Advertisement

Smart secure homes: a survey of smart home technologies that sense, assess, and respond to security threats

  • Jessamyn Dahmen
  • Diane J. Cook
  • Xiaobo Wang
  • Wang Honglei
Original Article

Abstract

Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.

Keywords

Security monitoring Anomaly detection Rare event identification Network security Smart home automation 

Notes

Acknowledgements

This work was supported in part by the National Science Foundation under Grant 121407.

References

  1. 1.
    Weiser M (1991) The computer for the twenty-first century. Sci Am 165:94–104CrossRefGoogle Scholar
  2. 2.
    Wilson C, Hargreaves T, Hauxwell-Baldwin R (2015) Smart homes and their users: a systematic analysis and key challenges. Pers Ubiquit Comput 19(2):463–476CrossRefGoogle Scholar
  3. 3.
    Alam MR, Reaz MBI, Ali MAM (2012) A review of smart homes–past, present, and future. IEEE Trans Syst Man Cybern Part C 42(6):1190–1203CrossRefGoogle Scholar
  4. 4.
    Jones T (2012) Artificial intelligence coming to a home near you. In: Digital construction (2012). (Online). http://www.constructiondigital.com/innovations/artificial-intelligence-coming-to-a-home-near-you
  5. 5.
    Cohen, T.: I’m afraid I can’t let you do that, Dave’: Scientists predict ‘smart’ homes controlled by computer will be a reality in 10 years. Mail Online (2012). (Online). http://www.dailymail.co.uk/sciencetech/article-2122343/Scientists-predict-smart-homes-controlled-reality-10-years.html
  6. 6.
    Abowd G, Mynatt ED (2005) Designing for the human experience in smart environments. In: Smart environments: technologies, protocols and applications, pp 153–174Google Scholar
  7. 7.
    Hagras H, Doctor F, Lopez A, Callaghan V (2007) An incremental adaptive life long learning approach for type-2 fuzzy embedded agents in ambient intelligent environments. IEEE Trans Fuzzy Syst 15(1):41–55CrossRefGoogle Scholar
  8. 8.
    Intille S, Larson K, Munguia-Tapia E, Beaudin J, Kaushik P, Nawyn J, Rockinson R (2006) Using a live-in laboratory for ubiquitous computing research. In: Pervasive, pp 349–365Google Scholar
  9. 9.
    Helal A, Mann W, Elzabadani H, King J, Kaddourah Y, Jansen E, El-Zabadani H, Kaddoura Y (2005) The gator tech smart house: a programmable pervasive space. IEEE Comput 38(3):50–60CrossRefGoogle Scholar
  10. 10.
    Mozer MC (2004) Lessons from an adaptive home. In: Cook DJ, Das SK (eds) Smart environments: technology, protocols, and applications. Wiley, New York, pp 273–298Google Scholar
  11. 11.
    Cook DJ, Youngblood M, Heierman E, Gopalratnam K, Rao S, Litvin A, Khawaja F (2003) MavHome: an agent-based smart home. In: Pervasive computing, pp 521–524Google Scholar
  12. 12.
    Cook DJ, Crandall A, Thomas B, Krishnan N (2012) CASAS: a smart home in a box. IEEE Comput 46(7):62–69CrossRefGoogle Scholar
  13. 13.
    Philips D (2003) 365 days’ ambient intelligence research in HomeLabGoogle Scholar
  14. 14.
    Intille S, Nawyn J, Logan B, Abowd G (2009) Developing shared home behavior datsets to advance HCI and ubiquitous computing research. In: International conference on human factors in computing systems extended abstracts, pp 4763–4766Google Scholar
  15. 15.
    ASU (2012) Sensor activity prediction in smart homesGoogle Scholar
  16. 16.
    Boxlab (2017) List of home datasets \(2012\). (Online). https://boxlab.wikispaces.com/List+of+Home+Datasets
  17. 17.
    De la Torre F, Hodgins J, Montano J, Valcarcel S, Macey J (2009) Guide to the Carnegie Mellon University multimodal activity (CMU-MMAC) databaseGoogle Scholar
  18. 18.
    Kim E, Helal S, Lee J, Hossain S (2011) The making of a dataset for smart spaces. In: International conference on ubiquitous intelligence and computingGoogle Scholar
  19. 19.
    Malik J, Petrov S, Berg A, Petrox S (2012) Action recognition datasets (Online). http://www.eecs.berkeley.edu/Research/Projects/CS/vision/action/
  20. 20.
    Wren C, Ivanov Y, Leigh D, Westhues J (2007) The MERL motion detector dataset. In: Workshop on massive datasets, pp 10–14Google Scholar
  21. 21.
    Bulling A, Blanke U, Schiele B (2014) A tutorial on human activity recognition using body-worn inertial sensors. ACM Comput Surv 46(3):107–140CrossRefGoogle Scholar
  22. 22.
    CASAS (2016) WSU CASAS Datasets (Online). http://ailab.wsu.edu/casas/datasets/
  23. 23.
    University of Florida (2016) Ambient intelligence dataset. http://www.cise.ufl.edu/~prashidi/Datasets/ambientIntelligence.html
  24. 24.
    Samsung SmartThings (2016) Stay connected to your home and family (Online). https://www.smartthings.com/
  25. 25.
    Honeywell (2016) Your connected home (Online). http://homesecurity.honeywell.com/home_automation.html
  26. 26.
    Google (2016) Get to know google home (Online). https://madeby.google.com/home/
  27. 27.
    Chen L, Hoey J, Nugent CD, Cook DJ, Yu Z (2012) Sensor-based activity recognition. IEEE Trans Syst Man Cybern Part C Appl Rev 42(6):790–808CrossRefGoogle Scholar
  28. 28.
    Krishnan N, Cook DJ (2014) Activity recognition on streaming sensor data. Pervas Mob Comput 10:138–154CrossRefGoogle Scholar
  29. 29.
    Cook DJ, Krishnan N (2015) Activity learning: discovering, recognizing, and predicting human behavior from sensor data. Wiley, New YorkCrossRefGoogle Scholar
  30. 30.
    Aggarwal JK, Ryoo MS (2011) Human activity analysis: a review. ACM Comput Surv 43(3):1–47CrossRefGoogle Scholar
  31. 31.
    Chen L, Khalil I (2011) Activity recognition: approaches, practices and trends. In: Chen L, Nugent CD, Biswas J, Hoey J (eds) Activity recognition in pervasive intelligent environments. Atlantis ambient and pervasive intelligence, pp 1–31Google Scholar
  32. 32.
    Tuaraga P, Chellappa R, Subrahmanian VS, Udrea O, Turaga P (2008) Machine recognition of human activities: a survey. IEEE Trans Circ Syst Video Technol 18(11):1473–1488CrossRefGoogle Scholar
  33. 33.
    Liao IL, Fox D, Kautz H (2005) Location-based activity recognition using relational Markov networks. In: International joint conference on artificial intelligence, pp 773–778Google Scholar
  34. 34.
    Munguia-Tapia E, Intille SS, Larson K (2004) Activity recognition in the home using simple and ubiquitous sensors. In: Pervasive, pp 158–175Google Scholar
  35. 35.
    Fang H, Hu C (2014) Recognizing human activity in smart home using deep learning algorithm. In: Chinese control conference, pp 4716–4720Google Scholar
  36. 36.
    Roy P, Giroux S, Bouchard B, Bouzouane A, Phua C, Tolstikov A, Biswas J (2011) A possibilistic approach for activity recognition in smart homes for cognitive assistance to Alzheimer’s patients. Atl Ambient Pervasive Intell 4:33–58CrossRefGoogle Scholar
  37. 37.
    Fleury A, Noury N, Vacher M (2009) Supervised classification of activities of daily living in health smart homes using SVM. In: Proceedings of the international conference of the IEEE engineering in medicine and biology society, pp 6099–6102Google Scholar
  38. 38.
    Dawadi P, Cook DJ, Schmitter-Edgecombe M (2016) Automated clinical assessment from smart home-based behavior data. IEEE J Biomed Heal InfGoogle Scholar
  39. 39.
    Cook DJ, Dawadi P, Schmitter-Edgecombe M (2015) Analyzing activity behavior and movement in a naturalistic environment using smart home techniques. IEEE J Biomed Heal Inf 19(6):1882–1892CrossRefGoogle Scholar
  40. 40.
    Morris ME, Adair B, Miller O, Hansen R, Pearce A, Santamaria N, Viegas L, Long M, Said C (2013) Smart home technologies to assist older people to live well at home. J Aging Sci 1:1–9Google Scholar
  41. 41.
    Walsh L, Kealy A, Loane J, Doyle J (2014) Inferring health metrics from ambient smart home data. IEEE Int Conf Bioinforma, BiomedCrossRefGoogle Scholar
  42. 42.
    Hoey J, Monk A, Mihailidis A (2012) People, sensors, decisions: customizable and adaptive technologies for assistance in healthcare. ACM Trans Interact Intell Syst 2(4)Google Scholar
  43. 43.
    Deleawe S, Kusznir J, Lamb B, Cook DJ (2010) Predicting air quality in smart environments. J Ambient Intell Smart Environ 2(2):145–154Google Scholar
  44. 44.
    Riche Y, Dodge J, Metoyer R (2010) Studying always-on electricity feedback in the home. In: International conference on human factors in computing systems, pp 1995–1998Google Scholar
  45. 45.
    Dinata IBPP, Hardian B (2014) Predicting smart home lighting behavior from sensors and user input using very fast decision tree with Kernel Density Estimation and improved Laplace correction. In: International conference on advanced computer science and information systems, pp 171–175Google Scholar
  46. 46.
    Fensel A, Tomic S, Kumar V, Stefanovic M, Aleshin SV, Novikov DO (2013) SESAME-S: Semantic smart home system for energy efficiency. Informatik-Spektrum 36(1):46–57CrossRefGoogle Scholar
  47. 47.
    Gupta S, Reynolds MS, Patel SN (2010) ElectriSense: single-point sensing using EMI for electrical event detection and classification in the home. In: ACM international conference on ubiquitous computing, pp 139–148Google Scholar
  48. 48.
    Scott J, Brush AJB, Krumm J, Meyers B, Hazas M, Hodges S, Villar N (2011) PreHeat: controlling home heating using occupancy prediction. In: International conference on ubiquitous computing, pp 281–290Google Scholar
  49. 49.
    Bureau of Labor Statistics (2016) American time use survey ((Online)). http://www.bls.gov/tus/
  50. 50.
    Skubic M, Harris BH, Stone E, Ho KC, Su BY, Rantz M (2016) Testing non-wearable fall detection methods in the homes of older adults. In: IEEE international conference of the engineering in medicine and biology society, pp 557–560Google Scholar
  51. 51.
    Mubashir M, Shao L, Seed L (2013) A survey on fall detection: Principles and approaches. Neurocomputing 100:144–152CrossRefGoogle Scholar
  52. 52.
    Noury N, Herve T, Rialle V, Virone G, Mercier E, Morey G, Moro A, Porcheron T (2000) Monitoring behavior in home using a smart fall sensor and position sensors. In: International conference on microtechnologies in medicine and bioloy, pp 607–610Google Scholar
  53. 53.
    Sprint G, Cook DJ (2016) Unsupervised detection and analysis of changes in everyday physical activity data. J Biomed InformGoogle Scholar
  54. 54.
    Sprint G, Cook DJ, Fritz R, Schmitter-Edgecombe M (2016) Using smart homes to detect and analyze health events. IEEE ComputGoogle Scholar
  55. 55.
    Demiris G, Hensel BK (2010) Technologies for an aging society: a systematic review of ‘smart home’ applications. IMIA Yearb Med Inf 47(1):33–40Google Scholar
  56. 56.
    Guillet S, Bouchard B, Bousouane A (2013) Correct by construction security approach to design fault tolerant smart homes for dsabled people. In: International conference on emerging ubiquitous systems and pervasive, pp 257–264Google Scholar
  57. 57.
    Pardo E, Espes D, Le-Parc P (2016) A framework for anomaly diagnosis in smart homes based on ontology. In: International conference on ambient systems, networks and technologies, pp 545–552Google Scholar
  58. 58.
    Komninos N, Philippou E, Pitsillides A (2014) Survey in smart grid and smart home security: Issues, challenges, and countermeasures. IEEE Commun Surv Tutor 16(4):1933–1954CrossRefGoogle Scholar
  59. 59.
    Storm D (2015) Of 10 IoT-connected home security systems tested. 100% are full of security FAIL. computerworld.comGoogle Scholar
  60. 60.
    Hill K (2013) When ‘smart homes’ get hacked: i haunted a complete stranger’s house via the internet. Forbes (Online). http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/
  61. 61.
    Brown E (2016) Who needs the internet of things? linux.comGoogle Scholar
  62. 62.
    Ring (2016) Never miss a visitor. With ring, you’re always home (Online). https://ring.com/
  63. 63.
    Icontrol Networks (2016) Home security (Online). https://getpiper.com/howitworks/
  64. 64.
    SmartThings (2016) Discovery ways to use smartThings for monitoring and security (Online). https://www.smartthings.com/uses/monitoring-security
  65. 65.
    Zhuang X, Huang J, Potamianos G, Hasegawa-Johnson M (2009) Acoustic fall detection using Gaussian mixture models and GMM supervectors. In: IEEE international conference on acoustics, speech, and signal processing, pp 69–72Google Scholar
  66. 66.
    Moncrieff S, Venkatesh S, West G, Greenhill S (2007) Multi-modal emotive computing in a smart house environment. Pervas Mob Comput 3(2):79–94CrossRefGoogle Scholar
  67. 67.
    Jain AK, Nandakumar K (2012) Biometric authentication: system security and user privacy. IEEE Comput 45(11):87–92CrossRefGoogle Scholar
  68. 68.
    euronews (2016) Smarter home security camera recognises intrduers says maker (Online). http://www.euronews.com/2016/08/03/smarter-home-security-camera-recognises-intruders-says-maker
  69. 69.
    Andersson V, Dutra R, and R. Araujo, “Anthropometric and human gait identification using skeleton data from Kinect sensor. In: ACM Symp Appl Comput, 60–61Google Scholar
  70. 70.
    Helal A, Mann W, Elzabadani H, King J, Kaddourah Y, Jansen E (2005) Gator tech smart house: a programmable pervasive space. IEEE Comput Mag 64–74Google Scholar
  71. 71.
    Jenkins J, Ellis C (2007) Using ground reaction forces from gait analysis: body mass as a weak biometric. In: Pervasive computing, pp 251–267Google Scholar
  72. 72.
    Watanabe K, Kurihara Y, Tanaka H (2009) Ubiquitous health monitoring at home–sensing of human biosignals on flooring, on tatami mat, in the bathtub, and in the lavatory. IEEE Sens J 9(12):1847–1855CrossRefGoogle Scholar
  73. 73.
    Matsushita N, Tajima S, Ayatsuka Y, Rekimoto J (2000) Wearable key: device for personalizing nearby environment. In: International symposium on wearable computers, pp 119–126Google Scholar
  74. 74.
    Venkatesh A (2008) Digital home technologies and transformation of households. Inf Syst Front 10(4):391–395CrossRefGoogle Scholar
  75. 75.
    Crandall A, Cook DJ (2013) Behaviometrics for multiple residents in a smart environment. In: Human aspects in ambient intelligence, pp 55–71Google Scholar
  76. 76.
    Teoh C, Tan C (2010) A neural network approach towards reinforcing smart home security. In: Asia-pacific symposium on information and telecommunication technologiesGoogle Scholar
  77. 77.
    Chitnis S, Deshpande N, Shalgram A (2016) An investigative study for smart home security: Issues, challenges and countermeasures. Wireless Sens Netw 8:61–68Google Scholar
  78. 78.
    Chitnis S, Deshpande N, Shaligram A (2016) An investigative study for smart home security: Issues, challenges and countermeasures. Wirel Sens Netw 8:61–68CrossRefGoogle Scholar
  79. 79.
    Petersen J, Austin D, Kaye JA, Pavel M, Hayes TL (2014) Unobtrusive in-home detection of time spent out-of-home with applications to loneliness and physical activity. IEEE J Biomed Heal Inf 18(5):1590–1596CrossRefGoogle Scholar
  80. 80.
    Dodge HH, Mattek NC, Austin D, Hayes TL, Kaye JA (2012) In-home walking speeds and variability trajectories associated with mild cognitive impairment. Neurology 78(24):1946–1952CrossRefGoogle Scholar
  81. 81.
    Hodges M, Kirsch N, Newman M, Pollack M (2010) Automatic assessment of cognitive impairment through electronic observation of object usage. In: International conference on pervasive computing, pp 192–209Google Scholar
  82. 82.
    Dawadi P, Cook D, Schmitter-Edgecombe M (2015) Modeling patterns of activities using activity curves. Pervasive Mob ComputGoogle Scholar
  83. 83.
    Lotfi A, Mahmoud LCSM, Akhlaghinia MJ (2012) Smart homes for the elderly dementia sufferers: identification and prediction of abnormal behavior. J Ambient Intell Humaniz Comput 3:205–218CrossRefGoogle Scholar
  84. 84.
    Ali H, Amalarethinam DG (2014) Detecting abnormality in activites performed by people with dementia in smart environment. Int J Comput Sci Inf Technol 5:2453–2457Google Scholar
  85. 85.
    Das B, Cook DJ, Krishnan N, Schmitter-Edgecombe M (2016) One-class classification-based real-time activity error detection in smart homes. IEEE J Sel Top Signal ProcessGoogle Scholar
  86. 86.
    Marson D, Hebert K (2006) Functional assessment. In: Geriatric neuropsychology assessment and intervention, pp 158–189Google Scholar
  87. 87.
    Desai A, Grossberg G, Sheth D (2004) Activities of daily living in patients with dementia: Clinical relevance, methods of assessment and effects of treatment. CNS Drugs 18:853–875CrossRefGoogle Scholar
  88. 88.
    Sonn U, Grimbyand G, Svanborg A (1996) Activities of daily living studied longitudinally between 70 and 76 years of age. Disabil Rehabil 18:91–100CrossRefGoogle Scholar
  89. 89.
    Zimmerman S, Magaziner J (1995) Methodological issues in measuring the functional status of cognitively impaired nursing home residents: the use of proxies and performance-based measures. Alzheimer Dis Assoc Disord 8:S281–S290Google Scholar
  90. 90.
    Barberger-Gateau P, Dartigues J, Letenneur L (1993) Four instrumental activities of daily living score as a predictor of one-year incident dementia. Age Ageing 22:457–463CrossRefGoogle Scholar
  91. 91.
    Peres K, Chrysostome V, Fabrigoule C, Orgogozo J, Dartigues J, Barberger-Gateau P (2006) Restriction in complex activities of daily living in MCI. Neurology 67:461–466CrossRefGoogle Scholar
  92. 92.
    Nourhashemi F, Andrieu S, Gillette-Guyonnet S, Vellas B, Albarede J, Grandjean H (2001) Instrumental activities of daily living as a potential marker of frailty: a study of 7364 community-dwelling elderly women (the EPIDOS study). J Gerontechnol 56A:M448–M453Google Scholar
  93. 93.
    Cuddihy P, Weisenberg J, Graichen C, Ganesh M (2007) Algorithm to automatically detect abnormally long periods of inactivity in a home. In: ACM SIGMOBILE international workshop on systems and networking support for healthcare and assisted living environments, pp 89–94Google Scholar
  94. 94.
    Stone E, Skubic M (2015) Fall detection in homes of older adults using the Microsoft Kinect. IEEE J Biomed Heal Informatics 19(1):290–301CrossRefGoogle Scholar
  95. 95.
    Lord SR, Sherrington C, Menz HB (2001) Falls in older people: risk factors and strategies for prevention. England, CambridgeGoogle Scholar
  96. 96.
    Bourke AK, Klenk J, Schwickert L, Aminian K, Ihlen EAF, Mellone S, Helbostad JL, Chiari L, Becker C (2016) Fall detection algorithms for real-world falls harvested from lumbar sensors in the elderly population: a machine learning approach. In: IEEE annual international conference of the engineering in medicine and biology society, pp 1–6Google Scholar
  97. 97.
    Li Y, Zeng L, Popescu M, Ho KC (2010) Acoustic fall detection using a circular microphone array. In: IEEE annual international conference of the engineering in medicine and biology society, pp 2242–2245Google Scholar
  98. 98.
    Rougier C, Meunier J, St-Arnaud A, Rousseau J (2011) Robust video surveillance for fall detection based on human shape deformation. IEEE Trans Circ Syst Video Technol 21(5):611–622CrossRefGoogle Scholar
  99. 99.
    Alwan M, Rajendran PJ, Kell S, Mack D, Dalal S, Wolfe M, Felder R (2006) A smart and passive floor-vibration based fall detector for elderly. In: IEEE international conference on information and communication technology, pp 1003–1007Google Scholar
  100. 100.
    Aicha AN, Englebienne G, Krose B (2014) Modeling visit behaviour in smart homes using unsupervised learning. In: ACM conference on ubiquitous computing, pp 1193–1200Google Scholar
  101. 101.
    Petersen J, Larimer N, Kaye JA, Pavel M, Hayes TL (2012) SVM to detect the presence of visitors in a smart home environment. In: International conference of the IEEE engineering in medicine and biology society, pp 5850–5853Google Scholar
  102. 102.
    Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41:1–15CrossRefGoogle Scholar
  103. 103.
    Youngblood GM, Cook DJ (2007) Data mining for hierarchical model creation. IEEE Trans Syst Man Cybern Part C 37(4):1–12CrossRefGoogle Scholar
  104. 104.
    Ordonez F, de Toldeo P, Sanchis A (2015) Sensor-based Bayesian detection of anomalous living patterns in a home setting. Pers Ubiquitous Comput 19:259–270CrossRefGoogle Scholar
  105. 105.
    Haque S, Rahman M, Aziz A (2015) Sensor anomaly detection in wireless sensor networks for healthcare. Sensors 15:8764–8786CrossRefGoogle Scholar
  106. 106.
    Aran O, Sanchez-Cortes D, Do MT, Gatica-Perez D (2016) Anomaly detection in elderly daily behavior in ambient sensing environments. In: Human behavior understanding, pp 51–67Google Scholar
  107. 107.
    Novak M (2013) Anomaly detection in user daily patterns in smart-home environment. J Sel Areas Heal Inf 3:1–11Google Scholar
  108. 108.
    Virone G (2009) Assesing everday life behavioral rythms for the older generation. Pervas Mob Comput 5:606–622CrossRefGoogle Scholar
  109. 109.
    Barger T, Brown D, Alwan M (2005) Health status monitoring through analysis of behavioral patterns. IEEE Trans Syst Man Cybern Part A 35(1):22–27CrossRefGoogle Scholar
  110. 110.
    Ke S-R, Thuc HLU, Lee Y-J, Hwang J-N, Yoo J-H, Choi K-H (2013) A review on video-based human activity recognition. Computers 2(2):88–131CrossRefGoogle Scholar
  111. 111.
    Han Y, Han M, Lee S, Sarkar AMJ, Lee Y-K (2012) A framework for supervising lifestyle diseases using long-term activity monitoring. Sensors 12:5363–5379CrossRefGoogle Scholar
  112. 112.
    Williams J, Cook D (2016) Forecasting behavior in smart homes based on past sleep and wake patterns. Technol Heal CareGoogle Scholar
  113. 113.
    Mocanu E, Florea AM (2011) A model for activity recognition and emergency detection in smart environments. In: International conference on ambient computing, applications, services and technologies, pp 13–19Google Scholar
  114. 114.
    Cardinaux F, Brownsell S, Hawley M, Bradley D (2008) Modelling of behavioural patterns for abnormality detection in the context of lifestyle reassurance. Prog Pattern Recognit Image Anal Appl 5197:243–251CrossRefGoogle Scholar
  115. 115.
    Elbert D, Storf H, Eisenbarth M, Unalan O, Schmitt M (2011) An approach for detecting deviations in daily routine for long-term behavior analysis. In: In pervasive health, pp 426–433Google Scholar
  116. 116.
    Mori T, Fujii A, Shimosaka M, Noguchi H, Sato T (2007) Typical behavior patterns extraction and anomaly detection algorithm based on accumulated home sensor data. In: Conference on future generation communication and networkingGoogle Scholar
  117. 117.
    Hoque E, Dickerson R, Preum S, Hanson M, Barth A, Stankovic J (2015) Holmes: a comprehensive anomaly detection system for daily in-home activities. In: International conference on distributed computing in sensor systems, pp 40–51Google Scholar
  118. 118.
    Hoque E, Stankovic J (2012) Semantic anomaly detection in daily activities integrate expert rules for acceptable anomalies. In: ACM international joint conference on pervasive and ubiquitous computing, pp 633–634Google Scholar
  119. 119.
    Okeyo G, Chen L, Wang H, Sterritt R (2014) Dynamic sensor data segmentation for real-time knowledge-driven activity recognition. Pervas Mob Comput 10:155–172CrossRefGoogle Scholar
  120. 120.
    Tong Y, Chen R, Gao J (2015) Hidden state conditional random field for abnormal activity recogniton in smart homes. Entropy 17:1358–1378CrossRefGoogle Scholar
  121. 121.
    Dredze M, Crammer K (2008) Active learning with confidence. In: Proceedings of ACL, pp 233–236Google Scholar
  122. 122.
    Joshi AJ, Porikli F, Papanikolopoulos N (2009) Multi-class active learning for image classification. In: IEEE conference on computer vision and pattern recognitionGoogle Scholar
  123. 123.
    Freund Y, Schapire RE (1996) Experiments with a new boosting algorithm. In: International conference on machine learning, pp 148–156Google Scholar
  124. 124.
    Krempl G, Kottke D, Lemaire V (2015) Optimised probabilistic active learning (OPAL) for fast, non-myopic, cost-sensitive active classification. Mach Learn 100(2):449–476MathSciNetCrossRefzbMATHGoogle Scholar
  125. 125.
    Lazarevic A, Srivastava J, Kumar V (2004) Data mining for analysis of rare events: a case study in security, financial and medical applications. In: Pacific-asia conference on knowledge discovery and data miningGoogle Scholar
  126. 126.
    Harrison D, Seah W, Rayudu R (2016) Rare event detection and propagation in wireless sensor networks. ACM Comput Surv 48:58CrossRefGoogle Scholar
  127. 127.
    Pelleg D, Moore AW (2004) Active learning for anomaly and rare-category detection. In: Advances in neural information processing systems, pp 1073–1080Google Scholar
  128. 128.
    Koh S, Ravana SD (2016) Unsupervised rare pattern mining: a survey. ACM Trans Knowl Discov Data 10(4):45CrossRefGoogle Scholar
  129. 129.
