Smart secure homes: a survey of smart home technologies that sense, assess, and respond to security threats

Abstract

Smart home design has undergone a metamorphosis in recent years. The field has evolved from designing theoretical smart home frameworks and performing scripted tasks in laboratories. Instead, we now find robust smart home technologies that are commonly used by large segments of the population in a variety of settings. Recent smart home applications are focused on activity recognition, health monitoring, and automation. In this paper, we take a look at another important role for smart homes: security. We first explore the numerous ways smart homes can and do provide protection for their residents. Next, we provide a comparative analysis of the alternative tools and research that has been developed for this purpose. We investigate not only existing commercial products that have been introduced but also discuss the numerous research that has been focused on detecting and identifying potential threats. Finally, we close with open challenges and ideas for future research that will keep individuals secure and healthy while in their own homes.

This is a preview of subscription content, log in to check access.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

References

  1. 1.

    Weiser M (1991) The computer for the twenty-first century. Sci Am 165:94–104

    Article  Google Scholar 

  2. 2.

    Wilson C, Hargreaves T, Hauxwell-Baldwin R (2015) Smart homes and their users: a systematic analysis and key challenges. Pers Ubiquit Comput 19(2):463–476

    Article  Google Scholar 

  3. 3.

    Alam MR, Reaz MBI, Ali MAM (2012) A review of smart homes–past, present, and future. IEEE Trans Syst Man Cybern Part C 42(6):1190–1203

    Article  Google Scholar 

  4. 4.

    Jones T (2012) Artificial intelligence coming to a home near you. In: Digital construction (2012). (Online). http://www.constructiondigital.com/innovations/artificial-intelligence-coming-to-a-home-near-you

  5. 5.

    Cohen, T.: I’m afraid I can’t let you do that, Dave’: Scientists predict ‘smart’ homes controlled by computer will be a reality in 10 years. Mail Online (2012). (Online). http://www.dailymail.co.uk/sciencetech/article-2122343/Scientists-predict-smart-homes-controlled-reality-10-years.html

  6. 6.

    Abowd G, Mynatt ED (2005) Designing for the human experience in smart environments. In: Smart environments: technologies, protocols and applications, pp 153–174

  7. 7.

    Hagras H, Doctor F, Lopez A, Callaghan V (2007) An incremental adaptive life long learning approach for type-2 fuzzy embedded agents in ambient intelligent environments. IEEE Trans Fuzzy Syst 15(1):41–55

    Article  Google Scholar 

  8. 8.

    Intille S, Larson K, Munguia-Tapia E, Beaudin J, Kaushik P, Nawyn J, Rockinson R (2006) Using a live-in laboratory for ubiquitous computing research. In: Pervasive, pp 349–365

  9. 9.

    Helal A, Mann W, Elzabadani H, King J, Kaddourah Y, Jansen E, El-Zabadani H, Kaddoura Y (2005) The gator tech smart house: a programmable pervasive space. IEEE Comput 38(3):50–60

    Article  Google Scholar 

  10. 10.

    Mozer MC (2004) Lessons from an adaptive home. In: Cook DJ, Das SK (eds) Smart environments: technology, protocols, and applications. Wiley, New York, pp 273–298

    Google Scholar 

  11. 11.

    Cook DJ, Youngblood M, Heierman E, Gopalratnam K, Rao S, Litvin A, Khawaja F (2003) MavHome: an agent-based smart home. In: Pervasive computing, pp 521–524

  12. 12.

    Cook DJ, Crandall A, Thomas B, Krishnan N (2012) CASAS: a smart home in a box. IEEE Comput 46(7):62–69

    Article  Google Scholar 

  13. 13.

    Philips D (2003) 365 days’ ambient intelligence research in HomeLab

  14. 14.

    Intille S, Nawyn J, Logan B, Abowd G (2009) Developing shared home behavior datsets to advance HCI and ubiquitous computing research. In: International conference on human factors in computing systems extended abstracts, pp 4763–4766

  15. 15.

    ASU (2012) Sensor activity prediction in smart homes

  16. 16.

    Boxlab (2017) List of home datasets \(2012\). (Online). https://boxlab.wikispaces.com/List+of+Home+Datasets

  17. 17.

    De la Torre F, Hodgins J, Montano J, Valcarcel S, Macey J (2009) Guide to the Carnegie Mellon University multimodal activity (CMU-MMAC) database

  18. 18.

    Kim E, Helal S, Lee J, Hossain S (2011) The making of a dataset for smart spaces. In: International conference on ubiquitous intelligence and computing

  19. 19.

    Malik J, Petrov S, Berg A, Petrox S (2012) Action recognition datasets (Online). http://www.eecs.berkeley.edu/Research/Projects/CS/vision/action/

  20. 20.

    Wren C, Ivanov Y, Leigh D, Westhues J (2007) The MERL motion detector dataset. In: Workshop on massive datasets, pp 10–14

  21. 21.

    Bulling A, Blanke U, Schiele B (2014) A tutorial on human activity recognition using body-worn inertial sensors. ACM Comput Surv 46(3):107–140

    Article  Google Scholar 

  22. 22.

    CASAS (2016) WSU CASAS Datasets (Online). http://ailab.wsu.edu/casas/datasets/

  23. 23.

    University of Florida (2016) Ambient intelligence dataset. http://www.cise.ufl.edu/~prashidi/Datasets/ambientIntelligence.html

  24. 24.

    Samsung SmartThings (2016) Stay connected to your home and family (Online). https://www.smartthings.com/

  25. 25.

    Honeywell (2016) Your connected home (Online). http://homesecurity.honeywell.com/home_automation.html

  26. 26.

    Google (2016) Get to know google home (Online). https://madeby.google.com/home/

  27. 27.

    Chen L, Hoey J, Nugent CD, Cook DJ, Yu Z (2012) Sensor-based activity recognition. IEEE Trans Syst Man Cybern Part C Appl Rev 42(6):790–808

    Article  Google Scholar 

  28. 28.

    Krishnan N, Cook DJ (2014) Activity recognition on streaming sensor data. Pervas Mob Comput 10:138–154

    Article  Google Scholar 

  29. 29.

    Cook DJ, Krishnan N (2015) Activity learning: discovering, recognizing, and predicting human behavior from sensor data. Wiley, New York

    Google Scholar 

  30. 30.

    Aggarwal JK, Ryoo MS (2011) Human activity analysis: a review. ACM Comput Surv 43(3):1–47

    Article  Google Scholar 

  31. 31.

    Chen L, Khalil I (2011) Activity recognition: approaches, practices and trends. In: Chen L, Nugent CD, Biswas J, Hoey J (eds) Activity recognition in pervasive intelligent environments. Atlantis ambient and pervasive intelligence, pp 1–31

  32. 32.

    Tuaraga P, Chellappa R, Subrahmanian VS, Udrea O, Turaga P (2008) Machine recognition of human activities: a survey. IEEE Trans Circ Syst Video Technol 18(11):1473–1488

    Article  Google Scholar 

  33. 33.

    Liao IL, Fox D, Kautz H (2005) Location-based activity recognition using relational Markov networks. In: International joint conference on artificial intelligence, pp 773–778

  34. 34.

    Munguia-Tapia E, Intille SS, Larson K (2004) Activity recognition in the home using simple and ubiquitous sensors. In: Pervasive, pp 158–175

  35. 35.

    Fang H, Hu C (2014) Recognizing human activity in smart home using deep learning algorithm. In: Chinese control conference, pp 4716–4720

  36. 36.

    Roy P, Giroux S, Bouchard B, Bouzouane A, Phua C, Tolstikov A, Biswas J (2011) A possibilistic approach for activity recognition in smart homes for cognitive assistance to Alzheimer’s patients. Atl Ambient Pervasive Intell 4:33–58

    Article  Google Scholar 

  37. 37.

    Fleury A, Noury N, Vacher M (2009) Supervised classification of activities of daily living in health smart homes using SVM. In: Proceedings of the international conference of the IEEE engineering in medicine and biology society, pp 6099–6102

  38. 38.

    Dawadi P, Cook DJ, Schmitter-Edgecombe M (2016) Automated clinical assessment from smart home-based behavior data. IEEE J Biomed Heal Inf

  39. 39.

    Cook DJ, Dawadi P, Schmitter-Edgecombe M (2015) Analyzing activity behavior and movement in a naturalistic environment using smart home techniques. IEEE J Biomed Heal Inf 19(6):1882–1892

    Article  Google Scholar 

  40. 40.

    Morris ME, Adair B, Miller O, Hansen R, Pearce A, Santamaria N, Viegas L, Long M, Said C (2013) Smart home technologies to assist older people to live well at home. J Aging Sci 1:1–9

    Google Scholar 

  41. 41.

    Walsh L, Kealy A, Loane J, Doyle J (2014) Inferring health metrics from ambient smart home data. IEEE Int Conf Bioinforma, Biomed

    Google Scholar 

  42. 42.

    Hoey J, Monk A, Mihailidis A (2012) People, sensors, decisions: customizable and adaptive technologies for assistance in healthcare. ACM Trans Interact Intell Syst 2(4)

  43. 43.

    Deleawe S, Kusznir J, Lamb B, Cook DJ (2010) Predicting air quality in smart environments. J Ambient Intell Smart Environ 2(2):145–154

  44. 44.

    Riche Y, Dodge J, Metoyer R (2010) Studying always-on electricity feedback in the home. In: International conference on human factors in computing systems, pp 1995–1998

  45. 45.

    Dinata IBPP, Hardian B (2014) Predicting smart home lighting behavior from sensors and user input using very fast decision tree with Kernel Density Estimation and improved Laplace correction. In: International conference on advanced computer science and information systems, pp 171–175

  46. 46.

    Fensel A, Tomic S, Kumar V, Stefanovic M, Aleshin SV, Novikov DO (2013) SESAME-S: Semantic smart home system for energy efficiency. Informatik-Spektrum 36(1):46–57

    Article  Google Scholar 

  47. 47.

    Gupta S, Reynolds MS, Patel SN (2010) ElectriSense: single-point sensing using EMI for electrical event detection and classification in the home. In: ACM international conference on ubiquitous computing, pp 139–148

  48. 48.

    Scott J, Brush AJB, Krumm J, Meyers B, Hazas M, Hodges S, Villar N (2011) PreHeat: controlling home heating using occupancy prediction. In: International conference on ubiquitous computing, pp 281–290

  49. 49.

    Bureau of Labor Statistics (2016) American time use survey ((Online)). http://www.bls.gov/tus/

  50. 50.

    Skubic M, Harris BH, Stone E, Ho KC, Su BY, Rantz M (2016) Testing non-wearable fall detection methods in the homes of older adults. In: IEEE international conference of the engineering in medicine and biology society, pp 557–560

  51. 51.

    Mubashir M, Shao L, Seed L (2013) A survey on fall detection: Principles and approaches. Neurocomputing 100:144–152

    Article  Google Scholar 

  52. 52.

    Noury N, Herve T, Rialle V, Virone G, Mercier E, Morey G, Moro A, Porcheron T (2000) Monitoring behavior in home using a smart fall sensor and position sensors. In: International conference on microtechnologies in medicine and bioloy, pp 607–610

  53. 53.

    Sprint G, Cook DJ (2016) Unsupervised detection and analysis of changes in everyday physical activity data. J Biomed Inform

  54. 54.

    Sprint G, Cook DJ, Fritz R, Schmitter-Edgecombe M (2016) Using smart homes to detect and analyze health events. IEEE Comput

  55. 55.

    Demiris G, Hensel BK (2010) Technologies for an aging society: a systematic review of ‘smart home’ applications. IMIA Yearb Med Inf 47(1):33–40

    Google Scholar 

  56. 56.

    Guillet S, Bouchard B, Bousouane A (2013) Correct by construction security approach to design fault tolerant smart homes for dsabled people. In: International conference on emerging ubiquitous systems and pervasive, pp 257–264

  57. 57.

    Pardo E, Espes D, Le-Parc P (2016) A framework for anomaly diagnosis in smart homes based on ontology. In: International conference on ambient systems, networks and technologies, pp 545–552

  58. 58.

    Komninos N, Philippou E, Pitsillides A (2014) Survey in smart grid and smart home security: Issues, challenges, and countermeasures. IEEE Commun Surv Tutor 16(4):1933–1954

    Article  Google Scholar 

  59. 59.

    Storm D (2015) Of 10 IoT-connected home security systems tested. 100% are full of security FAIL. computerworld.com

  60. 60.

    Hill K (2013) When ‘smart homes’ get hacked: i haunted a complete stranger’s house via the internet. Forbes (Online). http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/

  61. 61.

    Brown E (2016) Who needs the internet of things? linux.com

  62. 62.

    Ring (2016) Never miss a visitor. With ring, you’re always home (Online). https://ring.com/

  63. 63.

    Icontrol Networks (2016) Home security (Online). https://getpiper.com/howitworks/

  64. 64.

    SmartThings (2016) Discovery ways to use smartThings for monitoring and security (Online). https://www.smartthings.com/uses/monitoring-security

  65. 65.

    Zhuang X, Huang J, Potamianos G, Hasegawa-Johnson M (2009) Acoustic fall detection using Gaussian mixture models and GMM supervectors. In: IEEE international conference on acoustics, speech, and signal processing, pp 69–72

  66. 66.

    Moncrieff S, Venkatesh S, West G, Greenhill S (2007) Multi-modal emotive computing in a smart house environment. Pervas Mob Comput 3(2):79–94

    Article  Google Scholar 

  67. 67.

    Jain AK, Nandakumar K (2012) Biometric authentication: system security and user privacy. IEEE Comput 45(11):87–92

    Article  Google Scholar 

  68. 68.

    euronews (2016) Smarter home security camera recognises intrduers says maker (Online). http://www.euronews.com/2016/08/03/smarter-home-security-camera-recognises-intruders-says-maker

  69. 69.

    Andersson V, Dutra R, and R. Araujo, “Anthropometric and human gait identification using skeleton data from Kinect sensor. In: ACM Symp Appl Comput, 60–61

  70. 70.

    Helal A, Mann W, Elzabadani H, King J, Kaddourah Y, Jansen E (2005) Gator tech smart house: a programmable pervasive space. IEEE Comput Mag 64–74

  71. 71.

    Jenkins J, Ellis C (2007) Using ground reaction forces from gait analysis: body mass as a weak biometric. In: Pervasive computing, pp 251–267

  72. 72.

    Watanabe K, Kurihara Y, Tanaka H (2009) Ubiquitous health monitoring at home–sensing of human biosignals on flooring, on tatami mat, in the bathtub, and in the lavatory. IEEE Sens J 9(12):1847–1855

    Article  Google Scholar 

  73. 73.

    Matsushita N, Tajima S, Ayatsuka Y, Rekimoto J (2000) Wearable key: device for personalizing nearby environment. In: International symposium on wearable computers, pp 119–126

  74. 74.

    Venkatesh A (2008) Digital home technologies and transformation of households. Inf Syst Front 10(4):391–395

    Article  Google Scholar 

  75. 75.

    Crandall A, Cook DJ (2013) Behaviometrics for multiple residents in a smart environment. In: Human aspects in ambient intelligence, pp 55–71

  76. 76.

    Teoh C, Tan C (2010) A neural network approach towards reinforcing smart home security. In: Asia-pacific symposium on information and telecommunication technologies

  77. 77.

    Chitnis S, Deshpande N, Shalgram A (2016) An investigative study for smart home security: Issues, challenges and countermeasures. Wireless Sens Netw 8:61–68

  78. 78.

    Chitnis S, Deshpande N, Shaligram A (2016) An investigative study for smart home security: Issues, challenges and countermeasures. Wirel Sens Netw 8:61–68

    Article  Google Scholar 

  79. 79.

    Petersen J, Austin D, Kaye JA, Pavel M, Hayes TL (2014) Unobtrusive in-home detection of time spent out-of-home with applications to loneliness and physical activity. IEEE J Biomed Heal Inf 18(5):1590–1596

    Article  Google Scholar 

  80. 80.

    Dodge HH, Mattek NC, Austin D, Hayes TL, Kaye JA (2012) In-home walking speeds and variability trajectories associated with mild cognitive impairment. Neurology 78(24):1946–1952

    Article  Google Scholar 

  81. 81.

    Hodges M, Kirsch N, Newman M, Pollack M (2010) Automatic assessment of cognitive impairment through electronic observation of object usage. In: International conference on pervasive computing, pp 192–209

  82. 82.

    Dawadi P, Cook D, Schmitter-Edgecombe M (2015) Modeling patterns of activities using activity curves. Pervasive Mob Comput

  83. 83.

    Lotfi A, Mahmoud LCSM, Akhlaghinia MJ (2012) Smart homes for the elderly dementia sufferers: identification and prediction of abnormal behavior. J Ambient Intell Humaniz Comput 3:205–218

    Article  Google Scholar 

  84. 84.

    Ali H, Amalarethinam DG (2014) Detecting abnormality in activites performed by people with dementia in smart environment. Int J Comput Sci Inf Technol 5:2453–2457

    Google Scholar 

  85. 85.

    Das B, Cook DJ, Krishnan N, Schmitter-Edgecombe M (2016) One-class classification-based real-time activity error detection in smart homes. IEEE J Sel Top Signal Process

  86. 86.

    Marson D, Hebert K (2006) Functional assessment. In: Geriatric neuropsychology assessment and intervention, pp 158–189

  87. 87.

    Desai A, Grossberg G, Sheth D (2004) Activities of daily living in patients with dementia: Clinical relevance, methods of assessment and effects of treatment. CNS Drugs 18:853–875

    Article  Google Scholar 

  88. 88.

    Sonn U, Grimbyand G, Svanborg A (1996) Activities of daily living studied longitudinally between 70 and 76 years of age. Disabil Rehabil 18:91–100

    Article  Google Scholar 

  89. 89.

    Zimmerman S, Magaziner J (1995) Methodological issues in measuring the functional status of cognitively impaired nursing home residents: the use of proxies and performance-based measures. Alzheimer Dis Assoc Disord 8:S281–S290

    Google Scholar 

  90. 90.

    Barberger-Gateau P, Dartigues J, Letenneur L (1993) Four instrumental activities of daily living score as a predictor of one-year incident dementia. Age Ageing 22:457–463

    Article  Google Scholar 

  91. 91.

    Peres K, Chrysostome V, Fabrigoule C, Orgogozo J, Dartigues J, Barberger-Gateau P (2006) Restriction in complex activities of daily living in MCI. Neurology 67:461–466

    Article  Google Scholar 

  92. 92.

    Nourhashemi F, Andrieu S, Gillette-Guyonnet S, Vellas B, Albarede J, Grandjean H (2001) Instrumental activities of daily living as a potential marker of frailty: a study of 7364 community-dwelling elderly women (the EPIDOS study). J Gerontechnol 56A:M448–M453

    Google Scholar 

  93. 93.

    Cuddihy P, Weisenberg J, Graichen C, Ganesh M (2007) Algorithm to automatically detect abnormally long periods of inactivity in a home. In: ACM SIGMOBILE international workshop on systems and networking support for healthcare and assisted living environments, pp 89–94

  94. 94.

    Stone E, Skubic M (2015) Fall detection in homes of older adults using the Microsoft Kinect. IEEE J Biomed Heal Informatics 19(1):290–301

    Article  Google Scholar 

  95. 95.

    Lord SR, Sherrington C, Menz HB (2001) Falls in older people: risk factors and strategies for prevention. England, Cambridge

    Google Scholar 

  96. 96.

    Bourke AK, Klenk J, Schwickert L, Aminian K, Ihlen EAF, Mellone S, Helbostad JL, Chiari L, Becker C (2016) Fall detection algorithms for real-world falls harvested from lumbar sensors in the elderly population: a machine learning approach. In: IEEE annual international conference of the engineering in medicine and biology society, pp 1–6

  97. 97.

    Li Y, Zeng L, Popescu M, Ho KC (2010) Acoustic fall detection using a circular microphone array. In: IEEE annual international conference of the engineering in medicine and biology society, pp 2242–2245

  98. 98.

    Rougier C, Meunier J, St-Arnaud A, Rousseau J (2011) Robust video surveillance for fall detection based on human shape deformation. IEEE Trans Circ Syst Video Technol 21(5):611–622

    Article  Google Scholar 

  99. 99.

    Alwan M, Rajendran PJ, Kell S, Mack D, Dalal S, Wolfe M, Felder R (2006) A smart and passive floor-vibration based fall detector for elderly. In: IEEE international conference on information and communication technology, pp 1003–1007

  100. 100.

    Aicha AN, Englebienne G, Krose B (2014) Modeling visit behaviour in smart homes using unsupervised learning. In: ACM conference on ubiquitous computing, pp 1193–1200

  101. 101.

    Petersen J, Larimer N, Kaye JA, Pavel M, Hayes TL (2012) SVM to detect the presence of visitors in a smart home environment. In: International conference of the IEEE engineering in medicine and biology society, pp 5850–5853

  102. 102.

    Chandola V, Banerjee A, Kumar V (2009) Anomaly detection: a survey. ACM Comput Surv 41:1–15

    Article  Google Scholar 

  103. 103.

    Youngblood GM, Cook DJ (2007) Data mining for hierarchical model creation. IEEE Trans Syst Man Cybern Part C 37(4):1–12

    Article  Google Scholar 

  104. 104.

