Understanding and Guaranteeing Security, Privacy, and Safety of Smart Homes

Total Page:16

File Type:pdf, Size:1020Kb

Understanding and Guaranteeing Security, Privacy, and Safety of Smart Homes UNIVERSITY OF CALIFORNIA, IRVINE Understanding and Guaranteeing Security, Privacy, and Safety of Smart Homes DISSERTATION submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in Computer Engineering by Rahmadi Trimananda Dissertation Committee: Professor Brian Demsky, Chair Professor Athina Markopoulou Professor Guoqing (Harry) Xu 2020 © 2020 Rahmadi Trimananda DEDICATION To God the Trinity, my family, and humanity ii TABLE OF CONTENTS Page LIST OF FIGURES vi LIST OF TABLES vii ACKNOWLEDGMENTS ix VITA xi ABSTRACT OF THE DISSERTATION xiii 1 Introduction 1 1.1 Overview of a Smart Home . .2 1.1.1 Components . .3 1.1.2 Execution Model . .4 1.2 Smart Home Devices . .4 1.3 Smart Home Platforms . .7 1.4 Smart Home Apps . .8 1.5 Organization . 12 2 Packet-Level Signatures for Smart Home Devices 14 2.1 New Packet-Level Signatures . 14 2.2 Problem Setup . 15 2.2.1 Threat Model . 15 2.2.2 Smart Home Environment and Experimental Testbed . 16 2.2.3 Motivating Case: Smart Plugs . 20 2.3 PingPong Design . 21 2.3.1 Training . 22 2.3.2 Detection . 30 2.4 Evaluation . 33 2.4.1 Extracting Signatures from Smart Home Devices . 37 2.4.2 Smart Home Testbed Experiment . 40 2.4.3 Negative Control Experiment . 42 2.4.4 Events Triggered Remotely . 43 2.4.5 Devices from the Same Vendor . 47 2.4.6 Public Dataset Experiment . 48 2.4.7 Parameters Selection and Sensitivity . 56 iii 2.5 Possible Defenses against Packet-Level Signatures . 57 2.5.1 Possible Implementations . 58 2.5.2 Residual Side-Channel Information . 59 2.5.3 Efficacy of Packet Padding . 60 2.5.4 Recommendations for Padding . 62 2.5.5 Traffic Shaping and Injection . 62 3 Securing Smart Home Edge Computing 64 3.1 Smart Home System Vulnerabilities . 64 3.2 Vigilia Approach . 66 3.3 Threat Model and Guarantees . 67 3.4 Example . 68 3.5 Architecture and Programming Model . 70 3.6 Vigilia Security Mechanisms . 75 3.7 Vigilia Runtime System . 80 3.8 Evaluation . 83 3.8.1 Applications . 84 3.8.2 Comparisons . 87 3.8.3 Public IP . 92 3.8.4 Performance Microbenchmarks . 94 4 Understanding and Detecting Conflicting Interactions between Smart Home IoT Applications 96 4.1 Methodology . 97 4.1.1 Definitions . 98 4.1.2 Smart Home App Pairs . 101 4.1.3 Threats to Validity . 104 4.2 Device Interaction . 106 4.2.1 RQ1: Types of Non-Conflicting Interactions . 107 4.2.2 RQ2: Types of Conflicting Interactions . 108 4.2.3 RQ3: Prevalence of Conflicts . 110 4.2.4 RQ4: Unsafe Coding Patterns . 110 4.3 Physical-Medium Interaction . 111 4.3.1 RQ1&2: Types of (Non-)Conflicting Interactions . 111 4.3.2 RQ3&4: Prevalence of Conflicts/Unsafe Coding . 113 4.4 Global-Variable Interaction . 114 4.4.1 RQ1: Types of Non-Conflicting Interactions . 114 4.4.2 RQ2: Types of Conflicting Interactions . 115 4.4.3 RQ3&4: Prevalence of Conflicts and Unsafe Coding . 116 4.5 IoTCheck: Automated Conflict Detection . 117 4.5.1 IoTCheck Design . 117 4.5.2 Results . 122 iv 5 Related Work 124 5.1 Network Traffic Analysis and Defenses . 124 5.2 Smart Home and IoT Security . 132 5.3 Interactions of Smart Home Applications . 139 5.4 Other Related Work . 149 6 Conclusions 151 6.1 Summary . 151 6.2 Limitations and Future Directions . 152 Bibliography 155 v LIST OF FIGURES Page 1.1 SmartThings platform that integrates devices and manages multiple apps. .2 2.1 Our experimental setup for studying smart home devices. \Wi-Fi Device" is any smart home device connected to the router via Wi-Fi (e.g., Amazon and WeMo plugs). \Ethernet Device" is any smart home device connected to the router via Ethernet (e.g., SmartThings hub that relays the communication of Zigbee devices). Smart home device events may result in communication between Phone-Cloud, Device-Cloud, or Phone-Device. There may also be background traffic from additional computing devices in the home. 17 2.2 Left: PingPong Overview. Right: TP-Link plug is used as a running example throughout this section. 23 2.3 Pair clustering and signature creation for 2 extreme cases|TP-Link plug has the simplest signature with only 1 pair (see our initial findings in Ta- ble 2.2). The Arlo camera has a more complex signature with 1 sequence of 2 pairs and 1 sequence of 1 pair. The left subfigure, in every row, depicts the packet lengths in one packet pair (Pc1 , Pc2 ). Notation: C->S means a pair where the first packet's direction is Client-to-Server and the second packet's direction is server-to-client, and vice versa for S->C; f: 50 means that the pair appears in the clustering with a frequency of 50 ; Signature notation shows a summary of 2 sets of 50 instances of packet sequences. Example: C->S 556, 1293 f: 50 means that the pair of packets with lengths 556 (client-to-server) and 1293 (server-to-client) appear 50 times in the cluster. 24 3.1 A closer examination of an irrigation system. 68 3.2 Vigilia system architecture. 70 3.3 Example application code in Java. 72 3.4 Example device driver header in C++. 74 3.5 Capability-based RMI example. 79 3.6 Vigilia program (i.e., irrigation system) (a), device database (b), and instan- tiated firewall rules (c). 80 3.7 Vigilia hardware setup. 84 4.1 SmartThings Execution Traces. 98 4.2 IoTCheck Architecture. 118 4.3 Conflict Analysis . 119 vi LIST OF TABLES Page 2.1 The set of smart home devices considered in this paper. Devices highlighted in green are among the most popular on Amazon. 18 2.2 Packet-level signatures of TP-Link, D-Link, and SmartThings smart plugs observable by the WAN sniffer. The numbers represent packet lengths, with red indicating that the length is different for ON vs. OFF, and the arrows represent packet directions. 19 2.3 Smart plugs found to exhibit Phone-Cloud, Device-Cloud, and Phone-Device signatures. Prefix PH indicates Phone-to-device direction and prefix D indi- cates Device-to-phone direction in Signature column. Column Dura. reports numbers in the form of Min./Avg./Max., namely minimum, average, and maximum durations respectively. 34 2.4 Smart light bulbs found to exhibit Phone-Cloud, Device-Cloud, and Phone- Device signatures. Prefix PH indicates Phone-to-device direction and prefix D indicates Device-to-phone direction in Signature column. Column Dura. re- ports numbers in the form of Min./Avg./Max., namely minimum, average, and maximum durations respectively. 35 2.5 Smart thermostats and sprinklers found to exhibit Phone-Cloud, Device- Cloud, and Phone-Device signatures. Prefix PH indicates Phone-to-device direction and prefix D indicates Device-to-phone direction in Signature col- umn. Column Dura. reports numbers in the form of Min./Avg./Max., namely minimum, average, and maximum durations respectively. 36 2.6 Smart home security devices and others found to exhibit Phone-Cloud, Device- Cloud, and Phone-Device signatures. Prefix PH indicates Phone-to-device di- rection and prefix D indicates Device-to-phone direction in Signature column. Column Dura. reports numbers in the form of Min./Avg./Max., namely minimum, average, and maximum durations respectively. 37 2.7 Device-Cloud signature in 9 devices triggered by IFTTT home automation. 44 2.8 Comparison of Device-Cloud signatures for three devices (TP-Link plug, D- Link plug, and Rachio sprinkler) triggered in three different ways: via (i) a local phone, (ii) a remote phone, and (iii) IFTTT home automation. 45 2.9 Signatures extracted from different TP-Link devices. ∗These are the latest signatures for the TP-Link plug and TP-Link light bulb (per December 2019). 48 2.10 Signatures extracted from the cameras and light bulbs only in the Mon(IoT)r [166] dataset. 49 vii 2.11 Signatures extracted from the voice command devices only in the Mon(IoT)r [166] dataset. 50 2.12 Signatures extracted from the smart TVs and other devices only in the Mon(IoT)r [166] dataset. 51 2.13 Common devices that have the same signatures in the Mon(IoT)r and our testbed experiments. ∗ signature: training on our testbed. y signature: training on Mon(IoT)r [166]. Matching: training on testbed, detection on Mon(IoT)r. The number of events vary (around 30-40) per event type|the result is presented in % for convenience. 51 2.14 Common devices that have similar signatures in the Mon(IoT)r and our testbed experiments. ∗ signature: training on our testbed. y signature: training on Mon(IoT)r [166]. Matching: training on testbed, detection on Mon(IoT)r. The number of events vary (around 30-40) per event type|the result is pre- sented in % for convenience. 52 3.1 Lines of code in Vigilia applications. 85 3.2 Summary of Vigilia applications. 85 3.3 Attacks performed on devices. ..
