Open Access is an initiative that aims to make scientific research freely available to all. To date our community has made over 100 million downloads. It’s based on principles of collaboration, unobstructed discovery, and, most importantly, scientific progression. As PhD students, we found it difficult to access the research we needed, so we decided to create a new Open Access publisher that levels the playing field for scientists across the world. How? By making research easy to access, and puts the academic needs of the researchers before the business interests of publishers.

We are a community of more than 103,000 authors and editors from 3,291 institutions spanning 160 countries, including Nobel Prize winners and some of the world’s most-cited researchers. Publishing on IntechOpen allows authors to earn citations and find new collaborators, meaning more people see your work not only from your own field of study, but from other related fields too.

Brief introduction to this section that descibes Open Access especially from an IntechOpen perspective

Want to get in touch? Contact our London head office or media team here

Our team is growing all the time, so we’re always on the lookout for smart people who want to help us reshape the world of scientific publishing.

Home > Books > Internet of Things (IoT) for Automated and Smart Applications

Smart Home Systems Based on Internet of Things

Submitted: 17 September 2018 Reviewed: 01 February 2019 Published: 28 February 2019

DOI: 10.5772/intechopen.84894

Cite this chapter

There are two ways to cite this chapter:

From the Edited Volume

Internet of Things (IoT) for Automated and Smart Applications

Edited by Yasser Ismail

To purchase hard copies of this book, please contact the representative in India: CBS Publishers & Distributors Pvt. Ltd. www.cbspd.com | [email protected]

Chapter metrics overview

6,870 Chapter Downloads

Impact of this chapter

Total Chapter Downloads on intechopen.com

IntechOpen

Total Chapter Views on intechopen.com

Overall attention for this chapters

Smart home systems achieved great popularity in the last decades as they increase the comfort and quality of life. Most smart home systems are controlled by smartphones and microcontrollers. A smartphone application is used to control and monitor home functions using wireless communication techniques. We explore the concept of smart home with the integration of IoT services and cloud computing to it, by embedding intelligence into sensors and actuators, networking of smart things using the corresponding technology, facilitating interactions with smart things using cloud computing for easy access in different locations, increasing computation power, storage space and improving data exchange efficiency. In this chapter we present a composition of three components to build a robust approach of an advanced smart home concept and implementation.

  • cloud computing
  • event processing
  • home appliances
  • rule-based event processing

Author Information

Menachem domb *.

  • Computer Science Department, Ashkelon Academic College, Ashkelon, Israel

*Address all correspondence to: [email protected]

1. Introduction

Classic smart home, internet of things, cloud computing and rule-based event processing, are the building blocks of our proposed advanced smart home integrated compound. Each component contributes its core attributes and technologies to the proposed composition. IoT contributes the internet connection and remote management of mobile appliances, incorporated with a variety of sensors. Sensors may be attached to home related appliances, such as air-conditioning, lights and other environmental devices. And so, it embeds computer intelligence into home devices to provide ways to measure home conditions and monitor home appliances’ functionality. Cloud computing provides scalable computing power, storage space and applications, for developing, maintaining, running home services, and accessing home devices anywhere at anytime. The rule-based event processing system provides the control and orchestration of the entire advanced smart home composition.

Combining technologies in order to generate a best of breed product, already appear in recent literature in various ways. Christos Stergioua et al. [ 1 ] merge cloud computing and IoT to show how the cloud computing technology improves the functionality of the IoT. Majid Al-Kuwari [ 2 ] focus on embedded IoT for using analyzed data to remotely execute commands of home appliances in a smart home. Trisha Datta et al. [ 3 ] propose a privacy-preserving library to embed traffic shaping in home appliances. Jian Mao et al. [ 4 ] enhance machine learning algorithms to play a role in the security in a smart home ecosystem. Faisal Saeed et al. [ 5 ] propose using sensors to sense and provide in real-time, fire detection with high accuracy.

In this chapter we explain the integration of classic smart home, IoT and cloud computing. Starting by analyzing the basics of smart home, IoT, cloud computing and event processing systems. We discuss their complementarity and synergy, detailing what is currently driving to their integration. We also discuss what is already available in terms of platforms, and projects implementing the smart home, cloud and IoT paradigm. From the connectivity perspective, the added IoT appliances and the cloud, are connected to the internet and in this context also to the home local area network. These connections complement the overall setup to a complete unified and interconnected composition with extended processing power, powerful 3rd party tools, comprehensive applications and an extensive storage space.

In the rest of this chapter we elaborate on each of the four components. In Section 1, we describe the classic smart home, in Section 2, we introduce the internet of things [IoT], in Section 3, we outline cloud computing and in Section 4, we present the event processing module. In Section 5, we describe the composition of an advanced smart home, incorporating these four components. In Section 6, we provide some practical information and relevant selection considerations, for building a practical advanced smart home implementation. In Section 7, we describe our experiment introducing three examples presenting the essence of our integrated proposal. Finally, we identify open issues and future directions in the future of advanced smart home components and applications.

2. Classic smart home overview

Smart home is the residential extension of building automation and involves the control and automation of all its embedded technology. It defines a residence that has appliances, lighting, heating, air conditioning, TVs, computers, entertainment systems, big home appliances such as washers/dryers and refrigerators/freezers, security and camera systems capable of communicating with each other and being controlled remotely by a time schedule, phone, mobile or internet. These systems consist of switches and sensors connected to a central hub controlled by the home resident using wall-mounted terminal or mobile unit connected to internet cloud services.

Smart home provides, security, energy efficiency, low operating costs and convenience. Installation of smart products provide convenience and savings of time, money and energy. Such systems are adaptive and adjustable to meet the ongoing changing needs of the home residents. In most cases its infrastructure is flexible enough to integrate with a wide range of devices from different providers and standards.

The basic architecture enables measuring home conditions, process instrumented data, utilizing microcontroller-enabled sensors for measuring home conditions and actuators for monitoring home embedded devices.

The popularity and penetration of the smart home concept is growing in a good pace, as it became part of the modernization and reduction of cost trends. This is achieved by embedding the capability to maintain a centralized event log, execute machine learning processes to provide main cost elements, saving recommendations and other useful reports.

2.1 Smart home services

2.1.1 measuring home conditions.

A typical smart home is equipped with a set of sensors for measuring home conditions, such as: temperature, humidity, light and proximity. Each sensor is dedicated to capture one or more measurement. Temperature and humidity may be measured by one sensor, other sensors calculate the light ratio for a given area and the distance from it to each object exposed to it. All sensors allow storing the data and visualizing it so that the user can view it anywhere and anytime. To do so, it includes a signal processer, a communication interface and a host on a cloud infrastructure.

2.1.2 Managing home appliances

Creates the cloud service for managing home appliances which will be hosted on a cloud infrastructure. The managing service allows the user, controlling the outputs of smart actuators associated with home appliances, such as such as lamps and fans. Smart actuators are devices, such as valves and switches, which perform actions such as turning things on or off or adjusting an operational system. Actuators provides a variety of functionalities, such as on/off valve service, positioning to percentage open, modulating to control changes on flow conditions, emergency shutdown (ESD). To activate an actuator, a digital write command is issued to the actuator.

2.1.3 Controlling home access

Home access technologies are commonly used for public access doors. A common system uses a database with the identification attributes of authorized people. When a person is approaching the access control system, the person’s identification attributes are collected instantly and compared to the database. If it matches the database data, the access is allowed, otherwise, the access is denied. For a wide distributed institute, we may employ cloud services for centrally collecting persons’ data and processing it. Some use magnetic or proximity identification cards, other use face recognition systems, finger print and RFID.

In an example implementation, an RFID card and an RFID reader have been used. Every authorized person has an RFID card. The person scanned the card via RFID reader located near the door. The scanned ID has been sent via the internet to the cloud system. The system posted the ID to the controlling service which compares the scanned ID against the authorized IDs in the database.

2.2 The main components

Sensors to collect internal and external home data and measure home conditions. These sensors are connected to the home itself and to the attached-to-home devices. These sensors are not internet of things sensors, which are attached to home appliances. The sensors’ data is collected and continually transferred via the local network, to the smart home server.

Processors for performing local and integrated actions. It may also be connected to the cloud for applications requiring extended resources. The sensors’ data is then processed by the local server processes.

A collection of software components wrapped as APIs, allowing external applications execute it, given it follows the pre-defined parameters format. Such an API can process sensors data or manage necessary actions.

Actuators to provision and execute commands in the server or other control devices. It translates the required activity to the command syntax; the device can execute. During processing the received sensors’ data, the task checks if any rule became true. In such case the system may launch a command to the proper device processor.

Database to store the processed data collected from the sensors [and cloud services]. It will also be used for data analysis, data presentation and visualization. The processed data is saved in the attached database for future use.

smart home assignment

Smart home paradigm with optional cloud connectivity.

3. Internet of things [IoT] overview

The internet of things (IoT) paradigm refers to devices connected to the internet. Devices are objects such as sensors and actuators, equipped with a telecommunication interface, a processing unit, limited storage and software applications. It enables the integration of objects into the internet, establishing the interaction between people and devices among devices. The key technology of IoT includes radio frequency identification (RFID), sensor technology and intelligence technology. RFID is the foundation and networking core of the construction of IoT. Its processing and communication capabilities along with unique algorithms allows the integration of a variety of elements to operate as an integrated unit but at the same time allow easy addition and removal of components with minimum impact, making IoT robust but flexible to absorb changes in the environment and user preferences. To minimize bandwidth usage, it is using JSON, a lightweight version of XML, for inter components and external messaging.

4. Cloud computing and its contribution to IoT and smart home

Cloud computing is a shared pool of computing resources ready to provide a variety of computing services in different levels, from basic infrastructure to most sophisticated application services, easily allocated and released with minimal efforts or service provider interaction [ 6 , 7 ]. In practice, it manages computing, storage, and communication resources that are shared by multiple users in a virtualized and isolated environment. Figure 2 depicts the overall cloud paradigm.

smart home assignment

Cloud computing paradigm.

IoT and smart home can benefit from the wide resources and functionalities of cloud to compensate its limitation in storage, processing, communication, support in pick demand, backup and recovery. For example, cloud can support IoT service management and fulfillment and execute complementary applications using the data produced by it. Smart home can be condensed and focus just on the basic and critical functions and so minimize the local home resources and rely on the cloud capabilities and resources. Smart home and IoT will focus on data collection, basic processing, and transmission to the cloud for further processing. To cope with security challenges, cloud may be private for highly secured data and public for the rest.

IoT, smart home and cloud computing are not just a merge of technologies. But rather, a balance between local and central computing along with optimization of resources consumption. A computing task can be either executed on the IoT and smart home devices or outsourced to the cloud. Where to compute depends on the overhead tradeoffs, data availability, data dependency, amount of data transportation, communications dependency and security considerations. On the one hand, the triple computing model involving the cloud, IoT and smart home, should minimize the entire system cost, usually with more focus on reducing resource consumptions at home. On the other hand, an IoT and smart home computing service model, should improve IoT users to fulfill their demand when using cloud applications and address complex problems arising from the new IoT, smart home and cloud service model.

Some examples of healthcare services provided by cloud and IoT integration: properly managing information, sharing electronic healthcare records enable high-quality medical services, managing healthcare sensor data, makes mobile devices suited for health data delivery, security, privacy, and reliability, by enhancing medical data security and service availability and redundancy and assisted-living services in real-time, and cloud execution of multimedia-based health services.

5. Centralized event processing, a rule-based system

Smart home and IoT are rich with sensors, which generate massive data flows in the form of messages or events. Processing this data is above the capacity of a human being’s capabilities [ 8 , 9 , 10 ]. Hence, event processing systems have been developed and used to respond faster to classified events. In this section, we focus on rule management systems which can sense and evaluate events to respond to changes in values or interrupts. The user can define event-triggered rule and to control the proper delivery of services. A rule is composed of event conditions, event pattern and correlation-related information which can be combined for modeling complex situations. It was implemented in a typical smart home and proved its suitability for a service-oriented system.

The system can process large amounts of events, execute functions to monitor, navigate and optimize processes in real-time. It discovers and analyzes anomalies or exceptions and creates reactive/proactive responses, such as warnings and preventing damage actions. Situations are modeled by a user-friendly modeling interface for event-triggered rules. When required, it breaks them down into simple, understandable elements. The proposed model can be seamlessly integrated into the distributed and service-oriented event processing platform.

The evaluation process is triggered by events delivering the most recent state and information from the relevant environment. The outcome is a decision graph representing the rule. It can break down complex situations to simple conditions, and combine them with each other, composing complex conditions. The output is a response event raised when a rule fires. The fired events may be used as input for other rules for further evaluation. Event patterns are discovered when multiple events occur and match a pre-defined pattern. Due to the graphical model and modular approach for constructing rules, rules can be easily adapted to domain changes. New event conditions or event patterns can be added or removed from the rule model. Rules are executed by event services, which supply the rule engine with events and process the evaluation result. To ensure the availability of suitable processing resources, the system can run in a distributed mode, on multiple machines and facilitate the integration with external systems, as well. The definition of relationships and dependencies among events that are relevant for the rule processing, are performed using sequence sets, generated by the rule engine. The rule engine constructs sequences of events relevant to a specific rule condition to allow associating events by their context data. Rules automatically perform actions in response when stated conditions hold. Actions generate response events, which trigger response activities. Event patterns can match temporal event sequences, allowing the description of home situations where the occurrences of events are relevant. For example, when the door is kept open too long.

The following challenges are known with this model: structure for the processed events and data, configuration of services and adapters for processing steps, including their input and output parameters, interfaces to external systems for sensing data and for responding by executing transactions, structure for the processed events and data, data transformations, data analysis and persistence. It allows to model which events should be processed by the rule service and how the response events should be forwarded to other event services. The process is simple: data is collected and received from adapters which forward events to event services that consume them. Initially the events are enriched to prepare the event data for the rule processing. For example, the response events are sent to a service for sending notifications to a call agent, or to services which transmit event delay notifications and event updates back to the event management system.

5.1 Event processing languages

Event processing is concerned with real-time capturing and managing pre-defined events. It starts from managing the receptors of events right from the event occurrence, even identification, data collection, process association and activation of the response action. To allow rapid and flexible event handling, an event processing language is used, which allows fast configuration of the resources required to handle the expected sequence of activities per event type. It is composed of two modules, ESP and CEP. ESP efficiently handles the event, analyzes it and selects the appropriate occurrence. CEP handles aggregated events. Event languages describe complex event-types applied over the event log.

5.2 Rediscovering workflow from events

In some cases, rules relate to discrepancies in a sequence of events in a workflow. In such cases, it is mandatory to precisely understand the workflow and its associated events. To overcome this, we propose a reverse engineering process to automatically rediscover the workflows from the events log collected over time, assuming these events are ordered, and each event refers to one task being executed for a single case. The rediscovering process can be used to validate workflow sequences by measuring the discrepancies between prescriptive models and actual process executions. The rediscovery process consists of the following three steps: (1) construction of the dependency/frequency table. (2) Induction of dependency/frequency graphs. (3) Generating WF-nets from D/F-graphs.

6. Advanced smart home

In this section, we focus on the integration of smart home, IoT and cloud computing to define a new computing paradigm. We can find in the literature section [ 11 , 12 , 13 , 14 ] surveys and research work on smart home, IoT and cloud computing separately, emphasizing their unique properties, features, technologies, and drawbacks. However, our approach is the opposite. We are looking at the synergy among these three concepts and searching for ways to integrate them into a new comprehensive paradigm, utilizing its common underlying concepts as well as its unique attributes, to allow the execution of new processes, which could not be processed otherwise.

Figure 3 depicts the advanced smart-home main components and their inter-connectivity. On the left block, the smart home environment, we can see the typical devices connected to a local area network [LAN]. This enables the communication among the devices and outside of it. Connected to the LAN is a server and its database. The server controls the devices, logs its activities, provides reports, answers queries and executes the appropriate commands. For more comprehensive or common tasks, the smart home server, transfers data to the cloud and remotely activate tasks in it using APIs, application programming interface processes. In addition, IoT home appliances are connected to the internet and to the LAN, and so expands smart home to include IoT. The connection to the internet allows the end user, resident, to communicate with the smart home to get current information and remotely activate tasks.

smart home assignment

Advanced smart home—integrating smart home, IoT and cloud computing.

To demonstrate the benefits of the advanced smart home, we use RSA, a robust asymmetric cryptography algorithm, which generates a public and private key and encrypts/decrypts messages. Using the public key, everyone can encrypt a message, but only these who hold the private key can decrypt the sent message. Generating the keys and encrypting/decrypting messages, involves extensive calculations, which require considerable memory space and processing power. Therefore, it is usually processed on powerful computers built to cope with the required resources. However, due to its limited resources, running RSA in an IoT device is almost impossible, and so, it opens a security gap in the Internet, where attackers may easily utilize. To cope with it, we combine the power of the local smart home processors to compute some RSA calculations and forward more complicated computing tasks to be processed in the cloud. The results will then be transferred back to the IoT sensor to be compiled and assembled together, to generate the RSA encryption/decryption code, and so close the mentioned IoT security gap. This example demonstrates the data flow among the advanced smart home components. Where, each component performs its own stack of operations to generate its unique output. However, in case of complicated and long tasks it will split the task to sub tasks to be executed by more powerful components. Referring to the RSA example, the IoT device initiates the need to generate an encryption key and so, sends a request message to the RSA application, running in the smart home computer. The smart home computer then asks the “prime numbers generation” application running on cloud, to provide p and q prime numbers. Once p and q are accepted, the encryption code is generated. In a later stage, an IoT device issues a request to the smart home computer to encrypt a message, using the recent generated RSA encryption key. The encrypted message is then transferred back to the IoT device for further execution. A similar scenario may be in the opposite direction, when an IoT device gets a message it may request the smart home to decrypt it.

To summarize, the RSA scenarios depict the utilization of the strength of the cloud computing power, the smart home secured computing capabilities and at the end the limited power of the IoT device. It proves that without this automatic cooperation, RSA would not be able to be executed at the IoT level.

A more practical example is where several detached appliances, such as an oven, a slow cooker and a pan on the gas stove top, are active in fulfilling the resident request. The resident is getting an urgent phone call and leaves home immediately, without shutting off the active appliances. In case the relevant IoTs have been tuned to automatically shut down based on a predefined rule, it will be taken care at the IoT level. Otherwise, the smart home realizes the resident has left home [the home door has been opened and then locked, the garage has been opened, the resident’s car left, the main gate was opened and then closed, no one was at home] and will shut down all active devices classified as risk in case of absence. It will send an appropriate message to the mailing list defined for such an occasion.

7. Practical aspects and implementation considerations for IoT and smart home

Smart home has three components: hardware, software and communication protocols. It has a wide variety of applications for the digital consumer. Some of the areas of home automation led IoT enabled connectivity, such as: lighting control, gardening, safety and security, air quality, water-quality monitoring, voice assistants, switches, locks, energy and water meters.

Advanced smart home components include: IoT sensors, gateways, protocols, firmware, cloud computing, databases, middleware and gateways. IoT cloud can be divided into a platform-as-a-service (PaaS) and infrastructure-as-a-service (IaaS). Figure 4 demonstrates the main components of the proposed advanced smart home and the connection and data flow among its components.

smart home assignment

Advanced smart home composition.

The smart home application updates the home database in the cloud to allow remote people access it and get the latest status of the home. A typical IoT platform contains: device security and authentication, message brokers and message queuing, device administration, protocols, data collection, visualization, analysis capabilities, integration with other web services, scalability, APIs for real-time information flow and open source libraries. IoT sensors for home automation are known by their sensing capabilities, such as: temperature, lux, water level, air composition, surveillance video cameras, voice/sound, pressure, humidity, accelerometers, infrared, vibrations and ultrasonic. Some of the most commonly used smart home sensors are temperature sensors, most are digital sensors, but some are analog and can be extremely accurate. Lux sensors measure the luminosity. Water level ultrasonic sensors.

Float level sensors offer a more precise measurement capability to IoT developers. Air composition sensors are used by developers to measure specific components in the air: CO monitoring, hydrogen gas levels measuring, nitrogen oxide measure, hazardous gas levels. Most of them have a heating time, which means that it requires a certain time before presenting accurate values. It relies on detecting gas components on a surface only after the surface is heated enough, values start to show up. Video cameras for surveillance and analytics. A range of cameras, with a high-speed connection. Using Raspberry Pi processor is recommended as its camera module is very efficient due to its flex connector, connected directly to the board.

Sound detectors are widely used for monitoring purposes, detecting sounds and acting accordingly. Some can even detect ultra-low levels of noise, and fine tune among various noise levels.

Humidity sensors sense the humidity levels in the air for smart homes. Its accuracy and precision depend on the sensor design and placement. Certain sensors like the DHT22, built for rapid prototyping, will always perform poorly when compared to high-quality sensors like HIH6100. For open spaces, the distribution around the sensor is expected to be uniform requiring fewer corrective actions for the right calibration.

Smart home communication protocols: bluetooth, Wi-Fi, or GSM. Bluetooth smart or low energy wireless protocols with mesh capabilities and data encryption algorithms. Zigbee is mesh networked, low power radio frequency-based protocol for IoT. X10 protocol that utilizes powerline wiring for signaling and control. Insteon, wireless and wireline communication. Z-wave specializes in secured home automation. UPB, uses existing power lines. Thread, a royalty-free protocol for smart home automation. ANT, an ultra-low-power protocol for building low-powered sensors with a mesh distribution capability. The preferred protocols are bluetooth low energy, Z-wave, Zigbee, and thread. Considerations for incorporating a gateway may include: cloud connectivity, supported protocols, customization complexity and prototyping support. Home control is composed of the following: state machine, event bus, service log and timer.

Modularity: enables the bundle concept, runtime dynamics, software components can be managed at runtime, service orientation, manage dependencies among bundles, life cycle layer: controls the life cycle of the bundles, service layers: defines a dynamic model of communication between various modules, actual services: this is the application layer. Security layer: optional, leverages Java 2 security architecture and manages permissions from different modules.

OpenHAB is a framework, combining home automation and IoT gateway for smart homes. Its features: rules engine, logging mechanism and UI abstraction. Automation rules that focus on time, mood, or ambiance, easy configuration, common supported hardware:

Domoticz architecture: very few people know about the architecture of Domoticz, making it extremely difficult to build applications on it without taking unnecessary risks in building the product itself. For example, the entire design of general architecture feels a little weird when you look at the concept of a sensor to control to an actuator. Building advanced applications with Domoticz can be done using OO based languages.

Deployment of blockchain into home networks can easily be done with Raspberry Pi. A blockchain secured layer between devices and gateways can be implemented without a massive revamp of the existing code base. Blockchain is a technology that will play a role in the future to reassure them with revolutionary and new business models like dynamic renting for Airbnb.

8. Smart home and IoT examples

We can find in the literature and practical reports, many implementations of various integrations among part of the main three building blocks, smart home, IoT and cloud computing. For example, refer to [ 12 – 14 ]. In this section we outline three implementations, which clearly demonstrate the need and the benefits of interconnecting or integrating all three components, as illustrated in Figure 5 . Each component is numbered, 1–6. In the left side, we describe for each implementation, the sequence of messages/commands among components, from left to right and from bottom up. Take for example the third implementation, a control task constantly runing at the home server (2) discovers the fact that all residents left home and automatically, initiates actuators to shut down all IoT appliances (3), then it issues messages to the relevant users/residents, updating them about the situation and the applied actions it took (6).

smart home assignment

Advanced smart home implementations chart.

The use of (i) in the implementations explanation, corresponds to the circled numbers in Figure 5 .

8.1 Discovery of water leaks and its prevention

First step is deploying water sensors under every reasonable potential leak source and an automated master water valve sensor for the whole house, which now means the house is considered as an IoT.

In case the water sensor detects a leak of water (3), it sends an event to the hub (2), which triggers the “turn valve off” application. The home control application then sends a “turn off” command to all IoT (3) appliances defined as sensitive to water stopping and then sends the “turn off” command to the main water valve (1). An update message is sent via the messaging system to these appearing in the notification list (6). This setup helps defending against scenarios where the source of the water is from the house plumbing. The underlying configuration assumes an integration via messages and commands between the smart home and the IoT control system. It demonstrates the dependency and the resulting benefits of combining smart home and IoT.

8.2 Smoke detectors

Most houses already have the typical collection of smoke detectors (1), but there is no bridge to send data from the sensor to a smart home hub. Connecting these sensors to a smart home app (2), enables a comprehensive smoke detection system. It is further expanded to notify the elevator sensor to block the use of it due to fire condition (1), and so, it is even further expanded to any IoT sensor (3), who may be activated due to the detected smoke alert.

In [ 5 ] they designed a wireless sensor network for early detection of house fires. They simulated a fire in a smart home using the fire dynamics simulator and a language program. The simulation results showed that the system detects fire early.

8.3 Incident management to control home appliances

Consider the scenario where you leave home while some of the appliances are still on. In case your absence is long enough, some of the appliances may over heat and are about to blowout. To avoid such situations, we connect all IoT appliances’ sensors to the home application (2), so that when all leave home it will automatically adjust all the appliances’ sensors accordingly (3), to avoid damages. Note that the indication of an empty home is generated by the Smart Home application, while the “on” indication of the appliance, is generated by IoT. Hence, this scenario is possible due to the integration between smart home and IoT systems.

9. Conclusions and summary

In this chapter we described the integration of three loosely coupled components, smart home, Iot, and cloud computing. To orchestrate and timely manage the vast data flow in an efficient and balanced way, utilizing the strengths of each component we propose a centralized real time event processing application.

We describe the advantages and benefits of each standalone component and its possible complements, which may be achieved by integrating it with the other components providing new benefits raised from the whole compound system. Since these components are still at its development stage, the integration among them may change and provide a robust paradigm that generates a new generation of infrastructure and applications.

As we follow-up on the progress of each component and its corresponding impact on the integrated compound, we will constantly consider additional components to be added, resulting with new service models and applications.

  • 1. Stergioua C, Psannis KE, Kimb B-G, Gupta B. Secure Integration of IoT and Cloud Computing. Elsevier, Future Generation Computer Systems, Vol. 78. Part 3. January 2018. pp. 964-975
  • 2. Al-Kuwari M, Ramadan A, Ismael Y, Al-Sughair L, Gastli A, Benammar M. Smart-Home Automation Using IoT-Based Sensing and Monitoring Platform, IEEE. 2018. Available from: ieeexplore.ieee.org
  • 3. Datta T, Apthorpe N, Feamster N. Developer-friendly library for smart home IoT privacy-preserving traffic obfuscation, IoT S&P 18. In: Proceedings of the 2018 Workshop on IoT Security and Privacy. ACM; 2018. pp. 43-48
  • 4. Mao J, Lin Q , Bian J. Application of Learning Algorithms in Smart Home IoT System Security. American Institute of Mathematical Sciences; 2018. DOI: 10.3934/mfc.2018004
  • 5. Saeed F, Paul A, Rehman A, Hong WH, Seo H. IoT-based intelligent modeling of smart home environment for fire prevention and safety. Journal of Sensor and Actuator Networks. 2018; 7 (1):11. DOI: 10.3390/jsan7010011
  • 6. Botta A, de Donato W, Persico V, Pescapé A. Integration of cloud computing and internet of things: A survey. Future Generation Computer Systems. 2016; 56 :684-700
  • 7. Soliman M, Abiodun T, Hamouda T, Zhou J, Lung C-H. Smart home: Integrating internet of things with web services and cloud computing. In: International Conference on Cloud Computing Technology and Science; IEEE. 2013
  • 8. Paschke A, Kozlenkov A. Rule-Based Event Processing and Reaction Rules. London: Betfair Ltd; 2009. DOI: 10.1007/978-3-642-04985-9_8
  • 9. Khan NS, Ghani S, Haider S. Real-time analysis of a sensor’s data for automated decision making in an IoT-based smart home. Sensors. 2018; 18 :1711. DOI: 10.3390/s18061711
  • 10. Malik R, Parameswaran N, Ghose U. Rule based event management systems. In: Proceedings of the 25th International Florida Artificial Intelligence Research Society Conference. Association for the Advancement of Artificial Intelligence; 2012
  • 11. Vinodhan D, Vinnarasi A. IOT based smart home. International Journal of Engineering and Innovative Technology (IJEIT). 2016; 5 (10):35-38
  • 12. Jian MS, Wu JY, Chen JY, Li YJ, Wang YC, Xu HY. IOT Base Smart Home Appliances by Using Cloud Intelligent Tetris Switch; 19-22 February 2017; ICACT, ISBN 978-89-968650-9-4, 2017
  • 13. Risteska Stojkoska BL, Trivodaliev KV. A review of internet of things for smart home: Challenges and solutions. Journal of Cleaner Production. Part 3. 2017 January 1; 140 (3):1454-1464
  • 14. Lia B, Yub J. Research and application on the smart home based on component technologies and internet of things. Elsevier, Procedia Engineering; Vol. 15. 2011. pp. 2087-2092. 2011:1877-7058. DOI: 10.1016/j.proeng.2011.08.390

© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution 3.0 License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Continue reading from the same book

Published: 27 November 2019

By Mohammed Dauwed and Ahmed Meri

2314 downloads

By Thierry Edoh and Jules Degila

1798 downloads

By Jesús Jaime Moreno Escobar, Oswaldo Morales Matamo...

995 downloads

  • Smart Home /
  • How to start a smart home using Home Assistant

If you’re a tech nerd, then Home Assistant may be the smart home ecosystem for you.

By Chris Person

Share this story

If you buy something from a Verge link, Vox Media may earn a commission. See our ethics statement.

smart home assignment

There is a certain flavor of tech nerd that needs direct, unadulterated access to whatever they are working with. Most of these people are Linux users, can own several Raspberry Pis, can’t stand it when something comes in between them and their hardware, and will take whatever complex path they need to interface directly with it. I am one of these people, and I am only getting worse over time, which is why I have converted my smart home to Home Assistant , the home automation solution for true freaks.

Now, many “normal” people out there are satisfied with Apple Home, Google Home, Amazon Alexa, and the like, and I understand. These ecosystems are easy to use, require very minimal setup, and (for the most part) they “just work.” Apple Home, in particular, works great if you have multiple Apple devices. But get demanding enough, and you will hit walls, little compatibility issues, annoying limitations, and various other roadblocks that come from being in a walled garden. Home Assistant addresses that by being open source, flexible, and limited only to whatever people want to develop around it. If you can think of a smart home product, a sensor or switch or light, it’s very likely that one or more frustrated nerds figured out how to get it to work using Home Assistant several years ago.

Home Assistant started as a Python application back in 2013 and has quickly evolved over time into the go-to solution for fans of open-source software. Unlike other smart home systems, it can be installed on tons of devices like single-board computers (which includes Raspberry Pi devices and easier-to-get hardware like the Odroid N2 Plus ) as well as other network devices. For a while, I had Home Assistant running on a Docker container on NAS, but eventually, I put it on its own Pi. 

You can also buy hardware specifically for Home Assistant, like the Home Assistant Yellow , and they even offer a dongle called the SkyConnect for Zigbee and Thread support. Home Assistant is funded by Nabu Casa, an optional Home Assistant cloud computing service . 

Home Assistant Yellow

I have found that Home Assistant offers the greatest amount of compatibility with the devices in my home. If you can think of a scenario for your smart home gear, you can probably script your way to it. You can make any button or switch (provided you can find a compatible blueprint) trigger any other device in your household in excruciating detail. You can have specific conditions based on any number of very tiny criteria and external factors. If you really wanna get twisted, you can create an elaborate flow chart using something like Node-RED , a development tool originally made by IBM that has been adapted to Home Assistant specifically for just such depraved uses.

For example, not only was I able to program every light in my house, but I was also able to program one of my light switches to play audio through my speakers from the episode of Family Guy where Peter Griffin has to explain why he did not care for the movie The Godfather (“it insists upon itself”). Another example: fellow Verge -er Chris Grant took a cue from this Hackaday post and made a secret bookshelf switch that turns on his fireplace. 

Most people will never need that functionality, but for me, the freedom to do something that inane with my gear is absolutely vital. What’s more, I want as few people holding the keys to my home as possible, and so self-hosting my home automation is absolutely crucial. I don’t want Jeff Bezos knowing anything about my home activities aside from the countless reams of consumer spending data he already has on me and everyone reading this.

Ready, set, start

If you want to get started with Home Assistant, you can’t go wrong with a Raspberry Pi 4 , provided you can find one. But given the relative unavailability of Raspberry Pis even now, an Odroid N2 Plus is probably your best bet (this is what the developers currently recommend). Basic installation is pretty straightforward as far as these things go and far less intensive than most single-board computer projects. 

For example, with the Odroid, you’re going to need your little computer, your boot medium (usually a flash card but sometimes an EMMC), and a program called Balena Etcher . From there, you can flash your card via an URL, put that flashed medium into your SBC (single board computer) when you are done, connect that bad boy to your router, and let it set up. You should be able to access Home Assistant from any browser or phone, provided you are connected to the network. Connecting externally or via the cloud is an entirely different topic, although Nabu Casa is available if you don’t want to figure out remote access .

Once you have Home Assistant set up and connected to your network, the sky’s the limit for what’s possible. Do you already have Wi-Fi or Zigbee light bulbs? Home Assistant can work with them. In my case, I can group together my Hue lights, my Elgato Key Lights , and some fixtures I soldered together from scratch using WLED into scenes and automations. I used an integration called ZHA (Zigbee Home Automation) and the SkyConnect to negate the need for my original Hue hub.

One of the first things I did when I got Home Assistant set up was to automate my office lights using a human presence sensor I got on Aliexpress for 25 bucks. Unlike a motion sensor, a human presence sensor is sensitive enough to detect not only when you’re in a room but also when you’re in there and not moving. I currently have it set to turn all my lights on in the office with a brightness and color temperature that is time-dependent. It works very well. I don’t even use the light switch in there anymore, although the sensor is so sensitive that it occasionally detects human presence through the wall and in the hallway adjacent to the office itself. I have no idea why it does that, and my girlfriend finds it very funny.

Box and small white sensor.

I can control everything using the handy Home Assistant app or just via my browser if I want. The UI out of the box is not the slickest around, but it’s functional and allows for tons of customization. Home Assistant is able to talk to my many Airplay 2 devices, it can play media from my home server via DLNA, and if I want to expand it further, there’s an entire ocean of gadgets on Aliexpress that I can get to flesh it out. I actually bought a CO2 and air quality sensor for it that I’ve been meaning to build. There isn’t really much in my house with Wi-Fi or Zigbee that is outside of its reach. If I ever end up in a situation where owning a house with solar panels is possible, Home Assistant could be used to manage them . 

Help from the enthusiasts

I have written about my experience setting up Home Assistant before, but much of it involved taking the smart home ecosystem I had cobbled together over the years and ripping it apart to rebuild from scratch. When it was all said and done, it felt great. But I am not going to say it was a painless ordeal. Much of what makes Home Assistant work is built by enthusiasts, so if a device doesn’t work out of the gate, very often, someone in the Home Assistant Community will create a blueprint to fill the gap. 

While this is not the most complicated thing you will have to set up, it’s an additional layer to deal with and a far cry from the native support of other ecosystems. Little touches, like transitions between lighting scenes, need to be created manually. You need to know exactly what you are doing and why you’re doing it. This is especially true if you sink your teeth into the Home Assistant Community Store , a very powerful integration that adds tons of options if you really want to take the training wheels off.

To give Home Assistant credit, it has gotten much better and more intuitive over the years, but again, it is not frictionless. I wish that it was a little less difficult to make the UI more attractive (although I’ve found that Mushroom looks very elegant), and while I am the kind of person that loves scripting, it can be a little tedious at the end of the day. Better and more intuitive integration into community elements would be nice, but I mostly have it set up now, so I am not really complaining. That said, would I trust a clueless family member with only basic tech knowledge to be able to work with Home Assistant if I set it up for them? Probably not.

While there isn’t a lot that Home Assistant can’t do with enough elbow grease, there are ways it could be more inviting. It’s still a lot of manual work, and it has the highest barrier to entry. But on some level, what do you expect? If anything, it’s less about what I want out of Home Assistant but rather what I want out of hardware makers. While Home Assistant can be made to work with nearly anything, a more robust ecosystem of hardware that works out of the box (like Skyconnect) would make recommending it to people an easier sell. 

I would love a world where an open-source smart home was so simple and intuitive that a not-tech-inclined person could set it up easily. It would make me so happy for Home Assistant to be so ubiquitous that most hardware manufacturers have to support it instead of the other way around (although with Matter, that is less of an issue). I hope that Home Assistant becomes so robust and popular that I can recommend it to someone without having (or getting) to explain, in detail, what a Raspberry Pi is.

That’s a nice future to imagine, but currently, Home Assistant is still strictly for the real freaks, which is convenient — because that’s a fitting description of me.

Apple fans are starting to return their Vision Pros

The text file that runs the internet, wyze cameras let some owners see into a stranger’s home — again, the shine comes off the vision pro, apple will reportedly face a $539 million fine over spotify’s antitrust complaint.

Sponsor logo

More from Smart homes for smart people

Smart home 101.

  • How to pick a smart home platform
  • From brilliant to basic, here are our smart home setups
  • What is a smart home, and do you need one?
  • How to start a smart home using Google Home
  • How to start a smart home using Samsung SmartThings
  • How to start a smart home using Amazon Alexa
  • How to start a smart home using Apple Home
  • To worry or not to worry: answering questions about smart home security
  • Inside one couple’s state-of-the-art smart starter home

Advertiser content from Home Depot

Self-Assessment

Not sure where to begin with smart home technology? This self-assessment can help you identify what you want to do and plan for your smart home. It will prompt you to think about:

  • Your goals, strengths, and challenges
  • Your home environment
  • The supports you already have in place

Use your answers to this self-assessment as a guide when consulting with your support team to steer the planning of your smart home.

*This self-assessment is also available in Spanish: Hogares Inteligentes de Forma Sencilla: Herramienta de autoevaluación

Please fill out the following form to be directed to the download page. We keep all of your information completely private.

If you have difficulty using this form, please contact us by email at  [email protected]  or by phone at 484-674-0506, and we will gladly email you the PDF.

  • First Name *
  • Last Name *
  • Organization/Company
  • How did you hear about this resource?
  • Please sign me up to receive the PATF newsletter.

smart home assignment

DIY Smart Home Automation Using Android

license

Introduction: DIY Smart Home Automation Using Android

DIY Smart Home Automation Using Android

  • Increase your independence and give you greater control of your home environment.
  • Make it easier to communicate with your family.
  • Save you time and effort.
  • Improve your personal safety.
  • Reduce your heating and cooling costs.
  • Increase your home’s energy efficiency.
  • Alert you audibly and visually to emergency situations.
  • Allow you to monitor your home while you are away.
  • Control upto four home appliances wirelessly (expandable based on free IO pins).
  • Monitor status of your home like temperature inside and outside of your home,light intensity inside and outside of your home, motion (presence) on the main entrance,LPG leak in the home and status of you main door.
  • Open/close your main door electrically and wirelessly.
  • As the android application is password protected ,it automatically adds security to your home as it can be controlled by the user only.
  • Automate your indoor lightening, outdoor lightening and fan/AC to switch ON/OFF automatically when the light intensity and temperature conditions exceed the programmed threshold values.(This feature, we named it “SENSOMATE”).
  • It automatically monitor your home against LPG leaks and cases of fire.If it detects something wrong, it automatically switches off all home appliances instantly and immediately opens the door to let the LPG/fire exhaust off your home.
  • Has a “SLEEP MODE” , once activated will switch your light off and program the motion sensor and door sensor to raise alarm if anything goes wrong.
  • At last, as it uses Bluetooth the user can use the android phone within a range from 10-100m .

Step 1: What We Proposed : the Solution

What We Proposed : the Solution

  • Use five sensors to monitor the state of home namely temperature, light intensity,motion, LPG leak and door/window status.
  • Use a host device that will be mounted on wall and will have connection to all your home appliances like lights, fans, etc and to all the sensors.
  • Use “ANDROID” based smartphone, tablets as the user interface and control panel.
  • The ANDROID client will use bluetooth to wirelessly connect to the host device.
  • Simply logging in the android application will grant access to the user to control and automate his home wirelessly.

Step 2: BLOCK DIAGRAM

BLOCK DIAGRAM

The block diagram of the project is shown if figure above. The main heart of the project that do all data processing and decision making is the microcontroller. Here it serves the purpose of data acquisition from the sensors and comparing then with the programmed values stored in the microcontroller’s EEPROM and then actuating the devices accordingly. A 16x2 character LCD is used for displaying the messages,  appliance state and sensor readings. It is directly connected to the microcontroller in 4-bit addressable mode. Whenever a new action or event is raised like fire alarm, LPG leak, etc it is displayed on the LCD too. Next we have the Bluetooth UART module connected to the serial port of the microcontroller. It act as an access point for the android client on the another side and logically it act as complete serial cable replacement for the serial port. The data is exchanged serially between the two devices. A LINK status pin to the microcontroller from the Bluetooth UART tells it that the android client is successfully connected to the host. Next, to control two light one inside and other outside the home , a fan/AC and a television we have four relays connected to the microcontroller via the NPN transistor based buffer circuit. The relays consume a lot current while being activated and the microcontroller on any pin can source only 20mA of current so a buffer circuit is utmost indispensable between the relay and the controller. There are five types of sensors used in the project those are being directly interfaced to the microcontroller. To sense the light intensity we use two LDR sensors that is light dependent resistors interfaced to the ADC input of the microcontroller. To sense the temperature we used two solid state semiconductor temperature sensors from analog devices also interfaced to the ADC input of the microcontroller. To sense the LPG leak in the home we used the MQ-5 LPG sensor and it is interface to the ADC input of the microcontroller. After them, we used a hook switch to sense the door whether it is opened or closed. This sensor is connected to the digital input of the microcontroller pulled up externally. To sense the presence and motion we used the PIR (Pyroelectric InfraRed) sensor that has a digital output and it is also connected to the digital input of the microcontroller pulled up externally. The main door is driven by the geared DC motor and as it has to close and open the door, it has to be moved bi-direcionally. To do so, we used the NPN transistor based H-bridge bidirectional motor driver circuit interfaced to the digital output of the microcontroller. The microcontroller can digitally control the motion and direction of the motor to open and close the door. A software feedback is implemented between the motor and the door hook sensor output so that when the door reaches its max position and is being shut the motor stops driving the motor to prevent any damage.

Step 3: The Circuit Diagram

The Circuit Diagram

The circuit diagram of the project is shown above in figure above. The starting from the power supply section, we have the 9V AC input from the secondary output of the transformer. This is the fed to the bridge rectification section that converts AC supply into DC supply. This is done by four 1N4007, 1 A diodes in bridge configuration. Then on the DC output of this section a large capacitor (1000uF, 16V)  and another small 100nF capacitor is there to filter the DC supply and remove off all AC components from it. This is because here we are operating pre digital circuitry that fails to operate on unregulated and unfiltered supply. After the DC supply is being filtered as it is unregulated is turned into a regulated 5V DC supply using LM7805 regulator. Again after that a small 100nF capacitor is there to filter the regulated DC supply. A regulated 3.3 volt supply is also derived from another regulator that is the UA78M33 whose input is fed from the regulated 5V output of the LM7805 voltage regulator. Regulated 5 volt supply is needed to drive the microcontroller, relays and all the sensors, while a regulated 3.3 volt is required by the Bluetooth UART module to operate. After that the regulated supply is fed to all the sensors ,relays and the microcontroller. There are five types of sensors used in the project those are being directly interfaced to the microcontroller. To sense the light intensity we use two LDR sensors that is light dependent resistors interfaced to the ADC input of the microcontroller. One pin of the LDR is connected to Vcc via a 330K resistor and other tied to ground. This creates a potential difference in between of the circuit and is fed to pin A.3 and A.2 of the microcontroller respectively. To sense the temperature we used two solid state semiconductor temperature sensors from analog devices also interfaced to the ADC input of the microcontroller. The two pins are connected to the power supply to power the sensors and the third pin is the output pin is connected to the ADC7 and ADC6 channel of the microcontroller. To sense the LPG leak in the home we used the MQ-5 LPG sensor and it is interface to the ADC5 channel input of the microcontroller. When an LPG leak is detected the output of the LPG sensor decrease gradually and that is being sensed by the ADC of the microcontroller. After them, we used a hook switch to sense the door whether it is opened or closed. This sensor is connected to the digital input pin D.7 of the microcontroller pulled up externally.Whe the door is closed, the hook switch is closed and the output is logic low as it bypasses the ground. When the door is open, the hool switch is also open and it bypasses logic1 throught 10k resistor to the output. To sense the presence and motion we used the PIR (Pyroelectric InfraRed) sensor that has a digital output and it is also connected to the digital input (pinA.4) of the microcontroller pulled up externally. When a motion is detected ,the output goes high for a few seconds and comes back to low in case of absence of motion. The main door is driven by the geared DC motor and as it has to close and open the door, it has to be moved bi-direcionally. To do so, we used the four BC107 NPN transistor based H-bridge bidirectional motor driver circuit interfaced to the digital output of the microcontroller. The microcontroller can digitally control the motion and direction of the motor to open and close the door. To display messages and sensor values a 16x2 character LCD is used in 4 bit mode to portB of the microcontroller. The H-bridge circuit is used to drive a DC motor in both the directions. It can also use relays to function but here we used the BJT based one. It comprises of four BC107 NPN transistors as shown in figure 2. The two transistor T1 and T2 are in series and those T3 and T4 are also in series. The base of all four transistors are protected y current limiting resistors R1-R4. The prevent damaging the transistors. The base signals of T1 and T4 are the same and that of T3 and T2 are also the same. The operation is simple that when Sig1 is logic 1 and Sig 2 is logic 0, it will turn ON T1 and T4 and will turn the motor in one direction same if we reverse the input logics, the motor will go in reverse direction. All four transistors are used as simple switches here.

Step 4: 5 PCB FOR THE PROJECT

5 PCB FOR THE PROJECT

The PCB for the project is designed in EAGLE layout designer. The schematic is designed in the schematic editor and the board is designed in the board editor. The simple TONER TRANSFER METHOD is used here to develop PCB at home.

Attachments

Step 5: microcontroller code and algorithm used .

Microcontroller Code and Algorithm Used !!

The algorithm that is driving the code on the microcontroller is a multi-tasking algorithm. It has three basic functions, first is the main function to read all sensors and  actuate the actuators according to the programmed threshold values. Next is the timely updating of the LCD display and the transmission of encoded string serially to the android client if the android client is present. The last task is to check the input serial buffer for commands from the android client and process them accordingly. When the microcontroller is powered up it reads the eeprom for recovery of all programmed sensomate values and device states that whether which device was ON/OFF the last time the power failed. Then after recovery, it read all the sensor readings and process them accordingly in meaningfull values.  After that the microcontroller checks the sensor readings against the programmed sensomate values and turns ON/OFF the appliances accordingly. The checking of fire occurance and LPG leak is done here in this main loop only. If there is a sign of fire or LPG leak, the microcontroller automatically switches off all the appliances and open the door to exhaust the gases and reduce emergency cricality. The sleep mode is also processed here in this loop. If the sleep mode is activated and motion is detected or someone open the door, the alarm fires and alert the user. In the second loop, the microcontroller runs timer0 in interrupt mode and approx every 1.5 seconds it updates the LCD for sensor values and device states. The presence of the Bluetooth link is also displayed here. Also the microcontroller sends the encoded system status in a string serially to the bluetooth UART if the link is present. It is done every 0.8 second approximately. This loop is repeated infinitely as that of the main loop. The third section programs the serial receive complete interrupt and thus whenever a serial command is received from the android client, it processes it here and actuate the command. This is again an infinite procedure and microcontroller keeps on sensing the arrival of new command. The transmission and reception of commands to and from the android client is done wholesomely in ASCII code.

Step 6: The Android Application

The Android Application

The application for the android smartphone is wriiten completely in BASIC4ANDROID . BASIC4ANDROID is a BASIC high level language. Basic4android is a simple yet powerful development environment that targets Android devices. Basic4android language is similar to Visual Basic language with additional support for objects.Basic4android compiled applications are native Android applications, there are no extra runtimes or dependencies. Unlike other IDEs Basic4android is 100% focused on Android development. Basic4android includes a powerful GUI designer with built-in support for multiple screens and orientations. No XML writing is required. You can develop and debug with the Android emulator or with a real device (USB connected or over the local network). Basic4android has a rich set of libraries that make it easy to develop advanced applications. The android application so designed is fully applicable of controlling your home. There are a total of six screens including the screen containing the authors name. The application is a little bit voice acknowledged. Whenever you click on the help menus, it tells you about the particular with the voice acknowledgemnt too. FIG 1 This screen displays a boot animation on startup when you click the Smarthome application icon. Along with the animation, an audio message and welcome can be heared in the background. FIG 2 This is the manual appliance control screen. Here you can manually turn ON/OFF each appliance individually or can simultaneously switch all ON/OFF in one go. The particular device so controlled manually will disable its sensomate feature automatically. The button label shown in blue shows the status of the device. FIG 3 This is the sensors monitoring window. From here you can see all the sensor readings and also save them in a text file in the ROOT/smarthome folder of your android smartphone. You can activate/deactivate the sleep mode from here only. FIG 4 With this window ,you can check the status of your door whether it is open/close. You can also open or close the door from here. FIG 5,6 From this Sensomate (Sense and automate) window, you can program the threshold values for your two lights and fan. You can also program your motion sensor to raise an alarm if it detects a motion. FIG 7 This is the settings window. From here you can turn Bluetooth ON/OFF manually. You can manually connect to the android host from the paired list. You can change the login password here and program the threshold value for the fire alarm to raise. FIG 8 This screen displays the author involved in developing the application. The android app currently supports 320x240 resolution screens ,but with a simple designer code script it can be modified to suit any screen size.

123D Circuits Contest

Participated in the 123D Circuits Contest

Supercharged Contest

Participated in the Supercharged Contest

Recommendations

Retro Internet Radio Using ESP32

Stay Warm Contest

Stay Warm Contest

Make it Resilient

Make it Resilient

Engineering in the Kitchen - Autodesk Design & Make - Student Contest

Engineering in the Kitchen - Autodesk Design & Make - Student Contest

Smart home security: challenges, issues and solutions at different IoT layers

  • Published: 10 May 2021
  • Volume 77 , pages 14053–14089, ( 2021 )

Cite this article

  • Haseeb Touqeer 1 ,
  • Shakir Zaman 1 ,
  • Rashid Amin 1 ,
  • Mudassar Hussain 2 ,
  • Fadi Al-Turjman 3 &
  • Muhammad Bilal   ORCID: orcid.org/0000-0003-4221-0877 4  

6833 Accesses

74 Citations

8 Altmetric

Explore all metrics

The Internet of Things is a rapidly evolving technology in which interconnected computing devices and sensors share data over the network to decipher different problems and deliver new services. For example, IoT is the key enabling technology for smart homes. Smart home technology provides many facilities to users like temperature monitoring, smoke detection, automatic light control, smart locks, etc. However, it also opens the door to new set of security and privacy issues, for example, the private data of users can be accessed by taking control over surveillance devices or activating false fire alarms, etc. These challenges make smart homes feeble to various types of security attacks and people are reluctant to adopt this technology due to the security issues. In this survey paper, we throw light on IoT, how IoT is growing, objects and their specifications, the layered structure of the IoT environment, and various security challenges for each layer that occur in the smart home. This paper not only presents the challenges and issues that emerge in IoT-based smart homes but also presents some solutions that would help to overcome these security challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

smart home assignment

Abdul-Ghani HA, Konstantas D, Mahyoub M (2018) A comprehensive IoT attacks survey based on a building-blocked reference model. Int J Adv Comput Sci Appl (IJACSA) 9(3):355–373

Google Scholar  

Ahemd MM, Shah MA, Wahid A (2017) IoT security: a layered approach for attacks and defenses. In: 2017 International Conference on Communication Technologies (ComTech), pages 104–110. IEEE

Ahlawat B, Sangwan A, Sindhu V. IoT system model, challenges and threats

Firoz A, Young-Bae K (2016) Mitigation of black hole attacks in routing protocol for low power and lossy networks. Secur Commun Networks 9(18):5143–5154

Article   Google Scholar  

Ali W, Dustgeer G, Awais M, Shah MA (2017) IoT based smart home: security challenges, security requirements and solutions. In: 2017 23rd International Conference on Automation and Computing (ICAC), pages 1–6. IEEE

Farouq A, Tarek S, Shakshuki EM (2018) A detection and prevention technique for man in the middle attack in fog computing. Procedia Comput Sci 141:24–31

Alizai ZA, Tareen NF, Jadoon I (2018) Improved IoT device authentication scheme using device capability and digital signatures. In: 2018 International Conference on Applied and Engineering Mathematics (ICAEM), pages 1–5. IEEE

Almusaylim ZA, Noor Z (2019) A review on smart home present state and challenges: linked to context-awareness internet of things (IoT). Wirel Networks 25(6):3193–3204

Alnaeli SM, Sarnowski M, Aman MS, Abdelgawad A, Yelamarthi K (2016) Vulnerable c/c++ code usage in iot software systems. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pages 348–352. IEEE

Ruth A, Bamidele A, Mohammad H, Jibran S (2020) Internet of things: evolution and technologies from a security perspective. Sustain Cities Soc 54

Andrea I, Chrysostomou C, Hadjichristofi G (2015) Internet of things: security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), pages 180–187. IEEE

Arabo A, Pranggono B (2013) Mobile malware and smart device security: trends, challenges and solutions. In: 2013 19th International Conference on Control Systems and Computer Science, pages 526–531. IEEE

Arış A, Oktuğ SF, Berna Örs YS (2015) Internet-of-things security: denial of service attacks. In: 2015 23nd Signal Processing and Communications Applications Conference (SIU), pages 903–906. IEEE

Arora A, Kaur A, Bhushan B, Saini H (2019) Security concerns and future trends of internet of things. In: 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Vol 1, pages 891–896. IEEE

Ashibani Y, Mahmoud QH (2018) A behavior profiling model for user authentication in IoT networks based on app usage patterns. In: IECON 2018-44th Annual Conference of the IEEE Industrial Electronics Society, pages 2841–2846. IEEE

Asif W, Ghosh RI, Rajarajan M (2018) An attack tree based risk evaluation approach for the internet of things. In: Proceedings of the 8th International Conference on the Internet of Things, pages 1–8

Atlam HF, Wills GB (2020) IoT security, privacy, safety and ethics. In: Digital twin technologies and smart cities, pages 123–149. Springer

Azari A, Miao G, Stefanovic C, Popovski P (2018) Latency-energy tradeoff based on channel scheduling and repetitions in nb-IoT systems. In: 2018 IEEE Global Communications Conference (GLOBECOM), pages 1–7. IEEE

Bastos D, Shackleton M, El-Moussa F (2018) Internet of things: a survey of technologies and security risks in smart home and city environments

Bugeja J, Jacobsson A, Davidsson P (2016) On privacy and security challenges in smart connected homes. In: 2016 European Intelligence and Security Informatics Conference (EISIC), pages 172–175. IEEE

Celesti A, Carnevale L, Galletta A, Fazio M, Villari M (2017) A watchdog service making container-based micro-services reliable in iot clouds. In: 2017 IEEE 5th International Conference on Future Internet of Things and Cloud (FiCloud), pages 372–378. IEEE

Cesare S (2014) Breaking the security of physical devices. Presentation at Blackhat, 14,

Choi J, Jin S (2018) Security threats in connected car environment and proposal of in-vehicle infotainment-based access control mechanism. In: Advanced multimedia and ubiquitous engineering, pages 383–388. Springer

Classen J, Chen J, Steinmetzer D, Hollick M, Knightly E (2015) The spy next door: eavesdropping on high throughput visible light communications. In: Proceedings of the 2nd International Workshop on Visible Light Communications Systems, pages 9–14

Das D, Maity S, Nasir SB, Ghosh S, Raychowdhury A, Sen S (2017) High efficiency power side-channel attack immunity using noise injection in attenuated signature domain. In: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 62–67. IEEE

Datta P, Sharma B (2017) A survey on iot architectures, protocols, security and smart city based applications. In 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pages 1–5. IEEE

Denning DE (2012) Stuxnet: What has changed? Futur Internet 4(3):672–687

Deogirikar J, Vidhate A (2017) Security attacks in IoT: a survey. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pages 32–37. IEEE

Zheng D, Guangzhen S, Yun L, Meiyu W (2019) An adaptive resource allocation model with anti-jamming in IoT network. IEEE Access 7:93250–93258

Xiaojiang D, Hsiao-Hwa C, Liehuang Z, Jiangli L, Zheng C (2018) Security and privacy in wireless IoT. IEEE Wirel Commun 25(6):10–11

Duangphasuk S, Duangphasuk P, Thammarat C (2020) Review of internet of things (IoT): security issue and solution. In: 2020 17th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON), pages 559–562. IEEE

Dhar DA, Gautam S, Shalini D, Rajani S (2019) A decentralized privacy-preserving healthcare blockchain for IoT. Sensors 19(2):326

Faisal EM, Ismail AA, Hamed HFA (2018) Intrusion detection systems for IoT-based smart environments: a survey. J Cloud Comput 7(1):21

Evans D (2011) The internet of things: how the next evolution of the internet is changing everything. Cisco Int J Internet 3(2):123–132

Ezhilarasan E, Dinakaran M (2017) A review on mobile technologies: 3g, 4g and 5g. In: 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM), pages 369–373,

Fakhri D, Mutijarsa K (2018) Secure IoT communication using blockchain technology. In: 2018 International Symposium on Electronics and Smart Devices (ISESD), pages 1–6. IEEE

Pallab G, Mita N, Sourav D (2018) A novel approach for detecting and mitigating the energy theft issues in the smart metering infrastructure. Technol Econ Smart Grids Sustain Energy 3(1):13

Gavra V-D, Dobra I-M, Pop OA (2020) A survey on threats and security solutions for IoT. In: 2020 43rd International Spring Seminar on Electronics Technology (ISSE), pages 1–5. IEEE

Gendreau AA, Moorman M (2016) Survey of intrusion detection systems towards an end to end secure internet of things. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pages 84–90. IEEE

Geneiatakis D, Kounelis I, Neisse R, Nai-Fovino I, Steri G, Baldini G (2017) Security and privacy issues for an iot based smart home. In: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pages 1292–1297. IEEE

Ghafir I, Prenosil V, Alhejailan A, Hammoudeh M (2016) Social engineering attack strategies and defence approaches. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pages 145–149. IEEE

Ghasemi M, Saadaat M, Ghollasi O (2019) Threats of social engineering attacks against security of internet of things (IoT). In: Fundamental research in electrical engineering, pages 957–968. Springer

Gill RK, Sachdeva M (2018) Detection of hello flood attack on leach in wireless sensor networks. In: Next-generation networks, pages 377–387. Springer

Gupta Brij B, Arachchilage Nalin AG, Psannis Kostas E (2018) Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommun Syst 67(2):247–267

Hallman R, Bryan J, Palavicini G, Divita J, Romero-Mariona J (2017) Ioddos-the internet of distributed denial of sevice attacks. In: 2nd International Conference on Internet of Things, Big Data and Security. SCITEPRESS, pages 47–58

Hariri Reihaneh H, Fredericks Erik M, Bowers Kate M (2019) Uncertainty in big data analytics: survey, opportunities, and challenges. J Big Data 6(1):44

Vikas H, Vinay C, Vikas S, Divyansh J, Pranav G, Biplab S (2019) A survey on IoT security: application areas, security threats, and solution architectures. IEEE Access 7:82721–82743

Daojing H, Ran Y, Sammy C, Mohsen G, Yanping X (2018) Privacy in the internet of things for smart healthcare. IEEE Commun Mag 56(4):38–44

Mahmud Hossain SM, Riazul I, Farman A, Kyung-Sup K, Ragib H (2018) An internet of things-based health prescription assistant and its security system design. Futur Gener Comput Syst 82:422–439

Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. In: 2015 IEEE World Congress on Services, pages 21–28. IEEE

Hussain F, Hussain R, Hassan SA, Hossain E (2020) Machine learning in IoT security: current solutions and future challenges. IEEE Commun Surv Tutor

Ida IB, Jemai A, Loukil A (2016) A survey on security of IoT in the context of ehealth and clouds. In: 2016 11th International Design and Test Symposium (IDT), pages 25–30. IEEE

Islam K, Shen W, Wang X (2012) Security and privacy considerations for wireless sensor networks in smart home environments. In: Proceedings of the 2012 IEEE 16th International Conference on Computer Supported Cooperative Work in Design (CSCWD), pages 626–633. IEEE

ISO/IEC. Iso/iec 27005:2018 (2018). https://www.iso.org/standard/75281.html

Kanwal J, Ali SM, Ahmad A, Ali KH, Carsten M, Din IU (2020) Proactive forensics in IoT: privacy-aware log-preservation architecture in fog-enabled-cloud using holochain and containerization technologies. Electron 9(7):1172

Jayakumar H, Raha A, Kim Y, Sutar S, Lee WS, Raghunathan V (2016) Energy-efficient system design for IoT devices. In: 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC), pages 298–301. IEEE

Kalra N, Sharma A, Kumar N, Singh R, Gehlot A (2018) Design and development of IoT-based transmission line monitoring system. In: Intelligent communication, control and devices, pages 465–471. Springer

Hazalila K, Hairulnizam M, Abawajy JH (2018) Clone tag detection in distributed rfid systems. PloS one 13(3)

Kamel Samah Osama M, Hegazi Nadia H (2018) A proposed model of IoT security management system based on a study of internet of things (IoT) security. Int J Sci Eng Res 9(9):1227–1244

Kanuparthi A, Karri R, Addepalli S (2013) Hardware and embedded security in the context of internet of things. In: Proceedings of the 2013 ACM Workshop on Security, Privacy and Dependability for Cyber Vehicles, pages 61–64

Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2–3):293–315

Kasinathan P, Costamagna G, Khaleel H, Pastrone C, Spirito MA (2013) An ids framework for internet of things empowered by 6lowpan. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, pages 1337–1340

Kaur M, Kalra S (2018) Security in IoT-based smart grid through quantum key distribution. In: Advances in computer and computational sciences, pages 523–530. Springer

Khan F, Gawade A Secure data management in smart meter as an application of IoT

Hasan AK, Munam AS, Khan S, Ali I, Imran M (2019) Perception layer security in internet of things. Futur Gener Comput Syst 100:144–164

Kim D-Y (2014) Cyber security issues imposed on nuclear power plants. Ann Nuclear Energy 65:141–143

Kim Y-P, Yoo S, Yoo C (2015) Daot: dynamic and energy-aware authentication for smart home appliances in internet of things. In: 2015 IEEE International Conference on Consumer Electronics (ICCE), pages 196–197. IEEE

Ko E, Kim T, Kim H (2018) Management platform of threats information in IoT environment. J Ambient Intell Humanized Comput 9(4):1167–1176

Komninos N, Philippou E, Pitsillides A (2014) Survey in smart grid and smart home security: issues, challenges and countermeasures. IEEE Commun Surv Tutor 16(4):1933–1954

Konidala DM, Kim D, Chan YY, Lee B (2011) Security framework for rfid-based applications in smart home environment. J Inf Process Syst 7(1):111–120

Koo D, Hur J, Yoon H (2013) Secure and efficient data retrieval over encrypted data using attribute-based encryption in cloud storage. Comput Electr Eng 39(1):34–46

Kozlov D, Veijalainen J, Ali Y (2012) Security and privacy threats in IoT architectures. In: BODYNETS, pages 256–262

Kumar SA, Vealey T, Srivastava H (2016) Security in internet of things: challenges, solutions and future directions. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pages 5772–5781. IEEE

Kumar S, Sahoo S, Mahapatra A, Swain AK, Mahapatra KK (2017) Security enhancements to system on chip devices for iot perception layer. In: 2017 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), pages 151–156. IEEE

Li H, Chen Y, He Z (2012) The survey of rfid attacks and defenses. In: 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing, pages 1–4. IEEE

Li S, Da Li X, Zhao S (2015) The internet of things: a survey. Inf Syst Front 17(2):243–259

Li X, Wang H, Dai H-N, Wang Y , Zhao Q (2016) An analytical study on eavesdropping attacks in wireless nets of things. Mob Inform Syst

Li Z, Yin X, Geng Z, Zhang H, Li P, Sun Y, Zhang H, Li L (2013) Research on pki-like protocol for the internet of things. In: 2013 Fifth International Conference on Measuring Technology and Mechatronics Automation, pages 915–918. IEEE

Lin H, Bergmann NW (2016) IoT privacy and security challenges for smart home environments. Information 7(3):44

Liu J, Xiao Y, Chen CLP (2012) Authentication and access control in the internet of things. In: 2012 32nd International Conference on Distributed Computing Systems Workshops, pages 588–592. IEEE

Liu Y, Briones J, Zhou R, Magotra N (2017) Study of secure boot with a fpga-based IoT device. In: 2017 IEEE 60th International Midwest Symposium on Circuits and Systems (MWSCAS), pages 1053–1056. IEEE

Maurer U (2011) Constructive cryptography—a new paradigm for security definitions and proofs. In: Joint Workshop on Theory of Security and Applications, pages 33–56. Springer

Meneghello F, Calore M, Zucchetto D, Polese M, Zanella A (2019) IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Int Things J 6(5):8182–8201

Shunmei M, Zijian G, Qianmu L, Hao W, Hong-Ning D, Lianyong Q (2020) Security-driven hybrid collaborative recommendation method for cloud-based IoT services. Comput Secur 97

Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: Vision, applications and research challenges. Ad Hoc Networks 10(7):1497–1516

Mosenia A, Jha Niraj K (2016) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586–602

Mujica G, Portilla J (2019) Distributed reprogramming on the edge: a new collaborative code dissemination strategy for IoT. Electronics 8(3):267

Muthukrishnan H, Sunita B, Najeerabanu S, Yasuvanth V (2020) Observational study of wpan and lpwa technologies for various IoT devices and its applications

Nirmal K, Janet B, Kumar R (2020) Analyzing and eliminating phishing threats in IoT, network and other web applications using iterative intersection. Peer-to-Peer Network Appl, pages 1–13,

Perrig A, Stankovic J, Wagner D (2004) Security in wireless sensor networks. Commun ACM 47(6):53–57

Perwej Y, Omer MK, Sheta OE, Harb HAM, Adrees MS (2019) The future of internet of things (iot) and its empowering technology. Int J Eng Sci, 20192

Pongle P, Chavan G (2015) A survey: attacks on rpl and 6lowpan in IoT. In: 2015 International Conference on Pervasive Computing (ICPC), pages 1–6. IEEE

Porkodi R, Bhuvaneswari V (2014) The internet of things (IoT) applications and communication enabling technology standards: an overview. In: 2014 International Conference on Intelligent Computing Applications, pages 324–329. IEEE

Prokofiev AO, Smirnova YS, Surov VA (2018) A method to detect internet of things botnets. In: 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), pages 105–108. IEEE

Ramesh G, Krishnamurthi I, Sampath Sree Kumar K (2014) An efficacious method for detecting phishing webpages through target domain identification. Decis Support Syst 61:12–22

Tariq AR, Haq EU (2018) Security challenges facing iot layers and its protective measures. Int J Comput Appl 975:8887

Rizvi S, Kurtz A, Pfeffer J, Rizvi M (2018) Securing the internet of things (IoT): a security taxonomy for IoT. In: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pages 163–168. IEEE

Roberts CM (2006) Radio frequency identification (rfid). Comput Sec 25(1):18–26

Robles RJ, Kim T, Cook D, Das S (2010) A review on security in smart home development. Int J Adv Sci Technol 15

Rodrigues Luis, Guerreiro Joel, Correia Noélia (2020) Reload/coap architecture for the federation of wireless sensor networks. Peer-to-Peer Networking and Applications 13(1):27–37

Said O, Albagory Y, Nofal M, Fahad AR (2017) Iot-rtp and IoT-rtcp: adaptive protocols for multimedia transmission over internet of things environments. IEEE access 5:16757–16773

Salman O, Elhajj I, Chehab A, Kayssi A (2018) Iot survey: an sdn and fog computing perspective. Comput Networks 143:221–246

Sarkar AR, Sanyal G, Majumder S (2016) Application of wireless technology for a vision based rehabilitation system. In: 2016 Second International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN), pages 106–111. IEEE

Savola RM, Abie H, Sihvonen M (2012) Towards metrics-driven adaptive security management in e-health iot applications. In BodyNets, pages 276–281

Sethi P, Sarangi SR (2017) Internet of things: architectures, protocols, and applications. J Electr Comput Eng

Shamsoshoara A, Korenda A, Afghah F, Zeadally S (2019) A survey on hardware-based security mechanisms for internet of things. arXiv preprint arXiv:1907.12525

Sharma P, Zawar S, Patil Suryakant B (2016) Ransomware analysis: internet of things (IoT) security issues challenges and open problems inthe context of worldwide scenario of security of systems and malware attacks. Int Conf Recent Innov Eng Manag 2:177–184

Siddiqui ST, Alam S, Ahmad R, Shuaib M (2020) Security threats, attacks, and possible countermeasures in internet of things. In: Advances in data and information sciences, pages 35–46. Springer

Silva I, Leandro R, Macedo D, Luiz AG (2013) A dependability evaluation tool for the internet of things. Comput Electr Eng 39(7):2005–2018

Sivaraman V, Gharakheili HH, Vishwanath A, Boreli R, Mehani O (2015) Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pages 163–167. IEEE

Sonar K, Upadhyay H (2014) A survey: Ddos attack on internet of things. Int J Eng Res Dev 10(11):58–63

Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering, Vol. 3, pages 648–651. IEEE

Swamy SN, Jadhav D, Kulkarni N (2017) Security threats in the application layer in IoT applications. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pages 477–480. IEEE

Tang X, Ren P, Han Z (2018) Jamming mitigation via hierarchical security game for IoT communications. IEEE Access 6:5766–5779

Thangavel C, Sudhaman P (2017) Security challenges in the IoT paradigm for enterprise information systems. In: Connected environments for the internet of things, pages 3–17. Springer

Varga P, Plosz S, Soos G, Hegedus C (2017) Security threats and issues in automation IoT. In: 2017 IEEE 13th International Workshop on Factory Communication Systems (WFCS), pages 1–6. IEEE

Vashi S, Ram J, Modi J, Verma S, Prakash C (2017) Internet of things (IoT): a vision, architectural elements, and security issues. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pages 492–496. IEEE

Venkata Abhishek N, Tandon A, Lim TJ, Sikdar B (2018) Detecting forwarding misbehavior in clustered iot networks. In: Proceedings of the 14th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, pages 1–6

Vimal Jerald A, Rabara SA, Bai TDP (2015) Internet of things (IoT) based smart environment integrating various business applications. Int J Comput Appl 128(8):32–37

von Tschirschnitz M, Peuckert L, Franzen F, Grossklags J (2020) Method confusion attack on bluetooth pairing. Under submission

Vuppala S, Alie El-Din M, Kuenzi A (2019) Moving target defense mechanism for side-channel attacks. IEEE Syst J 14(2):1810–1819

Wallrabenstein JR (2016) Practical and secure IoT device authentication using physical unclonable functions. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), pages 99–106. IEEE

Wang P, Chaudhry S, Li L, Li S, Tryfonas T, Li H (2016) The internet of things: a security point of view. Internet Res

Wang Z (2019) Identity-based verifiable aggregator oblivious encryption and its applications in smart grids. IEEE Trans Sustain Comput

Wei D, Qiu X (2018) Status-based detection of malicious code in internet of things (IoT) devices. In: 2018 IEEE Conference on Communications and Network Security (CNS), pages 1–7. IEEE

Werbach K, Mehta A (2014) The spectrum opportunity: sharing as the solution to the wireless crunch. Int J Commun 8:22

Werner M, Unterluggauer T, Schaffenrath D, Mangard S (2018) Sponge-based control-flow protection for IoT devices. In: 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pages 214–226. IEEE

Whittaker C, Ryner B, Nazif M (2010) Large-scale automatic classification of phishing pages

Winter T, Thubert P, Brandt A, Hui JW, Kelsey R, Levis P, Pister K, Struik R, Vasseur J-P, Alexander RK, et al (2012) Rpl: Ipv6 routing protocol for low-power and lossy networks. rfc, 6550:1–157

Wu M, Lu T-J, Ling F-Y, Sun J, Du H-Y (2010) Research on the architecture of internet of things. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), Vol 5, pages V5–484. IEEE

Xiang G, Hong J, Rose CP, Cranor L (2011) Cantina+ a feature-rich machine learning framework for detecting phishing web sites. ACM Trans Inform Syst Secur (TISSEC) 14(2):1–28

Xiaohui X (2013) Study on security problems and key technologies of the internet of things. In: 2013 International Conference on Computational and Information Sciences, pages 407–410. IEEE

Yoon S, Park H, Yoo HS (2015) Security issues on smarthome in IoT environment. In: Computer science and its applications, pages 691–696. Springer

Zarpelão BB, Miani RS, Kawakani CT, de Alvarenga SC (2017) A survey of intrusion detection in internet of things. J Network Comput Appl84:25–37

Zeng X, Martinez T (2003) A noise filtering method using neural networks. In: IEEE International Workshop on Soft Computing Techniques in Instrumentation, Measurement and Related Applications, 2003. SCIMA 2003 pages 26–31. IEEE

Zhang T, Antunes H, Aggarwal S (2014) Defending connected vehicles against malware: Challenges and a solution framework. IEEE Internet Things J 1(1):10–21

Zhao W, Yang S, Luo X (2020) On threat analysis of IoT-based systems: a survey. In: 2020 IEEE International Conference on Smart Internet of Things (SmartIoT), pages 205–212. IEEE

Download references

Author information

Authors and affiliations.

Department of Computer Science, University of Engineering and Technology , Taxila, Pakistan

Haseeb Touqeer, Shakir Zaman & Rashid Amin

Department of Computer Science, University of Wah, Wah Cantt, Pakistan

Mudassar Hussain

Department of Artificial Intelligence Engineering, Research center for AI and IoT, Near East University, Mersin 10, Nicosia, Turkey

Fadi Al-Turjman

Department of Computer Engineering, Hankuk University of Foreign Studies, Yongin-si, Gyeonggi-do, 17035, Korea

Muhammad Bilal

You can also search for this author in PubMed   Google Scholar

Corresponding authors

Correspondence to Rashid Amin or Muhammad Bilal .

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Touqeer, H., Zaman, S., Amin, R. et al. Smart home security: challenges, issues and solutions at different IoT layers. J Supercomput 77 , 14053–14089 (2021). https://doi.org/10.1007/s11227-021-03825-1

Download citation

Accepted : 17 April 2021

Published : 10 May 2021

Issue Date : December 2021

DOI : https://doi.org/10.1007/s11227-021-03825-1

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Smart cities

Advertisement

  • Find a journal
  • Publish with us
  • Track your research

MiddleWeb

  • Articles / Homework

Smart Homework: How to Manage & Assess It

by MiddleWeb · Published 08/20/2014 · Updated 12/14/2019

In the first installment of our smart homework series from author & teaching consultant Rick Wormeli, he made the case for take-home assignments that matter for learning and engage student interest . In Part 2 , Rick suggested 13 guiding principles to help teachers create homework challenges that spark deeper learning. In this final article, Rick suggests some good ways to assess homework and manage the workload .

These articles are adapted with permission from Rick’s seminal book about teaching in the middle grades, Day One & Beyond: Practical Matters for New Middle Level Teachers (Stenhouse, 2005). Rick continues to offer great advice about homework, differentiation, assessment and many other topics in workshops and presentations across North America.

RickWormeli-hdsht-130

Fresh approaches to middle grades homework have many benefits, but how does all this play out as we manage homework in our classrooms? How do we assess homework effectively? How do we handle the paperwork? How do we guard against homework becoming just busywork again?

Here are some ideas:

▶ For big projects with multiple weeks of student responses, such as a science learning log or a reader’s response journal, skim every page students have written, but have students select one entry for a letter grade by placing a star on the intended page. The entry should demonstrate outstanding thinking, science protocol, plot analysis, personal response, or whatever you’re emphasizing with the unit. If you’re worried about having a large enough sample, grade two or three entries.

▶ When checking a list of problems, sentences, or answers to questions, have students work in groups of four or five to confirm answers with one another. If someone gets the wrong answer and doesn’t understand why, the rest of the group explains. If the student or group is stuck in understanding how an answer was achieved, they identify that one problem/sentence/question to the teacher when she calls the groups back to the whole class. The teacher reviews only identified problems.

▶ While groups are meeting to review homework, the teacher circulates from group to group, recording evidence of successful collaborations (to be shared later with the whole group), answering questions, correcting misconceptions, facilitating student conversations, and identifying areas to reteach. The great thing about this method is found in the value of conversation, not just the assessment the teacher does. Students who “talk math” (or English, history, science, art, PE, technology, drama, or music) learn those subjects.

Illustration of a Male and Female Teens Sharing a Book

▶ Don’t grade everything. Some assignments can be marked with a check or a zero for having done it. Spot-check problems two, nine, and seventeen because they represent different concepts you were worried about students understanding.

▶ Keep the student’s effort in doing the homework from diluting the grade that indicates mastery of content. That is, separate work habits from the letter grade if you can. Even though I know that good work habits usually yield high achievement, as a parent I don’t want my son’s grade to be based on anything but mastery of content and skills. If the grade’s validity reflects good effort but not mastery, then my son isn’t held accountable for learning, I don’t have a valid judgment of his learning, and he doesn’t have the required knowledge.

In the real world, we do not pay a carpet layer for the job until the job is done, regardless of how many hours or days it took, or how hot it was. The degree of his effort is not relevant, just that the job is done well (the standard of excellence was achieved). High-tech-industry workers may work all night long preparing a proposal for a client, but their efforts are irrelevant to the client who accepts and reviews all proposals equally that cross her desk by 10:00 a.m. the next morning.

Revising and Redoing Homework

smart home assignment

The teacher is an expert and a coach. Students are not penalized for multiple attempts and revisions, or for not understanding the first time around. The focus is on achieving the standard of excellence. The feedback to the student is clear: If they don’t achieve, they are not given master craftsman status (an A), nor can they set up a practice. They have not yet met the rigorous criteria (standards) for mastery. We can see the revision of important homework tasks in the same way—students do it until they get it right.

Consider the reflections of middle school educator Nancy Long: “We have experimented with dozens of rubric styles over the last few years, and my favorite still is the one that lists all of the content criteria and all of the quality criteria on the left side and has two columns on the right side: YES and NOT YET. Check marks are used in the appropriate column to show which criteria have been met and which still need work.”

Nancy continues: “I try to schedule deadlines for assignments far enough ahead of the end of the grading period so there is time for everyone to get the papers back and do over what was not right before I must assign a grade ‘in concrete.’ . . . (like) in most things in our adult lives, we can mess up and still get another chance to get it right without too large a penalty!”

Another successful educator, Bill Ivey, says this about redoing homework assignments:

“It is exactly what we want our children to do. We had an English teacher who, by taking her sixth-grade class carefully through draft after draft, helped them create poetry that was more powerful than many of the poetry contest winners at our high school, where the poetry program is considered to be quite strong. The principle here can apply to any subject and any learning.”

Punishing Students Who Don’t Do Homework

Teenage Student - Vector

Homework’s objective is to be instructional, not punitive. It would be wrong to fail a student for not doing homework when he had mastered all I had to teach. It would, however, indicate that I must not be doing my job very well. If my course is too easy for the student, then I need to make it more challenging for him or pursue placing him in a more advanced course.

Some argue against assessing homework in light of out-of-school pressures affecting a student’s ability to do schoolwork. We need to remember that our first task is to teach so that students will learn. Punishing a kid who cannot complete an assignment due to something beyond his control is abusive. We can’t just shrug our shoulders and say that a child has to do the homework and if he doesn’t, that’s just tough, regardless of the child’s situation.

We can work with families to find a satisfactory way in which to complete the work. I had a student who worked approximately four hours after school every day of the week in order to help support his family. Yes, I could have told him and his family that it is illegal to work at his age. Yes, I could have told him and the family that school is his job and it should come first. But food, medicine, and shelter were more basic needs. Completing a worksheet on objective pronouns pales in comparison.

If the student masters the material, then why should I fail him for not doing homework in the midst of such struggles? We should do the most effective thing for students, not the easiest thing for teachers. Many of our students live in harsh realities. Our compassion and alternative structuring of homework assignments will prepare those students for adult success far better than the punishment for not doing a set of 20 math problems ever will.

Is homework a necessary evil?

Illustration of a Male Teenager Having Trouble with His Homework

It’s troubling that many of today’s homework assignments and practices parallel those from the turn of the last century. Today’s middle schools require innovative and developmentally responsive homework based on what we now know about the human brain and young adolescents. One of the pluses of teaching and using these sanity-saving, creative approaches is that we get to experience the inspiring products our students create.

▶ Bonus idea: Homework reprieve

If you’re looking for ways to reward and motivate students and integrate homework into the regular work flow of your classroom, try a “Homework Deadline Extension Certificate.” I used these every quarter in my own classroom. Students really compete for them.

Textured red blue retro certificate. A vintage horizontal poster with a large copy space for you. Pe

On the day an assignment is due, students can submit the certificate instead of their homework and they are automatically allowed to turn in the assignment one, two, or three days late, according to your comfort level, for full credit. If we reward those who’ve earned these certificates by extending the deadline but not voiding the need to complete the assignment, we haven’t diminished the assignment’s importance. ( Make your own certificate .)

Of course, students learn to be judicious in their use—if the assignment was to study for tomorrow’s test, it won’t help them to use their deadline extension certificate. If they’re working on a complicated project, they’d be wise to have their certificate in reserve.

Rick-at-AMLE

His books include Meet Me in the Middle ; Day One and Beyond ; Fair Isn’t Always Equal: Assessment and Grading in the Differentiated Classroom ; Differentiation: From Planning to Practice; Metaphors & Analogies: Power Tools for Teaching Any Subject, and Summarization in Any Subject , plus The Collected Writings (So Far) of Rick Wormeli: Crazy Good Stuff I Learned about Teaching Along the Way .

He is currently working on his first young adult fiction novel and a new book on homework practices in the 21 st century.

Share this:

Tags: Day One & Beyond grading homework homework homework guidelines homework policies middle school Rick Wormeli why homework

' src=

MiddleWeb is all about the middle grades, with great 4-8 resources, book reviews, and guest posts by educators who support the success of young adolescents. And be sure to subscribe to MiddleWeb SmartBrief for the latest middle grades news & commentary from around the USA.

  • Pingbacks 0

' src=

Home work extension certificates…what things did students do to have to earn them?

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Notify me of follow-up comments by email.

Notify me of new posts by email.

This site uses Akismet to reduce spam. Learn how your comment data is processed .

  • Popular Posts
  • Recent Posts
  • Recent Comments

smart home assignment

Articles / Community Building

Promoting Student Art That Builds Team Spirit

smart home assignment

Book Reviews / School Reform

Opportunities for Swift Achievement Gains

smart home assignment

Articles / Student Support

Using Ambient Sound to Reduce Student Stress

smart home assignment

Articles / Writing

Add Imaginative Writing to Your ELA Classroom

smart home assignment

Brain Breaks / New Teacher Tips

Brain Breaks Relieve Stress & Boost Learning

smart home assignment

Book Reviews / Brain-based Teaching

Teaching for Retention, Application and Transfer

smart home assignment

Articles / Gifted

Some Things to Do When Gifted Students Struggle

smart home assignment

Articles / Learning through Failure

Use Failure as a Tool to Empower Kids’ Learning

smart home assignment

Resources / Women's History

The Long & Winding Road to Women’s Rights

smart home assignment

History & social studies / Resources

Black History Month All Year Long

smart home assignment

Articles / Literacy

Shakespeare: A Rite of Passage for 6th Graders

smart home assignment

Articles / Mathematics

Stop Using These Four Words in Math Class

smart home assignment

Literacy / Wide Open Learning

6 Ways to Help Students Absorb Difficult Texts

  • Sharon Groleau says: Can we add carry and borrow to the list also and...
  • Sharon Ratliff says: Dr. Chandler, This is a great reference for teachers! So many...
  • Susan Curtis says: “Interleaving is a process where students mix, or interleave, multiple subjects...
  • Joyce Eddy says: I have been retired for about two decades but I do...
  • TechyList says: "Love this! As a 6th grade teacher myself, I can totally...

Sign Up & Receive the Latest News about Our Content…

Email address:

First Name:

Read our Privacy Policy

BOOK REVIEWS

smart home assignment

Strategies to Adjust ‘Up’ What Students Know

smart home assignment

Assuring Just, Inclusive Learning for Newcomers

smart home assignment

Building Bridges That Cultivate Teacher Growth

smart home assignment

SEL, Civic Engagement, & a Healthy Democracy

smart home assignment

An Enhanced Edition of ‘When Kids Can’t Read’

smart home assignment

Shifting to Asset-Based Literacy Assessments

smart home assignment

Bringing the Science of Reading into Grades 3-5

smart home assignment

Class Libraries to Inspire and Challenge Readers

smart home assignment

Strategies to Integrate AI into Every Classroom

smart home assignment

Preparing Our Students to Engage the World

smart home assignment

A Playbook for Student and Teacher Well-Being

smart home assignment

Culturally & Historically Responsive Classrooms

smart home assignment

Filling Your Classroom with Deliberate Optimism

smart home assignment

Add the Power of Poetry to All Your ELA Lessons

smart home assignment

Genius Hour Can Ignite Innovation and Inquiry

smart home assignment

Effective Literacy Walks Begin with Collaboration

smart home assignment

Restoring the Joy and Possibility of Teaching

smart home assignment

The All-New ‘Classroom Instruction That Works’

  • Collections
  • AI Generator

Premium Access

Custom content, media manager.

Grow your brand authentically by sharing brand content with the internet’s creators.

smart home icons

Smart home family, smart home technology, smart home devices, smart home device, smart home icon, smart home lighting, smart home tech, smart home thermostat, smart home speaker, smart home automation, smart home app, smart home system, smart home phone, smart home appliances, smart home kitchen, smart home light, smart home lights, smart home installation, smart home vector, smart home tablet, senior smart home, smart home exterior, smart home illustration, smart home office, smart home security camera, smart home security system, smart home camera, smart home logo, 90,700 smart home stock photos & high-res pictures, browse 90,700  authentic smart home  stock photos, high-res images, and pictures, or explore additional smart home icons  or  iot  stock images to find the right photo at the right size and resolution for your project..

man using tablet with smart home control functions at home. - smart_home stock pictures, royalty-free photos & images

  • CRM Asignment Help
  • MBA Assignment Help
  • Statistics Assignment Help
  • Market Analysis Assignment Help
  • Business Development Assignment Help
  • 4p of Marketing Assignment Help
  • Pricing Strategy Assignment Help
  • CIPD Assignment Help
  • SWOT Analysis Assignment Help
  • Operations Management Assignment Help
  • Corporate Strategy Assignment Help
  • Change Management Assignment Help
  • Supply Chain Management Assignment Help
  • Human Resource Assignment Help
  • Management Assignment Help
  • Marketing Assignment Help
  • Strategy Assignment Help
  • Operation Assignment Help
  • Marketing Research Assignment Help
  • Strategic Marketing Assignment Help
  • Project Management Assignment Help
  • Strategic Management Assignment Help
  • Marketing Management Assignment Help
  • Business Assignment Help
  • Business Ethics Assignment Help
  • Consumer Behavior Assignment Help
  • Conflict Management Assignment Help
  • Business Statistics Assignment Help
  • Managerial Economics Assignment Help
  • Project Risk Management Assignment Help
  • Nursing Assignment Help
  • Clinical Reasoning Cycle
  • Nursing Resume Writing
  • Medical Assignment Help
  • Financial Accounting Assignment Help
  • Financial Services Assignment Help
  • Finance Planning Assignment Help
  • Finance Assignment Help
  • Forex Assignment Help
  • Behavioral Finance Assignment Help
  • Personal Finance Assignment Help
  • Capital Budgeting Assignment Help
  • Corporate Finance Planning Assignment Help
  • Financial Statement Analysis Assignment Help
  • Accounting Assignment Help
  • Solve My Accounting Paper
  • Taxation Assignment Help
  • Cost Accounting Assignment Help
  • Managerial Accounting Assignment Help
  • Business Accounting Assignment Help
  • Activity-Based Accounting Assignment Help
  • Economics Assignment Help
  • Microeconomics Assignment Help
  • Econometrics Assignment Help
  • IT Management Assignment Help
  • Robotics Assignment Help
  • Business Intelligence Assignment Help
  • Information Technology Assignment Help
  • Database Assignment Help
  • Data Mining Assignment Help
  • Data Structure Assignment Help
  • Computer Network Assignment Help
  • Operating System Assignment Help
  • Data Flow Diagram Assignment Help
  • UML Diagram Assignment Help
  • Solidworks Assignment Help
  • Cookery Assignment Help
  • R Studio Assignment Help
  • Computer Science Assignment Help
  • Law Assignment Help
  • Law Assignment Sample
  • Criminology Assignment Help
  • Taxation Law Assignment Help
  • Constitutional Law Assignment Help
  • Business Law Assignment Help
  • Consumer Law Assignment Help
  • Employment Law Assignment Help
  • Commercial Law Assignment Help
  • Criminal Law Assignment Help
  • Environmental Law Assignment Help
  • Contract Law Assignment Help
  • Company Law Assignment Help
  • Corp. Governance Law Assignment Help
  • Science Assignment Help
  • Physics Assignment Help
  • Chemistry Assignment Help
  • Sports Science Assignment Help
  • Chemical Engineering Assignment Help
  • Biology Assignment Help
  • Bioinformatics Assignment Help
  • Biochemistry Assignment Help
  • Biotechnology Assignment Help
  • Anthropology Assignment Help
  • Paleontology Assignment Help
  • Engineering Assignment Help
  • Autocad Assignment Help
  • Mechanical Assignment Help
  • Fluid Mechanics Assignment Help
  • Civil Engineering Assignment Help
  • Electrical Engineering Assignment Help
  • Humanities Assignment Help
  • Sociology Assignment Help
  • Philosophy Assignment Help
  • English Assignment Help
  • Geography Assignment Help
  • History Assignment Help
  • Agroecology Assignment Help
  • Psychology Assignment Help
  • Social Science Assignment Help
  • Public Relations Assignment Help
  • Political Science Assignment Help
  • Mass Communication Assignment Help
  • Auditing Assignment Help
  • Dissertation Writing Help
  • Sociology Dissertation Help
  • Marketing Dissertation Help
  • Biology Dissertation Help
  • Nursing Dissertation Help
  • MATLAB Dissertation Help
  • Law Dissertation Help
  • Geography Dissertation Help
  • English Dissertation Help
  • Architecture Dissertation Help
  • Doctoral Dissertation Help
  • Dissertation Statistics Help
  • Academic Dissertation Help
  • Cheap Dissertation Help
  • Dissertation Help Online
  • Dissertation Proofreading Services
  • Do My Dissertation
  • Business Report Writing
  • Programming Assignment Help
  • Java Programming Assignment Help
  • C Programming Assignment Help
  • PHP Assignment Help
  • Python Assignment Help
  • Perl Assignment Help
  • SAS Assignment Help
  • Web Designing Assignment Help
  • Android App Assignment Help
  • JavaScript Assignment Help
  • Linux Assignment Help
  • Coding Assignment Help
  • Mathematics Assignment Help
  • Geometry Assignment Help
  • Arithmetic Assignment Help
  • Trigonometry Assignment Help
  • Calculus Assignment Help
  • Arts Architecture Assignment Help
  • Arts Assignment Help
  • Case Study Assignment Help
  • History Case Study
  • Case Study Writing Services
  • Write My Case Study For Me
  • Business Law Case Study
  • Civil Law Case Study Help
  • Marketing Case Study Help
  • Nursing Case Study Help
  • ZARA Case Study
  • Amazon Case Study
  • Apple Case Study
  • Coursework Assignment Help
  • Finance Coursework Help
  • Coursework Writing Services
  • Marketing Coursework Help
  • Maths Coursework Help
  • Chemistry Coursework Help
  • English Coursework Help
  • Do My Coursework
  • Custom Coursework Writing Service
  • Thesis Writing Help
  • Thesis Help Online
  • Write my thesis for me
  • CDR Writing Services
  • CDR Engineers Australia
  • CDR Report Writers
  • Homework help
  • Algebra Homework Help
  • Psychology Homework Help
  • Statistics Homework Help
  • English Homework Help
  • CPM homework help
  • Do My Homework For Me
  • Online Exam Help
  • Pay Someone to Do My Homework
  • Do My Math Homework
  • Macroeconomics Homework Help
  • Research Paper Help
  • Edit my paper
  • Research Paper Writing Service
  • Write My Paper For Me
  • Buy Term Papers Online
  • Buy College Papers
  • Paper Writing Services
  • Research Proposal Help
  • Proofread My Paper
  • Report Writing Help
  • Story Writing Help
  • Grant Writing Help
  • CHCDIV001 Assessment Answers
  • BSBWOR203 Assessment Answers
  • CHC33015 Assessment Answers
  • CHCCCS015 Assessment Answers
  • CHCECE018 Assessment Answers
  • CHCLEG001 Assessment Answers
  • CHCPRP001 Assessment Answers
  • CHCPRT001 Assessment Answers
  • HLTAAP001 Assessment Answers
  • HLTINF001 Assessment Answers
  • HLTWHS001 Assessment Answers
  • SITXCOM005 Assessment Answers
  • SITXFSA001 Assessment Answers
  • BSBMED301 Assessment Answers
  • BSBWOR502 Assessment Answers
  • CHCAGE001 Assessment Answers
  • CHCCCS011 Assessment Answers
  • CHCCOM003 Assessment Answers
  • CHCCOM005 Assessment Answers
  • CHCDIV002 Assessment Answers
  • CHCECE001 Assessment Answers
  • CHCECE017 Assessment Answers
  • CHCECE023 Assessment Answers
  • CHCPRP003 Assessment Answers
  • HLTWHS003 Assessment Answers
  • SITXWHS001 Assessment Answers
  • BSBCMM401 Assessment Answers
  • BSBDIV501 Assessment Answers
  • BSBSUS401 Assessment Answers
  • BSBWOR501 Assessment Answers
  • CHCAGE005 Assessment Answers
  • CHCDIS002 Assessment Answers
  • CHCECE002 Assessment Answers
  • CHCECE007 Assessment Answers
  • CHCECE025 Assessment Answers
  • CHCECE026 Assessment Answers
  • CHCLEG003 Assessment Answers
  • HLTAID003 Assessment Answers
  • SITXHRM002 Assessment Answers
  • Elevator Speech
  • Maid Of Honor Speech
  • Problem Solutions Speech
  • Award Presentation Speech
  • Tropicana Speech Topics
  • Write My Assignment
  • Personal Statement Writing
  • Narrative Writing help
  • Academic Writing Service
  • Resume Writing Services
  • Assignment Writing Tips
  • Writing Assignment for University
  • Custom Assignment Writing Service
  • Assignment Provider
  • Assignment Assistance
  • Solve My Assignment
  • Pay For Assignment Help
  • Assignment Help Online
  • HND Assignment Help
  • SPSS Assignment Help
  • Buy Assignments Online
  • Assignment Paper Help
  • Assignment Cover Page
  • Urgent Assignment Help
  • Perdisco Assignment Help
  • Make My Assignment
  • College Assignment Help
  • Get Assignment Help
  • Cheap Assignment Help
  • Assignment Help Tutors
  • TAFE Assignment Help
  • Study Help Online
  • Do My Assignment
  • Do Assignment For Me
  • My Assignment Help
  • All Assignment Help
  • Academic Assignment Help
  • Student Assignment Help
  • University Assignment Help
  • Instant Assignment Help
  • Powerpoint Presentation Service
  • Last Minute Assignment Help
  • World No 1 Assignment Help Company
  • Mentorship Assignment Help
  • Legit Essay
  • Essay Writing Services
  • Essay Outline Help
  • Descriptive Essay Help
  • History Essay Help
  • Research Essay Help
  • English Essay Writing
  • Literature Essay Help
  • Essay Writer for Australia
  • Online Custom Essay Help
  • Essay Writing Help
  • Custom Essay Help
  • Essay Help Online
  • Writing Essay Papers
  • Essay Homework Help
  • Professional Essay Writer
  • Illustration Essay Help
  • Scholarship Essay Help
  • Need Help Writing Essay
  • Plagiarism Free Essays
  • Write My Essay
  • Response Essay Writing Help
  • Essay Editing Service
  • Essay Typer
  • APA Reference Generator
  • Harvard Reference Generator
  • Vancouver Reference Generator
  • Oscola Referencing Generator
  • Deakin Referencing Generator
  • Griffith Referencing Tool
  • Turabian Citation Generator
  • UTS Referencing Generator
  • Swinburne Referencing Tool
  • AGLC Referencing Generator
  • AMA Referencing Generator
  • MLA Referencing Generator
  • CSE Citation Generator
  • ASA Referencing
  • Oxford Referencing Generator
  • LaTrobe Referencing Tool
  • ACS Citation Generator
  • APSA Citation Generator
  • Central Queensland University
  • Holmes Institute
  • Monash University
  • Torrens University
  • Victoria University
  • Federation University
  • Griffith University
  • Deakin University
  • Murdoch University
  • The University of Sydney
  • The London College
  • Ulster University
  • University of derby
  • University of West London
  • Bath Spa University
  • University of Warwick
  • Newcastle University
  • Anglia Ruskin University
  • University of Northampton
  • The University of Manchester
  • University of Michigan
  • University of Chicago
  • University of Pennsylvania
  • Cornell University
  • Georgia Institute of Technology
  • National University
  • University of Florida
  • University of Minnesota
  • Help University
  • INTI International University
  • Universiti Sains Malaysia
  • Universiti Teknologi Malaysia
  • University of Malaya
  • ERC Institute
  • Nanyang Technological University
  • Singapore Institute of Management
  • Singapore Institute of Technology
  • United Kingdom
  • Jobs near Deakin University
  • Jobs Near CQUniversity
  • Jobs Near La Trobe University
  • Jobs Near Monash University
  • Jobs Near Torrens University
  • Jobs Near Cornell University
  • Jobs Near National University
  • Jobs Near University of Chicago
  • Jobs Near University of Florida
  • Jobs Near University of Michigan
  • Jobs Near Bath Spa University
  • Jobs Near Coventry University
  • Jobs Near Newcastle University
  • Jobs Near University of Bolton
  • Jobs Near university of derby
  • Search Assignments
  • Connect Seniors
  • Essay Rewriter
  • Knowledge Series
  • Conclusion Generator
  • GPA Calculator
  • Factoring Calculator
  • Plagiarism Checker
  • Word Page Counter
  • Paraphrasing Tool
  • Living Calculator
  • Quadratic Equation
  • Algebra Calculator
  • Integral Calculator
  • Chemical Balancer
  • Equation Solver
  • Fraction Calculator
  • Slope Calculator
  • Fisher Equation
  • Summary Generator
  • Essay Topic Generator
  • Alphabetizer
  • Case Converter
  • Antiderivative Calculator
  • Kinematics Calculator
  • Truth Table Generator
  • Financial Calculator
  • Reflection calculator
  • Projectile Motion Calculator
  • Paper Checker
  • Inverse Function Calculator

Online Free Samples

Boosting Smart Home Device Security Protocol

Task: You have just joined as an IoT Architect at Ingenious IoT. The first project you have been tasked with is the setup of a demo IoT Smart Office, with a link to the company offices. The project is divided into 2 parts:

  • Create a smart office with the criteria and devices given
  • Control these smart devices from the branch office which is in the same city.

The Main Smart Office includes, but is not limited to the following smart devices:

  • Ceiling Fan
  • Front Door Lock
  • Motion Detector
  • Lawn Sprinkler System
  • Smoke Detecto
  • Temperature Monitor
  • Anemometer (Wind Speed Detector)

These devices are linked to a Wireless Router, which is linked via an Ethernet cable to a Cable Modem. The modem is connected to the Internet via an ISP known as Optras. All the devices registered on the Remote Server can be controlled locally by a Tablet which is also connected to the wireless network. There is a Remote Server connected to the Company's Cloud Cluster service (run by Sky Servers), as well as an external server that the Smart office uses for backups

Ensure that you add all necessary screenshots with the documentation as well as the packet tracer file to be presented to the manager for project approval

Tasks: Build and configure a smart office. (Refer to the file on the Student Resources named Assignment_2_Help). Start the smart office from the basic file, available from the link below: https://static-course-assets.s3.amazonaws.com/I2PT/en/index.html#6.2.1.2

Smart home device

  • Add, connect, enable and configure the registration server, tablet and wireless router as shown in the diagram below
  • Add, configure the smart devices mentioned in the case study and name these as given in the diagram below. Note that these devices should be connected to a wireless router wirelessly and should be encrypted using AES by using WPA-PSK (PSK pass phrase must be only your student ID
  • Connect and activate the devices with username and password as Student ID only.
  • Set up all the smart device attributes through the tablet web browser for the devices to work as shown in the diagram below
  • Show the protocols that are used in transmitting a simple PDU from the tablet to the Server.

Smart home technology Assignment

Add a new branch office in the same city. Either move the same tablet to the branch office or use your smart phone and connect to the main smart office server. You can use any connecting and intermediary devices of your choice. Log on to the web browser on your tablet/smart phone and manage the devices.

U se your tablet/smart phone to:

  • Turn off the Sprinkler
  • Turn off the ceiling fan
  • Lock the door
  • Dim the lamp
  • Turn on the smoke alarm
  • Turn on the motion detector
  • Turn on the wind detector

Rationale This assessment covers the following learning outcomes:

  • be able to explain and demonstrate various components of Internet of Things (IoT);
  • be able to analyse the role and importance of IoT in the modern world;
  • be able to investigate and propose various requirements of IoT for real world applications

Introduction: The adoption of smart home technology is on the rise across the globe. The smart device requires to interconnect within a network so as to work effectively. While some are reliant on the internet to establish the connections others simply need to establish a connection between device to communicate and perform effectively.

The previous report has been designed based upon the smart office network and its configuration based upon the requirement of the plan. The report also contains the screenshot of the working of the management so as to get a clear picture of the IoT network and its working. The screenshot also describes the configuration of the device with the help of Wi-Fi network to all the smart home device. In order to connect the Smart home technology with a particular network it has to go through a process of configuring the system with the Wi-Fi device with certain username and password. When the configuration is done successfully, it is necessary to create a new account with the help of a tablet or a smartphone and create a new username and password so that the management of the device and be operated successfully. The tablet or the smartphone will allow to login to the established network and then all the devices can get connected to the same network. The configuration of the wireless device is very essential for establishing an efficient network connection between the device and the wireless connection. It will help in mobility and also help to transfer the device from one place to another without any physical labor. Working and connecting the device with this network is very crucial as it help both the employees and the company to work effectively with the advanced method.

1. Configuring the Smart IOT network within Packet Tracer

Connecting  Smart home technology

Figure 1: Screen shot of connecting the Smart home technology

2.I. Screenshot of the IoT device connecting and its configuration.

smart home technology IoT device connecting

II. Screenshot for registering the device and creating an account

smart home technology registering device

3. Screenshot for opening the Smart IOT device with the help of a smart device

Smart home IOT device.jpg

4. Simple PDU from Tablet to the server

Simple PDU from Tablet to the server

Conclusion It can be concluded from the above screenshot that all the smart home device has been configured successfully and is able to meet the requirement of the organization in all possible ways. The network is also being tested through the established connection via a smart home device and its process of registration is also being conducted to have an authentic and secured network. The Smart home technology connection is being preferred over the wired network because it helps to connect all the device easily and successfully with the use of wire. This will help to reduce the cost of wiring and even allow the device to have a flexible network that can move from one place to another without any problem. It is also necessary to note the location of the wireless device because it is very important to establish connection within a range so that all the device that are connected with the wireless network can be able to connect with each other with strong network connection. Thus, it is necessary to have to keep and router in a middle position so that it can connect all the device successfully. It must also be noted that Wi-Fi booster can also be installed in those places where connection is weak so that a better network connection can be established.

Introduction: The second part of the project deals with the branch of the same management and the organization but is situated to a new and different location. The remote branch of the office and its diagram has also been demonstrated. It must be noted that the new branch is also connected to the same network in which the head office is being registered. This will allow to control the branch office of remote location to be able to control easily from the head office and will have a clear and established connection. Thus, a cable wire has been drawn from the head office to the remote location by which the connection can be established. A switch is also being installed in order to connect and disconnect the established network. The work will be done entirely online and thus a cloud based network has been formed which is directly connected from the head office computer and this is important as the data can be transferred easily via this cloud platform. Employees will have a clear access of all the required data and can be connected easily with the network easily. It is also important to have a access point network which is important to establish connection between the device of the head office with that of the device of the remote location. The access point has been established based upon the requirement of the organization which is important to establish network connection with the smart device to that of the connecting network in order to have a clear access of all the IoT devices which has been installed in all parts of the Smart office location. Establishing the network connection is highly important because it will allow the device to connect with the home network and work efficiently.

The screenshot that has been provided will help to understand the connection of the IoT devices with the help of any smart device or application.