    Ordonez F, de Toldeo P, Sanchis A (2015) Sensor-based Bayesian detection of anomalous living patterns in a home setting. Pers Ubiquitous Comput 19:259–270

    Article  Google Scholar 

  105. 105.

    Haque S, Rahman M, Aziz A (2015) Sensor anomaly detection in wireless sensor networks for healthcare. Sensors 15:8764–8786

    Article  Google Scholar 

  106. 106.

    Aran O, Sanchez-Cortes D, Do MT, Gatica-Perez D (2016) Anomaly detection in elderly daily behavior in ambient sensing environments. In: Human behavior understanding, pp 51–67

  107. 107.

    Novak M (2013) Anomaly detection in user daily patterns in smart-home environment. J Sel Areas Heal Inf 3:1–11

    Google Scholar 

  108. 108.

    Virone G (2009) Assesing everday life behavioral rythms for the older generation. Pervas Mob Comput 5:606–622

    Article  Google Scholar 

  109. 109.

    Barger T, Brown D, Alwan M (2005) Health status monitoring through analysis of behavioral patterns. IEEE Trans Syst Man Cybern Part A 35(1):22–27

    Article  Google Scholar 

  110. 110.

    Ke S-R, Thuc HLU, Lee Y-J, Hwang J-N, Yoo J-H, Choi K-H (2013) A review on video-based human activity recognition. Computers 2(2):88–131

    Article  Google Scholar 

  111. 111.

    Han Y, Han M, Lee S, Sarkar AMJ, Lee Y-K (2012) A framework for supervising lifestyle diseases using long-term activity monitoring. Sensors 12:5363–5379

    Article  Google Scholar 

  112. 112.

    Williams J, Cook D (2016) Forecasting behavior in smart homes based on past sleep and wake patterns. Technol Heal Care

  113. 113.

    Mocanu E, Florea AM (2011) A model for activity recognition and emergency detection in smart environments. In: International conference on ambient computing, applications, services and technologies, pp 13–19

  114. 114.

    Cardinaux F, Brownsell S, Hawley M, Bradley D (2008) Modelling of behavioural patterns for abnormality detection in the context of lifestyle reassurance. Prog Pattern Recognit Image Anal Appl 5197:243–251

    Article  Google Scholar 

  115. 115.

    Elbert D, Storf H, Eisenbarth M, Unalan O, Schmitt M (2011) An approach for detecting deviations in daily routine for long-term behavior analysis. In: In pervasive health, pp 426–433

  116. 116.

    Mori T, Fujii A, Shimosaka M, Noguchi H, Sato T (2007) Typical behavior patterns extraction and anomaly detection algorithm based on accumulated home sensor data. In: Conference on future generation communication and networking

  117. 117.

    Hoque E, Dickerson R, Preum S, Hanson M, Barth A, Stankovic J (2015) Holmes: a comprehensive anomaly detection system for daily in-home activities. In: International conference on distributed computing in sensor systems, pp 40–51

  118. 118.

    Hoque E, Stankovic J (2012) Semantic anomaly detection in daily activities integrate expert rules for acceptable anomalies. In: ACM international joint conference on pervasive and ubiquitous computing, pp 633–634

  119. 119.

    Okeyo G, Chen L, Wang H, Sterritt R (2014) Dynamic sensor data segmentation for real-time knowledge-driven activity recognition. Pervas Mob Comput 10:155–172

    Article  Google Scholar 

  120. 120.

    Tong Y, Chen R, Gao J (2015) Hidden state conditional random field for abnormal activity recogniton in smart homes. Entropy 17:1358–1378

    Article  Google Scholar 

  121. 121.

    Dredze M, Crammer K (2008) Active learning with confidence. In: Proceedings of ACL, pp 233–236

  122. 122.

    Joshi AJ, Porikli F, Papanikolopoulos N (2009) Multi-class active learning for image classification. In: IEEE conference on computer vision and pattern recognition

  123. 123.

    Freund Y, Schapire RE (1996) Experiments with a new boosting algorithm. In: International conference on machine learning, pp 148–156

  124. 124.

    Krempl G, Kottke D, Lemaire V (2015) Optimised probabilistic active learning (OPAL) for fast, non-myopic, cost-sensitive active classification. Mach Learn 100(2):449–476

    MathSciNet  Article  MATH  Google Scholar 

  125. 125.

    Lazarevic A, Srivastava J, Kumar V (2004) Data mining for analysis of rare events: a case study in security, financial and medical applications. In: Pacific-asia conference on knowledge discovery and data mining

  126. 126.

    Harrison D, Seah W, Rayudu R (2016) Rare event detection and propagation in wireless sensor networks. ACM Comput Surv 48:58

    Article  Google Scholar 

  127. 127.

    Pelleg D, Moore AW (2004) Active learning for anomaly and rare-category detection. In: Advances in neural information processing systems, pp 1073–1080

  128. 128.

    Koh S, Ravana SD (2016) Unsupervised rare pattern mining: a survey. ACM Trans Knowl Discov Data 10(4):45

    Article  Google Scholar 

  129. 129.

    Aminikhanghahi S, Cook DJ (2016) A survey of methods for time series change point detection. Knowl Inf Syst 1–29

  130. 130.

    Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Discov 29(3):626–688

    MathSciNet  Article  Google Scholar 

  131. 131.

    Noble C, Cook DJ (2003) Graph-based anomaly detection. In: Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining

  132. 132.

    Eberle W, Holder L, Massengill B (2012) Graph-based anomaly detection applied to homeland security cargo screening. In: Florida artificial intelligence research society conference

  133. 133.

    Rayana S, Akoglu L (2016) Less is more: Building selective anomaly ensembles. ACM Trans Knowl Discov Data 10(4):42

    Article  Google Scholar 

  134. 134.

    Eberle W, Holder L (2015) Scalable anomaly detection in graphs. Intell Data Anal 19:57–74

    Google Scholar 

  135. 135.

    Cook D, Holder L, Thompson S, Whitney P, Chilton L (2009) Graph-based analysis of nuclear smuggling data. J Appl Secur Res 4(4):501–517

    Article  Google Scholar 

  136. 136.

    Chakrabarti D, Zhan Y, Blandford D, Faloutsos C, Blelloch G (2004) “NetMine: new mining tools for large graphs. In: SIAM workshop on link analysis, counter-terrorism and privacy

  137. 137.

    Efron B, Tibshirani RJ (1994) An introduction to the bootstrap. CRC Press, New York

    Google Scholar 

  138. 138.

    Fernandes E, Jung J, Prakash A (2016) Security analysis of emerging smart home applications. In: IEEE symposium on security and privacy, pp 636–654

  139. 139.

    Lee A (2013) Hacking the connected home: when your house watches you. Readwrite (Online). http://readwrite.com/2013/11/13/hacking-the-connected-home-when-your-house-watches-you&awesm=~osmDA6o9bkgx84

  140. 140.

    Clemons T (2016) Wake up call: mom learns daughters’ bedroom webcam was hacked

  141. 141.

    O’Flynn C (2016) A lightbulb worm?

  142. 142.

    Rose A, Ramsey B (2016) Picking bluetooth low energy locks from a quarter mile away. DefCon

  143. 143.

    Wang P, Chao K-M, Lo C-C, Lin W-H, Lin H-C, Chao W-J (2016) Using malware for software-defined networking-based smart home security management through a taint checking approach. Int J Distrib Sens Netw 12(8):2016

  144. 144.

    Hadid A (2014) Face biometrics under spoofing attacks: vulnerabilities, countermeasures, open issues and research directions. In: IEEE conference on computer vision and pattern recognition workshops, pp 113–118

  145. 145.

    Xu Y, Price T, Frahm JM, Monrose F (2016) Virtual u: defeating face liveness detection by building virtual models from your public photos. In: USENIX security symposium, pp 497–512

  146. 146.

    Lai C, Tai C (2016) A smart spoofing face detector by display features analysis. Sensors 16(7):1136–1150

    Article  Google Scholar 

  147. 147.

    Robles RJ, Kim T (2010) A review on security in smart home development. Int J Adv Sci Technol 15:13–22

    Google Scholar 

  148. 148.

    Xie M, Han S, Tian B, Parvin S (2011) Anomaly detection in wireless sensor networks: a survey. J Netw Comput Appl 34(4):1302–1325

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Science Foundation under Grant 121407.

Author information

Affiliations

Authors

Corresponding author

Correspondence to Diane J. Cook.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Dahmen, J., Cook, D.J., Wang, X. et al. Smart secure homes: a survey of smart home technologies that sense, assess, and respond to security threats. J Reliable Intell Environ 3, 83–98 (2017). https://doi.org/10.1007/s40860-017-0035-0

Download citation

Keywords

  • Security monitoring
  • Anomaly detection
  • Rare event identification
  • Network security
  • Smart home automation