Recommended publications
  • Voice Controlled Home Automation Akshay Mewada, Ayush Mishra, Manoj Gupta, Rahul Dash, Prof
    Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue on 3rd International Conference on Electronics & Computing Technologies-2016 Conference Held at K.C. College of Engineering & Management Studies & Research, Maharashtra, India Voice Controlled Home Automation Akshay Mewada, Ayush Mishra, Manoj Gupta, Rahul Dash, Prof. Nilofer Mulla BE EXTC, Department of Electronics and Telecommunication Engineering, K.C. College of Engineering & Management Studies & Research, Kopri, Thane (E), Maharashtra, India Abstract— Voice Controlled Home Automation is a very useful project for the adults and physically disabled persons, who are not able to do various activities efficiently when they are at home and need one’s assistant to perform those tasks. With the Voice Recognition the complication of wiring in case of wired automation is prevented. With the use of Bluetooth Home Automation considerable amount of power saving is possible and it is flexible and compatible with future technologies so it can be easily customized for individual requirements. Voice recognition system provides secure access to home. In the recent years, the Home Automation systems have seen rapid changes due to introduction of various wireless technologies. Home Automation industry is growing rapidly, this is fuelled by the need to provide supporting systems that are made to ease our life. Automation systems is supposed to be implemented in existing home environments, without any changes in the infrastructure. The automation is based on recognition of voice commands and uses Bluetooth modules along with microcontroller. This paper presents the overall design of ‘Voice Controlled Home Automation’, which we are currently developing.
    [Show full text]
  • Design and Implementation of Internet of Things for Home Environment
    Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere without the permission of the Author. Design and Implementation of Internet of Things for Home Environment A thesis presented in partial fulfilment of the requirements for the degree of Master of Engineering in Electronics and Computer Systems Engineering at Massey University, Manawatu, New Zealand. Sean Kelly 2013 Abstract An integrated framework for smart home monitoring towards internet of things based on ZigBee and 6LoWPAN wireless sensor networks is presented. The system was developed to retrofit existing sub systems of wireless technologies in order to reduce cost, and complexity. The practical internetworking architecture and the connection procedures for reliable measurement of smart sensors parameters and transmission of sensing data via internet are presented. A ZigBee based sensing system was designed and developed to see the feasibility of the system in home automation for contextual environmental monitoring. The ubiquitous sensing system is based on combination of pervasive distributed sensing units and an information system for data aggregation and analysis. Results related to the home automation parameters and execution of the system running continuously for long durations is encouraging. The prototype system (ZigBee based) was tested to generate real-time graphical information rather than using a simulator or a test bed scenario. A trail has also been performed with 6LoWPAN technology to provide functionality as the ZigBee based system. The overall internetworking architecture describes the integration of a low power consumption wireless sensor network with the internet.
    [Show full text]
  • Wireless Temperature Monitoring System Using Wireless Sensor Networks
    ISSN: 2278 – 909X International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 1, Issue 4, October 2012 WIRELESS TEMPERATURE MONITORING SYSTEM USING WIRELESS SENSOR NETWORKS Author -Prof.S.S.Sarade Prof.A.C.Joshi Prof. SACHIN S. PATIL Prof.A.N.Shinde R.I.T Rajaramnagar ADCET, ASHTA A.D.C.E.T ASHTA ADCET, ASHTA [email protected] Abstract - In today’s world we are facing with and networking possibilities with a variety of many different types of emergencies in networks such as CISCO messaging client or a the indoor environment. Response to such desktop program in order to make messaging emergencies is critical in order to protect easily integrated with existing systems. Using resources including human life and also we can wireless sensor networks it is possible to inform save property from damage. In this Paper, we appropriate user in timely manner. It emergency present wireless sensor network for Temperature detection and it is possible to save life of people, monitoring. Which can report the emergency to it will avoid damage of property. [1] the users in various forms, such as pop-ups on a The advancement of science and Computer screen, SMS on their cell phones and technology are dependent on parallel progress in so on. Due to this flexibility of reporting low sensing and measurement techniques. The cost wireless sensor network prepared for reason for this is obvious. As science and emergency response system of future. In this technology move ahead new phenomena and paper we are going to develop three wireless relationships are discovered and these advances sensor nodes and we have to place in different make new types of imperative.
    [Show full text]
  • Wolfbot: a Distributed Mobile Sensing Platform for Research and Education
    Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) WolfBot: A Distributed Mobile Sensing Platform for Research and Education Joseph Betthauser, Daniel Benavides, Jeff Schornick, Neal O’Hara, Jimit Patel, Jeremy Cole, Edgar Lobaton Abstract— Mobile sensor networks are often composed of agents with weak processing capabilities and some means of mobility. However, recent developments in embedded systems have enabled more powerful and portable processing units capable of analyzing complex data streams in real time. Systems with such capabilities are able to perform tasks such as 3D visual localization and tracking of targets. They are also well-suited for environmental monitoring using a combination of cameras, microphones, and sensors for temperature, air-quality, and pressure. Still there are few compact platforms that combine state of the art hardware with accessible software, an open source design, and an affordable price. In this paper, we present an in- depth comparison of several mobile distributed sensor network platforms, and we introduce the WolfBot platform which offers a balance between capabilities, accessibility, cost and an open- design. Experiments analyzing its computer-vision capabilities, power consumption, and system integration are provided. Index Terms— Distributed sensing platform, Swarm robotics, Open design platform. I. INTRODUCTION ireless sensor networks have been used in a variety of Wapplications including surveillance for security purposes [30], monitoring of wildlife [36], [25], [23], Fig 1.WolfBot mobile sensing platform and some of its features. and measuring pollutant concentrations in an environment [37] [24]. Initially, compact platforms were deployed in order to As the number of mobile devices increases, tools for perform low-bandwidth sensing (e.g., detecting motion or distributed control and motion planning for swarm robotic recording temperature) and simple computations.
    [Show full text]
  • Long-Range Wireless Radio Technologies: a Survey
    future internet Review Long-Range Wireless Radio Technologies: A Survey Brandon Foubert * and Nathalie Mitton Inria Lille - Nord Europe, 59650 Villeneuve d’Ascq, France; [email protected] * Correspondence: [email protected] Received: 19 December 2019; Accepted: 11 January 2020; Published: 14 January 2020 Abstract: Wireless networks are now a part of the everyday life of many people and are used for many applications. Recently, new technologies that enable low-power and long-range communications have emerged. These technologies, in opposition to more traditional communication technologies rather defined as "short range", allow kilometer-wide wireless communications. Long-range technologies are used to form Low-Power Wide-Area Networks (LPWAN). Many LPWAN technologies are available, and they offer different performances, business models etc., answering different applications’ needs. This makes it hard to find the right tool for a specific use case. In this article, we present a survey about the long-range technologies available presently as well as the technical characteristics they offer. Then we propose a discussion about the energy consumption of each alternative and which one may be most adapted depending on the use case requirements and expectations, as well as guidelines to choose the best suited technology. Keywords: long-range; wireless; IoT; LPWAN; mobile; cellular; LoRa; Sigfox; LTE-M; NB-IoT 1. Introduction Wireless radio technologies, such as Wi-Fi, are used daily to enable inter-device communications. In the last few years, new kinds of wireless technologies have emerged. In opposition to standard wireless technologies referred to as “short-range”, long-range radio technologies allow devices to communicate over kilometers-wide distances at a low energy cost, but at the expense of a low data rate.
    [Show full text]
  • The International Journal of Science & Technoledge
    The International Journal Of Science & Technoledge (ISSN 2321 – 919X) www.theijst.com THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE Wireless Microcontroller Based Mutlidrop System L. J. Kore P.G. Student, Electronics & Telecommunication Enginerring Department, SVERI’s College of Engineering, Pandharpur, Maharashtra, India Dr. Bodhe S. K. Professor, Electronics & Telecommunication Enginerring Department, SVERI’s College of Engineering, Pandharpur, Maharashtra, India Abstract: In our daily life, Wireless based industrial automation is a prim e concern. The field of approach to Zigbee Based Wireless Network for Industrial Applications has been standardized now a days. A wireless control and monitoring system for a industrial machines realized using the Zigbee communication protocol for safe and economic data communication in industrial fields where the wired communication is either more expensive or impossible due to physical conditions. The machines can be controlled wireless due to the microcontroller interface developed with Zigbee. It is also possible to protect the machines against some critical conditions such as change in temperature, humidity, light, pressure etc. so controlling, monitoring, and protection of the system are realized in real time. So the wireless communication technology is used in this paper, controlling abilities of the system are increased and also hardware and the necessities of other similar equipment for data communication are minimized. We concerns with designing and implementing the system which can be utilized effectively to reduce human efforts and accuracy of measurement of data. The main work behind this is to make instrumentation system more power full by enabling it modern communication technologies. Here we are using different sensors like temperature and humidity to measure surrounding temperature and humidity.
    [Show full text]
  • Home Automation System
    Home Automation System Clayton Brutus, Computer Engineering Project Advisor and Sponsor: Mr. Mark Randall April 26, 2018 Evansville, Indiana Table of Contents I. Introduction II. Background III. Client Requirements IV. Project Design A. Initial Design Choices B. Constraints and Considerations i. Safety Considerations ii. Mechanical Constraints iii. Manufacturability C. Hardware i. Relay Control ii. Light Dimming iii. Power Monitoring iv. Thermostat D. Software i. Server ii. Touchscreen Interface iii. Amazon Skill Lambda Function V. Results VI. Conclusion VII. References VIII. Appendices A. Schematic Print ​ B. Light Switch Bill of Materials C. Server Code D. Touchscreen GUI Code E. Amazon Skill Lambda Script List of Figures Figure 1: Digi XBee Pro S2C Development Module Figure 2: Raspberry Pi Model 3 B Figure 3: Amazon Echo Dot 2nd Edition Figure 4: Lightswitch PCB Assembly Figure 5: Hub Assembly Figure 6: Relay Toggling Circuit Figure 7: Light Dimming Circuit Figure 8: Digital Potentiometer and PWM Generator Circuit Figure 9: Diode AND Gate with Schmitt Trigger Inverter Figure 10: Current Transformer Figure 11: Power Usage Measuring Circuit Figure 12: 3D PCB Renderings (Front, Back) Figure 13: Server Request Processing Flowchart Figure 14: Touchscreen Interface List of Tables Table 1: Existing Home Automation System Table 2: Available Voice Commands I. Introduction Home automation systems are a relatively new concept which aim to make houses more intelligent and automated in order to make life easier and safer for a house’s occupants. Existing systems usually are capable of controlling the lighting, appliances, temperature, and security systems of an home by replacing the devices in the traditional ‘dumb’ devices with advanced ‘smart’ devices.
    [Show full text]
  • Mugla Journal of Science and Technology a WIRELESS SENSOR
    Mugla Journal of Science and Technology, Vol 3, No 2, 2017, Pages 150-154 Mugla Journal of Science and Technology A WIRELESS SENSOR NETWORK APPLICATION FOR VEHICLE TRACKING IN CAMPUS AREAS Gürcan ÇETİN1* , Feyyaz OKUL 1 , Süheyl KARADAŞ 1 1Department of Information Systems Engineering, Faculty of Technology, Muğla Sıtkı Koçman University, 48000, Muğla, Turkey [email protected], [email protected] , [email protected] Received: 22.10.2017, Accepted: 07.12.2017 *Corresponding author doi: 10.22531/muglajsci.357087 Abstract In this study, a Wireless Sensor Network structure was designed in order to track the vehicles entering a certain safe zone in real time, and it was tested in the campus area of Muğla Sıtkı Koçman University. To track the locations of the vehicles in the designed WSN infrastructure, a GTPA010 GPS module was used at the end devices components placed on vehicles. Moreover, the XBee S1 modules based on the ZigBee protocol were used to wirelessly transmit the obtained location data to a center node. An ASP.Net-based web application has been developed to graphically present the vehicle location information in a security center and record them in the MSSQL database at intervals of 5 minutes. It also notifies system administrators in case of long waiting times of the vehicles in the areas outside the pre-specified areas. At the end of the study, it has been proved that WSNs can be used as alternatives to wireless network infrastructures such as GSM or WIFI when vehicles are tracked in small scale campus areas. Keywords: Vehicle tracking, GPS, XBee, ZigBee YERLEŞKE ALANLARINDA ARAÇ TAKİBİ İÇİN BİR KABLOSUZ ALGILAYICI AĞ UYGULAMASI Öz Bu çalışmada belirli bir güvenli bölgeye giren araçları gerçek zamanlı olarak takip etmek amacıyla bir Kablosuz Algılayıcı Ağ tasarlanmış ve Muğla Sıtkı Koçman Üniversitesi yerleşke alanında test edilmiştir.
    [Show full text]
  • Vigilia: Securing Smart Home Edge Computing
    2018 Third ACM/IEEE Symposium on Edge Computing Vigilia: Securing Smart Home Edge Computing Rahmadi Trimananda Ali Younis Bojun Wang University of California, Irvine University of California, Irvine University of California, Irvine [email protected] [email protected] [email protected] Bin Xu Brian Demsky Guoqing Xu University of California, Irvine University of California, Irvine University of California, Los Angeles [email protected] [email protected] [email protected] Abstract—Smart home IoT devices are becoming increas- parate devices, but existing hubs including SmartThings have ingly popular. Modern programmable smart home hubs such serious security weaknesses. as SmartThings enable homeowners to manage devices in SmartThings: SmartThings is a smart home environ- sophisticated ways to save energy, improve security, and pro- vide conveniences. Unfortunately, many smart home systems ment created by Samsung [61]. This environment allows contain vulnerabilities, potentially impacting home security and smart home devices (e.g., SmartThings and third-party de- privacy. This paper presents Vigilia, a system that shrinks the vices) to be connected to a home network, monitored, and attack surface of smart home IoT systems by restricting the controlled through the SmartThings phone app. Among these network access of devices. As existing smart home systems are devices, Zigbee or Z-Wave devices are connected to the closed, we have created an open implementation of a similar programming and configuration model in Vigilia and extended LAN via the SmartThings smart hub, while WiFi devices the execution environment to maximally restrict communica- are directly connected to the LAN. tions by instantiating device-based network permissions. We The SmartThings environment also allows the user to have implemented and compared Vigilia with forefront IoT- create smart home apps (SmartApps) to manage connected defense systems; our results demonstrate that Vigilia outper- devices to perform specific functionality.
    [Show full text]
  • Apple Homekit Application and Cost Breakdown
    Apple HomeKit Application and Cost Breakdown Nicholas Fifield California Polytechnic State University, San Luis Obispo San Luis Obispo, CA A principle part of the American dream is to own a home. The definition of an American home is constantly changing, and smart home technology gives more functionality and control over a person’s space. With devices updating constantly and with newer devices coming out every day, having an organized, well-connected smart home can define a person’s home. Apple’s HomeKit ecosystem gives users a single application interface to operate smart home technology for an entire, organized home opposed to other similar ecosystems without necessary functions run by other companies like Google or Amazon. Starting or remodeling a smart home can be easy enough for a homeowner to complete on their own but there are many obstacles in completing a smart home. Preparing this application and cost deliverable will make it easier for an American homeowner to update their own home with Apple’s HomeKit. Running into unforeseen costs or time delays due to bridges or hubs necessary connection or problems with installation can postpone a schedule or dismantle a project. This paper provides pricing, connection requirements, installation notes, and additional notes to help homeowners plan and develop an Apple Homekit based smart home and avoid common smart home problems, saving time and money. Key Words: Apple, Smart Home Technology, HomeKit, Remodel Introduction Implementing smart home technology for the average homeowner requires basic knowledge that should be simple enough for any homeowner to understand such as screwing in lightbulbs, plugging devices into outlets, and connecting devices to home Wi-Fi networks.