Smart home device 1.jpg

Packet Tracer File

Packet Tracer File

Conclusion By the above scenario it can be easily stated that with the extreme growth and development of the smart IOT network which is very advanced, in some of the operations it can be done in the automated form. It can creates as well as increases the flexibility of the network by allowing the devices which is linked or merged with the network just to manage or organize from any of the location in this network. This devices basically constructed as per the requirement of the needs and wants too of the corporation and also do research which has been made on the device of IOT only and also construct for the increment of the network’s framework. This IOT device is configured to link up with the wireless access point and accurate authentication which is used especially for the maintenance of the security of the network. To test or check the connection of the network ICMP packets and give in between the sources (tablet/smart phone) and the aim (the registration server) just to decrease the problems or errors within the network and effectively delivered or supplied the project. This IOT network is very advanced in nature and due to this many problems can be sorted out easily. By this we can save a lot of time because it is very helpful in nature. This network can easily connect with the other one or with any other device which is also very advantageous by this doing of work through internet with the help of IOT can do in an easy way. The smartphones and the other devices like computer, tablets etc. are not going to have any damage like virus or any other things them. So, in other words, the devices are also get secured by the use of this IOT network.

Bibliography Behan, M. and Krejcar, O., 2013. Modern smart device-based concept of sensoric networks. EURASIP Journal on Wireless Communications and Networking, 2013(1), p.155.

Domingo, M.C., 2012. An overview of the Internet of Things for people with disabilities. Journal of Network and Computer Applications, 35(2), pp.584-596.

Kerski, J.J., 2003. The implementation and effectiveness of geographic information systems technology and methods in secondary education. Journal of Geography, 102(3), pp.128-137.

Luftman, J.N., Bullen, C.V., Liao, D., Nash, E. and Neumann, C., 2004. Managing the information technology resource: Leadership in the information age. Upper Saddle River, NJ: Pearson Education.

Mumtaz, S. and Rodriguez, J. eds., 2014. Smart device to smart device communication. Switzerland: Springer International Publishing.

Piyare, R., 2013. Internet of things: ubiquitous home control and monitoring system using android based smart phone. International Journal of Internet of Things, 2(1), pp.5-11.

Vermesan, O. and Friess, P. eds., 2013. Internet of things: converging technologies for smart environments and integrated ecosystems. River Publishers.

CHECK THE PRICE FOR YOUR PROJECT

Number of pages/words you require, choose your assignment deadline, related samples.

  • (CMP1042)Information systems assignment evaluating the hierarchy of information systems diagram
  • Information technology assignment on misinformation related to 5G spreading through websites
  • Professional employment skills assignment reflection and self development skills
  • business plan development using Artificial Intelligence assignment research
  • (MDA20009) Digital Communities Assignment On The Effect Digital Communication Has On Public Awareness And Decision Making
  • (DATA4100) Data Visualisation Software assignment
  • (MITS601) Research Methodology Assignment: Impact of full-text databases on Google as a search engine
  • Information Technology Assignment: Email Instant MessagingPolicy and Justification
  • (MITS6011) Research Methodology Assignment: Data Analysis Techniques For The Improvement Of Online Learning
  • Data Center Security Using Microsoft Threat Modeling
  • Business Analytics Assignment On Security And Privacy Challenges In The Big Data Era
  • (5NTCM001W) Programming Assignment on Password Storage Application
  • Information security assignment: discussion on e-fail and KRACK attacks
  • Digital Forensics Investigation Assignment: Critical Review on Digital Investigation Process Models
  • Information System Assignment: New Access System For Headspace
  • (Coit20248) Information System Assignment: Case Study Analysis on Australian Labs
  • Social & Digital Media Assignment Exploring The Exponential Growth Reported By The Industry
  • (MITS6002) Literature Review Analysis : Comparison Of Different Business Intelligence Tools
  • (MITS4003) Information System Assignment: Analysis Of Big Data Precision Marketing And E-Commerce Marketing Mode Based On Supply Chain Network Information
  • Information Technology Assignment On Employee Management Systems Use Towards Enhancing Employee Performance
  • Information System Assignment: Developing Biometric-Based Secure Attendance System
  • Information Management Assignment: Study On Management Information System of METRO
  • Data Analytics Assignment: A Reflective Journal On Business Data Strategy & Management
  • Information Technology Assignment: Effectiveness Of Using Technological Tools For Marketing
  • Business Analytics Assignment: Value Chain Analysis For Pizza Restaurant

Question Bank

Looking for Your Assignment?

smart home assignment

FREE PARAPHRASING TOOL

smart home assignment

FREE PLAGIARISM CHECKER

smart home assignment

FREE ESSAY TYPER TOOL

Other assignment services.

  • SCM Assignment Help
  • HRM Assignment Help
  • Dissertation Assignment Help
  • Marketing Analysis Assignment Help
  • Corporate Finance Assignment Help

FREE WORD COUNT AND PAGE CALCULATOR

FREE WORD COUNT AND PAGE CALCULATOR

smart home assignment

QUESTION BANK

smart home assignment

ESCALATION EMAIL

To get answer.

Please Fill the following Details

Thank you !

We have sent you an email with the required document.

Ask a question from expert

Smart Home Network System Assignment 2022

Design and implement a secure enterprise wireless network

Added on   2022-10-17

   Added on  2022-10-17

Smart Home Network System  Assignment  2022_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Design and Implementation of Secure Smart Home and Enterprise WLAN lg ...

Troubleshooting enterprise wlan: techniques and tools lg ..., network security and design lg ..., internet of things (iot) and home network lg ..., assignment on application of internet of things lg ..., internet of things privacy and security issues lg ....

StudyMonkey

Your personal ai tutor.

Learn Smarter, Not Harder with AI

Introducing StudyMonkey, your AI-powered tutor .

StudyMonkey AI can tutor complex homework questions, enhance your essay writing and assess your work—all in seconds.

No more long all-nighters

24/7 solutions to questions you're stumped on and essays you procrastinated on.

No more stress and anxiety

Get all your assignments done with helpful answers in 10 seconds or less.

No more asking friends for help

StudyMonkey is your new smart bestie that will never ghost you.

No more staying after school

AI tutoring is available 24/7, on-demand when you need it most.

AI Tutor for any subject

American college testing (act), anthropology, advanced placement exams (ap exams), arabic language, archaeology, biochemistry, chartered financial analyst (cfa) exam, communications, computer science, certified public accountant (cpa) exam, cultural studies, cyber security, dental admission test (dat), discrete mathematics, earth science, elementary school, entrepreneurship, environmental science, farsi (persian) language, fundamentals of engineering (fe) exam, gender studies, graduate management admission test (gmat), graduate record examination (gre), greek language, hebrew language, high school entrance exam, high school, human geography, human resources, international english language testing system (ielts), information technology, international relations, independent school entrance exam (isee), linear algebra, linguistics, law school admission test (lsat), machine learning, master's degree, medical college admission test (mcat), meteorology, microbiology, middle school, national council licensure examination (nclex), national merit scholarship qualifying test (nmsqt), number theory, organic chemistry, project management professional (pmp), political science, portuguese language, probability, project management, preliminary sat (psat), public policy, public relations, russian language, scholastic assessment test (sat), social sciences, secondary school admission test (ssat), sustainability, swahili language, test of english as a foreign language (toefl), trigonometry, turkish language, united states medical licensing examination (usmle), web development, step-by-step guidance 24/7.

Receive step-by-step guidance & homework help for any homework problem & any subject 24/7

Ask any question

StudyMonkey supports every subject and every level of education from 1st grade to masters level.

Get an answer

StudyMonkey will give you an answer in seconds—multiple choice questions, short answers, and even an essays are supported!

Review your history

See your past questions and answers so you can review for tests and improve your grades.

It's not cheating...

You're just learning smarter than everyone else

How Can StudyMonkey Help You?

Hear from our happy students.

"The AI tutor is available 24/7, making it a convenient and accessible resource for students who need help with their homework at any time."

"Overall, StudyMonkey is an excellent tool for students looking to improve their understanding of homework topics and boost their academic success."

Upgrade to StudyMonkey Premium!

You have used all of your answers for today!

Why not upgrade to StudyMonkey Premium and get access to all features?

Take advantage of our 14 day free trial and try it out for yourself!

smart home assignment

IMAGES

  1. Smart Home Technology Assignment Sample

    smart home assignment

  2. Smart Home Infographic

    smart home assignment

  3. Smart Home Infographic by www.CustomControls.co.uk

    smart home assignment

  4. A Beginner's Guide to Setting Up a Smart Home

    smart home assignment

  5. 5 Essential Tips For Making Your House a Smart Home

    smart home assignment

  6. What is a Smart Home

    smart home assignment

COMMENTS

  1. How to Build a Smart Home: A Step-by-Step Guide 2024

    Connecting your smart devices to the network is a fundamental step in setting up your smart home. Here's a guide to ensure a smooth and secure connection: Wi-Fi Selection: Use a reliable and secure Wi-Fi network with a strong password. Avoid using default router credentials.wp.

  2. How to Set Up Your Smart Home: A Beginner's Guide

    How to Control Everything In Your Smart Home. You can control the basic functions of many smart home devices directly via Wi-Fi and a companion mobile app. This means that you can simply pick up a ...

  3. Smart Home Systems Based on Internet of Things

    We explore the concept of smart home with the integration of IoT services and cloud computing to it, by embedding intelligence into sensors and actuators, networking of smart things using the corresponding technology, facilitating interactions with smart things using cloud computing for easy access in different locations, increasing computation ...

  4. Smart Home: Definition, Tech & Security

    Home appliances, such as the washing machine, lights or the coffee maker, can be time-controlled.Devices like motion sensors, cameras, shutters or thermostats initiate user-programmed processes. The heart of the smart home is the central control unit, with which various smart components are connected and can be controlled from the PC, smartphone or tablet.

  5. Programming the smart home: 'If this, then that'

    Taken together, the researchers say, the results suggest that trigger-action programming is flexible enough to do what people want a smart home to do, and simple enough that non-programmers can use it.

  6. Home Assistant: How to start a smart home

    From there, you can flash your card via an URL, put that flashed medium into your SBC (single board computer) when you are done, connect that bad boy to your router, and let it set up. You should ...

  7. Self-Assessment

    This self-assessment can help you identify what you want to do and plan for your smart home. It will prompt you to think about: Your goals, strengths, and challenges. Your home environment. The supports you already have in place. Use your answers to this self-assessment as a guide when consulting with your support team to steer the planning of ...

  8. DIY Smart Home Automation Using Android : 6 Steps

    Step 3: The Circuit Diagram. The circuit diagram of the project is shown above in figure above. The starting from the power supply section, we have the 9V AC input from the secondary output of the transformer. This is the fed to the bridge rectification section that converts AC supply into DC supply.

  9. Review on the Application of Artificial Intelligence in Smart Homes

    Literature reviews and product reviews are given to define the functions and roles of artificial intelligence in smart homes. We determined the application status of artificial intelligence in ...

  10. Smart Home Technology: An Exploration of End User Perceptions

    Also, smart home devices are consistently perceived as complex and expensive, and lack perceived value and trustworthiness. Interview questions asked to 10 current smart home technology users. ...

  11. Smart home security: challenges, issues and solutions at different IoT

    A smart home is an application of IoT environment, which comprises of physical components and Internet connectivity. These devices communicate with each other and provide innovative and smart services to the user [1, 96].Smart heaters, smart coolers, smart televisions, smart watches, mobile devices, and smart locks are IoT-based smart home appliances that are connected with the Internet and ...

  12. Securing the Smart Home: a real case study

    This is due to the many advantages, in easing users' every-day life and work, provided by the emerging Internet of Things (IoT) technologies and devices, equipped with sensors, cameras, or...

  13. SMART HOME USING CISCO PACKET TRACER

    Smart home is a living home that contains smart objects that can automate home tasks in advancewithout engaging users such as tracking home environment condition by different sensors (temperature, humidity, smoke, wind, sound) then ventilate the air depending on sensor details.

  14. How to Develop a Smart Home App

    Z-Wave is a purely wireless home automation protocol. It was developed by Zensys, introduced in 2001 and currently owned by Silicon Labs. It was specifically designed for the low power, low bandwidth needs of the smart home, which makes Z-Wave battery-efficient. Smart Home Technology Comparison. Watch on.

  15. AI and Smart Homes

    Skip to document M soban sajid Roll number 040 Artificial Intelligence (AI) and Smart Homes Hello everyone! Today, I will discuss artificial intelligence and smart home. Looking back ten years ago, the idea of being able to remotely control home lighting, temperature, and home security systems through a mobile phone seemed like a great movie.

  16. Smart Homework: How to Manage and Assess It

    In the first installment of our smart homework series from author & teaching consultant Rick Wormeli, he made the case for take-home assignments that matter for learning and engage student interest.In Part 2, Rick suggested 13 guiding principles to help teachers create homework challenges that spark deeper learning. In this final article, Rick suggests some good ways to assess homework and ...

  17. Assignment On Internet of Things and Smart Home

    IoT smart Home Current devices used in my dwelling Current devices 1. IoT across the board home security framework incorporates a HD camcorder and sensors for air quality, movement, sound, temperature and vibration in one unit. The framework utilizes machine figuring out how to figure out what constitutes ordinary action in the home and gives you a chance to send alarms to the Canary portable ...

  18. Smart Home Photos and Premium High Res Pictures

    Pixel perfect. Editable stroke. The set contains icons: Smart Home, Ecosystem, Remote Control, Wireless Technology, Security System, Internet of Things. Smart Home Living Room Close-up on an automated security system at a house Modern Living Room And Open Plan Kitchen At Night With Neon Lights.

  19. PDF Packet Tracer Adding IoT Devices to a Smart Home

    Part 1: Explore the Existing Smart Home Network Step 1: Open the Smart_Home_Network.pkt file a. Open the Smart_Home_Network.pkt file. b. Save the file to your computer. Step 2: Explore the Smart Home Network a. Explore IoT end devices. At the bottom left corner of the Packet Tracer window, locate and click the [End Devices] icon in the top

  20. Smart Home Technology Assignment Sample

    Question Task: You have just joined as an IoT Architect at Ingenious IoT. The first project you have been tasked with is the setup of a demo IoT Smart Office, with a link to the company offices. The project is divided into 2 parts: Create a smart office with the criteria and devices given

  21. Smart home technology Assignment Sample.pdf

    24/09/2021, 21:25 Smart home technology Assignment Sample 1/149 G E T A S S I S T A N C E ☰ Free sample Smart home technology assignment sample Boosting Smart Home Device Security Protocol Question Task: You have just joined as an IoT Architect at Ingenious IoT. The first project you have been tasked with is the setup of a demo IoT Smart Office, with a link to the company offices.

  22. Smart Home Network System Assignment 2022

    These smart devices may include home appliances like refrigerator, washing machines, lighting systems like lamps, bulbs, or any other devices like television, home speakers and so on. The primary components for the functionality of these smart devices are sensors, connectivity, software, and a user interface [1]. The purpose of the smart home ...

  23. Free AI Homework Helper

    Get all your assignments done with helpful answers in 10 seconds or less. No more asking friends for help. StudyMonkey is your new smart bestie that will never ghost you. No more staying after school. AI tutoring is available 24/7, on-demand when you need it most. AI Tutor for any subject