GPSPiChain-Blockchain and AI based Self-Contained Anomaly Detection Family Security System in Smart Home

With advancements in technology, personal computing devices are better adapted for and further integrated into people’s lives and homes. The integration of technology into society also results in an increasing desire to control who and what has access to sensitive information, especially for vulnerable people including children and the elderly. With blockchain rise as a technology that can revolutionize the world, it is now possible to have an immutable audit trail of locational data over time. By controlling the process through inexpensive equipment in the home, it is possible to control whom has access to such personal data. This paper presents a block-chain based family security system for outdoor tracking and in-house monitoring of users’ activities via sensors to detect anomalies in users’ daily activities with the integration of Artificial Intelligence (AI). For outdoor tracking the locations of the consenting family members’ smart phones are logged and stored in a private blockchain which can be accessed through a node installed in the family home on a computer. The data for the whereabouts and daily activities of family members stays securely within the family unit and does not go to any third-party organizations. A Self-Organizing Maps (SUM) based smart contract is used for anomaly detection in users’ daily activities in a smart home, which notifies emergency contact or other family members in case of anomaly detection. The approach described in this paper contributes to the development of in-house data processing for outdoor tracking, and daily activities monitoring and prediction without any third-party hardware or software. The system is implemented at a small scale with one miner, two user nodes and several device nodes, as a proof of concept; the technical feasibility is discussed along with the limitations of the system. Further research will cover the integration of the system into a smart-home environment with additional sensors and multiple users, and ethical implementations of tracking, especially of vulnerable people, via the immutability of blockchain.

[1]  Nagaveni B. Biradar,et al.  IOTA-Next Generation Block chain , 2018 .

[2]  J. Hay DESIGNING HOMES TO BE THE FIRST LINE OF DEFENSE , 2006 .

[3]  Vijay Varadharajan Internet filtering - Issues and challenges , 2010, IEEE Security & Privacy.

[4]  Prabitha Urwyler,et al.  Recognition of activities of daily living in healthy subjects using two ad-hoc classifiers , 2015, BioMedical Engineering OnLine.

[5]  Zhigang Liu,et al.  Vehicle anti-theft tracking system based on Internet of things , 2013, Proceedings of 2013 IEEE International Conference on Vehicular Electronics and Safety.

[6]  Dong-Hee Shin,et al.  The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption , 2010, Interact. Comput..

[7]  Andreas Pitsillides,et al.  Survey in Smart Grid and Smart Home Security: Issues, Challenges and Countermeasures , 2014, IEEE Communications Surveys & Tutorials.

[8]  Xiaoli Wang,et al.  Mobility tracking using GPS, Wi-Fi and Cell ID , 2012, The International Conference on Information Network 2012.

[9]  Albert C. Esterline,et al.  Behavioral Modeling Intrusion Detection System (BMIDS) Using Internet of Things (IoT) Behavior-Based Anomaly Detection via Immunity-Inspired Algorithms , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[10]  Josep Domingo-Ferrer,et al.  Big Data Privacy: Challenges to Privacy Principles and Models , 2015, Data Science and Engineering.

[11]  Lui Sha,et al.  Cyber-Physical Systems: A New Frontier , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[12]  Dharma P. Agrawal,et al.  GPS: Location-Tracking Technology , 2002, Computer.

[13]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[14]  Kjartan Ólafsson,et al.  Net Children Go Mobile: risks and opportunities , 2014 .

[15]  H. Koshima,et al.  Personal locator services emerge , 2000 .

[16]  Faïez Gargouri,et al.  2012 International Conference on Collaboration Technologies and Systems, CTS 2012, Denver, CO, USA, May 21-25, 2012 , 2012, International Conference on Collaboration Technologies and Systems.

[17]  Vijay Sivaraman,et al.  Quantifying the reflective DDoS attack capability of household IoT devices , 2017, WISEC.

[18]  Euan G. Ritchie,et al.  A cost-effective and informative method of GPS tracking wildlife , 2013, Wildlife Research.

[19]  Aggelos Kiayias,et al.  Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol , 2017, CRYPTO.

[20]  Sneha Kumar Kasera,et al.  Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks , 2017, WiSec.

[21]  P. Starosta,et al.  The Structure of Social Trust in Postindustrial Cities of Central and Eastern Europe , 2017, Russian Social Science Review.

[22]  Seref Sagiroglu,et al.  Big data: A review , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).

[23]  Sheng-Cheng Yeh,et al.  A study on outdoor positioning technology using GPS and WiFi networks , 2009, 2009 International Conference on Networking, Sensing and Control.

[24]  A. Collins,et al.  Contemporary Security Studies , 1999 .

[25]  N. Noury,et al.  Level of activity, night and day alternation, and well being measured in a smart hospital suite , 2008, 2008 30th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[26]  Mark Ryan,et al.  Election Verifiability in Electronic Voting Protocols , 2010, ESORICS.

[27]  Feng Zhou,et al.  Developing a Trusted System for Tracking Asset on the Move , 2008, 2008 The 9th International Conference for Young Computer Scientists.