Nubilum Ad Hominem: Taking smart homes steps further

Smart home technologies are developed with the goal of offering convenience to their users, but the currently available technologies are reactive, either to user commands or to user routine, as opposed to being proactive, and are not capable of taking the environment around the user into consideration when making an analysis. In addition, most existing systems have a strictly top-down hierarchical structure, where a central device such as the user’s mobile phone controls the system to the point where the lack thereof impacts the functionality of the system on a tremendous scale, and may sometimes result in a cascading failure rendering the entire system inoperable.This article focuses on the relationship and connection between various unconnected data points scattered across a person’s quotidian life, as well as the decentralized connection between smart home devices, both on a microscopic and on a community scale. It seeks to propose an alternative system that takes into account not only user commands and routines, but also pieces of information disseminated by the surrounding environment, which the user might not have perceived or understood, and incorporates them into its own process of analysis. Further more, the proposed system emphasizes modularization and decentralization, such that the addition and removal of a node should not impact the system outside of the specific functionality provided by the said node.

[1]  Fabien Sartor,et al.  Modélisation de l'interopérabilité d'objets communicants et de leur coopération : application à la domotique. (Modeling of interoperability of communicating object their cooperation : implementation to home automation) , 2012 .

[2]  김상혁 영어의 능격성(Ergativity) , 2003 .

[3]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[4]  Bernard Comrie,et al.  Language Universals and Linguistic Typology: Syntax and Morphology , 1981 .

[5]  Le Xu Securing the Enterprise with Intel ® AES-NI , 2010 .

[6]  Chonggang Wang,et al.  ZigBee Network Protocols and Applications , 2014 .

[7]  Bruce Schneier,et al.  Improved Cryptanalysis of Rijndael , 2000, FSE.

[8]  Remzi H. Arpaci-Dusseau Operating Systems: Three Easy Pieces , 2015, login Usenix Mag..

[9]  Masahiro Inoue,et al.  A Home Automation System , 1985, IEEE Transactions on Consumer Electronics.

[10]  Noam Chomsky,et al.  Topics in the Theory of Generative Grammar , 1966 .

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[12]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[13]  Matthew Green,et al.  Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice , 2015, CCS.

[14]  Lucien Tesnière Éléments de syntaxe structurale , 1959 .

[15]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .