implementation of intelligent home control systems based on active sensor networks , 2008, IEEE Transactions on Consumer Electronics.

[4]  Xin Zhang,et al.  Modeling of nonlinear system based on deep learning framework , 2016 .

[5]  Ali Ziya An Internet Based Wireless Home Automation System for Multifunctional Devices , 2005 .

[6]  Sin-Min Tsai,et al.  A service of home security system on intelligent network , 1997 .

[7]  Gerhard P. Hancke,et al.  Unimodal and Multimodal Biometric Sensing Systems: A Review , 2016, IEEE Access.

[8]  Derek Deadman,et al.  Forecasting Residential Burglary , 2003 .

[9]  Andreas Pitsillides,et al.  Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.

[10]  Uyen Trang Nguyen,et al.  A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks , 2013, IEEE Transactions on Information Forensics and Security.

[11]  Zhuo Lu,et al.  Cyber security in the Smart Grid: Survey and challenges , 2013, Comput. Networks.

[12]  A. Alheraish,et al.  Design and implementation of home automation system , 2004, IEEE Transactions on Consumer Electronics.

[13]  Vinod Namboodiri,et al.  Toward a Secure Wireless-Based Home Area Network for Metering in Smart Grids , 2014, IEEE Systems Journal.

[14]  Reza Malekian,et al.  TMicroscope: Behavior Perception Based on the Slightest RFID Tag Motion , 2016 .

[15]  Arun Cyril Jose,et al.  Smart Home Automation Security: A Literature Review , 2015, Smart Comput. Rev..

[16]  Dongkyoo Shin,et al.  Research and implementation of the context-aware middleware for controlling home appliances , 2005, 2005 Digest of Technical Papers. International Conference on Consumer Electronics, 2005. ICCE..

[17]  Suk Lee,et al.  A pyroelectric infrared sensor-based indoor location-aware system for the smart home , 2006, IEEE Transactions on Consumer Electronics.

[18]  Reza Malekian,et al.  TrackT: Accurate tracking of RFID tags with mm-level accuracy using first-order taylor series approximation , 2016, Ad Hoc Networks.

[19]  Suman Saha Consideration Points Detecting Cross-Site Scripting , 2009, ArXiv.

[20]  W. Keith Edwards,et al.  Intelligibility and Accountability: Human Considerations in Context-Aware Systems , 2001, Hum. Comput. Interact..

[21]  Yanbo Zhao,et al.  A low cost GSM/GPRS based wireless home security system , 2008, IEEE Transactions on Consumer Electronics.

[22]  James Bret Michael,et al.  Securing the ZigBee Protocol in the Smart Grid , 2012, Computer.

[23]  Alfredo De Santis,et al.  Bounds on entropy in a guessing game , 2001, IEEE Trans. Inf. Theory.

[24]  Jeng-Shyang Pan,et al.  A Fire-Alarming Method Based on Video Processing , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.

[25]  Sayidul Morsalin,et al.  Machine-to-machine communication based smart home security system by NFC, fingerprint, and PIR sensor with mobile android application , 2016, 2016 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT).

[26]  Kyung Chang Lee,et al.  Resident Location-Recognition Algorithm Using a Bayesian Classifier in the PIR Sensor-Based Indoor Location-Aware System , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[27]  Behrang Fouladi,et al.  Security Evaluation of the Z-Wave Wireless Protocol , 2013 .

[28]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[29]  Byoungcheon Lee,et al.  Security Framework for RFID-based Applications in Smart Home Environment , 2011, J. Inf. Process. Syst..

[30]  Tao Chen,et al.  Secure Two-Party Distance Computation Protocol Based on Privacy Homomorphism and Scalar Product in Wireless Sensor Networks , 2016 .

[31]  Youssif B. Al-Nashif,et al.  Anomaly Behavior Analysis System for ZigBee in smart buildings , 2015, 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA).

[32]  Arun Cyril Jose,et al.  Improving Home Automation Security; Integrating Device Fingerprinting Into Smart Home , 2016, IEEE Access.

[33]  Bill N. Schilit,et al.  Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.

[34]  David C. Feldmeier,et al.  UNIX Password Security - Ten Years Later , 1989, CRYPTO.

[35]  K. Atukorala,et al.  SmartEye Integrated Solution to Home Automation, Security and Monitoring through Mobile Phones , 2009, 2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies.

[36]  Chi Harold Liu,et al.  A survey of context-aware middleware designs for human activity recognition , 2014, IEEE Communications Magazine.

[37]  Mike Ryan,et al.  Bluetooth: With Low Energy Comes Low Security , 2013, WOOT.

[38]  Emin Islam Tatli Cracking More Password Hashes With Patterns , 2015, IEEE Transactions on Information Forensics and Security.

[39]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[40]  Sergio Saponara,et al.  Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid , 2012, J. Comput. Networks Commun..

[41]  Behrooz Shirazi,et al.  Home automation and security for mobile devices , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).