    Aminikhanghahi S, Cook DJ (2016) A survey of methods for time series change point detection. Knowl Inf Syst 1–29Google Scholar
  130. 130.
    Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Discov 29(3):626–688MathSciNetCrossRefGoogle Scholar
  131. 131.
    Noble C, Cook DJ (2003) Graph-based anomaly detection. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data miningGoogle Scholar
  132. 132.
    Eberle W, Holder L, Massengill B (2012) Graph-based anomaly detection applied to homeland security cargo screening. In: Florida artificial intelligence research society conferenceGoogle Scholar
  133. 133.
    Rayana S, Akoglu L (2016) Less is more: Building selective anomaly ensembles. ACM Trans Knowl Discov Data 10(4):42CrossRefGoogle Scholar
  134. 134.
    Eberle W, Holder L (2015) Scalable anomaly detection in graphs. Intell Data Anal 19:57–74Google Scholar
  135. 135.
    Cook D, Holder L, Thompson S, Whitney P, Chilton L (2009) Graph-based analysis of nuclear smuggling data. J Appl Secur Res 4(4):501–517CrossRefGoogle Scholar
  136. 136.
    Chakrabarti D, Zhan Y, Blandford D, Faloutsos C, Blelloch G (2004) “NetMine: new mining tools for large graphs. In: SIAM workshop on link analysis, counter-terrorism and privacyGoogle Scholar
  137. 137.
    Efron B, Tibshirani RJ (1994) An introduction to the bootstrap. CRC Press, New YorkzbMATHGoogle Scholar
  138. 138.
    Fernandes E, Jung J, Prakash A (2016) Security analysis of emerging smart home applications. In: IEEE symposium on security and privacy, pp 636–654Google Scholar
  139. 139.
    Lee A (2013) Hacking the connected home: when your house watches you. Readwrite (Online). http://readwrite.com/2013/11/13/hacking-the-connected-home-when-your-house-watches-you&awesm=~osmDA6o9bkgx84
  140. 140.
    Clemons T (2016) Wake up call: mom learns daughters’ bedroom webcam was hackedGoogle Scholar
  141. 141.
    O’Flynn C (2016) A lightbulb worm?Google Scholar
  142. 142.
    Rose A, Ramsey B (2016) Picking bluetooth low energy locks from a quarter mile away. DefConGoogle Scholar
  143. 143.
    Wang P, Chao K-M, Lo C-C, Lin W-H, Lin H-C, Chao W-J (2016) Using malware for software-defined networking-based smart home security management through a taint checking approach. Int J Distrib Sens Netw 12(8):2016Google Scholar
  144. 144.
    Hadid A (2014) Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues and research directions. In: IEEE conference on computer vision and pattern recognition workshops, pp 113–118Google Scholar
  145. 145.
    Xu Y, Price T, Frahm JM, Monrose F (2016) Virtual u: defeating face liveness detection by building virtual models from your public photos. In: USENIX security symposium, pp 497–512Google Scholar
  146. 146.
    Lai C, Tai C (2016) A smart spoofing face detector by display features analysis. Sensors 16(7):1136–1150CrossRefGoogle Scholar
  147. 147.
    Robles RJ, Kim T (2010) A review on security in smart home development. Int J Adv Sci Technol 15:13–22Google Scholar
  148. 148.
    Xie M, Han S, Tian B, Parvin S (2011) Anomaly detection in wireless sensor networks: a survey. J Netw Comput Appl 34(4):1302–1325CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2017

Authors and Affiliations

  • Jessamyn Dahmen
    • 1
  • Diane J. Cook
    • 1
  • Xiaobo Wang
    • 2
  • Wang Honglei
    • 2
  1. 1.School of Electrical Engineering and Computer ScienceWashington State UniversityPullmanUSA
  2. 2.Huawei R&D USA, FutureWei Technologies, Inc.PlanoUSA

Personalised recommendations