    [Show full text]
  • A Changing Landscape: the Internet of Things (Iot)
    A Changing Landscape: the Internet of Things (IoT) Prof Sanjay Jha Deputy Director, Australian Center for Cyber Security, UNSW Director of Cyber Security and Privacy Laboratory, School of Computer Science and Engineering University Of New South Wales [email protected] http://www.cse.unsw.edu.au/~sanjay SecureCanberra@MilCIS 2014, Australia 13th Nov 2014 Internet of Things • Connected devices • Smoke alarms, light bulbs, power switches, motion sensors, door locks etc. 2 Outline • Introduction to IoT • History of IoT (and M2M) and Wireless Sensor Networks • Security Challenges in IoT • Sample Research Projects at UNSW History (IoT) • Early 90s or prior: SCADA systems, Telemetry applications • Late 90s- Products/services from mobile operators (Siemens) to connect devices via cellular network – Primarily automotive telematics • Mid- 2000s – Many tailored products for logistics, fleet management, car safety, healthcare, and smart metering of electricity consumption • Since 2010 – A large number of consortiums mushrooming up to bid for a large market share – ABI Projects US$198M by 2018 – Berg Insight US$187M by 2014…… History of Wireless Sensor Net • 1999: Kahn, Katz,Pister: Vision for Smart Dust • 2002 Sensys CFP: Wireless Sensor Network research as being composed of ”distributed systems of numerous smart sensors and actuators connecting computational capabilities to the physical world have the potential to revolutionise a wide array of application areas by providing an unprecedented density and fidelity of instrumentation”. Typical Application Roadmap to IoT • Supply Chain Applications – Routing, inventory, loss prevention. • Vertical Market Helpers – Healthcare, Transport, Energy, Agriculture, Security, Home Network. • Ubiquitous Position – Location of people and objects and possible tailored services • Teleoperations/Telepresence - Ability to interact/control with remote objects.
    [Show full text]
  • Basado En Imágenes Parametrizadas Sobre Resnet Para IdentiCar Intrusiones En 'Smartwatches' U Otros Dispositivos ANes
    IA eñ ™ • Publicaciones de autores 'Framework' basado en imágenes parametrizadas sobre ResNet para identicar intrusiones en 'smartwatches' u otros dispositivos anes. (Un eje singular de la publicación “Estado del arte de la ciencia de datos en el idioma español y su aplicación en el campo de la Inteligencia Articial”) Juan Antonio Lloret Egea, Celia Medina Lloret, Adrián Hernández González, Diana Díaz Raboso, Carlos Campos, Kimberly Riveros Guzmán, Adrián Pérez Herrera, Luis Miguel Cortés Carballo, Héctor Miguel Terrés Lloret License: Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC-BY-NC-ND 4.0) IA eñ ™ • Publicaciones de autores aplicación en el campo de la Inteligencia Articial”) Abstracto Se ha definido un framework1 conceptual y algebraicamente, inexistente hasta ahora en su morfología, y pionero en aplicación en el campo de la Inteligencia Artificial (IA) de forma conjunta; e implementado en laboratorio, en sus aspectos más estructurales, como un modelo completamente operacional. Su mayor aportación a la IA a nivel cualitativo es aplicar la conversión o transducción de parámetros obtenidos con lógica ternaria[1] (sistemas multivaluados)2 y asociarlos a una imagen, que es analizada mediante una red residual artificial ResNet34[2],[3] para que nos advierta de una intrusión. El campo de aplicación de este framework va desde smartwaches, tablets y PC's hasta la domótica basada en el estándar KNX[4]. Abstract note The full version of this document in the English language will be available in this link. Código QR de la publicación Este marco propone para la IA una ingeniería inversa de tal modo que partiendo de principios matemáticos conocidos y revisables, aplicados en una imagen gráfica en 2D para detectar intrusiones, sea escrutada la privacidad y la seguridad de un dispositivo mediante la inteligencia artificial para mitigar estas lesiones a los usuarios finales.
    [Show full text]