week 6

Week 6

 

  1.   Kim, Y., Park, Y., & Choi, J. (2017). A study on the adoption of IoT smart home service: using Value-based Adoption Model. Total Quality Management & Business Excellence28(9-10), 1149-1165.

 The goal of this study is to analyze the adoption of smart home services in a thorough manner. A new model incorporating VAM (Value-based Adoption Model) and TAM (Technical Acceptance Model) was developed and analyzed using a set of variables from the Unified Theory of Acceptance and Use of Technology and Elaboration Probability Model. Perceived interest has been influenced by both perceived profit and perceived cost. In particular, the expected gain has been found to have a significant positive impact on the expected interest. On the other hand, privacy threats and resistance to innovation have been found to restrict perceived interest. This study is of significant significance as it suggests a new approach to IoT (Internet of Things) focused on VAM and TAM-based smart home services. Via these two models, the study concluded that it was crucial for businesses to develop and secure the necessary infrastructure for residents to use IoT-based smart home services. Developing security-related content is also crucial.

  1. Pradeep, S., Kousalya, T., Suresh, K. A., & Edwin, J. (2016). Iot and its connectivity challenges in smart home. International Research Journal of Engineering and Technology (IRJET)3, 1040-43

The Internet of Things (IoT) has become a modern phenomenon in the world of networking and automation technologies. The strong use of IoT can be seen in “Home Automation,” where this technology turns a simple home into a smart house. Smart Home connects most of the digital appliances together and helps to communicate with the Internet network. The only difficulty is that each digital interface uses a different communication protocol which will also vary depending on the vendor.

The main aim of this study is to provide an summary of the Internet of Things, security requirements and other difficulties / challenges encountered by the smart home network.

3.   Zaidan, A. A., Zaidan, B. B., Qahtan, M. Y., Albahri, O. S., Albahri, A. S., Alaa, M., … & Lim, C. K. (2018). A survey on communication components for IoT-based technologies in smart homes. Telecommunication Systems69(1), 1-25.

The modern and transformative Internet of Things (IoT) systems used in smart homes have dramatically reduced and distributed connectivity components. In order to analyse these techniques and provide researchers with a strong vision for this field, we need to be aware of the methods used and the shortcomings that exist in this line of research. To this end, exhaustive searches have been performed for papers concerned with (a) smart houses, (b) IoT, and (c) similar implementations have been comprehensively reviewed and a consistent taxonomy has been developed for these papers.

4.   Prange, S., von Zezschwitz, E., & Alt, F. (2019, June). Vision: Exploring challenges and opportunities for usable authentication in the smart home. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 154-158). IEEE.

In this research, we analyse the architectures and future risks of existing smart home environments to facilitate the construction of new authentication mechanisms. Our research is inspired by the ever-increasing number of smart devices in people’s homes that are built to enrich the everyday lives of consumers. Examples of these products include, but are not limited to, smart TVs, robot washing, safety and well-being appliances, these apps are capable of capturing sensitive data and ultimately deriving information, such as when the user is at home, how much they eat or watch TV, etc. To recognize potential risks from smart devices that are capable of accessing confidential data, we first map a architecture and issue area. Our analysis is complemented by an in-depth overview of possible directions for science.

week 5

Week 5

  1. Source: research article

Santoso, F. K., & Vun, N. C. (2015, June). Securing IoT for smart home system. In 2015 International Symposium on Consumer Electronics (ISCE) (pp. 1-2). IEEE.

Description: This paper provides an approach to integrating strong protection in the implementation of the Internet of Things (IoT) for a smart home network, with due consideration given to the convenience of the user in the operation of a device.

Critique: The IoT smart home system operates on a standard, AllJoyn-based wifi network, using asymmetric Elliptic Curve Cryptography to perform the authentication during system service. A wifi gateway is used as the device’s core node to perform initial network setup.

Summary: It is t responsible for authenticating communication between IoT devices and providing a means for the user to set up, navigate and manage the system through an Android-based mobile device running an approved application programme.

  1. Source: Journal article

Alaa, M., Zaidan, A. A., Zaidan, B. B., Talal, M., & Kiah, M. L. M. (2017). A review of smart home applications based on Internet of Things. Journal of Network and Computer Applications97, 48-65.

Description: In order to provide useful insights into the technical landscape and to help researchers, we need to consider the opportunities and gaps available in this field of study. In this report, a analysis is carried out to map the research landscape into a coherent taxonomy.

Critique: Identify the basic characteristics of this emerging field in the following areas: incentive to use IoT in smart home applications, open challenges to usage barriers, and suggestions to increase the acceptance and use of smart home applications in literature.

Summary: People will continue to embrace new technology, so researchers need to know about emerging trends and technology. The next feature in smart homes can be IoT-connected wearable gadgets. These gadgets are controlled by applications and driven by new generation of built-in sensors.

 

 

Name: Abhishek Chauhan
Project Title:  IOT, smart homes technologies and their impacts
Week No: 5 Date:1/04/2020
Planning
MILESTONE PLANNED: ACTUAL: COMMENT:
1.Complete the project proposal and plan. All the information about the project is gathered and recorded as per the format. ·       Finished and submitted Project proposal and plan. It was interesting to do research on the subject, and will do further analysis.
ISSUES
DESCRIPTION DATE: ACTION/RESULTS: FINESHED (Y/N)
N/A N/A N/A N

 

week 4

Week 4

 

Annotate means to ‘make a note’, and biblio refers to ‘book’. Simply stated, an annotated bibliography is a list of sources or citations with a brief evaluative summary about each source. Its purpose is to describe and evaluate a full text in a way that provides sufficient information for the reader to make an informed decision about whether they are likely to benefit from reading the full text.

 

How to write an annotated bibliography

 

Survey the literature available to find texts which best address your topic or question. Read abstracts or academic book reviews to help you select appropriately. You should aim to cover a range of different approaches to your topic. Note down complete bibliographic details for your chosen texts, in the referencing style preferred by your department. Read and take notes on your selected texts, with attention to the author’s theoretical approach, the scope of their paper within the topic, main points or findings on the topic, and the author’s stance. Evaluate as you read and reflect this in your notes; this way your bibliography will not merely be a catalogue, but present your own informed stance on the texts and the topic as a whole.

 

There are two main sections to each annotated bibliography entry:

  1. the bibliographical information (the reference).
  2. the explanatory paragraphs (the annotation).

Parts of the annotation

The annotation must provide

  1. a summary of the main arguments or ideas presented by the author and depending on your assessment requirements.
  2. an evaluation of how useful we found the source. Assess its objectivity, reliability and bias, and compare it with other sources we have used.
  3. a reflection on how we used the source in your research.

List of articles:

 

1.     A review of connectivity challenges in IoT-smart home
2.     A review of smart home applications based on Internet of Things
  1.          IoT based smart home: Security challenges, security requirements and solutions

 

Name: Abhishek Chauhan
Project Title:  IOT, smart homes technologies and their impacts
Week No: 4 Date:24/03/2020
Planning
MILESTONE PLANNED: ACTUAL: COMMENT:
1.Study for specific methodologies and project initiation  

Researching past methodologies to find out the outcome of the problem.

·       Indicate the correct methodology and begin work on it step by step Getting information about how the preceding researchers solve the problem.
ISSUES
DESCRIPTION DATE: ACTION/RESULTS: FINESHED (Y/N)
N/A 30/03/2020 note down the main important points. N

 

 

 

week 3

 

Rationale:

The reasoning behind conducting research related to the internet of things and smart home based on technologies helps identify the various home based services associated with evolving developments in technology and innovation.

New and emerging technologies need to adhere to particular policies that have a beneficial impact on the development of the industry and manufacturing operations related to businesses

  

Problem domain:

Home automation refers to using computer technology to power the home appliances. Software technology allow varying degrees of intelligence and automation from remote lighting control to complex micro-controller or software-based networks. Smart home offers safe, energy savings and user-friendliness so more is adopted. It also provides household appliances with remote interface to provide control and tracking over a web browser. (Denzin,2017)

 

Purpose and justification:

This project’s main objective is to develop a smart home system that can be used to monitor the home appliances via the internet.

. When using this app, customer will be able to easily track and manage home appliances from anywhere in the world.

  

Conceptual and theoretical framework:

While IoT involves machines which communicate with machines, the human component can not be removed from the model. Stakeholders are crucial for IoT’s ultimate success. Holding this in mind, it is important to consider the focus areas and obstacles leading to IoT adoption and all have to be discussed carefully before IoT implementation.

 

References:

 

Afuah, A. (2005). Business models: A strategic management approach. Journal-Operational Research Society56(11), 1343-1343.

 

 

Name: Abhishek Chauhan
Project Title:  IOT, smart homes technologies and their impacts
Week No: 3 Date:18/03/2020
Planning
MILESTONE PLANNED: ACTUAL: COMMENT:
1.

·       Work on Project and Proposal Strategy.

 

2. Update the Blog and introduce a few new features

 

 

 

·       Work on Project Plan and Proposal continue.

·

·

·

·       Go deeper into that subject. Read the articles on the study.

 

 

 

This helps in project comprehension.

ISSUES
DESCRIPTION DATE: ACTION/RESULTS: FINESHED (Y/N)
Too much information to filter. 22/03/2020 note down the main important points. N

 

 

 

 

 

 

 

 

 

 

Step 1 of 2
Please sign in first
You are on your way to create a site.