Skip to main content

Securing the Smart Devices in Home Automation System

  • Conference paper
  • First Online:
Cyber Security, Privacy and Networking

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 370))

  • 387 Accesses

Abstract

Security is the major concern in every infrastructure such as offices, banks, hospitals, etc. Due to lack of security in the existing home automation system, hackers can easily access and collapse the system. Hence, in this research work, we are providing security to the remotely controlled home infrastructure and to reduce the energy consumption of smart devices. The smart device consists of the appliances such as four lights and two switches operated using the web-based application. This application allows only authorized users to remove these smart devices which are not in use for longer time and also the hacked devices. Thus, we are reducing energy consumption and securing our smart devices from hackers. Adding to the benefit of the user, through this application we can change the status of the devices either to on or off state. The status of the devices is stored in the cloud in the encrypted form (ciphertext) using the encryption technique such as the AES algorithm. Through the server using Wi-Fi module, this ciphertext can be accessed by the user credentials and decrypt it through web-based application. In this research work, major security issues like authentication and verification are taken care, and this work focus is on reduction of energy consumption by removing unnecessary devices and protecting the smart devices from hackers in the existing home automation system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Granjal J, Monteiro E, Sá Silva JS (2010) A secure interconnection model for IPv6 enabled wireless sensor networks. In: IFIP wireless days, Venice, pp 1–6

    Google Scholar 

  2. Cenedese A, Susto GA, Belgioioso G, Cirillo GI, Fraccaroli F (2015) Home automation oriented gesture classification from inertial measurements. IEEE Trans Autom Sci Eng 12(4):1200–1210. https://doi.org/10.1109/TASE.2015.2473659

    Article  Google Scholar 

  3. Paul S, Indragandhi V, Kumar NK, Raja Singh R, Subramaniyaswamy V (2019) An IoT based home automation system. IOP Conf Ser Mater Sci Eng 623:012014. https://doi.org/10.1088/1757-899x/623/1/012014

  4. Khan M, Din S, Jabbar S, Gohar M, Ghayvat H, Mukhopadhyay SC (2016) Context-aware low power intelligent smart home based on the Internet of Things. Comput Electr Eng 52:208–222. ISSN 0045-7906

    Google Scholar 

  5. Ting J, Yang M, Zhang Y (2012) Research and implementation of M2M smart home and security system. Secur Commun Netw 8. https://doi.org/10.1002/sec.569

  6. Han Y, Hyun J, Jeong T, Yoo J-H, Hong JW-K (2016) A smarthome control system based on context and human speech. In: 18th international conference on advanced communication technology (ICACT)

    Google Scholar 

  7. Balamurugan S, Ayyasamy A, Suresh Joseph K (2018) A review on privacy and security challenges in the Internet of Things (IoT) to protect the device and communication networks. Int J Comput Sci Inf Secur (IJCSIS) 16(6)

    Google Scholar 

  8. Chifor B-C, Bica I, Patriciu V, Pop F (2018) A security authorization scheme for smart home Internet of Things devices. Future Gener Comput Syst 740–749

    Google Scholar 

  9. Sharaf-Dabbagh Y, Saad W (2016) On the authentication of devices in the Internet of Things. In: IEEE 17th international symposium on a world of wireless, mobile and multimedia networks (WoWMoM), June 2016, pp 1–3

    Google Scholar 

  10. Salman O, Abdullah S, Elhajj IH, Chehab A, Kayssi A (2016) Identity-based authentication scheme for the Internet of Things. In: IEEE symposium on computers and communication (ISCC), June 2016, pp 1109–1111

    Google Scholar 

  11. Feng H, Fu W (2010) Study of recent development about privacy and security of the Internet of Things. In: International conference on web information systems and mining, Sanya, pp 91–95

    Google Scholar 

  12. Kuzlu M, Pipattanasomporn M, Rahman S (2012) Hardware demonstration of a home energy management system for demand response applications. IEEE Trans Smart Grid 3(4):1704–1711. https://doi.org/10.1109/TSG.2012.2216295

    Article  Google Scholar 

Download references

Acknowledgements

We would like to thank M.S Ramaiah Institute of Technology, Computer Science and Engineering for supporting this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Syeda Sabah Sultana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sultana, S.S., Sangeetha, J. (2022). Securing the Smart Devices in Home Automation System. In: Agrawal, D.P., Nedjah, N., Gupta, B.B., Martinez Perez, G. (eds) Cyber Security, Privacy and Networking. Lecture Notes in Networks and Systems, vol 370. Springer, Singapore. https://doi.org/10.1007/978-981-16-8664-1_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-8664-1_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-8663-4

  • Online ISBN: 978-981-16-8664-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics